iES12G
User’s
Manual
UM-iES12G-1.72.2-EN.docx
Pages 118 of 166
© 2020 IS5 COMMUNICATIONS INC. ALL RIGHTS RESERVED
Label
Description
Select ACL
Select one of the following to be displayed:
Combined
: Shows both static and conflict entries in the ACL.
Static:
Shows static entries in the ACL.
IPMC:
Shows IPv4 MultiCast (IPMC)entries in the ACL.
PTP:
Shows PTP entries in the ACL
DHCP:
Shows DHCP entries in the ACL
Loop Protect:
Shows Loop-protect entries in the ACL.
Loop protect feature can prevent Layer2 loops by sending loop protect protocol packets
and shutting down interfaces in case they receive loop protect packets originated from
themselves. The feature works by checking source MAC address of received loop
protect packet against MAC addresses of loop protect enabled interfaces. If the match
is found, loop protect disables the interface which received the loop protect packet.
Log message warns about this event and interface is marked with a loop protect
comment by system.
Conflict:
Show conflict entries in the ACL.
Refresh
Click to refresh the page.
Auto-refresh
Check to enable an automatic refresh of the page at regular intervals.
AAA
AAA - Authentication Server Configuration
4.1.12.4.1.1
Common Server Configuration
This page allows the user to configure the Authentication Servers..
Figure 116 - Common Server Configuration
Label
Description
Timeout
The Timeout, which can be set to a number between 3 and 3600 seconds, is the
maximum time to wait for a reply from a server.
If the server does not reply within this time frame, we will consider it to be dead and
continue with the next enabled server (if any).
RADIUS servers are using the
protocol, which is unreliable by design. In order to
cope with lost frames, the timeout interval is divided into 3 subintervals of equal
length. If a reply is not received within the subinterval, the request is transmitted
again. This algorithm causes the RADIUS server to be queried up to 3 times before it
is considered to be dead.