Allied Telesis AT-S62 User Manual
Page 9

AT-S62 User’s Guide
9
Multiple VLAN Modes ................................................................................................................................................................................... 446
Multiple VLAN Mode Overview .................................................................................................................................................................... 447
802.1Q- Compliant Multiple VLAN mode ....................................................................................................................................... 447
Non-802.1Q Compliant Multiple VLAN Mode ............................................................................................................................... 449
Selecting a VLAN Mode ................................................................................................................................................................................... 451
Displaying VLAN Information ....................................................................................................................................................................... 452
............................................................................................................................................... 453
MAC Address Security .................................................................................................................................................................................. 454
MAC Address Security Overview ................................................................................................................................................................. 455
Automatic ................................................................................................................................................................................................... 455
Limited ........................................................................................................................................................................................................ 455
Secured ....................................................................................................................................................................................................... 456
Locked ......................................................................................................................................................................................................... 456
Security Violations and Intrusion Actions ....................................................................................................................................... 456
Guidelines .................................................................................................................................................................................................. 457
Configuring MAC Address Port Security ................................................................................................................................................... 458
Displaying Port Security Levels .................................................................................................................................................................... 461
802.1x Port-based Access Control .......................................................................................................................................................... 463
802.1x Port-based Access Control Overview .......................................................................................................................................... 464
Authentication Process ......................................................................................................................................................................... 465
Port Roles .................................................................................................................................................................................................... 466
RADIUS Accounting ................................................................................................................................................................................ 468
General Steps ............................................................................................................................................................................................ 469
Port-based Access Control Guidelines ............................................................................................................................................. 470
Enabling and Disabling Port-based Access Control ............................................................................................................................. 473
Setting Port Roles .............................................................................................................................................................................................. 474
Configuring Authenticator Port Parameters ........................................................................................................................................... 476
Configuring Supplicant Port Parameters ................................................................................................................................................. 480
Configuring RADIUS Accounting ................................................................................................................................................................ 483
Section VII
Management Security
...................................................................................................................... 485
Web Server ......................................................................................................................................................................................................... 486
Web Server Overview ...................................................................................................................................................................................... 487
Supported Protocols .............................................................................................................................................................................. 487
General Steps to Configuring the Web Server for Encryption ................................................................................................ 488
Encryption Keys ............................................................................................................................................................................................... 492
Basic Overview ................................................................................................................................................................................................... 493