Allied Telesis AT-S63 User Manual

Page 12

Advertising
background image

Figures

12

Chapter 20: Multiple Spanning Tree Protocol ...........................................................................................311
Figure 124: Spanning Tree Tab (Configuration) .............................................................................................312
Figure 125: Configure MSTP Parameters Tab (Configuration).......................................................................315
Figure 126: Add New MSTI Page ...................................................................................................................318
Figure 127: Modify MSTI Page .......................................................................................................................320
Figure 128: MSTP Settings - Port(s) Page .....................................................................................................322
Figure 129: Monitor MSTP Parameters Tab (Monitoring) ...............................................................................327
Figure 130: MSTP Settings - Port(s) Page .....................................................................................................328
Figure 131: MSTP Port Status - Port(s) Page.................................................................................................329

Chapter 21: Port-based and Tagged VLANs ..............................................................................................335
Figure 132: VLAN Tab (Configuration) ...........................................................................................................336
Figure 133: Add New VLAN Page ..................................................................................................................338
Figure 134: VLAN Tab (Monitoring) ................................................................................................................345
Figure 135: View Protected VLAN Page .........................................................................................................347

Chapter 22: GARP VLAN Registration Protocol ........................................................................................349
Figure 136: GVRP Tab (Configuration)...........................................................................................................350
Figure 137: GVRP Port Configuration Page ...................................................................................................352
Figure 138: GVRP Tab (Monitoring) ...............................................................................................................353
Figure 139: GVRP Port Configuration Page ...................................................................................................354
Figure 140: GVRP Database Page.................................................................................................................355
Figure 141: GVRP State Machine for VLAN Page..........................................................................................356
Figure 142: GVRP Counters Page..................................................................................................................359
Figure 143: GIP Connected Ports Ring Page .................................................................................................362

Chapter 23: MAC Address-based Port Security ........................................................................................365
Figure 144: Port Security Tab (Configuration) ................................................................................................366
Figure 145: Security for Ports Page (Configuration) .......................................................................................366
Figure 146: Port Security Tab (Monitoring) .....................................................................................................369
Figure 147: Security for Port(s) Page .............................................................................................................369

Chapter 24: 802.1x Port-based Network Access Control .........................................................................371
Figure 148: 802.1x Port Access Tab (Configuration)......................................................................................372
Figure 149: Port Role Configuration Page ......................................................................................................373
Figure 150: Authenticator Parameters Page...................................................................................................376
Figure 151: Supplicant Parameters Page .......................................................................................................381
Figure 152: 802.1x Port Access Tab (Monitoring) ..........................................................................................383
Figure 153: Port Access Port Status Page .....................................................................................................384
Figure 154: Authenticator Port Parameters Page ...........................................................................................385
Figure 155: Supplicant Port Parameters Page ...............................................................................................386

Chapter 25: Encryption Keys, PKI, and SSL ..............................................................................................391
Figure 156: Keys Tab (Monitoring) .................................................................................................................392
Figure 157: PKI Tab (Monitoring)....................................................................................................................394
Figure 158: X509 Certificate Details Page......................................................................................................395
Figure 159: SSL Tab (Monitoring)...................................................................................................................397

Chapter 26: Secure Shell (SSH) ..................................................................................................................399
Figure 160: Secure Shell Tab (Configuration) ................................................................................................400
Figure 161: Secure Shell Tab (Monitoring) .....................................................................................................402

Chapter 27: TACACS+ and RADIUS Protocols .........................................................................................405
Figure 162: Server-based Authentication Tab (Configuration)........................................................................406
Figure 163: TACACS+ Client Configuration Page ..........................................................................................408
Figure 164: Server-Based Authentication Tab (Monitoring)............................................................................410
Figure 165: TACACS+ Client Configuration Page ..........................................................................................411
Figure 166: RADIUS Client Configuration Page .............................................................................................412
Figure 167: RADIUS Client Configuration Page .............................................................................................414

Advertising