IMP Global Settings .................................................................................................................................................................................... 226
IMP Port Settings ........................................................................................................................................................................................ 228
IMP Entry Settings ...................................................................................................................................................................................... 229
DHCP Snooping Entries ............................................................................................................................................................................. 230
MAC Block List .......................................................................................................................................................................................... 230
802.1X ........................................................................................................................................................................................ 231
Guest VLANs.............................................................................................................................................................................................. 236
Limitations Using the Guest VLAN ...................................................................................................................................................... 236
Configure 802.1X Guest VLAN ................................................................................................................................................................. 236
Configure 802.1X Authenticator Parameter ................................................................................................................................................ 238
802.1X User ................................................................................................................................................................................................ 240
Initialize Port(s) .......................................................................................................................................................................................... 241
Reauthenticate Port(s) ................................................................................................................................................................................. 242
Authentic RADIUS Server .......................................................................................................................................................................... 244
Web-based Access Control (WAC) ........................................................................................................................................... 245
Conditions and Limitations .................................................................................................................................................................... 245
WAC Global State ...................................................................................................................................................................................... 245
WAC Port Settings ...................................................................................................................................................................................... 247
WAC User Account .................................................................................................................................................................................... 249
WAC Host Table Settings ........................................................................................................................................................................... 250
Trust Host ................................................................................................................................................................................... 251
Access Authentication Control ................................................................................................................................................... 252
Authentication Policy & Parameter Settings ............................................................................................................................................... 253
Application's Authentication Settings ......................................................................................................................................................... 253
Authentication Server Group ...................................................................................................................................................................... 254
Authentication Server Host ......................................................................................................................................................................... 255
Login Method Lists ..................................................................................................................................................................................... 257
Enable Method Lists ................................................................................................................................................................................... 258
Configure Local Enable Password .............................................................................................................................................................. 260
Enable Admin ............................................................................................................................................................................................. 261
RADIUS Accounting Settings .................................................................................................................................................................... 262
MAC-based Access Control (MAC) .......................................................................................................................................... 263
Notes About MAC-based Access Control ............................................................................................................................................. 263
MAC-based Access Control Global Settings .............................................................................................................................................. 263
MAC-based Access Control Local MAC Settings ...................................................................................................................................... 266
Safeguard Engine ....................................................................................................................................................................... 267
Safeguard Engine Settings .......................................................................................................................................................................... 268
Traffic Segmentation .................................................................................................................................................................. 269
Secure Socket Layer (SSL) ........................................................................................................................................................ 270
SSL ............................................................................................................................................................................................. 271
Secure Shell (SSH) ..................................................................................................................................................................... 272
SSH Server Configuration ........................................................................................................................................................................... 273
SSH Authentication Mode and Algorithm Settings .................................................................................................................................... 274
SSH User Authentication Mode .................................................................................................................................................................. 276
Multiple Authentication ............................................................................................................................................................. 277