beautypg.com

Chapter 14, Chapter 15, Chapter 16 – Allied Telesis AT-S101 User Manual

Page 5: Chapter 17, Chapter 18, Chapter 19, Chapter 20, Chapter 21

background image

AT-S101 Management Software User’s Guide

5

Port Priority..................................................................................................................................................................136

Forwarding Delay and Topology Changes .........................................................................................................................138

Hello Time and Bridge Protocol Data Units (BPDU)....................................................................................................138
Point-to-Point and Edge Ports.....................................................................................................................................139

Mixed STP and RSTP Networks.........................................................................................................................................142
Spanning Tree and VLANs.................................................................................................................................................143
Basic STP and RSTP Configuration...................................................................................................................................145
Configuring RSTP Port Settings .........................................................................................................................................148

Configuring the Basic RSTP Port Settings ..................................................................................................................148
Configuring the Advanced RSTP Port Settings ...........................................................................................................150

Viewing the Spanning Tree Topology.................................................................................................................................154

Chapter 14: 802.1x Port-based Network Access Control .............................................................................................157
Overview.............................................................................................................................................................................158

Authentication Process................................................................................................................................................159
Authenticator Ports......................................................................................................................................................159
General Steps .............................................................................................................................................................161
Port-based Network Access Control Guidelines..........................................................................................................161

Guest VLANs ......................................................................................................................................................................164
Configuring 802.1x Port-based Network Access Control....................................................................................................165

Chapter 15: RADIUS Authentication Protocol ..............................................................................................................169
Overview.............................................................................................................................................................................170

RADIUS Implementation Guidelines ...........................................................................................................................170

Configuring the RADIUS Client...........................................................................................................................................171

Chapter 16: Destination MAC Filter ...............................................................................................................................173
Overview.............................................................................................................................................................................174
Configuring a Destination MAC Filter .................................................................................................................................175
Deleting a Destination MAC Filter.......................................................................................................................................177

Chapter 17: Power over Ethernet (PoE) .........................................................................................................................179
Overview.............................................................................................................................................................................180

Power Budgeting .........................................................................................................................................................181

Setting Power over Ethernet...............................................................................................................................................182

Chapter 18: Classifiers ....................................................................................................................................................185
Overview.............................................................................................................................................................................186
Classifier Criteria ................................................................................................................................................................187
Guidelines...........................................................................................................................................................................191
Creating Classifiers.............................................................................................................................................................192

Chapter 19: Access Control Policies .............................................................................................................................195
Overview.............................................................................................................................................................................196
ACP Components...............................................................................................................................................................197
Guidelines...........................................................................................................................................................................198
Creating Profile Action........................................................................................................................................................199
Creating an In-profile Action ...............................................................................................................................................201
Creating an Out-Profile Action............................................................................................................................................203
Creating an Access Control Port List..................................................................................................................................205
Creating a Policy ................................................................................................................................................................206
Displaying a Policy Sequence ............................................................................................................................................208

Chapter 20: Management Software Updates .................................................................................................................209
Overview.............................................................................................................................................................................210
Upgrading a Firmware Image Using HTTP.........................................................................................................................211
Upgrading a Firmware Image Using TFTP .........................................................................................................................213
Downloading or Uploading a Configuration File via HTTP .................................................................................................215
Downloading or Uploading a Configuration File via TFTP..................................................................................................217

Chapter 21: Statistics ......................................................................................................................................................219
Overview.............................................................................................................................................................................220
Displaying Traffic Comparison Statistics ............................................................................................................................221