9.2.1 Rate Limit.......................................................................................................124
9.2.2 Storm Control .................................................................................................125
9.3 Voice VLAN ..............................................................................................................127
9.3.1 Global Config .................................................................................................129
9.3.2 Port Config .....................................................................................................129
9.3.3 OUI Config .....................................................................................................131
Chapter 10 ACL ..........................................................................................................................133
10.1 Time-Range ..............................................................................................................133
10.1.1 Time-Range Summary ...................................................................................133
10.1.2 Time-Range Create........................................................................................134
10.1.3 Holiday Config................................................................................................135
10.2 ACL Config ...............................................................................................................135
10.2.1 ACL Summary................................................................................................135
10.2.2 ACL Create ....................................................................................................136
10.2.3 MAC ACL .......................................................................................................136
10.2.4 Standard-IP ACL ............................................................................................137
10.2.5 Extend-IP ACL ...............................................................................................138
10.3 Policy Config.............................................................................................................140
10.3.1 Policy Summary .............................................................................................140
10.3.2 Policy
Create..................................................................................................141
10.3.3 Action Create
.................................................................................................141
10.4 Policy Binding ...........................................................................................................142
10.4.1 Binding Table .................................................................................................142
10.4.2 Port Binding ...................................................................................................143
10.4.3 VLAN Binding.................................................................................................143
10.5 Application Example for ACL ....................................................................................144
Chapter 11 Network Security ......................................................................................................147
11.1 IP-MAC Binding ........................................................................................................147
11.1.1 Binding Table .................................................................................................147
11.1.2 Manual Binding ..............................................................................................148
11.1.3 ARP Scanning................................................................................................149
11.1.4 DHCP Snooping.............................................................................................151
11.2 ARP Inspection .........................................................................................................156
11.2.1 ARP Detect ....................................................................................................160
11.2.2 ARP Defend ...................................................................................................161
11.2.3 ARP Statistics ................................................................................................162
11.3 IP Source Guard .......................................................................................................163
IV