VII
12.1 Time-Range ................................................................................................................ 187
12.1.1 Time-Range Summary .................................................................................... 187
12.1.2 Time-Range Create ......................................................................................... 188
12.1.3 Holiday Config ................................................................................................. 189
12.2 ACL Config ................................................................................................................. 189
12.2.1 ACL Summary ................................................................................................. 189
12.2.2 ACL Create ...................................................................................................... 190
12.2.3 MAC ACL ......................................................................................................... 191
12.2.4 Standard-IP ACL .............................................................................................. 191
12.2.5 Extend-IP ACL ................................................................................................. 192
12.2.6 Combined ACL ................................................................................................ 194
12.3 Policy Config .............................................................................................................. 195
12.3.1 Policy Summary .............................................................................................. 195
12.3.2 Policy Create ................................................................................................... 196
12.3.3 Action Create ................................................................................................... 196
12.4 Policy Binding ............................................................................................................. 198
12.4.1 Binding Table ................................................................................................... 198
12.4.2 Port Binding ..................................................................................................... 198
12.4.3 VLAN Binding .................................................................................................. 199
12.5 Application Example for ACL ..................................................................................... 200
Chapter 13 Network Security........................................................................................................ 202
13.1 IP-MAC Binding .......................................................................................................... 202
13.1.1 Binding Table ................................................................................................... 202
13.1.2 Manual Binding ................................................................................................ 203
13.1.3 ARP Scanning ................................................................................................. 205
13.2 DHCP Snooping ......................................................................................................... 206
13.2.1 DHCP Snooping .............................................................................................. 210
13.2.2 Option 82 .......................................................................................................... 211
13.3 ARP Inspection ........................................................................................................... 212
13.3.1 ARP Detect ...................................................................................................... 215
13.3.2 ARP Defend..................................................................................................... 217
13.3.3 ARP Statistics .................................................................................................. 218
13.4 IP Source Guard ......................................................................................................... 218
13.5 DoS Defend ................................................................................................................ 219
13.5.1 DoS Defend ..................................................................................................... 221
13.5.2 DoS Detect ......................................................................................................
222
13.6 802.1X ........................................................................................................................ 222