Qtech QSW-2100-12T Руководство пользователя онлайн [11/348] 481677

Qtech QSW-2100-12T Руководство пользователя онлайн [11/348] 481677
QTECH QSW-2100-12T Configuration Guide (CLI)
Contents
9.1 Secure MAC address .................................................................................................................................... 217
9.1.1 Introduction ......................................................................................................................................... 217
9.1.2 Preparing for configurations ............................................................................................................... 218
9.1.3 Default configurations of secure MAC address .................................................................................. 219
9.1.4 Configuring basic functions of secure MAC address .......................................................................... 219
9.1.5 Configuring static secure MAC address .............................................................................................. 220
9.1.6 Configuring dynamic secure MAC address ........................................................................................ 220
9.1.7 Configuring Sticky secure MAC address ............................................................................................ 221
9.1.8 Checking configurations ..................................................................................................................... 222
9.1.9 Maintenance ........................................................................................................................................ 222
9.1.10 Example for configuring secure MAC address ................................................................................. 222
9.2 Dynamic ARP inspection ............................................................................................................................. 224
9.2.1 Introduction ......................................................................................................................................... 224
9.2.2 Preparing for configurations ............................................................................................................... 226
9.2.3 Default configurations of dynamic ARP inspection ............................................................................ 226
9.2.4 Configuring trusted interfaces of dynamic ARP inspection ................................................................ 226
9.2.5 Configuring static binding of dynamic ARP inspection ...................................................................... 227
9.2.6 Configuring dynamic binding of dynamic ARP inspection ................................................................. 227
9.2.7 Configuring protection VLAN of dynamic ARP inspection ............................................................... 227
9.2.8 Configuring rate limiting on ARP packets on interface ...................................................................... 227
9.2.9 Configuring auto-recovery time for rate limiting on ARP packets ...................................................... 228
9.2.10 Checking configurations ................................................................................................................... 228
9.2.11 Example for configuring dynamic ARP inspection ........................................................................... 228
9.3 RADIUS ....................................................................................................................................................... 231
9.3.1 Introduction ......................................................................................................................................... 231
9.3.2 Preparing for configurations ............................................................................................................... 231
9.3.3 Default configurations of RADIUS .................................................................................................... 232
9.3.4 Configuring RADIUS authentication .................................................................................................. 232
9.3.5 Configuring RADIUS accounting ....................................................................................................... 233
9.3.6 Checking configurations ..................................................................................................................... 234
9.3.7 Example for configuring RADIUS ..................................................................................................... 234
9.4 TACACS+ .................................................................................................................................................... 235
9.4.1 Introduction ......................................................................................................................................... 235
9.4.2 Preparing for configurations ............................................................................................................... 236
9.4.3 Default configurations of TACACS+ .................................................................................................. 236
9.4.4 Configuring TACACS+ authentication ............................................................................................... 236
9.4.5 Configuring TACACS+ accounting .................................................................................................... 237
9.4.6 Checking configurations ..................................................................................................................... 237
9.4.7 Maintenance ........................................................................................................................................ 237
9.4.8 Example for configuring TACACS+ ................................................................................................... 238
9.5 Storm control ................................................................................................................................................ 239
9.5.2 Preparing for configurations ............................................................................................................... 240

Содержание

Скачать