C
ONFIGURING
THE
S
WITCH
3-8
Host-Key Settings
Generates the host key pair (public and
private)
3-87
Port Security
Configures per port security, including
status, response for security breach, and
maximum allowed MAC addresses
3-91
802.1X
Port authentication
3-94
Information
Displays global configuration settings
3-95
Configuration
Configures global configuration parameters
3-96
Port Configuration
Sets the authentication mode for individual
ports
3-97
Statistics
Displays protocol statistics for the selected
port
3-101
ACL
3-105
Configuration
Configures packet filtering based on IP or
MAC addresses
3-105
Mask Configuration
Controls the order in which ACL rules are
checked
3-113
Port Binding
Binds a port to the specified ACL
3-119
IP Filter
Configures IP addresses that are allowed
management access
3-103
Port
3-121
Port Information
Displays port connection status
3-121
Trunk Information
Displays trunk connection status
3-121
Port Configuration
Configures port connection settings
3-125
Trunk Configuration
Configures trunk connection settings
3-125
Trunk Membership
Specifies ports to group into static trunks
3-128
Table 3-2 Main Menu
(Continued)
Menu
Description
Page
Содержание 8708L2
Страница 2: ......
Страница 24: ...TABLES xxiv ...
Страница 28: ...FIGURES xxviii ...
Страница 213: ...SPANNING TREE ALGORITHM CONFIGURATION 3 161 Web Click Spanning Tree STA Information Figure 3 66 STA Information ...
Страница 290: ...CONFIGURING THE SWITCH 3 238 ...
Страница 584: ...COMMAND LINE INTERFACE 4 294 ...
Страница 592: ...TROUBLESHOOTING B 4 ...
Страница 605: ......