EasyManua.ls Logo

Dasan V5808 - Page 6

Dasan V5808
814 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
UMN:CLI User Manual
V5808
6
4.5.2.1 Login to SSH Server ...................................................................................... 89
4.5.2.2 Secured File Copy ......................................................................................... 89
4.5.2.3 Authentication Key ......................................................................................... 89
4.6 802.1x Authentication .......................................................................... 90
4.6.1 802.1x Authentication ................................................................................. 92
4.6.1.1 Enabling 802.1x ............................................................................................. 92
4.6.1.2 RADIUS Server .............................................................................................. 92
4.6.1.3 Authentication Mode ...................................................................................... 93
4.6.1.4 Authentication Port ........................................................................................ 94
4.6.1.5 Force Authorization ........................................................................................ 94
4.6.1.6 Interval for Retransmitting Request/Identity Packet ....................................... 94
4.6.1.7 Interval of Authentication................................................................................ 94
4.6.1.8 Number of Requests to RADIUS Server ........................................................ 95
4.6.1.9 Interval of Request to RADIUS Server ........................................................... 95
4.6.2 802.1x Re-Authentication ........................................................................... 95
4.6.2.1 Enabling 802.1x Re-Authentication ................................................................ 95
4.6.2.2 Interval of Re-Authentication .......................................................................... 96
4.6.2.3 Interval of Requesting Re-Authentication ...................................................... 96
4.6.2.4 802.1x Re-Authentication............................................................................... 96
4.6.3 Initializing Authentication Status ................................................................. 97
4.6.4 Restoring Default Value ............................................................................. 97
4.6.5 Displaying 802.1x Configuration ................................................................ 97
4.6.6 802.1x User Authentication Statistics ......................................................... 97
4.6.7 Sample Configuration ................................................................................. 98
5 Port Configuration ............................................................................ 99
5.1 Ethernet Port Configuration ................................................................. 99
5.1.1 Enabling Ethernet Port ............................................................................... 99
5.1.2 Auto-Negotiation ........................................................................................ 99
5.1.3 Transmit Rate ........................................................................................... 100
5.1.4 Duplex Mode ............................................................................................ 100
5.1.5 Flow Control ............................................................................................. 100
5.1.6 Port Description ........................................................................................ 101
5.1.7 Network Service Port ............................................................................... 101
5.1.8 L2 Port Bridge .......................................................................................... 101
5.1.9 Port Crossover ......................................................................................... 102
5.1.10 Traffic Statistics ........................................................................................ 102
5.1.10.1 Packet Statistics ........................................................................................... 102
5.1.10.2 CPU Statistics .............................................................................................. 103
5.1.10.3 Protocol Statistics ........................................................................................ 104
5.1.11 Port Information ........................................................................................ 104
5.1.12 Port Debounce Timer ............................................................................... 105
5.2 Port Mirroring .................................................................................... 106
6 System Environment ...................................................................... 109
6.1 Environment Configuration ................................................................ 109
6.1.1 Host Name ............................................................................................... 109
6.1.2 Time and Date .......................................................................................... 109
6.1.3 Time Zone ................................................................................................. 110
6.1.4 Network Time Protocol (NTP) ................................................................... 111

Table of Contents