
User’s Manual of GS-5220-24T4XV(R) Managed LCD Switch
4.4.1.5 Statistics..................................................................................................................................................225
4.4.2 Bandwidth Control.............................................................................................................................................226
4.4.2.1 Port Policing............................................................................................................................................226
4.4.2.2 Port Schedule..........................................................................................................................................227
4.4.2.3 Port Shaping............................................................................................................................................228
4.4.3 Storm Control ....................................................................................................................................................230
4.4.3.1 Storm Control Configuration....................................................................................................................230
4.4.4 Differentiated Service ........................................................................................................................................231
4.4.4.1 Port DSCP...............................................................................................................................................231
4.4.4.2 DSCP-based QoS ...................................................................................................................................233
4.4.4.3 DSCP Translation....................................................................................................................................234
4.4.4.4 DSCP Classification ................................................................................................................................235
4.4.5 QCL...................................................................................................................................................................236
4.4.5.1 QoS Control List......................................................................................................................................236
4.4.5.2 QoS Control Entry Configuration.............................................................................................................238
4.4.5.3 QCL Status..............................................................................................................................................240
4.4.5.4 Voice VLAN Configuration.......................................................................................................................242
4.4.5.6 Voice VLAN OUI Table ............................................................................................................................244
4.5 Security .....................................................................................................................................................245
4.5.1 Access Security.................................................................................................................................................245
4.5.1.1 Access Management...............................................................................................................................245
4.5.1.2 Access Management Statistics................................................................................................................246
4.5.1.3 SSH.........................................................................................................................................................246
4.5.1.4 HTTPs.....................................................................................................................................................247
4.5.2 AAA ...................................................................................................................................................................249
4.5.2.1 Authentication Configuration....................................................................................................................254
4.5.2.2 RADIUS...................................................................................................................................................256
4.5.2.3 TACACS+................................................................................................................................................259
4.5.2.4 RADIUS Overview...................................................................................................................................260
4.5.2.5 RADIUS Details.......................................................................................................................................262
4.5.3 Port Authentication ............................................................................................................................................268
4.5.3.1 Network Access Server Configuration.....................................................................................................268
4.5.3.2 Network Access Overview.......................................................................................................................272
4.5.3.3 Network Access Statistics........................................................................................................................273
4.5.4 Port Security......................................................................................................................................................278
4.5.4.1 Port Limit Control.....................................................................................................................................278
4.5.4.2 Port Security Status.................................................................................................................................281
4.5.4.3 Port Security Detail..................................................................................................................................285
4.5.5 Access Control Lists..........................................................................................................................................286
4.5.5.1 Access Control List Status.......................................................................................................................286