Configuring the Access Control
.......................................................................................................................................
64
Configuring the HTTP Function
........................................................................................................................................
66
Configuring the HTTPS Function
.....................................................................................................................................
67
Configuring the SSH Feature
.............................................................................................................................................
69
Enabling the Telnet Function
..............................................................................................................................................
72
SDM Template Configuration
.......................................................................................................................................
73
Using the GUI
............................................................................................................................................................................................
73
Using the CLI
.............................................................................................................................................................................................
74
Appendix: Default Parameters
.....................................................................................................................................
76
Managing Physical Interfaces
Physical Interface
.............................................................................................................................................................
80
Overview
......................................................................................................................................................................................................
80
Supported Features
..............................................................................................................................................................................
80
Basic Parameters Configurations
...............................................................................................................................
81
Using the GUI
............................................................................................................................................................................................
81
Using the CLI
.............................................................................................................................................................................................
82
Port Mirror Configuration
...............................................................................................................................................
85
Using the GUI
............................................................................................................................................................................................
85
Using the CLI
.............................................................................................................................................................................................
87
Port Security Configuration
..........................................................................................................................................
89
Using the GUI
............................................................................................................................................................................................
89
Using the CLI
.............................................................................................................................................................................................
90
Port Isolation Configurations
.......................................................................................................................................
93
Using the GUI
............................................................................................................................................................................................
93
Using the CLI
.............................................................................................................................................................................................
94
Loopback Detection Configuration
...........................................................................................................................
96
Using the GUI
............................................................................................................................................................................................
96
Using the CLI
.............................................................................................................................................................................................
97
Configuration Examples
...............................................................................................................................................
100
Example for Port Mirror
....................................................................................................................................................................
100
Network Requirements
.......................................................................................................................................................
100
Configuration Scheme
........................................................................................................................................................
100
Using the GUI
............................................................................................................................................................................
100
Using the CLI
............................................................................................................................................................................
102
Example for Port Isolation
...............................................................................................................................................................
102
Network Requirements
.......................................................................................................................................................
102