Allied Telesis AT-S63 User Manual
Page 10

Contents
10
Configuring GVRP ..........................................................................................................................................592
Enabling or Disabling GVRP on a Port ...........................................................................................................594
Displaying the GVRP Port Configuration ........................................................................................................596
Displaying GVRP Counters.............................................................................................................................597
Displaying the GVRP Database......................................................................................................................602
Displaying the GIP Connected Ports Ring ......................................................................................................604
Displaying the GVRP State Machine ..............................................................................................................606
Chapter 25: Multiple VLANs ........................................................................................................................611
Multiple VLAN Mode Overview .......................................................................................................................612
802.1Q- Compliant Multiple VLAN Mode..................................................................................................612
Non-802.1Q Compliant Multiple VLAN Mode ...........................................................................................614
Selecting a VLAN Mode..................................................................................................................................616
Displaying VLAN Information ..........................................................................................................................617
Chapter 26: Protected Ports VLANs ...........................................................................................................619
Protected Ports VLAN Overview .....................................................................................................................620
Creating a Protected Ports VLAN ...................................................................................................................623
Modifying a Protected Ports VLAN .................................................................................................................626
Displaying a Protected Ports VLAN ................................................................................................................630
Deleting a Protected Ports VLAN....................................................................................................................632
Chapter 27: Port Security ............................................................................................................................637
MAC Address Security Overview ....................................................................................................................638
Automatic..................................................................................................................................................638
Limited ......................................................................................................................................................638
Secured ....................................................................................................................................................639
Locked ......................................................................................................................................................639
Security Violations and Intrusion Actions .................................................................................................639
MAC Address Security Guidelines ...........................................................................................................640
Configuring MAC Address Port Security .........................................................................................................641
Displaying Port Security Levels ......................................................................................................................644
Chapter 28: 802.1x Port-based Network Access Control .........................................................................647
IEEE 802.1x Port-based Network Access Control Overview ..........................................................................648
Authentication Process.............................................................................................................................649
Port Roles.................................................................................................................................................650
RADIUS Accounting .................................................................................................................................652
General Steps...........................................................................................................................................653
Port-based Network Access Control Guidelines.......................................................................................654
Setting Port Roles ...........................................................................................................................................657
Enabling or Disabling 802.1x Port-based Network Access Control ................................................................659
Configuring Authenticator Port Parameters ....................................................................................................660
Configuring Supplicant Port Parameters.........................................................................................................664
Displaying the Port Access Parameters..........................................................................................................667
Configuring RADIUS Accounting ....................................................................................................................669
Chapter 29: MAC Address Table ................................................................................................................671
MAC Address Overview ..................................................................................................................................672
Displaying the MAC Address Tables ..............................................................................................................674