Allied Telesis AT-S95 WEB User Manual
Page 4

Page 4
Allied Telesis
AT-S95 Management Software Web Browser Interface User’s Guide
Defining Access Profiles ......................................................................................................................... 43
Defining Profile Rules ............................................................................................................................. 47
Defining Authentication Profiles .............................................................................................................. 51
Mapping Authentication Profiles ............................................................................................................. 55
Configuring TACACS+ ........................................................................................................................... 56
Configuring RADIUS ............................................................................................................................... 60
Configuring Local Users.......................................................................................................................... 64
Defining Line Passwords ........................................................................................................................ 66
Managing Port Security........................................................................................................................... 67
Defining 802.1x Port Access................................................................................................................... 70
Enabling Storm Control........................................................................................................................... 75
Defining MAC Based ACL....................................................................................................................... 77
Defining IPv4 Based ACL ....................................................................................................................... 81
Defining IPv6 Based ACL ....................................................................................................................... 87
Defining ACL Binding.............................................................................................................................. 91
Defining DHCP Snooping General Properties ........................................................................................ 94
Defining DHCP Snooping on VLANs ...................................................................................................... 95
Defining Trusted Interfaces..................................................................................................................... 96
Binding Addresses to the DHCP Snooping Database ............................................................................ 99
Defining Port Settings ........................................................................................................................... 101
Configuring Port Mirroring..................................................................................................................... 105
Defining Trunk Settings......................................................................................................................... 108
Defining Port Trunking .......................................................................................................................... 111
Configuring LACP ................................................................................................................................. 113
Defining VLAN Properties ..................................................................................................................... 119
Defining VLAN Interface Settings ......................................................................................................... 122
Defining GVRP...................................................................................................................................... 124
Adding Log Servers ......................................................................................................................... 130
Modifying Log Servers .................................................................................................................... 132