EasyManua.ls Logo

Raisecom ISCOM2600G-HI (A) Series - Page 21

Raisecom ISCOM2600G-HI (A) Series
581 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
Contents
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
xix
10.5.1 Introduction ....................................................................................................................................... 422
10.5.2 Preparing for configurations ............................................................................................................. 422
10.5.3 Default configurations of TACACS+ ................................................................................................ 423
10.5.4 Configuring TACACS+ authorization............................................................................................... 423
10.5.5 Configuring TACACS+ authentication ............................................................................................. 423
10.5.6 Configuring TACACS+ accounting .................................................................................................. 424
10.5.7 Configuring TACACS+ authorization............................................................................................... 424
10.5.8 Checking configurations ................................................................................................................... 424
10.5.9 Maintenance ...................................................................................................................................... 425
10.5.10 Example for configuring TACACS+ ............................................................................................... 425
10.6 Storm control .............................................................................................................................................. 426
10.6.1 Introduction ....................................................................................................................................... 426
10.6.2 Preparing for configurations ............................................................................................................. 427
10.6.3 Default configurations of storm control ............................................................................................ 427
10.6.4 Configuring storm control ................................................................................................................. 428
10.6.5 Configuring DLF packet forwarding................................................................................................. 429
10.6.6 Checking configurations ................................................................................................................... 429
10.6.7 Example for configuring storm control ............................................................................................. 429
10.7 802.1x ......................................................................................................................................................... 431
10.7.1 Introduction ....................................................................................................................................... 431
10.7.2 Preparing for configruations ............................................................................................................. 433
10.7.3 Default configurations of 802.1x ...................................................................................................... 433
10.7.4 Configuring basic functions of 802.1x .............................................................................................. 434
10.7.5 Configuring 802.1x re-authentication ............................................................................................... 435
10.7.6 Configuring 802.1x timers ................................................................................................................ 435
10.7.7 Checking configurations ................................................................................................................... 436
10.7.8 Maintenance ...................................................................................................................................... 436
10.7.9 Example for configuring 802.1x ....................................................................................................... 437
10.8 IP Source Guard ......................................................................................................................................... 438
10.8.1 Introduction ....................................................................................................................................... 438
10.8.2 Preparing for configurations ............................................................................................................. 440
10.8.3 Default configurations of IP Source Guard ....................................................................................... 440
10.8.4 Configuring interface trust status of IP Source Guard ...................................................................... 440
10.8.5 Configuring IP Source Guard binding............................................................................................... 441
10.8.6 Configuring priority and rate limit of IP source guard ...................................................................... 442
10.8.7 Checking configurations ................................................................................................................... 442
10.8.8 Example for configuring IP Source Guard ........................................................................................ 442
10.9 PPPoE+ ...................................................................................................................................................... 444
10.9.1 Introduction ....................................................................................................................................... 444
10.9.2 Preparing for configurations ............................................................................................................. 445
10.9.3 Default configurations of PPPoE+ .................................................................................................... 446
10.9.4 Configuring basic functions of PPPoE+ ........................................................................................... 446

Table of Contents

Related product manuals