Allied Telesis AT-S95 WEB User Manual

Page 4

Advertising
background image

Page 4

Allied Telesis
AT-S95 Management Software Web Browser Interface User’s Guide

Chapter 5.Configuring Device Security ............................................................................ 43

Configuring Management Security................................................................................................ 43

Defining Access Profiles ......................................................................................................................... 43
Defining Profile Rules ............................................................................................................................. 47
Defining Authentication Profiles .............................................................................................................. 51
Mapping Authentication Profiles ............................................................................................................. 55

Configuring Server Based Authentication ..................................................................................... 56

Configuring TACACS+ ........................................................................................................................... 56
Configuring RADIUS ............................................................................................................................... 60
Configuring Local Users.......................................................................................................................... 64
Defining Line Passwords ........................................................................................................................ 66

Configuring Network Security........................................................................................................ 66

Managing Port Security........................................................................................................................... 67
Defining 802.1x Port Access................................................................................................................... 70
Enabling Storm Control........................................................................................................................... 75

Defining Access Control................................................................................................................ 77

Defining MAC Based ACL....................................................................................................................... 77
Defining IPv4 Based ACL ....................................................................................................................... 81
Defining IPv6 Based ACL ....................................................................................................................... 87
Defining ACL Binding.............................................................................................................................. 91

Chapter 6.Configuring DHCP Snooping ........................................................................... 93

Defining DHCP Snooping General Properties ........................................................................................ 94
Defining DHCP Snooping on VLANs ...................................................................................................... 95
Defining Trusted Interfaces..................................................................................................................... 96
Binding Addresses to the DHCP Snooping Database ............................................................................ 99

Chapter 7.Configuring Ports............................................................................................ 101

Setting Ports Configurations ....................................................................................................... 101

Defining Port Settings ........................................................................................................................... 101
Configuring Port Mirroring..................................................................................................................... 105

Aggregating Ports ....................................................................................................................... 107

Defining Trunk Settings......................................................................................................................... 108
Defining Port Trunking .......................................................................................................................... 111
Configuring LACP ................................................................................................................................. 113

Chapter 8.Configuring Interfaces .................................................................................... 115

Defining MAC Addresses...................................................................................................................... 115

Configuring VLANs...................................................................................................................... 118

Defining VLAN Properties ..................................................................................................................... 119
Defining VLAN Interface Settings ......................................................................................................... 122
Defining GVRP...................................................................................................................................... 124

Defining MAC Based Groups ...................................................................................................... 126

Chapter 9.Configuring System Logs............................................................................... 129

Defining Log Settings............................................................................................................................ 129

Adding Log Servers ......................................................................................................................... 130
Modifying Log Servers .................................................................................................................... 132

Viewing Temporary and Flash Logs ..................................................................................................... 132

Advertising