6.6.3 Viewing SA Statistics ......................................................................................................................................................................6-69
6.7 Configuring IPSec VPN ...............................................................................................................................................................................6-71
6.7.1 Defining the IPSec Configuration ....................................................................................................................................................6-72
6.7.4 Configuring Crypto Maps ................................................................................................................................................................6-80
6.8 Configuring the Radius Server ....................................................................................................................................................................6-90
6.8.1 Radius Overview ..............................................................................................................................................................................6-90
6.8.5 Configuring Radius Users ................................................................................................................................................................6-98
6.8.6 Configuring Radius User Groups ...................................................................................................................................................6-100
6.8.7 Viewing Radius Accounting Logs ..................................................................................................................................................6-103
6.9 Creating Server Certificates .....................................................................................................................................................................6-105
6.10.1 Configuring the Beacon Table .....................................................................................................................................................6-118
6.10.2 Configuring the Probe Table ........................................................................................................................................................6-120
6.10.3 Reviewing Found Beacons ..........................................................................................................................................................6-121
6.10.4 Reviewing Found Probes .............................................................................................................................................................6-122
7.2 Configuring Access Control ..........................................................................................................................................................................7-3
7.3 Configuring SNMP Access ...........................................................................................................................................................................7-5
7.3.1 Configuring SNMP v1/v2 Access ......................................................................................................................................................7-5
7.3.2 Configuring SNMP v3 Access ...........................................................................................................................................................7-7
7.3.3 Accessing SNMP v2/v3 Statistics .....................................................................................................................................................7-9
7.3.4 Message Parameters ......................................................................................................................................................................7-10
7.4 Configuring SNMP Traps ............................................................................................................................................................................7-11
7.4.1 Enabling Trap Configuration ............................................................................................................................................................7-11
7.4.2 Configuring Trap Thresholds ...........................................................................................................................................................7-14
7.5 Configuring SNMP Trap Receivers .............................................................................................................................................................7-17
7.5.1 Editing SNMP Trap Receivers .........................................................................................................................................................7-18
7.5.2 Adding SNMP Trap Receivers .........................................................................................................................................................7-18
7.6 Creating and Managing Users ....................................................................................................................................................................7-20
7.6.1 Configuring Local Users ..................................................................................................................................................................7-20
8.1.1 Switch Environment ..........................................................................................................................................................................8-2
8.1.2 CPU Performance ...............................................................................................................................................................................8-3
8.1.3 Switch Memory Allocation ................................................................................................................................................................8-4
8.1.4 Switch Disk Allocation ......................................................................................................................................................................8-5
8.1.5 Switch Memory Processes ................................................................................................................................................................8-5
8.1.6 Other Switch Resources ....................................................................................................................................................................8-6
8.2 Configuring System Logging .........................................................................................................................................................................8-8
8.2.1 Log Options ........................................................................................................................................................................................8-8
Table of Contents
ix