User guide
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Section I
- Basic Operations
- Chapter 1
- Basic Switch Parameters
- Configuring the Switch’s Name, Location, and Contact
- Changing the Manager and Operator Passwords
- Setting the System Date and Time
- Rebooting a Switch
- Pinging a Remote System
- Returning the AT-S63 Management Software to the Factory Default Values
- Displaying the IP Address of the Local Interface
- Displaying System Information
- Chapter 2
- Port Parameters
- Chapter 3
- Enhanced Stacking
- Chapter 4
- SNMPv1 and SNMPv2c
- Chapter 5
- MAC Address Table
- Chapter 6
- Static Port Trunks
- Chapter 7
- Port Mirroring
- Section II
- Advanced Operations
- Chapter 8
- File System
- Chapter 9
- File Downloads and Uploads
- Chapter 10
- Event Logs and Syslog Client
- Chapter 11
- Classifiers
- Chapter 12
- Access Control Lists
- Chapter 13
- Class of Service
- Chapter 14
- Quality of Service
- Chapter 15
- Denial of Service Defenses
- Chapter 16
- IGMP Snooping
- Section III
- SNMPv3
- Chapter 17
- SNMPv3
- Configuring the SNMPv3 Protocol
- Enabling or Disabling SNMP Management
- Configuring the SNMPv3 User Table
- Configuring the SNMPv3 View Table
- Configuring the SNMPv3 Access Table
- Configuring the SNMPv3 SecurityToGroup Table
- Configuring the SNMPv3 Notify Table
- Configuring the SNMPv3 Target Address Table
- Configuring the SNMPv3 Target Parameters Table
- Configuring the SNMPv3 Community Table
- Displaying SNMPv3 Tables
- Section IV
- Spanning Tree Protocols
- Chapter 18
- Spanning Tree and Rapid Spanning Tree Protocols
- Chapter 19
- Multiple Spanning Tree Protocol
- Section V
- Virtual LANs
- Chapter 20
- Port-based and Tagged VLANs
- Chapter 21
- GARP VLAN Registration Protocol
- Section VI
- Port Security
- Chapter 22
- MAC Address-based Port Security
- Chapter 23
- 802.1x Port-based Network Access Control
- Section VII
- Management Security
- Chapter 24
- Encryption Keys, PKI, and SSL
- Chapter 25
- Secure Shell (SSH)
- Chapter 26
- TACACS+ and RADIUS Protocols
- Chapter 27
- Management Access Control List
- Index
AT-S63 Management Software Web Browser User’s Guide
7
Section V: Virtual LANs ......................................................................................... 315
Chapter 20: Port-based and Tagged VLANs ............................................................................................. 317
Creating a New Port-Based or Tagged VLAN ................................................................................................ 318
Modifying a VLAN........................................................................................................................................... 323
Deleting a VLAN ............................................................................................................................................. 325
Selecting a VLAN Mode ................................................................................................................................. 326
Displaying VLANs........................................................................................................................................... 327
Chapter 21: GARP VLAN Registration Protocol ....................................................................................... 331
Configuring GVRP .......................................................................................................................................... 332
Enabling or Disabling GVRP on a Port........................................................................................................... 334
Displaying the GVRP Configuration ............................................................................................................... 335
Displaying the GVRP Port Configuration........................................................................................................ 336
Displaying the GVRP Database ..................................................................................................................... 337
Displaying the GVRP State Machine.............................................................................................................. 338
Displaying the GVRP Counters ...................................................................................................................... 341
Displaying the GIP Connected Ports Ring...................................................................................................... 344
Section VI: Port Security ........................................................................................ 345
Chapter 22: MAC Address-based Port Security ....................................................................................... 347
Configuring Port Security................................................................................................................................ 348
Displaying Port Security Levels ...................................................................................................................... 351
Chapter 23: 802.1x Port-based Network Access Control ........................................................................ 353
Setting Port Roles........................................................................................................................................... 354
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 356
Configuring Authenticator Port Parameters.................................................................................................... 357
Configuring Supplicant Port Parameters ........................................................................................................ 363
Displaying the Port-based Network Access Control Parameters ................................................................... 365
Displaying the Port Status........................................................................................................................ 365
Displaying the Port Settings ..................................................................................................................... 367
RADIUS Accounting ....................................................................................................................................... 369
Configuring RADIUS Accounting ............................................................................................................. 369
Displaying the RADIUS Accounting Settings ........................................................................................... 370
Section VII: Management Security ....................................................................... 371
Chapter 24: Encryption Keys, PKI, and SSL ............................................................................................. 373
Displaying the Encryption Keys ...................................................................................................................... 374
Displaying the PKI Settings and Certificates .................................................................................................. 376
Displaying the SSL Settings ........................................................................................................................... 379
Chapter 25: Secure Shell (SSH) ................................................................................................................. 381
Configuring SSH............................................................................................................................................. 382
Displaying the SSH Settings........................................................................................................................... 384
Chapter 26: TACACS+ and RADIUS Protocols ......................................................................................... 387
Enabling or Disabling TACACS+ or RADIUS ................................................................................................. 388
Configuring the TACACS+ Client Settings ..................................................................................................... 390
Displaying the TACACS+ Client Settings ....................................................................................................... 392
Configuring the RADIUS Client Settings ........................................................................................................ 394
Displaying the RADIUS Client Settings .......................................................................................................... 396