4.5.2.4 RADIUS Details ....................................................................................................................................... 323
4.5.3 Port Authentication ............................................................................................................................................ 330
4.5.3.2 Network Access Overview ....................................................................................................................... 334
4.5.4 Port Security ...................................................................................................................................................... 340
4.5.4.1 Port Limit Control ..................................................................................................................................... 340
4.5.4.2 Port Security Status ................................................................................................................................. 343
4.5.4.3 Port Security Detail .................................................................................................................................. 345
4.5.4.4 MAC Address .......................................................................................................................................... 346
4.5.5 Access Control Lists .......................................................................................................................................... 348
4.5.5.2.1 ACE Configuration ......................................................................................................................... 352
4.5.5.3 ACL Ports Configuration .......................................................................................................................... 362
4.5.5.4 ACL Rate Limiters .................................................................................................................................... 364
4.5.6 DHCP Snooping ................................................................................................................................................ 365
4.5.6.2 Snooping Table ........................................................................................................................................ 367
4.5.7 DHCPv6 Snooping ............................................................................................................................................ 368
4.5.8 IP Source Guard ................................................................................................................................................ 370
4.5.9 IPv6 Source Guard ............................................................................................................................................ 373
4.5.10 ARP Inspection ................................................................................................................................................ 376
4.5.10.1 ARP Inspection ...................................................................................................................................... 376
4.5.10.2 VLAN Configuration ............................................................................................................................... 378
4.6 Ring ............................................................................................................................................................ 381
4.6.1 Ring Wizard ....................................................................................................................................................... 381
4.6.1.2 Ring Wizard Example .............................................................................................................................. 382
4.6.2 ERPS ................................................................................................................................................................. 385
User's Manual of WGS-5225-8P2S Series
9