4.9.15 Voice VLAN Configuration ...............................................................................................................................215
4.9.16 Voice VLAN OUI Table.....................................................................................................................................217
4.10 Access Control List................................................................................................................................218
4.10.3 ACE Configuration ...........................................................................................................................................222
4.10.4 ACL Ports Configuration ..................................................................................................................................232
4.11 Authentication.........................................................................................................................................235
4.11.4 Network Access Overview ...............................................................................................................................251
4.11.5 Network Access Statistics ................................................................................................................................252
4.11.6 RADIUS ...........................................................................................................................................................258
4.11.7 TACACS+ ........................................................................................................................................................260
4.11.8 RADIUS Overview ...........................................................................................................................................262
4.11.9 RADIUS Details ...............................................................................................................................................263
4.12 Security ...................................................................................................................................................278
4.12.1 Port Limit Control .............................................................................................................................................278
4.12.2 Access Management .......................................................................................................................................282
4.12.4 HTTPs .............................................................................................................................................................284
4.12.5 SSH .................................................................................................................................................................285
4.12.6 Port Security Status .........................................................................................................................................285
4.12.7 Port Security Detail ..........................................................................................................................................288
4.12.8 DHCP Snooping ..............................................................................................................................................289
4.12.9 Snooping Table ................................................................................................................................................290
4.12.13 ARP Inspection ..............................................................................................................................................294
4.13 MAC Address Table................................................................................................................................298
4.13.1 MAC Table Configuration.................................................................................................................................298
User's Manual of IGS-5225 series
7