User Manual

Table Of Contents
5.3.14 Set dynamic VLAN....................................................................................................................................176
5.3.15 Set the guest VLAN...................................................................................................................................177
5.3.16 Suppression period settings following failed authentication......................................................................177
5.3.17 Set reauthentication interval.......................................................................................................................178
5.3.18 Set the reply wait time for the RADIUS server overall.............................................................................178
5.3.19 Set supplicant reply wait time....................................................................................................................179
5.3.20 Set RADIUS server host............................................................................................................................179
5.3.21 Set the reply wait time for each RADIUS server.......................................................................................180
5.3.22 Set number of times to resend requests to RADIUS server.......................................................................181
5.3.23 Set RADIUS server shared password.........................................................................................................181
5.3.24 Set time of RADIUS server usage prevention............................................................................................182
5.3.25 Set NAS-Identifier attribute sent to RADIUS server.................................................................................182
5.3.26 Show port authentication information........................................................................................................183
5.3.27 Show supplicant information.....................................................................................................................184
5.3.28 Show statistical information.......................................................................................................................184
5.3.29 Clear statistical information.......................................................................................................................185
5.3.30 Show RADIUS server setting information.................................................................................................185
5.3.31 Settings for redirect destination URL following successful Web authentication......................................186
5.3.32 Clear the authentication state.....................................................................................................................186
5.3.33 Setting the time for clearing the authentication state (system)..................................................................187
5.3.34 Setting the time for clearing the authentication state (interface)................................................................187
5.3.35 Locate the file for customizing the Web authentication screen.................................................................188
5.3.36 Delete the file for customizing the Web authentication screen..................................................................188
5.3.37 Set EAP pass through.................................................................................................................................189
5.4 Port security.................................................................................................................................................................189
5.4.1 Set port security function.............................................................................................................................189
5.4.2 Register permitted MAC addresses..............................................................................................................190
5.4.3 Set operations used for security violations...................................................................................................190
5.4.4 Show port security information....................................................................................................................191
5.5 Error detection function...............................................................................................................................................191
5.5.1 Set automatic recovery from errdisable state...............................................................................................191
5.5.2 Show error detection function information..................................................................................................192
Chapter 6: Layer 2 functions...........................................................................................193
6.1 FDB (Forwarding Data Base).....................................................................................................................................193
6.1.1 Set MAC address acquisition function.........................................................................................................193
6.1.2 Set dynamic entry ageing time.....................................................................................................................193
6.1.3 Clear dynamic entry.....................................................................................................................................194
6.1.4 Set static entry..............................................................................................................................................194
6.1.5 Show MAC address table.............................................................................................................................195
6.1.6 Show number of MAC addresses.................................................................................................................196
6.2 VLAN..........................................................................................................................................................................196
6.2.1 Move to VLAN mode..................................................................................................................................196
6.2.2 Set VLAN interface......................................................................................................................................196
6.2.3 Set private VLAN.........................................................................................................................................197
6.2.4 Set secondary VLAN for primary VLAN....................................................................................................198
6.2.5 Set access port (untagged port)....................................................................................................................199
6.2.6 Set associated VLAN of an access port (untagged port)..............................................................................199
6.2.7 Set trunk port (tagged port)..........................................................................................................................200
6.2.8 Set associated VLAN for trunk port (tagged port).......................................................................................201
6.2.9 Set native VLAN for trunk port (tagged port)..............................................................................................202
6.2.10 Set private VLAN port type.......................................................................................................................202
6.2.11 Set private VLAN host port.......................................................................................................................203
6.2.12 Set promiscuous port for private VLAN....................................................................................................204
6.2.13 Set voice VLAN.........................................................................................................................................205
6.2.14 Set CoS value for voice VLAN..................................................................................................................205
6.2.15 Set DSCP value for voice VLAN...............................................................................................................206
6.2.16 Set multiple VALN group..........................................................................................................................206
6.2.17 Set name of multiple VLAN group............................................................................................................207
6.2.18 Configuring the YMPI frame transmission when multiple VLANs are configured..................................207
6.2.19 Show VLAN information...........................................................................................................................208
6.2.20 Show private VLAN information...............................................................................................................209
6.2.21 Show multiple VLAN group setting information......................................................................................209
6.3 STP (Spanning Tree Protocol)....................................................................................................................................210
Command Reference | Contents | 7