S1700 Managed Series Ethernet Switches
Web User Manual
Contents
Issue 05 (2012-10-25)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
vii
9.2 802.1X .......................................................................................................................................................... 123
9.2.1 Global .................................................................................................................................................. 124
9.2.2 Mode ................................................................................................................................................... 125
9.2.3 Interface .............................................................................................................................................. 126
9.2.4 Authorized Status ................................................................................................................................ 128
9.2.5 Statistics .............................................................................................................................................. 129
9.2.6 Session ................................................................................................................................................ 130
9.2.7 Diagnostics .......................................................................................................................................... 131
9.3 Guest VLAN ................................................................................................................................................ 133
9.4 Storm Suppression........................................................................................................................................ 134
9.4.1 Storm Control ...................................................................................................................................... 134
9.4.2 Storm Suppression .............................................................................................................................. 136
9.5 Port Security ................................................................................................................................................. 137
9.5.1 Port Security Parameter Configuration ............................................................................................... 138
9.5.2 Port Security Address Information ...................................................................................................... 140
9.5.3 Address Table Import and Export ........................................................................................................ 142
9.6 MAC-based Access Control ......................................................................................................................... 143
9.6.1 Global .................................................................................................................................................. 143
9.6.2 Interface .............................................................................................................................................. 144
9.6.3 MAC-based Access Control Auth-info ............................................................................................... 145
9.6.4 MAC Format Configure ...................................................................................................................... 146
9.7 Attack Prevent .............................................................................................................................................. 147
9.7.1 Worm Prevent ..................................................................................................................................... 147
9.7.2 DoS Attack Prevent ............................................................................................................................. 148
9.8 DHCP Snooping ........................................................................................................................................... 148
9.8.1 Global .................................................................................................................................................. 149
9.8.2 Interface State Settings ........................................................................................................................ 149
9.8.3 Interface Trust Settings ....................................................................................................................... 150
9.8.4 Interface Parameter Settings ............................................................................................................... 151
9.8.5 Binding Table Information .................................................................................................................. 153
9.9 IPSG ............................................................................................................................................................. 154
9.9.1 IPSG Settings ...................................................................................................................................... 154
9.9.2 Static Binding Table ............................................................................................................................ 156
9.9.3 One Key Bind ..................................................................................................................................... 157
9.10 DAI............................................................................................................................................................. 158
9.10.1 Global ................................................................................................................................................ 158
9.10.2 Interface ............................................................................................................................................ 159
9.11 MAC Attack ............................................................................................................................................... 161
9.11.1 Illegal Packet Settings ....................................................................................................................... 161
9.12 Interface Isolation ....................................................................................................................................... 162
9.12.1 Two-way Isolation ............................................................................................................................. 162
9.12.2 One-way Isolation ............................................................................................................................. 163