Allied Telesis AT-S63 User Manual

Page 9

Advertising
background image

AT-S63 Management Software Features Guide

9

Chapter 29: BOOTP Relay Agent ............................................................................................................... 337
Supported Platforms....................................................................................................................................... 338
Overview......................................................................................................................................................... 339
Guidelines....................................................................................................................................................... 341

Chapter 30: Virtual Router Redundancy Protocol .................................................................................... 343
Supported Platforms....................................................................................................................................... 344
Overview......................................................................................................................................................... 345
Master Switch ................................................................................................................................................. 346
Backup Switches ............................................................................................................................................ 347
Interface Monitoring........................................................................................................................................ 348
Port Monitoring ............................................................................................................................................... 349
VRRP on the Switch ....................................................................................................................................... 350

Section VIII: Port Security ..................................................................................... 353

Chapter 31: MAC Address-based Port Security ....................................................................................... 355
Supported Platforms....................................................................................................................................... 356
Overview......................................................................................................................................................... 357

Automatic ................................................................................................................................................. 357
Limited...................................................................................................................................................... 357
Secured.................................................................................................................................................... 358
Locked...................................................................................................................................................... 358

Invalid Frames and Intrusion Actions ............................................................................................................. 359
Guidelines....................................................................................................................................................... 360

Chapter 32: 802.1x Port-based Network Access Control ........................................................................ 361
Supported Platforms....................................................................................................................................... 362
Overview......................................................................................................................................................... 363
Authentication Process................................................................................................................................... 365
Port Roles....................................................................................................................................................... 366

None Role ................................................................................................................................................ 366
Authenticator Role.................................................................................................................................... 366
Supplicant Role ........................................................................................................................................ 368

Authenticator Ports with Single and Multiple Supplicants............................................................................... 369

Single Operating Mode ............................................................................................................................ 369
Multiple Operating Mode .......................................................................................................................... 373

Supplicant and VLAN Associations ................................................................................................................ 376

Single Operating Mode ............................................................................................................................ 377
Multiple Operating Mode .......................................................................................................................... 377
Supplicant VLAN Attributes on the RADIUS Server................................................................................. 377

Guest VLAN.................................................................................................................................................... 378
RADIUS Accounting ....................................................................................................................................... 379
General Steps................................................................................................................................................. 380
Guidelines....................................................................................................................................................... 381

Section IX: Management Security ......................................................................... 385

Chapter 33: Web Server .............................................................................................................................. 387
Supported Platforms....................................................................................................................................... 388
Overview......................................................................................................................................................... 389

Supported Protocols................................................................................................................................. 389

Configuring the Web Server for HTTP............................................................................................................ 390
Configuring the Web Server for HTTPS ......................................................................................................... 391

General Steps for a Self-signed Certificate.............................................................................................. 391
General Steps for a Public or Private CA Certificate................................................................................ 391

Advertising