Allied Telesis AT-9000 Series User Manual
Page 7

AlliedWare Plus Version 2.1.8 Management Software Web Interface User’s Guide
7
Chapter 12: Setting Internet Group Management Protocol (IGMP) Snooping ....................................... 137
Overview......................................................................................................................................................... 138
Displaying and Modifying IGMP Snooping Configuration............................................................................... 139
Clearing the Routers List ................................................................................................................................ 141
Disabling IGMP Snooping .............................................................................................................................. 143
Displaying the Routers List............................................................................................................................. 144
Displaying the Hosts List ................................................................................................................................ 145
Chapter 13: Setting Switch Spanning Tree Protocols ............................................................................. 147
Overview......................................................................................................................................................... 148
Displaying Switch Spanning Tree Protocol Settings....................................................................................... 149
Modifying Switch Spanning Tree Protocol Settings........................................................................................ 152
Chapter 14: Power Over Ethernet (PoE) .................................................................................................... 155
Overview......................................................................................................................................................... 156
Power Sourcing Equipment (PSE) ........................................................................................................... 156
Powered Device (PD)............................................................................................................................... 156
PD Classes .............................................................................................................................................. 156
Power Budget........................................................................................................................................... 157
Port Prioritization...................................................................................................................................... 157
Displaying PoE Settings ................................................................................................................................. 158
PoE Configuration .......................................................................................................................................... 160
Chapter 15: Setting MAC Address-based Port Security .......................................................................... 163
Overview......................................................................................................................................................... 164
Static Versus Dynamic Addresses ........................................................................................................... 164
Intrusion Actions....................................................................................................................................... 164
Guidelines ................................................................................................................................................ 165
Displaying MAC Address-based Port Security Settings ................................................................................. 166
Modifying MAC Address-based Port Security Settings .................................................................................. 168
Disabling MAC Address-based Port Security Settings ................................................................................... 170
Chapter 16: Setting RADIUS and TACACS+ Clients ................................................................................ 171
Overview......................................................................................................................................................... 172
Remote Manager Accounts...................................................................................................................... 172
Accounting Information ............................................................................................................................ 173
Configuring RADIUS and TACACS+ ....................................................................................................... 173
Placing RADIUS and TACACS+ Servers in the Client’s List ................................................................... 173
Configuring Remote Manager Authentication Using RADIUS ................................................................. 175
Adding a RADIUS Server......................................................................................................................... 177
Configuring Remote Manager Authentication Using TACACS+ .............................................................. 179
Adding a TACACS+ Server...................................................................................................................... 182
Chapter 17: Setting 802.1x Port-based Network Access ......................................................................... 185
Overview......................................................................................................................................................... 186
Enabling 802.1x Port-based Authentication on the Switch............................................................................. 187
Configuring 802.1x Port-based Authentication ............................................................................................... 188
Displaying the 802.1x Authentication Port Settings........................................................................................ 194
Disabling 802.1x Port-based Authentication on the Switch ............................................................................ 195
Disabling 802.1x Port-based Authentication on a Port ................................................................................... 196
Chapter 18: Setting IPv4 and IPv6 Management ...................................................................................... 197
Overview......................................................................................................................................................... 198