beautypg.com

Allied Telesis AT-S62 User Manual

Page 12

background image

List of Figures

12

Figure 96: MSTP Spanning Tree Tab .......................................................................................................................................................... 259
Figure 97: Add New MSTI Window ............................................................................................................................................................. 262
Figure 98: Modify MSTI Window ................................................................................................................................................................. 263
Figure 99: MSTP Port Settings Window .................................................................................................................................................... 264
Figure 100: Spanning Tree Tab (Monitoring) ......................................................................................................................................... 268

Chapter 21
Virtual LANs
.......................................................................................................................................................................................................270
Figure 101: VLAN Tab (Configuration) ...................................................................................................................................................... 271
Figure 102: Add New VLAN Page ................................................................................................................................................................ 272

Chapter 22
GARP VLAN Registration Protocol
..........................................................................................................................................................282
Figure 103: GVRP Tab (Configuring) .......................................................................................................................................................... 283
Figure 104: GVRP Port Configuration Page ............................................................................................................................................. 285

Chapter 23
Protected Ports VLANs
.
................................................................................................................................................................................287

Chapter 24
MAC Address Security
...................................................................................................................................................................................291
Figure 105: Port Security Tab ....................................................................................................................................................................... 292
Figure 106: Security for Port(s) Window ................................................................................................................................................... 293
Figure 107: Security for Port(s) Tab ............................................................................................................................................................ 295

Chapter 25
802.1x Port-based Access Control
..........................................................................................................................................................297
Figure 108: 802.1x Port Access Tab (Configuration) ............................................................................................................................ 298
Figure 109: Port Role Configuration Page ............................................................................................................................................... 300
Figure 110: Authenticator Parameters Page ........................................................................................................................................... 302
Figure 111: Supplicant Parameters Page ................................................................................................................................................. 306

Chapter 26
Encryption Keys, PKI, and SSL
.
..................................................................................................................................................................310
Figure 112: Keys Tab (Monitoring) ............................................................................................................................................................. 311
Figure 113: PKI Tab (Monitoring) ................................................................................................................................................................ 312
Figure 114: SSL Tab (Monitoring) ............................................................................................................................................................... 315

Chapter 27
Secure Shell Protocol
.
...................................................................................................................................................................................316
Figure 115: Secure Shell Tab (Configuration) ......................................................................................................................................... 317

Chapter 28
RADIUS and TACACS+ Authentication Protocols
.
...........................................................................................................................320
Figure 116: Server-based Authentication Tab (Configuration) ....................................................................................................... 321
Figure 117: TACACS+ Configuration Page .............................................................................................................................................. 322
Figure 118: RADIUS Configuration Page .................................................................................................................................................. 323

Chapter 29
Management Access Control List
............................................................................................................................................................326
Figure 119: Mgmt. ACL Tab (Configuration) ........................................................................................................................................... 327