EasyManua.ls Logo

Raisecom ISCOM2600G-HI (A) Series - File management

Raisecom ISCOM2600G-HI (A) Series
581 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
Contents
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
xviii
9.5.5 Checking configurations ..................................................................................................................... 396
10 Security...................................................................................................................................... 397
10.1 ACL ............................................................................................................................................................ 397
10.1.1 Introduction ....................................................................................................................................... 397
10.1.2 Preparing for configurations ............................................................................................................. 398
10.1.3 Configuring MAC ACL .................................................................................................................... 398
10.1.4 Configuring ACL period ................................................................................................................... 401
10.1.5 Configuring filter .............................................................................................................................. 402
10.1.6 Checking configurations ................................................................................................................... 402
10.1.7 Maintenance ...................................................................................................................................... 403
10.2 Port security MAC ..................................................................................................................................... 403
10.2.1 Introduction ....................................................................................................................................... 403
10.2.2 Preparing for configurations ............................................................................................................. 404
10.2.3 Default configurations of port security MAC ................................................................................... 404
10.2.4 Configuring basic functions of port security MAC ........................................................................... 405
10.2.5 Configuring static secure MAC address ............................................................................................ 406
10.2.6 Configuring dynamic secure MAC address ...................................................................................... 406
10.2.7 Configuring sticky secure MAC address .......................................................................................... 407
10.2.8 Checking configurations ................................................................................................................... 408
10.2.9 Maintenance ...................................................................................................................................... 408
10.2.10 Example for configuring port security MAC .................................................................................. 408
10.3 Dynamic ARP inspection ........................................................................................................................... 410
10.3.1 Introduction ....................................................................................................................................... 410
10.3.2 Preparing for configurations ............................................................................................................. 412
10.3.3 Default configurations of dynamic ARP inspection .......................................................................... 412
10.3.4 Configuring trusted interfaces of dynamic ARP inspection .............................................................. 412
10.3.5 Configuring static binding of dynamic ARP inspection .................................................................... 413
10.3.6 Configuring dynamic binding of dynamic ARP inspection ............................................................... 413
10.3.7 Configuring protection VLAN of dynamic ARP inspection ............................................................. 413
10.3.8 Configuring rate limiting on ARP packets on interface .................................................................... 414
10.3.9 Checking configurations ................................................................................................................... 414
10.3.10 Example for configuring dynamic ARP inspection ......................................................................... 414
10.4 RADIUS ..................................................................................................................................................... 417
10.4.1 Introduction ....................................................................................................................................... 417
10.4.2 Preparing for configurations ............................................................................................................. 418
10.4.3 Default configurations of RADIUS .................................................................................................. 418
10.4.4 Configuring RADIUS authentication ................................................................................................ 418
10.4.5 Configuring RADIUS accounting ..................................................................................................... 419
10.4.6 Checking configurations ................................................................................................................... 420
10.4.7 Example for configuring RADIUS ................................................................................................... 420
10.5 TACACS+ .................................................................................................................................................. 422

Table of Contents

Related product manuals