Allied Telesis AT-8100 Series User Manual
Page 20
Contents
20
VLAN SET MACADDRESS (Global Configuration Mode)...................................................................... 1010
VLAN SET MACADDRESS (Port Interface Mode)................................................................................. 1012
Chapter 66
: Private Port VLANs ............................................................................................................. 1015
Host Ports ........................................................................................................................................ 1016
Uplink Port........................................................................................................................................ 1016
Private VLAN Functionality .............................................................................................................. 1017
Guidelines............................................................................................................................................... 1018
Creating Private VLANs.......................................................................................................................... 1019
Adding Host and Uplink Ports................................................................................................................. 1020
Deleting VLANs ...................................................................................................................................... 1021
Displaying Private VLANs....................................................................................................................... 1022
Chapter 67
: Private Port VLAN Commands ........................................................................................... 1023
NO VLAN................................................................................................................................................ 1024
PRIVATE-VLAN...................................................................................................................................... 1025
SHOW VLAN PRIVATE-VLAN ............................................................................................................... 1026
SWITCHPORT MODE PRIVATE-VLAN HOST...................................................................................... 1027
SWITCHPORT MODE PRIVATE-VLAN PROMISCUOUS .................................................................... 1028
Chapter 68
: Voice VLAN Commands ..................................................................................................... 1029
NO SWITCHPORT VOICE VLAN .......................................................................................................... 1030
SWITCHPORT VOICE DSCP ................................................................................................................ 1031
SWITCHPORT VOICE VLAN................................................................................................................. 1032
Section IX:
Port Security ..................................................................................................................... 1035
Chapter 69
: MAC Address-based Port Security .................................................................................... 1037
Static Versus Dynamic Addresses ................................................................................................... 1038
Intrusion Actions............................................................................................................................... 1038
Guidelines ........................................................................................................................................ 1039
Configuring Ports.................................................................................................................................... 1040
Enabling MAC Address-based Security on Ports ...................................................................................1042
Disabling MAC Address-based Security on Ports .................................................................................. 1043
Displaying Port Settings ......................................................................................................................... 1044
Chapter 70
: MAC Address-based Port Security Commands ............................................................... 1047
NO SWITCHPORT PORT-SECURITY................................................................................................... 1048
NO SWITCHPORT PORT-SECURITY AGING ...................................................................................... 1049
SHOW PORT-SECURITY INTERFACE................................................................................................. 1050
SHOW PORT-SECURITY INTRUSION INTERFACE ............................................................................ 1053
SWITCHPORT PORT-SECURITY ......................................................................................................... 1055
SWITCHPORT PORT-SECURITY AGING ............................................................................................ 1056
SWITCHPORT PORT-SECURITY MAXIMUM....................................................................................... 1057
SWITCHPORT PORT-SECURITY VIOLATION ..................................................................................... 1058
Chapter 71
: 802.1x Port-based Network Access Control ..................................................................... 1061
Overview................................................................................................................................................. 1062
Authentication Process........................................................................................................................... 1063
Port Roles............................................................................................................................................... 1064
None Role ........................................................................................................................................ 1064
Authenticator Role............................................................................................................................ 1064
Supplicant Role ................................................................................................................................ 1064