Contents
6
Port List .................................................................................................................................................... 195
Create Port List .................................................................................................................................. 195
Modify Port List ..................................................................................................................................196
Delete Port List...................................................................................................................................197
Policy ........................................................................................................................................................198
Create Policy......................................................................................................................................198
Modify Policy ......................................................................................................................................200
Delete Policy ......................................................................................................................................201
Policy Sequence.......................................................................................................................................203
Chapter 14: Storm Control ..........................................................................................................................205
Overview...................................................................................................................................................206
Ingress Rate Limiting .........................................................................................................................207
Egress Rate Limiting ..........................................................................................................................207
Configuration ............................................................................................................................................208
Ingress Rate Limiting................................................................................................................................ 210
Egress Rate Limiting ................................................................................................................................212
Chapter 15: MAC Address Table ................................................................................................................213
Overview...................................................................................................................................................214
Static Unicast MAC Address Configuration ..............................................................................................216
Modify Static Unicast Address..................................................................................................................218
Delete Static Unicast Address ..................................................................................................................219
Static Multicast Address Configuration.....................................................................................................220
Modify Static Multicast Address................................................................................................................222
Delete Static Multicast Address................................................................................................................223
Chapter 16: DHCP Snooping ......................................................................................................................225
Overview...................................................................................................................................................226
Trusted Ports...................................................................................................................................... 226
Untrusted Ports .................................................................................................................................. 226
Unauthorized DHCP Servers .............................................................................................................226
DHCP with Option 82 .........................................................................................................................227
General Guidelines...................................................................................................................................228
General Configuration ..............................................................................................................................229
VLAN Setting ............................................................................................................................................231
Create VLAN Setting.......................................................................................................................... 231
Modify VLAN Setting ..........................................................................................................................232
Delete VLAN Setting ..........................................................................................................................232
Trusted and Untrusted Port Configuration................................................................................................233
Binding Database ..................................................................................................................................... 234
Static IP Addresses............................................................................................................................234
Viewing...............................................................................................................................................235
Chapter 17: IGMP Snooping .......................................................................................................................237
Overview...................................................................................................................................................238
IGMP Snooping Configuration..................................................................................................................240
Chapter 18: Security ...................................................................................................................................243
Port Access Control.................................................................................................................................. 244
Overview ............................................................................................................................................244
Port Access Control Configuration .....................................................................................................245
RADIUS Client..........................................................................................................................................249
Overview ............................................................................................................................................249
General Guidelines ............................................................................................................................ 249
Radius Client Configuration ...............................................................................................................250