Allied Telesis AT-S63 User Manual
Page 7

AT-S63 Management Software Web Browser User’s Guide
7
Chapter 21: GARP VLAN Registration Protocol ....................................................................................... 331
Configuring GVRP .......................................................................................................................................... 332
Enabling or Disabling GVRP on a Port........................................................................................................... 334
Displaying the GVRP Configuration ............................................................................................................... 335
Displaying the GVRP Port Configuration........................................................................................................ 336
Displaying the GVRP Database ..................................................................................................................... 337
Displaying the GVRP State Machine.............................................................................................................. 338
Displaying the GVRP Counters ...................................................................................................................... 341
Displaying the GIP Connected Ports Ring...................................................................................................... 344
Chapter 22: MAC Address-based Port Security ....................................................................................... 347
Configuring Port Security................................................................................................................................ 348
Displaying Port Security Levels ...................................................................................................................... 351
Chapter 23: 802.1x Port-based Network Access Control ........................................................................ 353
Setting Port Roles........................................................................................................................................... 354
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 356
Configuring Authenticator Port Parameters.................................................................................................... 357
Configuring Supplicant Port Parameters ........................................................................................................ 363
Displaying the Port-based Network Access Control Parameters ................................................................... 365
Displaying the Port Status........................................................................................................................ 365
Displaying the Port Settings ..................................................................................................................... 367
Configuring RADIUS Accounting ............................................................................................................. 369
Displaying the RADIUS Accounting Settings ........................................................................................... 370
Chapter 24: Encryption Keys, PKI, and SSL ............................................................................................. 373
Displaying the Encryption Keys ...................................................................................................................... 374
Displaying the PKI Settings and Certificates .................................................................................................. 376
Displaying the SSL Settings ........................................................................................................................... 379
Chapter 25: Secure Shell (SSH) ................................................................................................................. 381
Configuring SSH............................................................................................................................................. 382
Displaying the SSH Settings........................................................................................................................... 384
Chapter 26: TACACS+ and RADIUS Protocols ......................................................................................... 387
Enabling or Disabling TACACS+ or RADIUS ................................................................................................. 388
Configuring the TACACS+ Client Settings ..................................................................................................... 390
Displaying the TACACS+ Client Settings ....................................................................................................... 392
Configuring the RADIUS Client Settings ........................................................................................................ 394
Displaying the RADIUS Client Settings .......................................................................................................... 396
Chapter 27: Management Access Control List ......................................................................................... 399
Enabling or Disabling the Management ACL.................................................................................................. 400
Creating an ACE............................................................................................................................................. 402
Modifying an ACE........................................................................................................................................... 404
Deleting an ACE ............................................................................................................................................. 405
Displaying the Management Access Control List ........................................................................................... 406
Index ............................................................................................................................................................. 407