Allied Telesis AT-S63 User Manual

Page 11

Advertising
background image

AT-S63 Management Software Menus Interface User’s Guide

11

Chapter 27: Multiple VLAN Modes ............................................................................................................. 661
Multiple VLAN Mode Overview....................................................................................................................... 662

802.1Q- Compliant Multiple VLAN Mode ................................................................................................. 662
Non-802.1Q Compliant Multiple VLAN Mode........................................................................................... 664

Selecting a VLAN Mode ................................................................................................................................. 666
Displaying VLAN Information.......................................................................................................................... 667

Chapter 28: Protected Ports VLANs .......................................................................................................... 669
Protected Ports VLAN Overview .................................................................................................................... 670

Protected Ports VLAN Guidelines ............................................................................................................ 672

Creating a Protected Ports VLAN................................................................................................................... 673
Modifying a Protected Ports VLAN ................................................................................................................. 676
Displaying a Protected Ports VLAN................................................................................................................ 680
Deleting a Protected Ports VLAN ................................................................................................................... 682

Chapter 29: MAC Address-based VLANs .................................................................................................. 685
MAC Address-based VLAN Overview ............................................................................................................ 686

Egress Ports............................................................................................................................................. 686
VLANs That Span Switches ..................................................................................................................... 689
VLAN Hierarchy ....................................................................................................................................... 690
Steps to Creating a MAC Address-based VLAN...................................................................................... 690
Guidelines ................................................................................................................................................ 691

Creating a MAC Address-based VLAN .......................................................................................................... 693
Adding and Deleting MAC Addresses ............................................................................................................ 696
Adding and Deleting Egress Ports.................................................................................................................. 698
Deleting a MAC Address-based VLAN........................................................................................................... 700
Displaying MAC Address-based VLANs......................................................................................................... 702

Section VII: Port Security ...................................................................................... 705

Chapter 30: MAC Address-based Port Security ....................................................................................... 707
MAC Address Port Security Overview............................................................................................................ 708

Automatic ................................................................................................................................................. 708
Limited...................................................................................................................................................... 708
Secured.................................................................................................................................................... 709
Locked...................................................................................................................................................... 709
Invalid Frames and Intrusion Actions ....................................................................................................... 709
MAC Address Port Security Guidelines ................................................................................................... 710

Configuring MAC Address Port Security ........................................................................................................ 711
Displaying Port Security Levels ...................................................................................................................... 715

Chapter 31: 802.1x Port-based Network Access Control ........................................................................ 717
IEEE 802.1x Port-based Network Access Control Overview.......................................................................... 718

Authentication Process ............................................................................................................................ 719
Port Roles ................................................................................................................................................ 720
None Role ................................................................................................................................................ 720
Authenticator Role.................................................................................................................................... 720
Supplicant Role ........................................................................................................................................ 722
Authenticator Ports with Single and Multiple Supplicants ........................................................................ 723
Supplicant and VLAN Associations.......................................................................................................... 729
Guest VLAN ............................................................................................................................................. 731
RADIUS Accounting................................................................................................................................. 732
General Steps .......................................................................................................................................... 733
802.1x Port-based Network Access Control Guidelines .......................................................................... 734

Setting Port Roles........................................................................................................................................... 736
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 738

Advertising