3-7Features DescriptionPort SecurityPort security is a MAC address-based security mechanism for networkaccess controlling. It is an extension to the existing 802.1X authenticationand MAC authentication. This document describes:z Enabling Port Securityz Setting the Maximum Number of Secure MAC Addressesz Setting the Port Security Modez Configuring Port Security Featuresz Configuring Secure MAC Addressesz Ignoring Authorization Information from the ServerIP Source GuardBy filtering packets on a per-port basis, IP source guard prevents illegalpackets from traveling through, thus improving the network security. Thisdocument describes:z Configuring a Static Binding Entryz Configuring Dynamic Binding FunctionSSH2.0SSH ensures secure login to a remote device in a non-secure networkenvironment. By encryption and strong authentication, it protects thedevice against attacks. This document describes:z Configuring Asymmetric Keysz Configuring the Device as an SSH Serverz Configuring the Device as an SSH Clientz Configuring an SFTP Serverz Configuring an SFTP ClientPKIThe Public Key Infrastructure (PKI) is a hierarchical framework designedfor providing information security through public key technologies anddigital certificates and verifying the identities of the digital certificateowners. This document describes PKI related configuration.SSLSecure Sockets Layer (SSL) is a security protocol providing secureconnection service for TCP-based application layer protocols, thisdocument describes SSL related configuration.Public Key This document describes Public Key Configuration.ACLAn ACL is used for identifying traffic based on a series of preset matchingcriteria. This document describes:z ACL overview and ACL typesz ACL configurationSystem VolumeTable 3-7 Features in the System volumeFeatures DescriptionLoginUpon logging into a device, you can configure user interface propertiesand manage the system conveniently. This document describes:z How to log in to your Ethernet switchz Introduction to the user interface and common configurationsz Logging In Through the Console Portz Logging In Through Telnetz Logging in Through Web-based Network Management Systemz Logging In Through NMSz Specifying Source IP address/Interface for Telnet Packetsz Controlling Login Users