Allied Telesis AT-9000 Series User Manual
Page 18

Contents
18
VLAN Stacking Process ...........................................................................................................................825
Example of VLAN Stacking ......................................................................................................................826
Chapter 57: VLAN Stacking Commands ....................................................................................................831
NO SWITCHPORT VLAN-STACKING .....................................................................................................832
PLATFORM VLAN-STACKING-TPID.......................................................................................................833
SHOW VLAN VLAN-STACKING ..............................................................................................................834
SWITCHPORT VLAN-STACKING ...........................................................................................................835
Port Security ...................................................................................................................837
Chapter 58: MAC Address-based Port Security ........................................................................................839
Static Versus Dynamic Addresses .....................................................................................................840
Intrusion Actions.................................................................................................................................840
Guidelines ..........................................................................................................................................841
Configuring Ports......................................................................................................................................842
Enabling MAC Address-based Security on Ports .....................................................................................844
Disabling MAC Address-based Security on Ports ....................................................................................845
Displaying Port Settings ...........................................................................................................................846
Chapter 59: MAC Address-based Port Security Commands ...................................................................849
NO SWITCHPORT PORT-SECURITY.....................................................................................................850
NO SWITCHPORT PORT-SECURITY AGING ........................................................................................851
SHOW PORT-SECURITY INTERFACE...................................................................................................852
SHOW PORT-SECURITY INTRUSION INTERFACE..............................................................................855
SWITCHPORT PORT-SECURITY ...........................................................................................................857
SWITCHPORT PORT-SECURITY AGING ..............................................................................................858
SWITCHPORT PORT-SECURITY MAXIMUM.........................................................................................859
SWITCHPORT PORT-SECURITY VIOLATION.......................................................................................860
Chapter 60: 802.1x Port-based Network Access Control .........................................................................863
Overview...................................................................................................................................................864
Authentication Process.............................................................................................................................865
Port Roles.................................................................................................................................................866
Authentication Methods for Authenticator Ports .......................................................................................867
Operational Settings for Authenticator Ports ............................................................................................868
Operating Modes for Authenticator Ports .................................................................................................869
Single Host Mode...............................................................................................................................869
Multi Host Mode .................................................................................................................................869
Multi Supplicant Mode........................................................................................................................871
Single Host Mode...............................................................................................................................874
Multi Host Mode .................................................................................................................................874
Multi Supplicant Mode........................................................................................................................874
Supplicant VLAN Attributes on the RADIUS Server...........................................................................875
Guest VLAN..............................................................................................................................................876
RADIUS Accounting .................................................................................................................................877
General Steps...........................................................................................................................................878
Guidelines.................................................................................................................................................879
Enabling 802.1x Port-Based Network Access Control on the Switch.......................................................881