EasyManua.ls Logo

Quanta Cloud Technology QuantaMesh QNOS5 - Page 9

Quanta Cloud Technology QuantaMesh QNOS5
256 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
9
3.14. AR Guard........................................................................................................... 113
3.15. FIP Snooping ..................................................................................................... 113
3.16. ECN ................................................................................................................... 117
3.16.1. Enabling ECN in Microsoft Windows .............................................................................................................. 118
3.16.2. Example 1: SLA Example ................................................................................................................................. 118
3.16.3. Example 2: Data Cetner TCP (DCTCP) Configuration ...................................................................................... 121
4. Configuring Security Features ...................................................................... 123
4.1. Controlling Management Access ......................................................................................... 123
4.1.1. Using RADIUS Servers for Management Security ........................................................................................... 123
4.1.1.1. RADIUS Dynamic Authorization .................................................................................................................. 124
4.1.2. Using TACACS+ to Control Management Access ............................................................................................ 126
4.1.3. Configuring and Applying Authentication Profiles.......................................................................................... 126
4.1.3.1. Configuring Authentication Profiles for Post-based Authentication ........................................................... 128
4.1.4. Configuring the Primary and Secondary RADIUS Servers ............................................................................... 128
4.1.5. Configuring an Authentication Profile ............................................................................................................ 129
4.2. Configuring DHCP Snooping, DAI, and IPSG ......................................................................... 130
4.2.1. DHCP Snooping Overview ............................................................................................................................... 130
4.2.1.1. Populating the DHCP Snooping Bindings Database .................................................................................... 131
4.2.1.2. DHCP Snooping and VLANs ......................................................................................................................... 131
4.2.1.3. DHCP Snooping Logging and Rate Limits.................................................................................................... 132
4.2.2. IP Source Guard Overview .............................................................................................................................. 132
4.2.2.1. IPSG and Port Security ................................................................................................................................ 132
4.2.3. Dynamic ARP Inspection Overview ................................................................................................................. 133
4.2.3.1. Optional DAI Features ................................................................................................................................ 133
4.2.4. Increasing Security with DHCP Snooping, DAI, and IPSG ................................................................................ 133
4.2.5. Configuring DHCP Snooping ........................................................................................................................... 134
4.2.6. Configuring IPSG ............................................................................................................................................. 135
4.3. ACLs 136
4.3.1. MAC ACLs ........................................................................................................................................................ 136
4.3.2. IP ACLs ............................................................................................................................................................ 137
4.3.3. ACL Redirect Function ..................................................................................................................................... 137
4.3.4. ACL Mirror Function ........................................................................................................................................ 138
4.3.5. ACL Logging .................................................................................................................................................... 138
4.3.6. Time-based ACLs ............................................................................................................................................. 138
4.3.7. ACL Rule Remarks ........................................................................................................................................... 139
4.3.8. ACL Rule Priority ............................................................................................................................................. 139

Table of Contents