beautypg.com

Allied Telesis AT-S62 User Manual

Page 11

background image

AT-S62 Management Software Web Browser Interface User’s Guide

11

Figure 72: Add New SNMPv3 Notify Page .........................................................................................................................235
Figure 73: Modify SNMPv3 Notify Page .............................................................................................................................237
Figure 74: SNMPv3 Target Address Table Page ...............................................................................................................240
Figure 75: Add New SNMPv3 Target Address Table Page................................................................................................240
Figure 76: Modify SNMPv3 Target Address Table Page....................................................................................................243
Figure 77: SNMPv3 Target Parameters Table Page..........................................................................................................246
Figure 78: Add New SNMPv3 Target Parameters Table Page ..........................................................................................247
Figure 79: Modify SNMPv3 Target Parameters Table Page ..............................................................................................250
Figure 80: SNMPv3 Community Table Page......................................................................................................................254
Figure 81: Add New SNMPv3 Community Table Page ......................................................................................................254
Figure 82: Modify SNMPv3 Community Table Page ..........................................................................................................257
Figure 83: Monitoring, SNMPv3 User Table Page..............................................................................................................260
Figure 84: Monitoring, SNMPv3 View Table Page .............................................................................................................261
Figure 85: Monitoring, SNMPv3 Access Table Page..........................................................................................................262
Figure 86: Monitoring, SNMPv3 SecurityToGroup Table Page ..........................................................................................263
Figure 87: Monitoring, SNMPv3 Notify Table Page ............................................................................................................264
Figure 88: Monitoring, SNMPv3 Target Address Table Page.............................................................................................265
Figure 89: Monitoring, SNMPv3 Target Parameters Table Page .......................................................................................266
Figure 90: Monitoring, SNMPv3 Community Table Page ...................................................................................................267

Chapter 20: Spanning Tree, Rapid Spanning Tree, and Multiple Spanning Tree Protocols ................ 271

Figure 91: Spanning Tree Tab (Configuration) ...................................................................................................................272
Figure 92: STP Spanning Tree Tab....................................................................................................................................274
Figure 93: STP Port Settings Window ................................................................................................................................276
Figure 94: RSTP Spanning Tree Tab .................................................................................................................................279
Figure 95: RSTP Port Settings Window..............................................................................................................................281
Figure 96: MSTP Spanning Tree Tab.................................................................................................................................284
Figure 97: Add New MSTI Window.....................................................................................................................................287
Figure 98: Modify MSTI Window.........................................................................................................................................288
Figure 99: MSTP Port Settings Window .............................................................................................................................289
Figure 100: Spanning Tree Tab (Monitoring)......................................................................................................................293

Chapter 21: Port-based and Tagged Virtual LANs ................................................................................... 297

Figure 101: VLAN Tab (Configuration) ...............................................................................................................................298
Figure 102: Add New VLAN Page ......................................................................................................................................300

Chapter 22: GARP VLAN Registration Protocol ....................................................................................... 311

Figure 103: GVRP Tab (Configuring) .................................................................................................................................312
Figure 104: GVRP Port Configuration Page.......................................................................................................................314

Chapter 23: Protected Ports VLANs .......................................................................................................... 317

Chapter 24: MAC Address-based Port Security ....................................................................................... 323

Figure 105: Port Security Tab.............................................................................................................................................324
Figure 106: Security for Port(s) Window.............................................................................................................................325
Figure 107: Security for Port(s) Tab ...................................................................................................................................327

Chapter 25: 802.1x Port-based Network Access Control ........................................................................ 329

Figure 108: 802.1x Port Access Tab (Configuration)..........................................................................................................330
Figure 109: Port Role Configuration Page..........................................................................................................................333
Figure 110: Authenticator Parameters Page ......................................................................................................................335
Figure 111: Supplicant Parameters Page...........................................................................................................................340

Chapter 26: Encryption Keys, PKI, and SSL ............................................................................................. 345

Figure 112: Keys Tab (Monitoring) .....................................................................................................................................346
Figure 113: PKI Tab (Monitoring) .......................................................................................................................................347
Figure 114: SSL Tab (Monitoring) ......................................................................................................................................350

Chapter 27: Secure Shell Protocol............................................................................................................. 351

Figure 115: Secure Shell Tab (Configuration) ....................................................................................................................352