Chapter 13
ACL
..........................................................................................................................
261
13.1
Time-Range
..............................................................................................................
261
13.1.1
Time-Range Summary
...................................................................................
261
13.1.2
Time-Range Create
........................................................................................
262
13.1.3
Holiday Config
................................................................................................
263
13.2
ACL Config
...............................................................................................................
263
13.2.1
ACL Summary
................................................................................................
264
13.2.2
ACL Create
....................................................................................................
264
13.2.3
MAC ACL
.......................................................................................................
265
13.2.4
Standard-IP ACL
............................................................................................
265
13.2.5
Extend-IP ACL
...............................................................................................
266
13.3
Policy Config
.............................................................................................................
268
13.3.1
Policy Summary
.............................................................................................
268
13.3.2
Policy Create
..................................................................................................
268
13.3.3
Action Create
.................................................................................................
269
13.4
Policy Binding
...........................................................................................................
270
13.4.1
Binding Table
.................................................................................................
270
13.4.2
Port Binding
...................................................................................................
271
13.4.3
VLAN Binding
.................................................................................................
272
13.5
Application Example for ACL
....................................................................................
273
Chapter 14
Network Security
......................................................................................................
275
14.1
IP-MAC Binding
........................................................................................................
275
14.1.1
Binding Table
.................................................................................................
275
14.1.2
Manual Binding
..............................................................................................
276
14.1.3
ARP Scanning
................................................................................................
278
14.2
DHCP Snooping
.......................................................................................................
279
14.2.1
Global Config
.................................................................................................
282
14.2.2
Port Config
.....................................................................................................
284
14.3
ARP Inspection
.........................................................................................................
285
14.3.1
ARP Detect
....................................................................................................
288
14.3.2
ARP Defend
...................................................................................................
289
14.3.3
ARP Statistics
................................................................................................
290
14.4
IP Source Guard
.......................................................................................................
291
14.5
DoS Defend
..............................................................................................................
293
14.5.1
DoS Defend
...................................................................................................
294
14.6
802.1X
......................................................................................................................
294
14.6.1
Global Config
.................................................................................................
298
VI