Allied Telesis AT-S63 User Manual

Page 9

Advertising
background image

AT-S63 Management Software Menus User’s Guide

9

Section VII: Internet Protocol Routing ................................................................. 541

Chapter 29: Internet Protocol Version 4 Routing Interfaces ................................................................... 543
Creating a New Routing Interface .................................................................................................................. 544
Modifying a Routing Interface......................................................................................................................... 547
Deleting a Routing Interface ........................................................................................................................... 550
Displaying the IP Address of the Local Interface............................................................................................ 551
Setting the Default Route or Default Gateway................................................................................................ 552
Setting the Local Interface.............................................................................................................................. 553
Setting the ARP Cache Timeout..................................................................................................................... 554

Section VIII: Port Security ..................................................................................... 555

Chapter 30: MAC Address-based Port Security ....................................................................................... 557
Configuring MAC Address Port Security ........................................................................................................ 558
Displaying Port Security Levels ...................................................................................................................... 562

Chapter 31: 802.1x Port-based Network Access Control ........................................................................ 565
Setting Port Roles........................................................................................................................................... 566
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 568
Configuring Authenticator Port Parameters.................................................................................................... 569
Configuring Supplicant Port Parameters ........................................................................................................ 575
Displaying the Port Access Parameters ......................................................................................................... 578
Configuring RADIUS Accounting.................................................................................................................... 580

Section IX: Management Security ......................................................................... 583

Chapter 32: Web Server .............................................................................................................................. 585
Configuring the Web Server ........................................................................................................................... 586
General Steps for Configuring the Web Server for Encryption ....................................................................... 589

General Steps for a Self-signed Certificate.............................................................................................. 589
General Steps for a Public or Private CA Certificate................................................................................ 589

Chapter 33: Encryption Keys ..................................................................................................................... 591
Creating an Encryption Key............................................................................................................................ 592
Deleting an Encryption Key ............................................................................................................................ 596
Modifying an Encryption Key .......................................................................................................................... 597
Exporting an Encryption Key .......................................................................................................................... 598
Importing an Encryption Key .......................................................................................................................... 601
Displaying the Encryption Keys ...................................................................................................................... 604

Chapter 34: PKI Certificates and SSL ........................................................................................................ 607
Creating a Self-signed Certificate................................................................................................................... 608
Adding a Certificate to the Database.............................................................................................................. 612
Modifying a Certificate .................................................................................................................................... 615
Deleting a Certificate ...................................................................................................................................... 618
Viewing a Certificate....................................................................................................................................... 620
Generating an Enrollment Request ................................................................................................................ 623
Installing CA Certificates onto a Switch.......................................................................................................... 626
Viewing and Configuring the Maximum Number of Certificates ..................................................................... 627
Configuring SSL ............................................................................................................................................. 628

Chapter 35: Secure Shell (SSH) ................................................................................................................. 629
Configuring SSH............................................................................................................................................. 630
Displaying SSH Information............................................................................................................................ 633

Advertising