Allied Telesis AT-S63 User Manual

Page 7

Advertising
background image

AT-S63 Management Software Web Browser User’s Guide

7

Chapter 21: GARP VLAN Registration Protocol ....................................................................................... 331
Configuring GVRP .......................................................................................................................................... 332
Enabling or Disabling GVRP on a Port........................................................................................................... 334
Displaying the GVRP Configuration ............................................................................................................... 335
Displaying the GVRP Port Configuration........................................................................................................ 336
Displaying the GVRP Database ..................................................................................................................... 337
Displaying the GVRP State Machine.............................................................................................................. 338
Displaying the GVRP Counters ...................................................................................................................... 341
Displaying the GIP Connected Ports Ring...................................................................................................... 344

Section VI: Port Security ........................................................................................ 345

Chapter 22: MAC Address-based Port Security ....................................................................................... 347
Configuring Port Security................................................................................................................................ 348
Displaying Port Security Levels ...................................................................................................................... 351

Chapter 23: 802.1x Port-based Network Access Control ........................................................................ 353
Setting Port Roles........................................................................................................................................... 354
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 356
Configuring Authenticator Port Parameters.................................................................................................... 357
Configuring Supplicant Port Parameters ........................................................................................................ 363
Displaying the Port-based Network Access Control Parameters ................................................................... 365

Displaying the Port Status........................................................................................................................ 365
Displaying the Port Settings ..................................................................................................................... 367

RADIUS Accounting ....................................................................................................................................... 369

Configuring RADIUS Accounting ............................................................................................................. 369
Displaying the RADIUS Accounting Settings ........................................................................................... 370

Section VII: Management Security ....................................................................... 371

Chapter 24: Encryption Keys, PKI, and SSL ............................................................................................. 373
Displaying the Encryption Keys ...................................................................................................................... 374
Displaying the PKI Settings and Certificates .................................................................................................. 376
Displaying the SSL Settings ........................................................................................................................... 379

Chapter 25: Secure Shell (SSH) ................................................................................................................. 381
Configuring SSH............................................................................................................................................. 382
Displaying the SSH Settings........................................................................................................................... 384

Chapter 26: TACACS+ and RADIUS Protocols ......................................................................................... 387
Enabling or Disabling TACACS+ or RADIUS ................................................................................................. 388
Configuring the TACACS+ Client Settings ..................................................................................................... 390
Displaying the TACACS+ Client Settings ....................................................................................................... 392
Configuring the RADIUS Client Settings ........................................................................................................ 394
Displaying the RADIUS Client Settings .......................................................................................................... 396

Chapter 27: Management Access Control List ......................................................................................... 399
Enabling or Disabling the Management ACL.................................................................................................. 400
Creating an ACE............................................................................................................................................. 402
Modifying an ACE........................................................................................................................................... 404
Deleting an ACE ............................................................................................................................................. 405
Displaying the Management Access Control List ........................................................................................... 406

Index ............................................................................................................................................................. 407

Advertising