Allied Telesis AT-S63 User Manual
Page 9

AT-S63 Management Software Features Guide
9
Local Interface ................................................................................................................................................ 345
AT-9408LC/SP AT-9424T/GB, and AT-9424T/SP Switches .......................................................................... 346
Local Interface.......................................................................................................................................... 346
ARP Table................................................................................................................................................ 346
Default Gateway....................................................................................................................................... 347
Creating the VLANs ................................................................................................................................. 349
Creating the Routing Interfaces ............................................................................................................... 349
Adding a Static Route and Default Route ................................................................................................ 350
Adding RIP ............................................................................................................................................... 351
Selecting the Local Interface.................................................................................................................... 351
Non-routing Command Example .................................................................................................................... 352
Upgrading from AT-S63 Version 1.3.0 or Earlier............................................................................................ 354
Chapter 30: BOOTP Relay Agent ............................................................................................................... 355
Supported Platforms....................................................................................................................................... 356
Overview......................................................................................................................................................... 357
Guidelines....................................................................................................................................................... 359
Chapter 31: Virtual Router Redundancy Protocol .................................................................................... 361
Supported Platforms....................................................................................................................................... 362
Overview......................................................................................................................................................... 363
Master Switch ................................................................................................................................................. 364
Backup Switches ............................................................................................................................................ 365
Interface Monitoring........................................................................................................................................ 366
Port Monitoring ............................................................................................................................................... 367
VRRP on the Switch ....................................................................................................................................... 368
Chapter 32: MAC Address-based Port Security ....................................................................................... 373
Supported Platforms....................................................................................................................................... 374
Overview......................................................................................................................................................... 375
Automatic ................................................................................................................................................. 375
Limited...................................................................................................................................................... 375
Secured.................................................................................................................................................... 376
Locked...................................................................................................................................................... 376
Invalid Frames and Intrusion Actions ............................................................................................................. 377
Guidelines....................................................................................................................................................... 378
Chapter 33: 802.1x Port-based Network Access Control ........................................................................ 379
Supported Platforms....................................................................................................................................... 380
Overview......................................................................................................................................................... 381
Authentication Process................................................................................................................................... 383
Port Roles....................................................................................................................................................... 384
None Role ................................................................................................................................................ 384
Authenticator Role.................................................................................................................................... 384
Supplicant Role ........................................................................................................................................ 386
Single Operating Mode ............................................................................................................................ 387
Multiple Operating Mode .......................................................................................................................... 391