beautypg.com

Allied Telesis AT-GS950/16 User Manual

Page 6

background image

Contents

6

Port List ....................................................................................................................................................195

Create Port List ..................................................................................................................................195
Modify Port List ..................................................................................................................................196
Delete Port List...................................................................................................................................197

Policy ........................................................................................................................................................198

Create Policy......................................................................................................................................198
Modify Policy ......................................................................................................................................200
Delete Policy ......................................................................................................................................201

Policy Sequence.......................................................................................................................................203

Chapter 14

: Storm Control ..........................................................................................................................205

Overview...................................................................................................................................................206

Ingress Rate Limiting .........................................................................................................................207
Egress Rate Limiting ..........................................................................................................................207

Configuration ............................................................................................................................................208
Ingress Rate Limiting................................................................................................................................210
Egress Rate Limiting ................................................................................................................................212

Chapter 15

: MAC Address Table ................................................................................................................213

Overview...................................................................................................................................................214
Static Unicast MAC Address Configuration ..............................................................................................216
Modify Static Unicast Address..................................................................................................................218
Delete Static Unicast Address ..................................................................................................................219
Static Multicast Address Configuration.....................................................................................................220
Modify Static Multicast Address................................................................................................................222
Delete Static Multicast Address................................................................................................................223

Chapter 16

: DHCP Snooping ......................................................................................................................225

Overview...................................................................................................................................................226

Trusted Ports......................................................................................................................................226
Untrusted Ports ..................................................................................................................................226
Unauthorized DHCP Servers .............................................................................................................226
DHCP with Option 82 .........................................................................................................................227

General Guidelines...................................................................................................................................228
General Configuration ..............................................................................................................................229
VLAN Setting ............................................................................................................................................231

Create VLAN Setting..........................................................................................................................231
Modify VLAN Setting ..........................................................................................................................232
Delete VLAN Setting ..........................................................................................................................232

Trusted and Untrusted Port Configuration................................................................................................233
Binding Database .....................................................................................................................................234

Static IP Addresses............................................................................................................................234
Viewing...............................................................................................................................................235

Chapter 17

: IGMP Snooping .......................................................................................................................237

Overview...................................................................................................................................................238
IGMP Snooping Configuration..................................................................................................................240

Chapter 18

: Security ...................................................................................................................................243

Port Access Control..................................................................................................................................244

Overview ............................................................................................................................................244
Port Access Control Configuration .....................................................................................................245

RADIUS Client..........................................................................................................................................249

Overview ............................................................................................................................................249
General Guidelines ............................................................................................................................249
Radius Client Configuration ...............................................................................................................250