Creating static trunks – Allied Telesis AT-S100 User Manual
Page 49
AT-S100 Management Software User’s Guide
49
Setting Port Security Violation
The Port Security Violation Feature determines how the AT-S100 software
reacts when the number of port secure MAC addresses reaches the
maximum value set in the SWITCHPORT PORT-SECURITY MAXIMUM
command (see “Setting the Maximum Number of MAC Addresses” on
page 47.)
The syntax of SWITCHPORT PORT-SECURITY VIOLATION command
is:
switchport port-security violation
protect|restrict|shutdown
To set the port security violation mode on port 20 to restrict, enter the
following commands:
switch# configure terminal
switch(config)# interface ge20
switch(config-if)#switchport port-security violation
restrict
For more information about this command, see “SWITCHPORT PORT-
SECURITY VIOLATION” on page 225.
Creating Static
Trunks
A static port trunk is a group of two to eight ports that function as a single
virtual link between the switch and another device. Traffic is distributed
across the ports to improve performance and enhance reliability by
reducing the reliance on a single physical link.
To configure a static port trunk, you designate the ports of the trunk and
the management software groups them together automatically. You can
also control how traffic is distributed over the trunk ports.
The syntax of the static trunk command is:
static-channel-group<1-8>
For example, to assign port 8 to static port trunk 2, enter the following
commands:
switch# configure terminal
switch(config)# interface ge8
switch(config-if)# static-channel-group2