F
IGURES
– 54 –
Figure 176: Configuring Interface Settings for Network Access 334
Figure 177: Configuring Link Detection for Network Access 335
Figure 178: Configuring a MAC Address Filter for Network Access 336
Figure 179: Showing the MAC Address Filter Table for Network Access 336
Figure 180: Showing Addresses Authenticated for Network Access 338
Figure 181: Configuring HTTPS 340
Figure 182: Downloading the Secure-Site Certificate 341
Figure 183: Configuring the SSH Server 345
Figure 184: Generating the SSH Host Key Pair 347
Figure 185: Showing the SSH Host Key Pair 347
Figure 186: Copying the SSH User’s Public Key 348
Figure 187: Showing the SSH User’s Public Key 349
Figure 188: Setting the Name of a Time Range 352
Figure 189: Showing a List of Time Ranges 352
Figure 190: Add a Rule to a Time Range 353
Figure 191: Showing the Rules Configured for a Time Range 353
Figure 192: Showing TCAM Utilization 354
Figure 193: Creating an ACL 355
Figure 194: Showing a List of ACLs 356
Figure 195: Configuring a Standard IPv4 ACL 357
Figure 196: Configuring an Extended IPv4 ACL 360
Figure 197: Configuring a Standard IPv6 ACL 361
Figure 198: Configuring an Extended IPv6 ACL 363
Figure 199: Configuring a MAC ACL 365
Figure 200: Configuring a ARP ACL 367
Figure 201: Binding a Port to an ACL 369
Figure 202: Configuring ACL Mirroring 370
Figure 203: Showing the VLANs to Mirror 370
Figure 204: Showing ACL Statistics 372
Figure 205: Configuring Global Settings for ARP Inspection 375
Figure 206: Configuring VLAN Settings for ARP Inspection 376
Figure 207: Configuring Interface Settings for ARP Inspection 378
Figure 208: Displaying Statistics for ARP Inspection 379
Figure 209: Displaying the ARP Inspection Log 380
Figure 210: Creating an IP Address Filter for Management Access 381
Figure 211: Showing IP Addresses Authorized for Management Access 382