Allied Telesis AT-S63 User Manual

Page 10

Advertising
background image

Contents

10

GVRP and Network Security ....................................................................................................................587
GVRP-inactive Intermediate Switches......................................................................................................587
Generic Attribute Registration Protocol (GARP) Overview.......................................................................587

Configuring GVRP ..........................................................................................................................................592
Enabling or Disabling GVRP on a Port ...........................................................................................................594
Displaying the GVRP Port Configuration ........................................................................................................596
Displaying GVRP Counters.............................................................................................................................597
Displaying the GVRP Database......................................................................................................................602
Displaying the GIP Connected Ports Ring ......................................................................................................604
Displaying the GVRP State Machine ..............................................................................................................606

Chapter 25: Multiple VLANs ........................................................................................................................611
Multiple VLAN Mode Overview .......................................................................................................................612

802.1Q- Compliant Multiple VLAN Mode..................................................................................................612
Non-802.1Q Compliant Multiple VLAN Mode ...........................................................................................614

Selecting a VLAN Mode..................................................................................................................................616
Displaying VLAN Information ..........................................................................................................................617

Chapter 26: Protected Ports VLANs ...........................................................................................................619
Protected Ports VLAN Overview .....................................................................................................................620

Protected Ports VLAN Guidelines ............................................................................................................621

Creating a Protected Ports VLAN ...................................................................................................................623
Modifying a Protected Ports VLAN .................................................................................................................626
Displaying a Protected Ports VLAN ................................................................................................................630
Deleting a Protected Ports VLAN....................................................................................................................632

Section VI: Port Security ........................................................................................635

Chapter 27: Port Security ............................................................................................................................637
MAC Address Security Overview ....................................................................................................................638

Automatic..................................................................................................................................................638
Limited ......................................................................................................................................................638
Secured ....................................................................................................................................................639
Locked ......................................................................................................................................................639
Security Violations and Intrusion Actions .................................................................................................639
MAC Address Security Guidelines ...........................................................................................................640

Configuring MAC Address Port Security .........................................................................................................641
Displaying Port Security Levels ......................................................................................................................644

Chapter 28: 802.1x Port-based Network Access Control .........................................................................647
IEEE 802.1x Port-based Network Access Control Overview ..........................................................................648

Authentication Process.............................................................................................................................649
Port Roles.................................................................................................................................................650
RADIUS Accounting .................................................................................................................................652
General Steps...........................................................................................................................................653
Port-based Network Access Control Guidelines.......................................................................................654

Setting Port Roles ...........................................................................................................................................657
Enabling or Disabling 802.1x Port-based Network Access Control ................................................................659
Configuring Authenticator Port Parameters ....................................................................................................660
Configuring Supplicant Port Parameters.........................................................................................................664
Displaying the Port Access Parameters..........................................................................................................667
Configuring RADIUS Accounting ....................................................................................................................669

Chapter 29: MAC Address Table ................................................................................................................671
MAC Address Overview ..................................................................................................................................672
Displaying the MAC Address Tables ..............................................................................................................674

Advertising