Allied Telesis AT-S63 User Manual

Page 11

Advertising
background image

AT-S63 Management Software Menus Interface User’s Guide

11

Chapter 28: Protected Ports VLANs .......................................................................................................... 671
Protected Ports VLAN Overview .................................................................................................................... 672

Protected Ports VLAN Guidelines ............................................................................................................ 674

Creating a Protected Ports VLAN................................................................................................................... 675
Modifying a Protected Ports VLAN ................................................................................................................. 678
Displaying a Protected Ports VLAN................................................................................................................ 682
Deleting a Protected Ports VLAN ................................................................................................................... 684

Chapter 29: MAC Address-based VLANs .................................................................................................. 687
MAC Address-based VLAN Overview ............................................................................................................ 688

Egress Ports............................................................................................................................................. 688
VLANs That Span Switches ..................................................................................................................... 691
VLAN Hierarchy ....................................................................................................................................... 692
Steps to Creating a MAC Address-based VLAN...................................................................................... 692
Guidelines ................................................................................................................................................ 693

Creating a MAC Address-based VLAN .......................................................................................................... 694
Adding and Deleting MAC Addresses ............................................................................................................ 697
Adding and Deleting Egress Ports.................................................................................................................. 699
Deleting a MAC Address-based VLAN........................................................................................................... 701
Displaying MAC Address-based VLANs......................................................................................................... 703

Section VII: Port Security ...................................................................................... 707

Chapter 30: MAC Address-based Port Security ....................................................................................... 709
MAC Address Port Security Overview............................................................................................................ 710

Automatic ................................................................................................................................................. 710
Limited...................................................................................................................................................... 710
Secured.................................................................................................................................................... 711
Locked...................................................................................................................................................... 711
Invalid Frames and Intrusion Actions ....................................................................................................... 711
MAC Address Port Security Guidelines ................................................................................................... 712

Configuring MAC Address Port Security ........................................................................................................ 713
Displaying Port Security Levels ...................................................................................................................... 717

Chapter 31: 802.1x Port-based Network Access Control ........................................................................ 719
IEEE 802.1x Port-based Network Access Control Overview.......................................................................... 720

Authentication Process ............................................................................................................................ 721
Port Roles ................................................................................................................................................ 722
Authenticator Ports with Single and Multiple Supplicants ........................................................................ 724
RADIUS Accounting................................................................................................................................. 730
General Steps .......................................................................................................................................... 731
802.1x Port-based Network Access Control Guidelines .......................................................................... 732

Setting Port Roles........................................................................................................................................... 734
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 736
Configuring Authenticator Port Parameters.................................................................................................... 737
Configuring Supplicant Port Parameters ........................................................................................................ 741
Displaying the Port Access Parameters ......................................................................................................... 744
Configuring RADIUS Accounting.................................................................................................................... 746

Advertising