Contents
6
Port List .................................................................................................................................................... 197
Create Port List ..................................................................................................................................197
Modify Port List ..................................................................................................................................198
Delete Port List...................................................................................................................................199
Policy ........................................................................................................................................................200
Create Policy......................................................................................................................................200
Modify Policy ......................................................................................................................................202
Delete Policy ......................................................................................................................................203
Policy Sequence.......................................................................................................................................205
Chapter 14: Storm Control ..........................................................................................................................207
Overview...................................................................................................................................................208
Ingress Rate Limiting .........................................................................................................................209
Egress Rate Limiting ..........................................................................................................................209
Configuration ............................................................................................................................................210
Ingress Rate Limiting................................................................................................................................ 212
Egress Rate Limiting ................................................................................................................................214
Chapter 15: MAC Address Table ................................................................................................................215
Overview...................................................................................................................................................216
Static Unicast MAC Address Configuration ..............................................................................................218
Modify Static Unicast Address..................................................................................................................220
Delete Static Unicast Address ..................................................................................................................221
Static Multicast Address Configuration.....................................................................................................222
Modify Static Multicast Address................................................................................................................224
Delete Static Multicast Address................................................................................................................225
Chapter 16: DHCP Snooping ......................................................................................................................227
Overview...................................................................................................................................................228
Trusted Ports...................................................................................................................................... 228
Untrusted Ports ..................................................................................................................................228
Unauthorized DHCP Servers .............................................................................................................228
DHCP with Option 82 .........................................................................................................................229
General Guidelines...................................................................................................................................230
General Configuration ..............................................................................................................................231
VLAN Setting ............................................................................................................................................233
Create VLAN Setting.......................................................................................................................... 233
Modify VLAN Setting .......................................................................................................................... 234
Delete VLAN Setting ..........................................................................................................................234
Trusted and Untrusted Port Configuration................................................................................................235
Binding Database .....................................................................................................................................236
Static IP Addresses............................................................................................................................236
Viewing...............................................................................................................................................237
Chapter 17: IGMP Snooping .......................................................................................................................239
Overview...................................................................................................................................................240
IGMP Snooping Configuration..................................................................................................................242
Chapter 18: Security ...................................................................................................................................245
Port Access Control.................................................................................................................................. 246
Overview ............................................................................................................................................246
Port Access Control Configuration .....................................................................................................247
RADIUS Client..........................................................................................................................................251
Overview ............................................................................................................................................251
General Guidelines ............................................................................................................................ 251
Radius Client Configuration ...............................................................................................................252