beautypg.com

Allied Telesis AT-GS950/24 User Manual

Page 6

background image

Contents

6

Port List ....................................................................................................................................................197

Create Port List ..................................................................................................................................197
Modify Port List ..................................................................................................................................198
Delete Port List...................................................................................................................................199

Policy ........................................................................................................................................................200

Create Policy......................................................................................................................................200
Modify Policy ......................................................................................................................................202
Delete Policy ......................................................................................................................................203

Policy Sequence.......................................................................................................................................205

Chapter 14

: Storm Control ..........................................................................................................................207

Overview...................................................................................................................................................208

Ingress Rate Limiting .........................................................................................................................209
Egress Rate Limiting ..........................................................................................................................209

Configuration ............................................................................................................................................210
Ingress Rate Limiting................................................................................................................................212
Egress Rate Limiting ................................................................................................................................214

Chapter 15

: MAC Address Table ................................................................................................................215

Overview...................................................................................................................................................216
Static Unicast MAC Address Configuration ..............................................................................................218
Modify Static Unicast Address..................................................................................................................220
Delete Static Unicast Address ..................................................................................................................221
Static Multicast Address Configuration.....................................................................................................222
Modify Static Multicast Address................................................................................................................224
Delete Static Multicast Address................................................................................................................225

Chapter 16

: DHCP Snooping ......................................................................................................................227

Overview...................................................................................................................................................228

Trusted Ports......................................................................................................................................228
Untrusted Ports ..................................................................................................................................228
Unauthorized DHCP Servers .............................................................................................................228
DHCP with Option 82 .........................................................................................................................229

General Guidelines...................................................................................................................................230
General Configuration ..............................................................................................................................231
VLAN Setting ............................................................................................................................................233

Create VLAN Setting..........................................................................................................................233
Modify VLAN Setting ..........................................................................................................................234
Delete VLAN Setting ..........................................................................................................................234

Trusted and Untrusted Port Configuration................................................................................................235
Binding Database .....................................................................................................................................236

Static IP Addresses............................................................................................................................236
Viewing...............................................................................................................................................237

Chapter 17

: IGMP Snooping .......................................................................................................................239

Overview...................................................................................................................................................240
IGMP Snooping Configuration..................................................................................................................242

Chapter 18

: Security ...................................................................................................................................245

Port Access Control..................................................................................................................................246

Overview ............................................................................................................................................246
Port Access Control Configuration .....................................................................................................247

RADIUS Client..........................................................................................................................................251

Overview ............................................................................................................................................251
General Guidelines ............................................................................................................................251
Radius Client Configuration ...............................................................................................................252