Allied Telesis AT-9000/28POE Switch User Manual


  Open as PDF
of 1480
 
Contents
18
Provider Ports ....................................................................................................................................824
EtherType/Length...............................................................................................................................824
VLAN Stacking Process ...........................................................................................................................825
Example of VLAN Stacking ......................................................................................................................826
Chapter 57: VLAN Stacking Commands ....................................................................................................831
NO SWITCHPORT VLAN-STACKING.....................................................................................................832
PLATFORM VLAN-STACKING-TPID.......................................................................................................833
SHOW VLAN VLAN-STACKING..............................................................................................................834
SWITCHPORT VLAN-STACKING ...........................................................................................................835
Section VIII: Port Security ...................................................................................................................837
Chapter 58: MAC Address-based Port Security ........................................................................................839
Overview...................................................................................................................................................840
Static Versus Dynamic Addresses.....................................................................................................840
Intrusion Actions.................................................................................................................................840
Guidelines ..........................................................................................................................................841
Configuring Ports......................................................................................................................................842
Enabling MAC Address-based Security on Ports .....................................................................................844
Disabling MAC Address-based Security on Ports ....................................................................................845
Displaying Port Settings ...........................................................................................................................846
Chapter 59: MAC Address-based Port Security Commands ...................................................................849
NO SWITCHPORT PORT-SECURITY.....................................................................................................850
NO SWITCHPORT PORT-SECURITY AGING ........................................................................................851
SHOW PORT-SECURITY INTERFACE...................................................................................................852
SHOW PORT-SECURITY INTRUSION INTERFACE..............................................................................855
SWITCHPORT PORT-SECURITY...........................................................................................................857
SWITCHPORT PORT-SECURITY AGING ..............................................................................................858
SWITCHPORT PORT-SECURITY MAXIMUM.........................................................................................859
SWITCHPORT PORT-SECURITY VIOLATION.......................................................................................860
Chapter 60: 802.1x Port-based Network Access Control .........................................................................863
Overview...................................................................................................................................................864
Authentication Process.............................................................................................................................865
Port Roles.................................................................................................................................................866
None Role ..........................................................................................................................................866
Authenticator Role..............................................................................................................................866
Authentication Methods for Authenticator Ports .......................................................................................867
Operational Settings for Authenticator Ports ............................................................................................868
Operating Modes for Authenticator Ports .................................................................................................869
Single Host Mode...............................................................................................................................869
Multi Host Mode .................................................................................................................................869
Multi Supplicant Mode........................................................................................................................871
Supplicant and VLAN Associations ..........................................................................................................873
Single Host Mode...............................................................................................................................874
Multi Host Mode .................................................................................................................................874
Multi Supplicant Mode........................................................................................................................874
Supplicant VLAN Attributes on the RADIUS Server...........................................................................875
Guest VLAN..............................................................................................................................................876
RADIUS Accounting .................................................................................................................................877
General Steps...........................................................................................................................................878
Guidelines.................................................................................................................................................879
Enabling 802.1x Port-Based Network Access Control on the Switch.......................................................881