beautypg.com

Allied Telesis AT-9000 Series User Manual

Page 18

background image

Contents

18

Provider Ports ....................................................................................................................................824
EtherType/Length...............................................................................................................................824

VLAN Stacking Process ...........................................................................................................................825
Example of VLAN Stacking ......................................................................................................................826

Chapter 57: VLAN Stacking Commands ....................................................................................................831

NO SWITCHPORT VLAN-STACKING .....................................................................................................832
PLATFORM VLAN-STACKING-TPID.......................................................................................................833
SHOW VLAN VLAN-STACKING ..............................................................................................................834
SWITCHPORT VLAN-STACKING ...........................................................................................................835

Section VIII:

Port Security ...................................................................................................................837

Chapter 58: MAC Address-based Port Security ........................................................................................839

Overview...................................................................................................................................................840

Static Versus Dynamic Addresses .....................................................................................................840
Intrusion Actions.................................................................................................................................840
Guidelines ..........................................................................................................................................841

Configuring Ports......................................................................................................................................842
Enabling MAC Address-based Security on Ports .....................................................................................844
Disabling MAC Address-based Security on Ports ....................................................................................845
Displaying Port Settings ...........................................................................................................................846

Chapter 59: MAC Address-based Port Security Commands ...................................................................849

NO SWITCHPORT PORT-SECURITY.....................................................................................................850
NO SWITCHPORT PORT-SECURITY AGING ........................................................................................851
SHOW PORT-SECURITY INTERFACE...................................................................................................852
SHOW PORT-SECURITY INTRUSION INTERFACE..............................................................................855
SWITCHPORT PORT-SECURITY ...........................................................................................................857
SWITCHPORT PORT-SECURITY AGING ..............................................................................................858
SWITCHPORT PORT-SECURITY MAXIMUM.........................................................................................859
SWITCHPORT PORT-SECURITY VIOLATION.......................................................................................860

Chapter 60: 802.1x Port-based Network Access Control .........................................................................863

Overview...................................................................................................................................................864
Authentication Process.............................................................................................................................865
Port Roles.................................................................................................................................................866

None Role ..........................................................................................................................................866
Authenticator Role..............................................................................................................................866

Authentication Methods for Authenticator Ports .......................................................................................867
Operational Settings for Authenticator Ports ............................................................................................868
Operating Modes for Authenticator Ports .................................................................................................869

Single Host Mode...............................................................................................................................869
Multi Host Mode .................................................................................................................................869
Multi Supplicant Mode........................................................................................................................871

Supplicant and VLAN Associations ..........................................................................................................873

Single Host Mode...............................................................................................................................874
Multi Host Mode .................................................................................................................................874
Multi Supplicant Mode........................................................................................................................874
Supplicant VLAN Attributes on the RADIUS Server...........................................................................875

Guest VLAN..............................................................................................................................................876
RADIUS Accounting .................................................................................................................................877
General Steps...........................................................................................................................................878
Guidelines.................................................................................................................................................879
Enabling 802.1x Port-Based Network Access Control on the Switch.......................................................881