iii
FTP ·································································································································································· 57
Telnet ······························································································································································· 57
NTP ·································································································································································· 57
SNMP ······························································································································································· 57
MIB ··························································································································································· 57
SNMP versions ········································································································································ 58
SNMP access control ······························································································································· 58
Resources features ······················································································· 60
ACL ·································································································································································· 60
ACL types and match criteria ··················································································································· 60
Match order ·············································································································································· 60
Rule numbering ········································································································································ 61
Time range ······················································································································································· 62
SSL ·································································································································································· 62
Public key ························································································································································· 62
Managing local key pairs ·························································································································· 63
Managing peer public keys ······················································································································ 63
PKI ··································································································································································· 64
PKI architecture ········································································································································ 64
Managing certificates ······························································································································· 65
Certificate access control ································································································································· 66
Certificate access control policies ············································································································ 66
Attribute groups ········································································································································ 66
QoS features ································································································· 68
QoS policies ····················································································································································· 68
Traffic class ·············································································································································· 68
Traffic behavior ········································································································································ 68
QoS policy ················································································································································ 68
Applying a QoS policy ······························································································································ 68
Hardware queuing ············································································································································ 68
SP queuing ··············································································································································· 69
WRR queuing ··········································································································································· 69
WFQ queuing ··········································································································································· 70
Queue scheduling profile ························································································································· 71
Priority mapping ··············································································································································· 71
Port priority ··············································································································································· 71
Priority map ·············································································································································· 72
Rate limit ·························································································································································· 72
Security features ··························································································· 73
Packet filter ······················································································································································ 73
IP source guard ················································································································································ 73
Overview ·················································································································································· 73
Interface-specific static IPv4SG bindings ································································································· 73
802.1X ······························································································································································ 73
802.1X architecture ·································································································································· 73
802.1X authentication methods ················································································································ 74
Access control methods ··························································································································· 74
Port authorization state ···························································································································· 74
Periodic online user reauthentication ······································································································· 74
Online user handshake ···························································································································· 75
Authentication trigger ······························································································································· 75
Auth-Fail VLAN ········································································································································ 75
Guest VLAN ············································································································································· 76
Critical VLAN ············································································································································ 76
Mandatory authentication domain ············································································································ 77
EAD assistant ··········································································································································· 77
MAC authentication ·········································································································································· 77
Overview ·················································································································································· 77
MAC authentication configuration on a port ····························································································· 78