Allied Telesis AT-S63 User Manual
Page 11

AT-S63 Management Software Menus Interface User’s Guide
11
Chapter 27: Multiple VLAN Modes ............................................................................................................. 661
Multiple VLAN Mode Overview....................................................................................................................... 662
802.1Q- Compliant Multiple VLAN Mode ................................................................................................. 662
Non-802.1Q Compliant Multiple VLAN Mode........................................................................................... 664
Selecting a VLAN Mode ................................................................................................................................. 666
Displaying VLAN Information.......................................................................................................................... 667
Chapter 28: Protected Ports VLANs .......................................................................................................... 669
Protected Ports VLAN Overview .................................................................................................................... 670
Creating a Protected Ports VLAN................................................................................................................... 673
Modifying a Protected Ports VLAN ................................................................................................................. 676
Displaying a Protected Ports VLAN................................................................................................................ 680
Deleting a Protected Ports VLAN ................................................................................................................... 682
Chapter 29: MAC Address-based VLANs .................................................................................................. 685
MAC Address-based VLAN Overview ............................................................................................................ 686
Egress Ports............................................................................................................................................. 686
VLANs That Span Switches ..................................................................................................................... 689
VLAN Hierarchy ....................................................................................................................................... 690
Steps to Creating a MAC Address-based VLAN...................................................................................... 690
Guidelines ................................................................................................................................................ 691
Creating a MAC Address-based VLAN .......................................................................................................... 693
Adding and Deleting MAC Addresses ............................................................................................................ 696
Adding and Deleting Egress Ports.................................................................................................................. 698
Deleting a MAC Address-based VLAN........................................................................................................... 700
Displaying MAC Address-based VLANs......................................................................................................... 702
Chapter 30: MAC Address-based Port Security ....................................................................................... 707
MAC Address Port Security Overview............................................................................................................ 708
Automatic ................................................................................................................................................. 708
Limited...................................................................................................................................................... 708
Secured.................................................................................................................................................... 709
Locked...................................................................................................................................................... 709
Invalid Frames and Intrusion Actions ....................................................................................................... 709
MAC Address Port Security Guidelines ................................................................................................... 710
Configuring MAC Address Port Security ........................................................................................................ 711
Displaying Port Security Levels ...................................................................................................................... 715
Chapter 31: 802.1x Port-based Network Access Control ........................................................................ 717
IEEE 802.1x Port-based Network Access Control Overview.......................................................................... 718
Authentication Process ............................................................................................................................ 719
Port Roles ................................................................................................................................................ 720
None Role ................................................................................................................................................ 720
Authenticator Role.................................................................................................................................... 720
Supplicant Role ........................................................................................................................................ 722
Authenticator Ports with Single and Multiple Supplicants ........................................................................ 723
Supplicant and VLAN Associations.......................................................................................................... 729
Guest VLAN ............................................................................................................................................. 731
RADIUS Accounting................................................................................................................................. 732
General Steps .......................................................................................................................................... 733
802.1x Port-based Network Access Control Guidelines .......................................................................... 734
Setting Port Roles........................................................................................................................................... 736
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 738