Raisecom ISCOM2600G-HI (A) Series Configuration Manual page 20

Table of Contents

Advertisement

Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
9.5.5 Checking configurations ..................................................................................................................... 396
10 Security...................................................................................................................................... 397
10.1 ACL ............................................................................................................................................................ 397
10.1.1 Introduction ....................................................................................................................................... 397
10.1.2 Preparing for configurations ............................................................................................................. 398
10.1.3 Configuring MAC ACL .................................................................................................................... 398
10.1.4 Configuring ACL period ................................................................................................................... 401
10.1.5 Configuring filter .............................................................................................................................. 402
10.1.6 Checking configurations ................................................................................................................... 402
10.1.7 Maintenance ...................................................................................................................................... 403
10.2 Port security MAC ..................................................................................................................................... 403
10.2.1 Introduction ....................................................................................................................................... 403
10.2.2 Preparing for configurations ............................................................................................................. 404
10.2.3 Default configurations of port security MAC ................................................................................... 404
10.2.4 Configuring basic functions of port security MAC ........................................................................... 405
10.2.5 Configuring static secure MAC address ............................................................................................ 406
10.2.6 Configuring dynamic secure MAC address ...................................................................................... 406
10.2.7 Configuring sticky secure MAC address .......................................................................................... 407
10.2.8 Checking configurations ................................................................................................................... 408
10.2.9 Maintenance ...................................................................................................................................... 408
10.2.10 Example for configuring port security MAC .................................................................................. 408
10.3 Dynamic ARP inspection ........................................................................................................................... 410
10.3.1 Introduction ....................................................................................................................................... 410
10.3.2 Preparing for configurations ............................................................................................................. 412
10.3.3 Default configurations of dynamic ARP inspection .......................................................................... 412
10.3.4 Configuring trusted interfaces of dynamic ARP inspection .............................................................. 412
10.3.5 Configuring static binding of dynamic ARP inspection .................................................................... 413
10.3.6 Configuring dynamic binding of dynamic ARP inspection ............................................................... 413
10.3.7 Configuring protection VLAN of dynamic ARP inspection ............................................................. 413
10.3.8 Configuring rate limiting on ARP packets on interface .................................................................... 414
10.3.9 Checking configurations ................................................................................................................... 414
10.3.10 Example for configuring dynamic ARP inspection ......................................................................... 414
10.4 RADIUS ..................................................................................................................................................... 417
10.4.1 Introduction ....................................................................................................................................... 417
10.4.2 Preparing for configurations ............................................................................................................. 418
10.4.3 Default configurations of RADIUS .................................................................................................. 418
10.4.4 Configuring RADIUS authentication ................................................................................................ 418
10.4.5 Configuring RADIUS accounting ..................................................................................................... 419
10.4.6 Checking configurations ................................................................................................................... 420
10.4.7 Example for configuring RADIUS ................................................................................................... 420
10.5 TACACS+ .................................................................................................................................................. 422
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
Contents
xviii

Advertisement

Table of Contents
loading

Table of Contents