Section iv, Security 515 – Allied Telesis AT-S63 User Manual
Page 10

Contents
10
GARP VLAN Registration Protocol .......................................................................................................................................................... 471
GARP VLAN Registration Protocol (GVRP) Overview ............................................................................................................................ 472
Guidelines .................................................................................................................................................................................................. 474
GVRP and Network Security ................................................................................................................................................................ 475
GVRP-inactive Intermediate Switches ............................................................................................................................................. 475
Generic Attribute Registration Protocol (GARP) Overview .......................................................................................................... 476
Configuring GVRP ............................................................................................................................................................................................. 480
Enabling or Disabling GVRP on a Port ....................................................................................................................................................... 482
Displaying the GVRP Port Configuration .................................................................................................................................................. 484
Displaying GVRP Counters ............................................................................................................................................................................. 485
Displaying the GVRP Database .................................................................................................................................................................... 490
Displaying the GIP Connected Ports Ring ................................................................................................................................................ 492
Displaying the GVRP State Machine ........................................................................................................................................................... 494
Chapter 22
Protected Ports VLANs ................................................................................................................................................................................. 499
Protected Ports VLAN Overview .................................................................................................................................................................. 500
Creating a Protected Ports VLAN ................................................................................................................................................................. 503
Modifying a Protected Ports VLAN ............................................................................................................................................................. 506
Displaying a Protected Ports VLAN ............................................................................................................................................................. 510
Deleting a Protected Ports VLAN ................................................................................................................................................................ 512
Section IV
Security .............................................................................................................................................515
Chapter 23
Port Security ...................................................................................................................................................................................................... 517
MAC Address Security Overview ................................................................................................................................................................. 518
Automatic ................................................................................................................................................................................................... 518
Limited ........................................................................................................................................................................................................ 518
Secured ....................................................................................................................................................................................................... 519
Locked ......................................................................................................................................................................................................... 519
Security Violations and Intrusion Actions ....................................................................................................................................... 519
MAC Address Security Guidelines ..................................................................................................................................................... 520
Configuring MAC Address Port Security ................................................................................................................................................... 521
Displaying Port Security Levels .................................................................................................................................................................... 524
Chapter 24
Access Control Lists ....................................................................................................................................................................................... 527
Management ACL Security Overview ........................................................................................................................................................ 528
IP Address ........................................................................................................................................................................................... 528
Mask ...................................................................................................................................................................................................... 529
Protocol ............................................................................................................................................................................................... 529
Interface .............................................................................................................................................................................................. 529
Management ACL Guidelines ............................................................................................................................................................. 529
Examples .................................................................................................................................................................................................... 530
Creating the Management ACL ................................................................................................................................................................... 532
Adding an ACE ................................................................................................................................................................................................... 535
Deleting an ACE ................................................................................................................................................................................................. 536
Displaying the ACEs ......................................................................................................................................................................................... 537
Chapter 25
Web Server ......................................................................................................................................................................................................... 539
Web Server Overview ...................................................................................................................................................................................... 540