EasyManuals Logo

Quanta Cloud Technology QuantaMesh QNOS5 User Manual

Quanta Cloud Technology QuantaMesh QNOS5
256 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #9 background imageLoading...
Page #9 background image
9
3.14. AR Guard........................................................................................................... 113
3.15. FIP Snooping ..................................................................................................... 113
3.16. ECN ................................................................................................................... 117
3.16.1. Enabling ECN in Microsoft Windows .............................................................................................................. 118
3.16.2. Example 1: SLA Example ................................................................................................................................. 118
3.16.3. Example 2: Data Cetner TCP (DCTCP) Configuration ...................................................................................... 121
4. Configuring Security Features ...................................................................... 123
4.1. Controlling Management Access ......................................................................................... 123
4.1.1. Using RADIUS Servers for Management Security ........................................................................................... 123
4.1.1.1. RADIUS Dynamic Authorization .................................................................................................................. 124
4.1.2. Using TACACS+ to Control Management Access ............................................................................................ 126
4.1.3. Configuring and Applying Authentication Profiles.......................................................................................... 126
4.1.3.1. Configuring Authentication Profiles for Post-based Authentication ........................................................... 128
4.1.4. Configuring the Primary and Secondary RADIUS Servers ............................................................................... 128
4.1.5. Configuring an Authentication Profile ............................................................................................................ 129
4.2. Configuring DHCP Snooping, DAI, and IPSG ......................................................................... 130
4.2.1. DHCP Snooping Overview ............................................................................................................................... 130
4.2.1.1. Populating the DHCP Snooping Bindings Database .................................................................................... 131
4.2.1.2. DHCP Snooping and VLANs ......................................................................................................................... 131
4.2.1.3. DHCP Snooping Logging and Rate Limits.................................................................................................... 132
4.2.2. IP Source Guard Overview .............................................................................................................................. 132
4.2.2.1. IPSG and Port Security ................................................................................................................................ 132
4.2.3. Dynamic ARP Inspection Overview ................................................................................................................. 133
4.2.3.1. Optional DAI Features ................................................................................................................................ 133
4.2.4. Increasing Security with DHCP Snooping, DAI, and IPSG ................................................................................ 133
4.2.5. Configuring DHCP Snooping ........................................................................................................................... 134
4.2.6. Configuring IPSG ............................................................................................................................................. 135
4.3. ACLs 136
4.3.1. MAC ACLs ........................................................................................................................................................ 136
4.3.2. IP ACLs ............................................................................................................................................................ 137
4.3.3. ACL Redirect Function ..................................................................................................................................... 137
4.3.4. ACL Mirror Function ........................................................................................................................................ 138
4.3.5. ACL Logging .................................................................................................................................................... 138
4.3.6. Time-based ACLs ............................................................................................................................................. 138
4.3.7. ACL Rule Remarks ........................................................................................................................................... 139
4.3.8. ACL Rule Priority ............................................................................................................................................. 139

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Quanta Cloud Technology QuantaMesh QNOS5 and is the answer not in the manual?

Quanta Cloud Technology QuantaMesh QNOS5 Specifications

General IconGeneral
BrandQuanta Cloud Technology
ModelQuantaMesh QNOS5
CategoryNetwork Router
LanguageEnglish