beautypg.com

Interlogix NS3550-2T-8S User Manual User Manual

Page 7

background image

IFS NS3552-8P-2S AND NS3550-2T-8S User Manual

7

4.10 Access Control Lists .............................................................................................................................. 217

4.10.1 Access Control List Status ............................................................................................................................... 218

4.10.2 Access Control List Configuration .................................................................................................................... 220

4.10.3 ACE Configuration ........................................................................................................................................... 222

4.10.4 ACL Ports Configuration .................................................................................................................................. 228

4.10.5 ACL Rate Limiter Configuration ....................................................................................................................... 230

4.11 Authentication ......................................................................................................................................... 232

4.11.1 Understanding IEEE 802.1X Port-Based Authentication .................................................................................. 233

4.11.2 Authentication Configuration ............................................................................................................................ 237

4.11.3 Network Access Server Configuration .............................................................................................................. 238

4.11.4 Network Access Overview ............................................................................................................................... 244

4.11.5 Network Access Statistics ................................................................................................................................ 245

4.11.6 Authentication Server Configuration................................................................................................................. 251

4.11.7 RADIUS Overview ........................................................................................................................................... 253

4.11.8 RADIUS Details ............................................................................................................................................... 256

4.11.9 Windows Platform RADIUS Server Configuration ............................................................................................ 260

4.11.10 802.1X Client Configuration ........................................................................................................................... 265

4.12 Security ................................................................................................................................................... 268

4.12.1 Port Limit Control ............................................................................................................................................. 268

4.12.2 Access Management ....................................................................................................................................... 272

4.12.3 Access Management Statistics ........................................................................................................................ 272

4.12.4 HTTPs ............................................................................................................................................................. 274

4.12.5 SSH ................................................................................................................................................................. 275

4.12.6 Port Security Status ......................................................................................................................................... 275

4.12.7 Port Security Detail .......................................................................................................................................... 278

4.12.8 DHCP Snooping .............................................................................................................................................. 278

4.12.9 DHCP Snooping Statistics ............................................................................................................................... 280

4.12.10 IP Source Guard Configuration ...................................................................................................................... 282

4.12.11 IP Source Guard Static Table ......................................................................................................................... 283

4.12.12 ARP Inspection .............................................................................................................................................. 284

4.12.13 ARP Inspection Static Table ........................................................................................................................... 285

4.13 MAC Address Table ................................................................................................................................ 286

4.13.1 MAC Address Table Configuration ................................................................................................................... 286

4.13.2 MAC Address Table Status .............................................................................................................................. 288

4.13.3 Dynamic ARP Inspection Table ........................................................................................................................ 289

4.13.4 Dynamic IP Source Guard Table ...................................................................................................................... 290

4.14 LLDP ........................................................................................................................................................ 292

4.14.1 Link Layer Discovery Protocol ......................................................................................................................... 292

4.14.2 LLDP Configuration ......................................................................................................................................... 292

This manual is related to the following products: