C
ONFIGURING
THE
S
WITCH
3-6
SSH 3-41
Settings Configures Secure Shell server settings 3-46
Host-Key Settings Generates the host key pair (public and
private)
3-44
Port Security Configures per port security, including
status, response for security breach, and
maximum allowed MAC addresses
3-48
802.1X Port authentication 4-104
Information Displays global configuration settings 3-52
Configuration Configures protocol parameters 3-54
Port Configuration Sets the authentication mode for individual
ports
3-54
Statistics Displays protocol statistics for the selected
port
3-58
ACL 3-60
Configuration Configures packet filtering based on IP or
MAC addresses
3-60
Mask Configuration Controls the order in which ACL rules are
checked
3-69
Port Binding Binds a port to the specified ACL 3-75
IP Filter Sets IP addresses of clients allowed
management access
3-77
Port 3-77
Port Information Displays port connection status 3-79
Trunk Information Displays trunk connection status 3-79
Port Configuration Configures port connection settings 3-83
Trunk Configuration Configures trunk connection settings 3-83
Trunk Membership Specifies ports to group into static trunks 3-87
Table 3-2 Main Menu (Continued)
Menu Description Page