
User’s Manual of GS-5220 LCD Series Managed Switch
4.5.5.1 QoS Control List......................................................................................................................................280
4.5.5.2 QoS Control Entry Configuration.............................................................................................................282
4.5.5.3 QCL Status..............................................................................................................................................284
4.5.5.4 Voice VLAN Configuration.......................................................................................................................286
4.5.5.5 Voice VLAN OUI Table ............................................................................................................................287
4.6 Security .....................................................................................................................................................289
4.6.1 Access Security.................................................................................................................................................289
4.6.1.1 Access Management...............................................................................................................................289
4.6.1.2 Access Management Statistics................................................................................................................290
4.6.1.3 SSH.........................................................................................................................................................290
4.6.1.4 HTTPs.....................................................................................................................................................291
4.6.2 AAA ...................................................................................................................................................................293
4.6.2.1 Authentication Configuration....................................................................................................................298
4.6.2.2 RADIUS...................................................................................................................................................300
4.6.2.3 TACACS+................................................................................................................................................302
4.6.2.4 RADIUS Overview...................................................................................................................................304
4.6.2.5 RADIUS Details.......................................................................................................................................306
4.6.3 Port Authentication ............................................................................................................................................312
4.6.3.1 Network Access Server Configuration.....................................................................................................312
4.6.3.2 Network Access Overview.......................................................................................................................316
4.6.3.3 Network Access Statistics........................................................................................................................317
4.6.4 Port Security......................................................................................................................................................322
4.6.4.1 Port Limit Control.....................................................................................................................................322
4.6.4.2 Port Security Status.................................................................................................................................325
4.6.4.3 Port Security Detail..................................................................................................................................328
4.6.5 Access Control Lists..........................................................................................................................................329
4.5.5.1 Access Control List Status.......................................................................................................................329
4.6.5.2 Access Control List Configuration............................................................................................................330
4.6.5.3 ACE Configuration...................................................................................................................................333
4.6.5.4 ACL Ports Configuration..........................................................................................................................343
4.6.5.5 ACL Rate Limiters....................................................................................................................................344
4.6.6 DHCP Snooping................................................................................................................................................346
4.5.6.1 DHCP Snooping Configuration................................................................................................................346
4.6.6.2 Snooping Table........................................................................................................................................348
4.6.7 IP Source Guard................................................................................................................................................349
4.6.7.1 IP Source Guard Configuration................................................................................................................349
4.6.7.2 Static IP Source Guard Table..................................................................................................................350
4.6.7.3 Dynamic IP Source Guard Table.............................................................................................................351
4.6.8 ARP Inspection..................................................................................................................................................352
4.6.8.1 ARP Inspection........................................................................................................................................352