F
IGURES
– 54 –
Figure 176: Showing the MAC Address Filter Table for Network Access 335
Figure 177: Showing Addresses Authenticated for Network Access 336
Figure 178: Configuring HTTPS 338
Figure 179: Downloading the Secure-Site Certificate 340
Figure 180: Configuring the SSH Server 344
Figure 181: Generating the SSH Host Key Pair 345
Figure 182: Showing the SSH Host Key Pair 345
Figure 183: Copying the SSH User’s Public Key 347
Figure 184: Showing the SSH User’s Public Key 347
Figure 185: Setting the Name of a Time Range 350
Figure 186: Showing a List of Time Ranges 350
Figure 187: Add a Rule to a Time Range 351
Figure 188: Showing the Rules Configured for a Time Range 351
Figure 189: Showing TCAM Utilization 353
Figure 190: Creating an ACL 354
Figure 191: Showing a List of ACLs 354
Figure 192: Configuring a Standard IPv4 ACL 356
Figure 193: Configuring an Extended IPv4 ACL 358
Figure 194: Configuring a Standard IPv6 ACL 360
Figure 195: Configuring an Extended IPv6 ACL 362
Figure 196: Configuring a MAC ACL 364
Figure 197: Configuring a ARP ACL 366
Figure 198: Binding a Port to an ACL 367
Figure 199: Configuring ACL Mirroring 368
Figure 200: Showing the VLANs to Mirror 369
Figure 201: Showing ACL Statistics 370
Figure 202: Configuring Global Settings for ARP Inspection 373
Figure 203: Configuring VLAN Settings for ARP Inspection 374
Figure 204: Configuring Interface Settings for ARP Inspection 376
Figure 205: Displaying Statistics for ARP Inspection 377
Figure 206: Displaying the ARP Inspection Log 378
Figure 207: Creating an IP Address Filter for Management Access 379
Figure 208: Showing IP Addresses Authorized for Management Access 380
Figure 209: Configuring Port Security 382
Figure 210: Configuring Port Security 383
Figure 211: Configuring Global Settings for 802.1X Port Authentication 385