Figures
– 22 –
Figure 169: Configuring User Accounts 266
Figure 170: Showing User Accounts 267
Figure 171: Configuring Global Settings for Web Authentication 268
Figure 172: Configuring Interface Settings for Web Authentication 269
Figure 173: Configuring Global Settings for Network Access 273
Figure 174: Configuring Interface Settings for Network Access 275
Figure 175: Configuring Link Detection for Network Access 276
Figure 176: Configuring a MAC Address Filter for Network Access 277
Figure 177: Showing the MAC Address Filter Table for Network Access 277
Figure 178: Showing Addresses Authenticated for Network Access 279
Figure 179: Configuring HTTPS 281
Figure 180: Downloading the Secure-Site Certificate 282
Figure 181: Configuring the SSH Server 286
Figure 182: Generating the SSH Host Key Pair 287
Figure 183: Showing the SSH Host Key Pair 288
Figure 184: Copying the SSH User’s Public Key 289
Figure 185: Showing the SSH User’s Public Key 290
Figure 186: Setting the Name of a Time Range 292
Figure 187: Showing a List of Time Ranges 293
Figure 188: Add a Rule to a Time Range 293
Figure 189: Showing the Rules Configured for a Time Range 294
Figure 190: Showing TCAM Utilization 295
Figure 191: Creating an ACL 296
Figure 192: Showing a List of ACLs 296
Figure 193: Configuring a Standard IPv4 ACL 298
Figure 194: Configuring an Extended IPv4 ACL 300
Figure 195: Configuring a Standard IPv6 ACL 302
Figure 196: Configuring an Extended IPv6 ACL 304
Figure 197: Configuring a MAC ACL 306
Figure 198: Configuring a ARP ACL 308
Figure 199: Binding a Port to an ACL 309
Figure 200: Configuring ACL Mirroring 310
Figure 201: Showing the VLANs to Mirror 310
Figure 202: Showing ACL Statistics 311
Figure 203: Configuring Global Settings for ARP Inspection 314