Allied Telesis AT-S63 User Manual

Page 7

Advertising
background image

AT-S63 Management Software Web Browser Interface User’s Guide

7

Displaying the MSTP Port Configuration ........................................................................................................ 337
Displaying the MSTP Port Status ................................................................................................................... 340
Resetting MSTP to the Default Settings ......................................................................................................... 342

Section V: Virtual LANs ......................................................................................... 343

Chapter 21: Port-based and Tagged VLANs ............................................................................................. 345
Creating a New Port-Based or Tagged VLAN ................................................................................................ 346
Modifying a VLAN........................................................................................................................................... 350
Deleting a VLAN ............................................................................................................................................. 352
Selecting a VLAN Mode ................................................................................................................................. 353
Displaying VLANs........................................................................................................................................... 355
Specifying a Management VLAN.................................................................................................................... 357

Chapter 22: GARP VLAN Registration Protocol ....................................................................................... 359
Configuring GVRP .......................................................................................................................................... 360
Enabling or Disabling GVRP on a Port........................................................................................................... 362
Displaying the GVRP Configuration ............................................................................................................... 363
Displaying the GVRP Port Configuration........................................................................................................ 365
Displaying the GVRP Database ..................................................................................................................... 366
Displaying the GVRP State Machine.............................................................................................................. 367
Displaying the GVRP Counters ...................................................................................................................... 370
Displaying the GIP Connected Ports Ring...................................................................................................... 373

Chapter 23: Protected Ports VLANs .......................................................................................................... 375
Creating a New Protected Ports VLAN........................................................................................................... 376
Modifying a Protected Ports VLAN ................................................................................................................. 381
Deleting a Protected Ports VLAN ................................................................................................................... 385
Displaying a Protected Ports VLAN................................................................................................................ 386

Section VI: Port Security ........................................................................................ 389

Chapter 24: MAC Address-based Port Security ....................................................................................... 391
Configuring Port Security................................................................................................................................ 392
Displaying the Port Security Level.................................................................................................................. 395

Chapter 25: 802.1x Port-based Network Access Control ........................................................................ 397
Setting Port Roles........................................................................................................................................... 398
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 400
Configuring Authenticator Port Parameters.................................................................................................... 401
Configuring Supplicant Port Parameters ........................................................................................................ 405
Displaying the Port-based Network Access Control Parameters ................................................................... 407

Displaying the Port Status........................................................................................................................ 407
Displaying the Port Settings ..................................................................................................................... 408

RADIUS Accounting ....................................................................................................................................... 411

Configuring RADIUS Accounting ............................................................................................................. 411
Displaying the RADIUS Accounting Settings ........................................................................................... 412

Section VII: Management Security ....................................................................... 415

Chapter 26: Encryption Keys, PKI, and SSL ............................................................................................. 417
Displaying the Encryption Keys ...................................................................................................................... 418
Displaying the PKI Settings and Certificates .................................................................................................. 420
Displaying the SSL Settings ........................................................................................................................... 423

Advertising