beautypg.com

Creating static trunks – Allied Telesis AT-S100 User Manual

Page 49

background image

AT-S100 Management Software User’s Guide

49

Setting Port Security Violation

The Port Security Violation Feature determines how the AT-S100 software
reacts when the number of port secure MAC addresses reaches the
maximum value set in the SWITCHPORT PORT-SECURITY MAXIMUM
command (see “Setting the Maximum Number of MAC Addresses” on
page 47.)

The syntax of SWITCHPORT PORT-SECURITY VIOLATION command
is:

switchport port-security violation
protect|restrict|shutdown

To set the port security violation mode on port 20 to restrict, enter the
following commands:

switch# configure terminal

switch(config)# interface ge20

switch(config-if)#switchport port-security violation
restrict

For more information about this command, see “SWITCHPORT PORT-
SECURITY VIOLATION” on page 225.

Creating Static

Trunks

A static port trunk is a group of two to eight ports that function as a single
virtual link between the switch and another device. Traffic is distributed
across the ports to improve performance and enhance reliability by
reducing the reliance on a single physical link.

To configure a static port trunk, you designate the ports of the trunk and
the management software groups them together automatically. You can
also control how traffic is distributed over the trunk ports.

The syntax of the static trunk command is:

static-channel-group<1-8>

For example, to assign port 8 to static port trunk 2, enter the following
commands:

switch# configure terminal

switch(config)# interface ge8

switch(config-if)# static-channel-group2