AT-S63 Management Software Features Guide
9
Local Interface ................................................................................................................................................ 345
AT-9408LC/SP AT-9424T/GB, and AT-9424T/SP Switches .......................................................................... 346
Local Interface.......................................................................................................................................... 346
ARP Table................................................................................................................................................ 346
Default Gateway....................................................................................................................................... 347
Routing Command Example........................................................................................................................... 348
Creating the VLANs ................................................................................................................................. 349
Creating the Routing Interfaces ............................................................................................................... 349
Adding a Static Route and Default Route ................................................................................................ 350
Adding RIP ............................................................................................................................................... 351
Selecting the Local Interface.................................................................................................................... 351
Non-routing Command Example .................................................................................................................... 352
Upgrading from AT-S63 Version 1.3.0 or Earlier............................................................................................ 354
Chapter 30: BOOTP Relay Agent
............................................................................................................... 355
Supported Platforms....................................................................................................................................... 356
Overview......................................................................................................................................................... 357
Guidelines....................................................................................................................................................... 359
Chapter 31: Virtual Router Redundancy Protocol
.................................................................................... 361
Supported Platforms....................................................................................................................................... 362
Overview......................................................................................................................................................... 363
Master Switch ................................................................................................................................................. 364
Backup Switches ............................................................................................................................................ 365
Interface Monitoring........................................................................................................................................ 366
Port Monitoring ............................................................................................................................................... 367
VRRP on the Switch ....................................................................................................................................... 368
Section VIII: Port Security ..................................................................................... 371
Chapter 32: MAC Address-based Port Security
....................................................................................... 373
Supported Platforms....................................................................................................................................... 374
Overview......................................................................................................................................................... 375
Automatic ................................................................................................................................................. 375
Limited...................................................................................................................................................... 375
Secured.................................................................................................................................................... 376
Locked...................................................................................................................................................... 376
Invalid Frames and Intrusion Actions ............................................................................................................. 377
Guidelines....................................................................................................................................................... 378
Chapter 33: 802.1x Port-based Network Access Control
........................................................................ 379
Supported Platforms....................................................................................................................................... 380
Overview......................................................................................................................................................... 381
Authentication Process................................................................................................................................... 383
Port Roles....................................................................................................................................................... 384
None Role ................................................................................................................................................ 384
Authenticator Role.................................................................................................................................... 384
Supplicant Role ........................................................................................................................................ 386
Authenticator Ports with Single and Multiple Supplicants............................................................................... 387
Single Operating Mode ............................................................................................................................ 387
Multiple Operating Mode .......................................................................................................................... 391
Supplicant and VLAN Associations ................................................................................................................ 394
Single Operating Mode ............................................................................................................................ 395
Multiple Operating Mode .......................................................................................................................... 395
Supplicant VLAN Attributes on the RADIUS Server................................................................................. 395
Guest VLAN.................................................................................................................................................... 396
Summary of Contents for AT-S63
Page 14: ...Figures 14 ...
Page 18: ...Tables 18 ...
Page 28: ...28 Section I Basic Operations ...
Page 58: ...Chapter 1 Overview 58 ...
Page 76: ...Chapter 2 AT 9400Ts Stacks 76 Section I Basic Operations ...
Page 96: ...Chapter 5 MAC Address Table 96 Section I Basic Operations ...
Page 114: ...Chapter 8 Port Mirror 114 Section I Basic Operations ...
Page 116: ...116 Section II Advanced Operations ...
Page 146: ...Chapter 12 Access Control Lists 146 Section II Advanced Operations ...
Page 176: ...Chapter 14 Quality of Service 176 Section II Advanced Operations ...
Page 196: ...196 Section III Snooping Protocols ...
Page 204: ...Chapter 18 Multicast Listener Discovery Snooping 204 Section III Snooping Protocols ...
Page 216: ...Chapter 20 Ethernet Protection Switching Ring Snooping 216 Section III Snooping Protocols ...
Page 218: ...218 Section IV SNMPv3 ...
Page 234: ...234 Section V Spanning Tree Protocols ...
Page 268: ...268 Section VI Virtual LANs ...
Page 306: ...Chapter 27 Protected Ports VLANs 306 Section VI Virtual LANs ...
Page 320: ...320 Section VII Internet Protocol Routing ...
Page 360: ...Chapter 30 BOOTP Relay Agent 360 Section VII Routing ...
Page 370: ...Chapter 31 Virtual Router Redundancy Protocol 370 Section VII Routing ...
Page 372: ...372 Section VIII Port Security ...
Page 402: ...Chapter 33 802 1x Port based Network Access Control 402 Section VIII Port Security ...
Page 404: ...404 Section IX Management Security ...
Page 436: ...Chapter 36 PKI Certificates and SSL 436 Section IX Management Security ...
Page 454: ...Chapter 38 TACACS and RADIUS Protocols 454 Section IX Management Security ...
Page 462: ...Chapter 39 Management Access Control List 462 Section IX Management Security ...
Page 532: ...Appendix D MIB Objects 532 ...