12.2.4 Standard-IP ACL ............................................................................................185
12.2.5 Extend-IP ACL ...............................................................................................186
12.2.6 Combined ACL...............................................................................................188
12.3 Policy Config.............................................................................................................189
12.3.1 Policy Summary .............................................................................................189
12.3.2 Policy Create..................................................................................................190
12.3.3 Action Create .................................................................................................190
12.4 Policy Binding ...........................................................................................................192
12.4.1 Binding Table .................................................................................................192
12.4.2 Port Binding ...................................................................................................192
12.4.3 VLAN Binding.................................................................................................193
12.5 Application Example for ACL ....................................................................................194
Chapter 13 Network Security ......................................................................................................196
13.1 IP-MAC Binding ........................................................................................................196
13.1.1 Binding Table .................................................................................................196
13.1.2 Manual Binding ..............................................................................................197
13.1.3 ARP Scanning................................................................................................199
13.2 DHCP Snooping .......................................................................................................200
13.2.1
DHCP
Snooping.............................................................................................204
13.2.2 Option 82 .......................................................................................................205
13.3 ARP Inspection.........................................................................................................206
13.3.1 ARP Detect ....................................................................................................209
13.3.2 ARP Defend ................................................................................................... 211
13.3.3 ARP Statistics ................................................................................................212
13.4 IP Source Guard .......................................................................................................212
13.5 DoS Defend ..............................................................................................................213
13.5.1 DoS Defend ...................................................................................................215
13.5.2 DoS Detect.....................................................................................................216
13.6 802.1X ......................................................................................................................216
13.6.1 Global Config .................................................................................................220
13.6.2 Port Config.....................................................................................................222
13.7 AAA ..........................................................................................................................223
13.7.1 Global Config .................................................................................................224
13.7.2 Privilege Elevation .........................................................................................225
13.7.3 RADIUS Server Config ..................................................................................225
13.7.4 TACACS+ Server Config................................................................................226
13.7.5 Authentication Server Group Config ..............................................................227
V