Section iv, Security 515 – Allied Telesis AT-S63 User Manual

Page 10

Advertising
background image

Contents

10

GARP VLAN Registration Protocol .......................................................................................................................................................... 471
GARP VLAN Registration Protocol (GVRP) Overview ............................................................................................................................ 472

Guidelines .................................................................................................................................................................................................. 474
GVRP and Network Security ................................................................................................................................................................ 475
GVRP-inactive Intermediate Switches ............................................................................................................................................. 475
Generic Attribute Registration Protocol (GARP) Overview .......................................................................................................... 476

Configuring GVRP ............................................................................................................................................................................................. 480
Enabling or Disabling GVRP on a Port ....................................................................................................................................................... 482
Displaying the GVRP Port Configuration .................................................................................................................................................. 484
Displaying GVRP Counters ............................................................................................................................................................................. 485
Displaying the GVRP Database .................................................................................................................................................................... 490
Displaying the GIP Connected Ports Ring ................................................................................................................................................ 492
Displaying the GVRP State Machine ........................................................................................................................................................... 494

Chapter 22
Protected Ports VLANs
................................................................................................................................................................................. 499
Protected Ports VLAN Overview .................................................................................................................................................................. 500

Protected Ports VLAN Guidelines ...................................................................................................................................................... 502

Creating a Protected Ports VLAN ................................................................................................................................................................. 503
Modifying a Protected Ports VLAN ............................................................................................................................................................. 506
Displaying a Protected Ports VLAN ............................................................................................................................................................. 510
Deleting a Protected Ports VLAN ................................................................................................................................................................ 512

Section IV
Security
.............................................................................................................................................515

Chapter 23
Port Security
...................................................................................................................................................................................................... 517
MAC Address Security Overview ................................................................................................................................................................. 518

Automatic ................................................................................................................................................................................................... 518
Limited ........................................................................................................................................................................................................ 518
Secured ....................................................................................................................................................................................................... 519
Locked ......................................................................................................................................................................................................... 519
Security Violations and Intrusion Actions ....................................................................................................................................... 519
MAC Address Security Guidelines ..................................................................................................................................................... 520

Configuring MAC Address Port Security ................................................................................................................................................... 521
Displaying Port Security Levels .................................................................................................................................................................... 524

Chapter 24
Access Control Lists
....................................................................................................................................................................................... 527
Management ACL Security Overview ........................................................................................................................................................ 528

Parts of a Management ACE ................................................................................................................................................................ 528

IP Address ........................................................................................................................................................................................... 528
Mask ...................................................................................................................................................................................................... 529
Protocol ............................................................................................................................................................................................... 529
Interface .............................................................................................................................................................................................. 529

Management ACL Guidelines ............................................................................................................................................................. 529
Examples .................................................................................................................................................................................................... 530

Creating the Management ACL ................................................................................................................................................................... 532
Adding an ACE ................................................................................................................................................................................................... 535
Deleting an ACE ................................................................................................................................................................................................. 536
Displaying the ACEs ......................................................................................................................................................................................... 537

Chapter 25
Web Server
......................................................................................................................................................................................................... 539
Web Server Overview ...................................................................................................................................................................................... 540

Supported Protocols .............................................................................................................................................................................. 540

Advertising