
User’s Manual of IGS-5225-8T2S2X & 8P2S2X series
4.5.1 Access Security.................................................................................................................................................271
4.5.1.1 Access Management...............................................................................................................................271
4.5.1.2 Access Management Statistics................................................................................................................272
4.5.1.3 SSH.........................................................................................................................................................273
4.5.1.4 HTTPs.....................................................................................................................................................273
4.5.2 AAA ...................................................................................................................................................................276
4.5.2.1 Authentication Configuration....................................................................................................................280
4.5.2.2 RADIUS...................................................................................................................................................283
4.5.2.3 TACACS+................................................................................................................................................285
4.5.2.4 RADIUS Overview...................................................................................................................................286
4.5.2.5 RADIUS Details.......................................................................................................................................288
4.5.3 Port Authentication ............................................................................................................................................295
4.5.3.1 Network Access Server Configuration.....................................................................................................295
4.5.3.2 Network Access Overview.......................................................................................................................298
4.5.3.3 Network Access Statistics........................................................................................................................300
4.5.4 Port Security......................................................................................................................................................305
4.5.4.1 Port Limit Control.....................................................................................................................................305
4.5.4.2 Port Security Status.................................................................................................................................308
4.5.4.3 Port Security Detail..................................................................................................................................310
4.5.5 Access Control Lists ..........................................................................................................................................312
4.5.5.1 Access Control List Status.......................................................................................................................312
4.5.5.2 Access Control List Configuration............................................................................................................313
4.5.5.3 ACE Configuration...................................................................................................................................315
4.5.5.4 ACL Ports Configuration..........................................................................................................................325
4.5.5.5 ACL Rate Limiters....................................................................................................................................327
4.5.6 DHCP Snooping................................................................................................................................................329
4.5.6.1 DHCP Snooping Configuration................................................................................................................329
4.5.6.2 Snooping Table........................................................................................................................................331
4.5.7 IP Source Guard................................................................................................................................................332
4.5.7.1 IP Source Guard Configuration................................................................................................................332
4.5.7.2 Static IP Source Guard Table ..................................................................................................................333
4.5.7.3 Dynamic IP Source Guard Table .............................................................................................................334
4.5.8 ARP Inspection..................................................................................................................................................335
4.5.8.1 ARP Inspection........................................................................................................................................335
4.5.8.2 ARP Inspection Static Table.....................................................................................................................336
4.5.8.3 Dynamic ARP Inspection Table................................................................................................................337
4.6 Power over Ethernet (IGS-5225-8P2S2X)...............................................................................................339
4.6.1 PoE....................................................................................................................................................................339
4.6.1.1 Power over Ethernet Powered Device.....................................................................................................340
4.6.1.2 System Configuration..............................................................................................................................340