C
ONFIGURING
THE
S
WITCH
3-8
Authentication Settings Configures authentication sequence,
RADIUS and TACACS
6-3
HTTPS Settings Configures secure HTTP settings 6-7
SSH 6-10
Settings Configures Secure Shell server settings 6-16
Host-Key Settings Generates the host key pair (public and
private)
6-13
Port Security Configures per port security, including status,
response for security breach, and maximum
allowed MAC addresses
6-18
802.1X Port authentication 6-21
Information Displays global configuration settings 6-22
Configuration Configures global configuration parameters 6-23
Port Configuration Sets the authentication mode for individual
ports
6-24
Statistics Displays protocol statistics for the selected
port
6-27
ACL 7-1
Configuration Configures packet filtering based on IP or
MAC addresses
7-1
Port Binding Binds a port to the specified ACL 7-13
IP Filter Configures IP addresses that are allowed
management access
6-29
Port 8-1
Port Information Displays port connection status 8-1
Trunk Information Displays trunk connection status 8-1
Port Configuration Configures port connection settings 8-4
Trunk Configuration Configures trunk connection settings 8-4
Trunk Membership Specifies ports to group into static trunks 8-9
Table 3-2 Switch Main Menu (Continued)
Menu Description Page