Table of Contents
XS1930 Series User’s Guide
11
17.4 Technical Reference .................................................................................................................. 167
17.4.1 Static Trunking Example ................................................................................................... 167
Chapter 18
Port Authentication..........................................................................................................................169
18.1 Port Authentication Overview .................................................................................................. 169
18.1.1 What You Can Do ............................................................................................................. 169
18.1.2 What You Need to Know ................................................................................................. 170
18.1.3 MAC Authentication ........................................................................................................ 170
18.2 Port Authentication Configuration ........................................................................................... 171
18.3 Activate IEEE 802.1x Security ..................................................................................................... 171
18.4 Activate MAC Authentication .................................................................................................. 173
18.5 Guest VLAN ................................................................................................................................. 174
Chapter 19
Port Security......................................................................................................................................177
19.1 About Port Security ..................................................................................................................... 177
19.2 Port Security Setup ...................................................................................................................... 177
Chapter 20
Time Range.......................................................................................................................................179
20.1 Time Range Overview ................................................................................................................ 179
20.1.1 What You Can Do ............................................................................................................. 179
20.2 Configuring Time Range ............................................................................................................ 179
Chapter 21
Classifier............................................................................................................................................181
21.1 Classifier Overview ..................................................................................................................... 181
21.1.1 What You Can Do ............................................................................................................. 181
21.1.2 What You Need to Know ................................................................................................. 181
21.2 Classifier Status ............................................................................................................................ 181
21.3 Classifier Configuration .............................................................................................................. 182
21.3.1 Viewing and Editing Classifier Configuration Summary ............................................... 186
21.4 Classifier Global Setting Configuration .................................................................................... 187
21.5 Classifier Example ....................................................................................................................... 188
Chapter 22
Policy Rule ........................................................................................................................................190
22.1 Policy Rules Overview ................................................................................................................ 190
22.1.1 What You Can Do ............................................................................................................. 190
22.2 Configuring Policy Rules ............................................................................................................ 190
22.3 Policy Example ............................................................................................................................ 193