Setting the link access control protocol (lacp), Setting 802.1x port authentication – Allied Telesis AT-S100 User Manual
Page 56
Chapter 2: Configuring the AT-S100 Software
56
Setting the Link
Access Control
Protocol (LACP)
LACP (Link Aggregation Control Protocol) port trunks perform the same
function as static trunks. They increase the bandwidth between network
devices by distributing the traffic load over multiple physical links. The
advantage of an LACP trunk over a static port trunk is its flexibility. While
implementations of static trunking tend to be vendor specific, the
implementation of LACP in the AT-S100 Management Software is
compliant with the IEEE 802.3ad standard, making it interoperable with
equipment from other vendors that also comply with the standard.
Therefore, you can create an LACP trunk between an Allied Telesis
device and network devices from other manufacturers.
Another advantage is that ports in an LACP trunk can function in a
standby mode. This adds redundancy and resiliency to the trunk. If a link
in a static trunk goes down, the overall bandwidth of the trunk is reduced
until the link is reestablished or another port is added to the trunk. In
contrast, an LACP trunk can automatically activate ports in a standby
mode when an active link fails so that the maximum possible bandwidth of
the trunk is maintained.
The syntax of this command is:
channel-group (1-10) mode active|passive
To configure LACP on port 12 and channel group 1, enter the following
commands:
switch# config t
switch(config)# interf ge12
switch(config-if)# channel-group 1 mode active
To disable LACP on port 7 and channel group 2, enter the following
commands:
switch# config t
switch(config)# interf ge7
switch(config-if)# no channel-group 2 mode passive
Setting 802.1x
Port
Authentication
The AT-S100 Management Software has several different methods for
protecting your network and its resources from unauthorized access. One
method is 802.1x port-based network access control which uses the
RADIUS protocol to control who can send traffic through and receive
traffic from a switch port. The switch does not allow an end node to send
or receive traffic through a port until the user of the node has been
authenticated by a RADIUS server.
The benefit of this type of network security is that you can prevent
unauthorized individuals from connecting a computer to a switch port or