Figures
xxiv
Figure 3-43 AAA Accounting Summary 3-67
Figure 3-44 AAA Authorization Settings 3-68
Figure 3-45 AAA Authorization Exec Settings 3-69
Figure 3-46 AAA Authorization Summary 3-70
Figure 3-47 HTTPS Settings 3-71
Figure 3-48 HTTPS Settings 3-72
Figure 3-49 SSH Server Settings 3-75
Figure 3-50 SSH Host-Key Settings 3-77
Figure 3-51 SSH User Public-Key Settings 3-79
Figure 3-52 Configuring Port Security 3-82
Figure 3-53 802.1X Global Information 3-84
Figure 3-54 802.1X Global Configuration 3-85
Figure 3-55 802.1X Port Configuration 3-86
Figure 3-56 Displaying 802.1X Port Statistics 3-89
Figure 3-57 Web Authentication Configuration 3-90
Figure 3-58 Web Authentication Port Configuration 3-91
Figure 3-59 Web Authentication Port Information 3-93
Figure 3-60 Web Authentication Port Re-authentication 3-93
Figure 3-61 Network Access Configuration 3-95
Figure 3-62 Network Access Port Configuration 3-96
Figure 3-63 Network Access Port Link Detection Configuration 3-98
Figure 3-64 Network Access MAC Address Information 3-99
Figure 3-65 MAC Authentication Port Configuration 3-100
Figure 3-66 Selecting ACL Type 3-102
Figure 3-67 Configuring Standard IP ACLs 3-103
Figure 3-68 Configuring Extended IP ACLs 3-105
Figure 3-69 Configuring MAC ACLs 3-107
Figure 3-70 Configuring ACL Port Binding 3-108
Figure 3-71 Creating an IP Filter List 3-110
Figure 3-72 Displaying Port/Trunk Information 3-111
Figure 3-73 Port/Trunk Configuration 3-114
Figure 3-74 Configuring Static Trunks 3-116
Figure 3-75 LACP Trunk Configuration 3-118
Figure 3-76 LACP Port Configuration 3-120
Figure 3-77 LACP - Port Counters Information 3-122
Figure 3-78 LACP - Port Internal Information 3-124
Figure 3-79 LACP - Port Neighbors Information 3-125
Figure 3-80 Port Broadcast Control 3-127
Figure 3-81 Mirror Port Configuration 3-128
Figure 3-82 Input Rate Limit Port Configuration 3-129
Figure 3-83 Port Statistics 3-133
Figure 3-84 Configuring a Static Address Table 3-135
Figure 3-85 Configuring a Dynamic Address Table 3-136
Figure 3-86 Setting the Address Aging Time 3-137
Figure 3-87 Configuring Port Loopback Detection 3-140