VII
12.1
Time-Range
................................................................................................................
187
12.1.1
Time-Range Summary
....................................................................................
187
12.1.2
Time-Range Create
.........................................................................................
188
12.1.3
Holiday Config
.................................................................................................
189
12.2
ACL Config
.................................................................................................................
189
12.2.1
ACL Summary
.................................................................................................
189
12.2.2
ACL Create
......................................................................................................
190
12.2.3
MAC ACL
.........................................................................................................
191
12.2.4
Standard-IP ACL
..............................................................................................
191
12.2.5
Extend-IP ACL
.................................................................................................
192
12.2.6
Combined ACL
................................................................................................
194
12.3
Policy Config
..............................................................................................................
195
12.3.1
Policy Summary
..............................................................................................
195
12.3.2
Policy Create
...................................................................................................
196
12.3.3
Action Create
...................................................................................................
196
12.4
Policy Binding
.............................................................................................................
198
12.4.1
Binding Table
...................................................................................................
198
12.4.2
Port Binding
.....................................................................................................
198
12.4.3
VLAN Binding
..................................................................................................
199
12.5
Application Example for ACL
.....................................................................................
200
Chapter 13
Network Security
........................................................................................................
202
13.1
IP-MAC Binding
..........................................................................................................
202
13.1.1
Binding Table
...................................................................................................
202
13.1.2
Manual Binding
................................................................................................
203
13.1.3
ARP Scanning
.................................................................................................
205
13.2
DHCP Snooping
.........................................................................................................
206
13.2.1
DHCP Snooping
..............................................................................................
210
13.2.2
Option 82
..........................................................................................................
211
13.3
ARP Inspection
...........................................................................................................
212
13.3.1
ARP Detect
......................................................................................................
215
13.3.2
ARP Defend
.....................................................................................................
217
13.3.3
ARP Statistics
..................................................................................................
218
13.4
IP Source Guard
.........................................................................................................
218
13.5
DoS Defend
................................................................................................................
219
13.5.1
DoS Defend
.....................................................................................................
221
13.5.2
DoS Detect
......................................................................................................
222
13.6
802.1X
........................................................................................................................
222