9.2 Bandwidth Control ....................................................................................................126
9.2.1 Rate Limit.......................................................................................................126
9.2.2 Storm Control .................................................................................................127
9.3 Voice VLAN ..............................................................................................................129
9.3.1 Global Config .................................................................................................131
9.3.2 Port Config.....................................................................................................131
9.3.3 OUI Config .....................................................................................................133
Chapter 10 ACL ..........................................................................................................................135
10.1 Time-Range..............................................................................................................135
10.1.1 Time-Range Summary ...................................................................................135
10.1.2 Time-Range Create........................................................................................136
10.1.3 Holiday Config................................................................................................137
10.2 ACL Config ...............................................................................................................137
10.2.1 ACL Summary................................................................................................137
10.2.2 ACL Create ....................................................................................................138
10.2.3 MAC ACL .......................................................................................................138
10.2.4 Standard-IP ACL ............................................................................................139
10.2.5 Extend-IP ACL ...............................................................................................140
10.3 Policy Config.............................................................................................................142
10.3.1 Policy
Summary.............................................................................................142
10.3.2 Policy Create..................................................................................................143
10.3.3 Action Create .................................................................................................143
10.4 Policy Binding ...........................................................................................................144
10.4.1 Binding Table .................................................................................................144
10.4.2 Port Binding ...................................................................................................145
10.4.3 VLAN Binding.................................................................................................145
10.5 Application Example for ACL ....................................................................................146
Chapter 11 Network Security......................................................................................................149
11.1 IP-MAC Binding ........................................................................................................149
11.1.1 Binding Table .................................................................................................149
11.1.2 Manual Binding ..............................................................................................150
11.1.3 ARP Scanning................................................................................................151
11.1.4 DHCP Snooping.............................................................................................153
11.2 ARP Inspection.........................................................................................................158
11.2.1 ARP Detect ....................................................................................................162
11.2.2 ARP Defend ...................................................................................................163
11.2.3 ARP Statistics ................................................................................................164
IV