Allied Telesis AT-S63 User Manual

Page 9

Advertising
background image

AT-S63 Management Software Menus Interface User’s Guide

9

Section VII: Internet Protocol Routing ................................................................. 547

Chapter 28: Internet Protocol Version 4 Routing Interfaces ................................................................... 549
Creating a New Routing Interface .................................................................................................................. 550
Modifying a Routing Interface......................................................................................................................... 553
Deleting a Routing Interface ........................................................................................................................... 556
Displaying the IP Address of the Local Interface............................................................................................ 557
Setting the Default Route or Default Gateway................................................................................................ 558
Setting the Local Interface.............................................................................................................................. 559
Setting the ARP Cache Timeout..................................................................................................................... 560

Section VIII: Port Security ..................................................................................... 561

Chapter 29: MAC Address-based Port Security ....................................................................................... 563
Configuring MAC Address Port Security ........................................................................................................ 564
Displaying Port Security Levels ...................................................................................................................... 568

Chapter 30: 802.1x Port-based Network Access Control ........................................................................ 571
Setting Port Roles........................................................................................................................................... 572
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 574
Configuring Authenticator Port Parameters.................................................................................................... 575
Configuring Supplicant Port Parameters ........................................................................................................ 581
Displaying the Port Access Parameters ......................................................................................................... 584
Configuring RADIUS Accounting.................................................................................................................... 586

Section IX: Management Security ......................................................................... 589

Chapter 31: Web Server .............................................................................................................................. 591
Configuring the Web Server ........................................................................................................................... 592
General Steps for Configuring the Web Server for Encryption....................................................................... 595

General Steps for a Self-signed Certificate.............................................................................................. 595
General Steps for a Public or Private CA Certificate................................................................................ 595

Chapter 32: Encryption Keys ..................................................................................................................... 597
Creating an Encryption Key............................................................................................................................ 598
Deleting an Encryption Key ............................................................................................................................ 602
Modifying an Encryption Key .......................................................................................................................... 603
Exporting an Encryption Key .......................................................................................................................... 604
Importing an Encryption Key .......................................................................................................................... 607
Displaying the Encryption Keys ...................................................................................................................... 610

Chapter 33: PKI Certificates and SSL ........................................................................................................ 613
Creating a Self-signed Certificate................................................................................................................... 614
Adding a Certificate to the Database.............................................................................................................. 618
Modifying a Certificate .................................................................................................................................... 621
Deleting a Certificate ...................................................................................................................................... 624
Viewing a Certificate....................................................................................................................................... 626
Generating an Enrollment Request ................................................................................................................ 629
Installing CA Certificates onto a Switch.......................................................................................................... 632
Viewing and Configuring the Maximum Number of Certificates ..................................................................... 633
Configuring SSL ............................................................................................................................................. 634

Chapter 34: Secure Shell (SSH) ................................................................................................................. 635
Configuring SSH............................................................................................................................................. 636
Displaying SSH Information............................................................................................................................ 639

Advertising