Interlogix NS3550-8T-2S User Manual User Manual

Page 5

Advertising
background image

User’s Manual of NS3550-8T-2S

5

4.8.14 MVR.................................................................................................................................................................155

4.8.15 MVR Status......................................................................................................................................................157

4.8.16 MVR Groups Information .................................................................................................................................158

4.8.17

MVR SFM Information .....................................................................................................................................159

4.9 Quality of Service .....................................................................................................................................160

4.9.1 Understand QOS ...............................................................................................................................................160

4.9.2 Port Policing ......................................................................................................................................................160

4.9.3 Port Classification..............................................................................................................................................162

4.9.3.1 QoS Ingress Port Tag Classification ........................................................................................................163

4.9.4 Port Scheduler...................................................................................................................................................164

4.9.5 Port Shaping......................................................................................................................................................164

4.9.5.1 QoS Egress Port Schedule and Shapers ................................................................................................166

4.9.6 Port Tag Remarking ...........................................................................................................................................167

4.9.6.1 QoS Egress Port Tag Remarking.............................................................................................................167

4.9.7 Port DSCP .........................................................................................................................................................169

4.9.8 DSCP-Based QoS .............................................................................................................................................171

4.9.9 DSCP Translation ..............................................................................................................................................172

4.9.10 DSCP Classification.........................................................................................................................................174

4.9.11 QoS Control List...............................................................................................................................................174

4.9.11.1 QoS Control Entry Configuration ...........................................................................................................176

4.9.12 QoS Status ......................................................................................................................................................177

4.9.13 Storm Control Configuration ............................................................................................................................179

4.9.14 QoS Statistics ..................................................................................................................................................180

4.9.15 Voice VLAN Configuration ...............................................................................................................................181

4.9.16 Voice VLAN OUI Table.....................................................................................................................................183

4.10 Access Control Lists..............................................................................................................................183

4.10.1 Access Control List Status ...............................................................................................................................184

4.10.2 Access Control List Configuration....................................................................................................................185

4.10.3 ACE Configuration ...........................................................................................................................................187

4.10.4 ACL Ports Configuration ..................................................................................................................................192

4.10.5 ACL Rate Limiter Configuration .......................................................................................................................194

4.11 Authentication.........................................................................................................................................196

4.11.1 Understanding IEEE 802.1X Port-Based Authentication..................................................................................197

4.11.2 Authentication Configuration ............................................................................................................................199

4.11.3 Network Access Server Configuration..............................................................................................................201

4.11.4 Network Access Overview ...............................................................................................................................207

4.11.5 Network Access Statistics ................................................................................................................................208

4.11.6 Authentication Server Configuration.................................................................................................................213

4.11.7 RADIUS Overview ...........................................................................................................................................216

4.11.8 RADIUS Details ...............................................................................................................................................218

4.11.9 Windows Platform RADIUS Server Configuration............................................................................................223

4.11.10 802.1X Client Configuration ...........................................................................................................................228

4.12 Security ...................................................................................................................................................231

4.12.1 Port Limit Control.............................................................................................................................................231

4.12.2 Access Management .......................................................................................................................................234

4.12.3 Access Management Statistics ........................................................................................................................234

4.12.4 HTTPs .............................................................................................................................................................236

4.12.5 SSH .................................................................................................................................................................237

4.12.6 Port Security Status .........................................................................................................................................238

4.12.7 Port Security Detail ..........................................................................................................................................240

4.12.8 DHCP Snooping ..............................................................................................................................................240

4.12.9 DHCP Snooping Statistics ...............................................................................................................................242

4.12.10 IP Source Guard Configuration......................................................................................................................244

4.12.11 IP Source Guard Static Table .........................................................................................................................245

4.12.12 ARP Inspection ..............................................................................................................................................246

4.12.13 ARP Inspection Static Table ...........................................................................................................................247

4.13 MAC Address Table................................................................................................................................248

4.13.1 MAC Address Table Configuration ...................................................................................................................248

4.13.2 MAC Address Table Status ..............................................................................................................................250

4.13.3 Dynamic ARP Inspection Table........................................................................................................................251

4.13.4 Dynamic IP Source Guard Table......................................................................................................................253

4.14 LLDP ........................................................................................................................................................253

4.14.1 Link Layer Discovery Protocol .........................................................................................................................253

4.14.2 LLDP Configuration .........................................................................................................................................254

4.14.3 LLDP-MED Configuration ................................................................................................................................257

4.14.4 LLDP-MED Neighbor .......................................................................................................................................262

Advertising