Transition Networks
SISPM1040-3xxx-L Web User Guide
33763 Rev. G
Page
6
of
496
13-2.3 Status
....................................................................................................................................................
213
13-2.4 Groups Information
..............................................................................................................................
215
13-2.5 MLD SFM Information
...........................................................................................................................
217
13-3 MVR
..............................................................................................................................................................
219
10-3.1 Basic Configuration
...............................................................................................................................
219
13-3.2 Statistics
................................................................................................................................................
222
13-3.3 Groups Information
..............................................................................................................................
223
13-3.4 SFM Information
...................................................................................................................................
224
13-4 Multicast Filtering Profile
.............................................................................................................................
226
13-4.1 Filtering Profile Table
............................................................................................................................
226
13-4.2 Filtering Address Entry
..........................................................................................................................
229
Chapter 14
–
DHCP
......................................................................................................................................
231
14-1 Snooping
......................................................................................................................................................
231
14-1.1 Configuration
........................................................................................................................................
231
14-1.2 Snooping Table
......................................................................................................................................
233
14-1.3 Detailed Statistics
.................................................................................................................................
234
14-2 Relay
.............................................................................................................................................................
236
14-2.1 Configuration
........................................................................................................................................
236
14-2.2 Statistics
................................................................................................................................................
238
14-3 Server
...........................................................................................................................................................
240
14-3.1 Configuration
........................................................................................................................................
240
14-3.2 Status
....................................................................................................................................................
241
Chapter 15
–
Security
...................................................................................................................................
243
15-1 Management
................................................................................................................................................
243
15-1.1 Account
.................................................................................................................................................
243
15-1.2 Privilege Levels
......................................................................................................................................
247
15-1.3 Auth Method
.........................................................................................................................................
249
15-1.4 Access Method
......................................................................................................................................
252
15-1.5 HTTPS
....................................................................................................................................................
254
15-2 802.1X
..........................................................................................................................................................
256
15-2.1 Configuration
........................................................................................................................................
256
15-2.2 Status
....................................................................................................................................................
264
15-3 IP Source Guard
...........................................................................................................................................
270
15-3.1 Configuration
........................................................................................................................................
270
15-3.2 Static Table
............................................................................................................................................
272
15-3.3 Dynamic Table
.......................................................................................................................................
273
15-4 ARP Inspection
.............................................................................................................................................
275
15-4.1 Configuration
........................................................................................................................................
275
15-4.2 VLAN Configuration
..............................................................................................................................
277
15-4.3 Static Table
............................................................................................................................................
279
12-4.4 Dynamic Table
.......................................................................................................................................
280
15-5 Port Security
.................................................................................................................................................
282