Interlogix NS3550-8T-2S User Manual User Manual
Page 5
User’s Manual of NS3550-8T-2S
5
4.8.14 MVR.................................................................................................................................................................155
4.8.15 MVR Status......................................................................................................................................................157
4.8.16 MVR Groups Information .................................................................................................................................158
MVR SFM Information .....................................................................................................................................159
4.9 Quality of Service .....................................................................................................................................160
4.9.1 Understand QOS ...............................................................................................................................................160
4.9.2 Port Policing ......................................................................................................................................................160
4.9.3 Port Classification..............................................................................................................................................162
4.9.3.1 QoS Ingress Port Tag Classification ........................................................................................................163
4.9.4 Port Scheduler...................................................................................................................................................164
4.9.5 Port Shaping......................................................................................................................................................164
4.9.5.1 QoS Egress Port Schedule and Shapers ................................................................................................166
4.9.6 Port Tag Remarking ...........................................................................................................................................167
4.9.6.1 QoS Egress Port Tag Remarking.............................................................................................................167
4.9.7 Port DSCP .........................................................................................................................................................169
4.9.8 DSCP-Based QoS .............................................................................................................................................171
4.9.9 DSCP Translation ..............................................................................................................................................172
4.9.10 DSCP Classification.........................................................................................................................................174
4.9.11 QoS Control List...............................................................................................................................................174
4.9.11.1 QoS Control Entry Configuration ...........................................................................................................176
4.9.12 QoS Status ......................................................................................................................................................177
4.9.13 Storm Control Configuration ............................................................................................................................179
4.9.14 QoS Statistics ..................................................................................................................................................180
4.9.15 Voice VLAN Configuration ...............................................................................................................................181
4.9.16 Voice VLAN OUI Table.....................................................................................................................................183
4.10 Access Control Lists..............................................................................................................................183
4.10.1 Access Control List Status ...............................................................................................................................184
4.10.2 Access Control List Configuration....................................................................................................................185
4.10.3 ACE Configuration ...........................................................................................................................................187
4.10.4 ACL Ports Configuration ..................................................................................................................................192
4.10.5 ACL Rate Limiter Configuration .......................................................................................................................194
4.11 Authentication.........................................................................................................................................196
4.11.1 Understanding IEEE 802.1X Port-Based Authentication..................................................................................197
4.11.2 Authentication Configuration ............................................................................................................................199
4.11.3 Network Access Server Configuration..............................................................................................................201
4.11.4 Network Access Overview ...............................................................................................................................207
4.11.5 Network Access Statistics ................................................................................................................................208
4.11.6 Authentication Server Configuration.................................................................................................................213
4.11.7 RADIUS Overview ...........................................................................................................................................216
4.11.8 RADIUS Details ...............................................................................................................................................218
4.11.9 Windows Platform RADIUS Server Configuration............................................................................................223
4.11.10 802.1X Client Configuration ...........................................................................................................................228
4.12 Security ...................................................................................................................................................231
4.12.1 Port Limit Control.............................................................................................................................................231
4.12.2 Access Management .......................................................................................................................................234
4.12.3 Access Management Statistics ........................................................................................................................234
4.12.4 HTTPs .............................................................................................................................................................236
4.12.5 SSH .................................................................................................................................................................237
4.12.6 Port Security Status .........................................................................................................................................238
4.12.7 Port Security Detail ..........................................................................................................................................240
4.12.8 DHCP Snooping ..............................................................................................................................................240
4.12.9 DHCP Snooping Statistics ...............................................................................................................................242
4.12.10 IP Source Guard Configuration......................................................................................................................244
4.12.11 IP Source Guard Static Table .........................................................................................................................245
4.12.12 ARP Inspection ..............................................................................................................................................246
4.12.13 ARP Inspection Static Table ...........................................................................................................................247
4.13 MAC Address Table................................................................................................................................248
4.13.1 MAC Address Table Configuration ...................................................................................................................248
4.13.2 MAC Address Table Status ..............................................................................................................................250
4.13.3 Dynamic ARP Inspection Table........................................................................................................................251
4.13.4 Dynamic IP Source Guard Table......................................................................................................................253
4.14 LLDP ........................................................................................................................................................253
4.14.1 Link Layer Discovery Protocol .........................................................................................................................253
4.14.2 LLDP Configuration .........................................................................................................................................254
4.14.3 LLDP-MED Configuration ................................................................................................................................257
4.14.4 LLDP-MED Neighbor .......................................................................................................................................262