EasyManua.ls Logo

InHand InSwitch ISM-P Series - Page 3

Default Icon
81 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
II
4.1.4 Author Rule Management ................................................................................. - 15 -
4.1.5 Authentication Rule Management ..................................................................... - 16 -
4.2 Management Access ................................................................................................... - 16 -
4.2.1 Server ................................................................................................................ - 16 -
4.2.2 SNMP Community Management (SNMPv1/v2 community) .............................. - 17 -
4.2.3 SNMPv3 Configuration ...................................................................................... - 18 -
4.2.4 CLI ( Command Line Interface ) ........................................................................ - 19 -
4.3 Port Security ................................................................................................................ - 20 -
4.3.1 IP MAC Binding ................................................................................................. - 20 -
4.3.2 Static MAC Filter Mode ..................................................................................... - 20 -
4.3.3 Static MAC Filter ............................................................................................... - 21 -
4.3.4 Dynamic MAC Mode ......................................................................................... - 22 -
4.4 Switchport Protect ....................................................................................................... - 22 -
4.5 Keepalive ..................................................................................................................... - 23 -
4.6 802.1X Port Authentication .......................................................................................... - 24 -
4.6.1 Global ................................................................................................................ - 24 -
4.6.2 Authentication List ............................................................................................. - 25 -
4.4.3 Port Configuration ............................................................................................. - 25 -
4.6.4 Statistics ............................................................................................................ - 26 -
4.7 RADIUS ....................................................................................................................... - 26 -
4.7.1 Global ................................................................................................................ - 26 -
4.7.2 Service .............................................................................................................. - 26 -
Chapter 5 Time ................................................................................................................................... - 28 -
5.1 Basic Setting ................................................................................................................ - 28 -
5.2 NTP .............................................................................................................................. - 28 -
Chapter 6 Network Security .............................................................................................................. - 29 -
6.1 DOS Configuration ...................................................................................................... - 29 -
6.1.1 DOS Global Configuration ................................................................................. - 29 -
6.2
DHCP Snooping Configuration ......................................................................... - 29 -
6.2.1 DHCP Snooping Global Configuration .............................................................. - 29 -
6.2.2 DHCP Snooping VLAN Configuration ............................................................... - 30 -
6.2.3 DHCP Snooping Interface Configuration .......................................................... - 31 -
6.2.4 DHCP Snooping Bindings ................................................................................. - 31 -
6.3 Access Control List ...................................................................................................... - 32 -
6.3.1 IPv4 Rules ......................................................................................................... - 32 -
6.3.2 MAC Rules ........................................................................................................ - 33 -
6.3.3 Assignment ........................................................................................................ - 33 -
6.4 Filter Function .............................................................................................................. - 34 -

Table of Contents

Related product manuals