Access Control.................................................................................................................................461
66.1.1 What You Can Do ............................................................................................................. 461
66.2 Service Access Control .............................................................................................................. 461
66.3 Remote Management ............................................................................................................... 463
66.4 Account Security ........................................................................................................................ 464
66.5 Technical Reference .................................................................................................................. 466
66.5.1 SSH Overview ..................................................................................................................... 466
Classifier............................................................................................................................................471
67.1 Classifier Overview ..................................................................................................................... 471
67.1.1 What You Can Do ............................................................................................................. 471
67.2 Classifier Status ............................................................................................................................ 472
67.3 Classifier Setup ............................................................................................................................ 472
67.5 Classifier Example ....................................................................................................................... 478
Policy Rule ........................................................................................................................................480
68.1 Policy Rules Overview ................................................................................................................ 480
68.1.1 What You Can Do ............................................................................................................. 480
68.1.2 DiffServ ................................................................................................................................ 480
68.2 Policy Rules .................................................................................................................................. 481
68.3 Policy Example ............................................................................................................................ 485
Anti-Arpscan ....................................................................................................................................487
69.1 Anti-Arpscan Overview .............................................................................................................. 487
69.1.1 What You Can Do ............................................................................................................. 487
69.2 Anti-Arpscan Status .................................................................................................................... 488
69.4 Anti-Arpscan Setup .................................................................................................................... 489
69.5 Anti-Arpscan Trust Host .............................................................................................................. 491
Table of Contents
XMG1930 Series User's Guide
21