Allied Telesis AT-S63 User Manual
Page 9

AT-S63 Management Software Features Guide
9
Chapter 29: BOOTP Relay Agent ............................................................................................................... 337
Supported Platforms....................................................................................................................................... 338
Overview......................................................................................................................................................... 339
Guidelines....................................................................................................................................................... 341
Chapter 30: Virtual Router Redundancy Protocol .................................................................................... 343
Supported Platforms....................................................................................................................................... 344
Overview......................................................................................................................................................... 345
Master Switch ................................................................................................................................................. 346
Backup Switches ............................................................................................................................................ 347
Interface Monitoring........................................................................................................................................ 348
Port Monitoring ............................................................................................................................................... 349
VRRP on the Switch ....................................................................................................................................... 350
Chapter 31: MAC Address-based Port Security ....................................................................................... 355
Supported Platforms....................................................................................................................................... 356
Overview......................................................................................................................................................... 357
Automatic ................................................................................................................................................. 357
Limited...................................................................................................................................................... 357
Secured.................................................................................................................................................... 358
Locked...................................................................................................................................................... 358
Invalid Frames and Intrusion Actions ............................................................................................................. 359
Guidelines....................................................................................................................................................... 360
Chapter 32: 802.1x Port-based Network Access Control ........................................................................ 361
Supported Platforms....................................................................................................................................... 362
Overview......................................................................................................................................................... 363
Authentication Process................................................................................................................................... 365
Port Roles....................................................................................................................................................... 366
None Role ................................................................................................................................................ 366
Authenticator Role.................................................................................................................................... 366
Supplicant Role ........................................................................................................................................ 368
Single Operating Mode ............................................................................................................................ 369
Multiple Operating Mode .......................................................................................................................... 373
Guest VLAN.................................................................................................................................................... 378
RADIUS Accounting ....................................................................................................................................... 379
General Steps................................................................................................................................................. 380
Guidelines....................................................................................................................................................... 381
Chapter 33: Web Server .............................................................................................................................. 387
Supported Platforms....................................................................................................................................... 388
Overview......................................................................................................................................................... 389
Configuring the Web Server for HTTP............................................................................................................ 390
Configuring the Web Server for HTTPS ......................................................................................................... 391