beautypg.com

Setting the link access control protocol (lacp), Setting 802.1x port authentication – Allied Telesis AT-S100 User Manual

Page 56

background image

Chapter 2: Configuring the AT-S100 Software

56

Setting the Link

Access Control

Protocol (LACP)

LACP (Link Aggregation Control Protocol) port trunks perform the same
function as static trunks. They increase the bandwidth between network
devices by distributing the traffic load over multiple physical links. The
advantage of an LACP trunk over a static port trunk is its flexibility. While
implementations of static trunking tend to be vendor specific, the
implementation of LACP in the AT-S100 Management Software is
compliant with the IEEE 802.3ad standard, making it interoperable with
equipment from other vendors that also comply with the standard.
Therefore, you can create an LACP trunk between an Allied Telesis
device and network devices from other manufacturers.

Another advantage is that ports in an LACP trunk can function in a
standby mode. This adds redundancy and resiliency to the trunk. If a link
in a static trunk goes down, the overall bandwidth of the trunk is reduced
until the link is reestablished or another port is added to the trunk. In
contrast, an LACP trunk can automatically activate ports in a standby
mode when an active link fails so that the maximum possible bandwidth of
the trunk is maintained.

The syntax of this command is:

channel-group (1-10) mode active|passive

To configure LACP on port 12 and channel group 1, enter the following
commands:

switch# config t

switch(config)# interf ge12

switch(config-if)# channel-group 1 mode active

To disable LACP on port 7 and channel group 2, enter the following
commands:

switch# config t

switch(config)# interf ge7

switch(config-if)# no channel-group 2 mode passive

Setting 802.1x

Port

Authentication

The AT-S100 Management Software has several different methods for
protecting your network and its resources from unauthorized access. One
method is 802.1x port-based network access control which uses the
RADIUS protocol to control who can send traffic through and receive
traffic from a switch port. The switch does not allow an end node to send
or receive traffic through a port until the user of the node has been
authenticated by a RADIUS server.

The benefit of this type of network security is that you can prevent
unauthorized individuals from connecting a computer to a switch port or