4.5.1 Access Security ................................................................................................................................................. 272
4.5.1.1 Access Management ............................................................................................................................... 272
4.5.1.3 SSH ......................................................................................................................................................... 274
4.5.1.4 HTTPs ..................................................................................................................................................... 275
4.5.2 AAA ................................................................................................................................................................... 277
4.5.2.2 RADIUS ................................................................................................................................................... 284
4.5.2.3 TACACS+ ................................................................................................................................................ 286
4.5.2.4 RADIUS Overview ................................................................................................................................... 287
4.5.2.5 RADIUS Details ....................................................................................................................................... 289
4.5.3 Port Authentication ............................................................................................................................................ 296
4.5.3.2 Network Access Overview ....................................................................................................................... 300
4.5.4 Port Security ...................................................................................................................................................... 306
4.5.4.1 Port Limit Control ..................................................................................................................................... 306
4.5.4.2 Port Security Status ................................................................................................................................. 309
4.5.4.3 Port Security Detail .................................................................................................................................. 311
4.5.5 Access Control Lists .......................................................................................................................................... 312
4.5.5.3 ACE Configuration ................................................................................................................................... 316
4.5.5.4 ACL Ports Configuration .......................................................................................................................... 325
4.5.5.5 ACL Rate Limiters .................................................................................................................................... 327
4.5.6 DHCP Snooping ................................................................................................................................................ 328
4.5.6.2 Snooping Table ........................................................................................................................................ 330
4.5.7 IP Source Guard ................................................................................................................................................ 331
4.5.8 ARP Inspection .................................................................................................................................................. 334
4.5.8.1 ARP Inspection ........................................................................................................................................ 334
4.6 Power over Ethernet ....................................................................................................................................... 338
4.6.1 PoE .................................................................................................................................................................... 338
4.6.1.2 System Configuration .............................................................................................................................. 340
User's Manual of IGS-10020HPT-U
8