4
7.2.1 DSCP Mutation Map .............................................................................. 207
7.2.2 Port Trust State and Mutation Binding ................................................... 208
7.2.3 DSCP CoS Mapping ................................................................................ 209
7.2.4 CoS Color Mapping ................................................................................ 210
7.2.5 DSCP Color Mapping ............................................................................. 211
7.2.6 Class Map .............................................................................................. 212
7.2.7 Aggregate Policer .................................................................................. 214
7.2.8 Policy Map ............................................................................................. 220
7.2.9 Policy Binding ......................................................................................... 228
8 ACL (Access Control List) .................................................................230
8.1.1 MAC ACL ............................................................................................... 232
8.1.2 IPv4 ....................................................................................................... 235
8.1.3 IPv6 ....................................................................................................... 240
8.2.1 Standard IP ACL ..................................................................................... 247
8.2.2 Extended IP ACL ..................................................................................... 250
8.2.3 Standard IPv6 ACL ................................................................................. 255
8.2.4 Extended IPv6 ACL ................................................................................. 258
8.2.5 Extended MAC ACL ................................................................................ 263
8.2.6 Extended Expert ACL .............................................................................. 266
8.3 ACL Interface Access Group ............................................................................ 272
8.4 ACL VLAN Access Map .................................................................................... 274
8.5 ACL VLAN Filter ............................................................................................... 277
9.1.1 Port Security Global Settings .................................................................. 278
9.1.2 Port Security Port Settings ...................................................................... 280
9.1.3 Port Security Address Entries .................................................................. 282
9.2.1 802.1X Global Settings ......................................................................... 283
9.2.2 802.1X Forced Authorized MAC Settings ............................................... 285
9.2.3 802.1X Unauthorized MAC Settings ....................................................... 286
9.2.4 802.1X Ports Settings ............................................................................ 287
9.2.5 EAP Port Config ..................................................................................... 292
9.2.6 802.1X Authentication Statistics Information ........................................ 293
9.2.7 802.1X Supplicant Global Settings ........................................................ 294
9.2.8 802.1X Supplicant Port Settings ............................................................. 295
9.2.9 802.1X Supplicant Statistics Information ................................................ 297
9.3 AAA (Authentication, Authorization, and Accounting) .................................... 298
9.3.1 AAA Global Settings .............................................................................. 298
9.3.2 AAA Authentication Settings .................................................................. 299
9.3.3 AAA Authentication User Settings .......................................................... 302
9.3.4 AAA Authentication MAC Settings ......................................................... 304
9.3.5 Application Authentication Settings ....................................................... 306
9.3.6 Application Accounting Settings ............................................................. 307
9.3.7 Authentication EXEC Settings ................................................................. 309
Содержание GA-ML Series
Страница 13: ...11 2 Web User Interface Web UI 2 1 Connecting to the Web UI Figure 2 3 Main Window of Web UI ...
Страница 42: ...40 3 System 3 7 PoE Configuration 3 7 1 PoE Global Configuration Click Apply to reflect the change ...
Страница 90: ...88 5 L2 Features 5 1 4 MAC Notification Figure 5 8 MAC Notification MAC Notification History ...
Страница 110: ...108 5 L2 Features 5 2 8 Voice VLAN 5 2 8 1 Voice VLAN Global Click Apply to reflect the change ...
Страница 151: ...149 5 L2 Features 5 7 2 MLD Snooping 5 7 2 1 MLD Snooping Settings Figure 5 54 MLD Snooping Settings Edit and Revise ...
Страница 170: ...168 5 L2 Features 5 8 5 LLDP Dot1 TLV Settings Click Apply to reflect the change ...
Страница 195: ...193 6 L3 Features 6 4 2 IPv6 Interface Click Apply to reflect the change ...
Страница 258: ...256 8 ACL Access Control List 8 2 3 Standard IPv6 ACL Figure 8 19 ACL Access List Adding Rules Standard IPv6 ACL v ...
Страница 298: ...296 9 Security 9 2 8 802 1X Supplicant Port Settings Click Apply to reflect the change ...