iii
3.5.5 GMRP Configuration ........................................................................3-67
3.5.6 Multicast Forwarding Table...............................................................3-68
3.6 Traffic Prioritization..................................................................................3-68
3.6.1 QoS..................................................................................................3-68
3.6.1.1 QoS Setting...............................................................................3-69
3.6.1.2 CoS Queue Mapping.................................................................3-70
3.6.1.3 DSCP Queue Mapping..............................................................3-71
3.7 Traffic Control..........................................................................................3-72
3.7.1 Port Protected ..................................................................................3-72
3.8 Port Bandwidth........................................................................................3-72
3.8.1 Storm Control ...................................................................................3-72
3.8.1.1 Storm Control Setting................................................................3-73
3.8.1.2 Rate Limiting.............................................................................3-74
3.9 Port Trunking...........................................................................................3-75
3.9.1 LAG..................................................................................................3-75
3.9.1.1 LAG Membership ......................................................................3-76
3.9.1.2 LAG Information........................................................................3-76
3.10 Access Control List..................................................................................3-76
3.10.1 MAC ACL .........................................................................................3-77
3.10.2 MAC Rules.......................................................................................3-78
3.10.3 MAC Binding Configuration..............................................................3-80
3.10.4 Binding Table....................................................................................3-81
3.11 Security Settings .....................................................................................3-81
3.11.1 Security ............................................................................................3-81
3.11.1.1 Port Security..............................................................................3-82
3.11.1.2 IP Source ..................................................................................3-84
3.11.1.3 Port Authentication....................................................................3-84
3.11.2 Management Security ......................................................................3-91
3.11.2.1 Local Users Management .........................................................3-91
3.11.2.2 RADIUS Server Config..............................................................3-92
3.11.2.3 RADIUS Statistics .....................................................................3-93
3.11.2.4 TACACS+ Server ......................................................................3-94
3.11.2.5 TACACS+ AS............................................................................3-95
3.11.2.6 Login Authentication..................................................................3-95
3.11.2.7 Login User Sessions .................................................................3-96
3.11.3 Denial of Service..............................................................................3-97
3.12 Monitoring Settings..................................................................................3-98
3.12.1 Mac Address Table...........................................................................3-99