Allied Telesis AT-S63 User Manual
Page 11

AT-S63 Management Software Menus Interface User’s Guide
11
Chapter 28: Protected Ports VLANs .......................................................................................................... 671
Protected Ports VLAN Overview .................................................................................................................... 672
Creating a Protected Ports VLAN................................................................................................................... 675
Modifying a Protected Ports VLAN ................................................................................................................. 678
Displaying a Protected Ports VLAN................................................................................................................ 682
Deleting a Protected Ports VLAN ................................................................................................................... 684
Chapter 29: MAC Address-based VLANs .................................................................................................. 687
MAC Address-based VLAN Overview ............................................................................................................ 688
Egress Ports............................................................................................................................................. 688
VLANs That Span Switches ..................................................................................................................... 691
VLAN Hierarchy ....................................................................................................................................... 692
Steps to Creating a MAC Address-based VLAN...................................................................................... 692
Guidelines ................................................................................................................................................ 693
Creating a MAC Address-based VLAN .......................................................................................................... 694
Adding and Deleting MAC Addresses ............................................................................................................ 697
Adding and Deleting Egress Ports.................................................................................................................. 699
Deleting a MAC Address-based VLAN........................................................................................................... 701
Displaying MAC Address-based VLANs......................................................................................................... 703
Chapter 30: MAC Address-based Port Security ....................................................................................... 709
MAC Address Port Security Overview............................................................................................................ 710
Automatic ................................................................................................................................................. 710
Limited...................................................................................................................................................... 710
Secured.................................................................................................................................................... 711
Locked...................................................................................................................................................... 711
Invalid Frames and Intrusion Actions ....................................................................................................... 711
MAC Address Port Security Guidelines ................................................................................................... 712
Configuring MAC Address Port Security ........................................................................................................ 713
Displaying Port Security Levels ...................................................................................................................... 717
Chapter 31: 802.1x Port-based Network Access Control ........................................................................ 719
IEEE 802.1x Port-based Network Access Control Overview.......................................................................... 720
Authentication Process ............................................................................................................................ 721
Port Roles ................................................................................................................................................ 722
Authenticator Ports with Single and Multiple Supplicants ........................................................................ 724
RADIUS Accounting................................................................................................................................. 730
General Steps .......................................................................................................................................... 731
802.1x Port-based Network Access Control Guidelines .......................................................................... 732
Setting Port Roles........................................................................................................................................... 734
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 736
Configuring Authenticator Port Parameters.................................................................................................... 737
Configuring Supplicant Port Parameters ........................................................................................................ 741
Displaying the Port Access Parameters ......................................................................................................... 744
Configuring RADIUS Accounting.................................................................................................................... 746