
AT-GS950/48 Web Interface User Guide
7
Create a Rate Control Entry .............................................................................................................. 253
Modify the Committed Rate............................................................................................................... 254
Delete a Rate Control Entry............................................................................................................... 255
Policy Database....................................................................................................................................... 256
Display Policy Sequence................................................................................................................... 256
Display Specific Policy Information.................................................................................................... 257
Chapter 19: RMON ..................................................................................................................................... 259
Overview.................................................................................................................................................. 260
Enable and Disable RMON...................................................................................................................... 261
Port Statistics........................................................................................................................................... 262
Histories................................................................................................................................................... 264
Events...................................................................................................................................................... 266
Alarms...................................................................................................................................................... 268
Chapter 20: Voice VLAN ............................................................................................................................. 273
Overview.................................................................................................................................................. 274
CoS with Voice VLAN........................................................................................................................ 274
Organization Unique Identifier (OUI) ................................................................................................. 274
Dynamic Auto-Detection vs Static Ports............................................................................................ 275
General Guidelines .................................................................................................................................. 277
Configuration............................................................................................................................................ 278
OUI Setting............................................................................................................................................... 281
Create OUI Setting ............................................................................................................................ 281
Modify OUI Setting ............................................................................................................................ 282
Delete OUI Setting............................................................................................................................. 282
Chapter 21: Security ................................................................................................................................... 283
Port Access Control ................................................................................................................................. 284
Port Access Control Overview........................................................................................................... 284
Port Access Control Configuration .................................................................................................... 285
RADIUS Client ......................................................................................................................................... 290
RADIUS Overview............................................................................................................................. 290
General Guidelines............................................................................................................................ 290
RADIUS Client Configuration ............................................................................................................ 291
RADIUS Accounting Status............................................................................................................... 292
TACACS+ ................................................................................................................................................ 293
TACACS+ Overview.......................................................................................................................... 293
General Guidelines............................................................................................................................ 293
TACACS+ Configuration.................................................................................................................... 294
Dial-in User— Local Authentication ......................................................................................................... 296
Dial-In User Overview........................................................................................................................ 296
Dial-in User Configuration ................................................................................................................. 296
Destination MAC Filter............................................................................................................................. 299
Destination MAC Filter Overview....................................................................................................... 299
Destination MAC Filter Configuration ................................................................................................ 299
Delete Destination MAC Filter ........................................................................................................... 300
Chapter 22: DHCP Snooping ...................................................................................................................... 303
Overview.................................................................................................................................................. 304
Trusted Ports..................................................................................................................................... 304
Untrusted Ports.................................................................................................................................. 304
Unauthorized DHCP Servers............................................................................................................. 304
DHCP with Option 82 ........................................................................................................................ 305
General Guidelines .................................................................................................................................. 306
General Configuration.............................................................................................................................. 307
Enabling DHCP Snooping ................................................................................................................. 307