Contents 11Stack Port Summary . . . . . . . . . . . . . . . . 153Stack Port Counters . . . . . . . . . . . . . . . . 154Stack Port Diagnostics . . . . . . . . . . . . . . . 154NSF Summary. . . . . . . . . . . . . . . . . . . . 155Checkpoint Statistics . . . . . . . . . . . . . . . . 156Managing the Stack (CLI) . . . . . . . . . . . . . . . . 157Configuring Stack Member and NSF Settings . . . 157Viewing and Clearing Stacking and NSFInformation . . . . . . . . . . . . . . . . . . . . . 158Stacking and NSF Usage Scenarios . . . . . . . . . . . 159Basic Failover. . . . . . . . . . . . . . . . . . . . 160Preconfiguring a Stack Member . . . . . . . . . . 162NSF in the Data Center . . . . . . . . . . . . . . . 164NSF and VoIP . . . . . . . . . . . . . . . . . . . . 165NSF and DHCP Snooping . . . . . . . . . . . . . . 166NSF and the Storage Access Network . . . . . . . 167NSF and Routed Access . . . . . . . . . . . . . . 1699 Controlling Management Access . . . . . 171Management Access Control Overview . . . . . . . . 171What Are the Recommendations forManagement Security?. . . . . . . . . . . . . . . 173What Is an Authentication Profile?. . . . . . . . . 173How Does TACACS+ Control ManagementAccess?. . . . . . . . . . . . . . . . . . . . . . . 174How Does RADIUS Control ManagementAccess?. . . . . . . . . . . . . . . . . . . . . . . 176What are RADIUS Server Groups? . . . . . . . . . 178How Does the Switch Determine WhichRADIUS Server to Contact? . . . . . . . . . . . . 178What Other Features Use Authentication?. . . . . 180