Table Of Contents - Allied Telesis AT-S94 User Manual

Layer 2 ethernet switch
Hide thumbs Also See for AT-S94:
Table of Contents

Advertisement

Preface.................................................................................................................................... 7
Web Browser Interface User's Guide Overview .............................................................................. 7
Intended Audience........................................................................................................................... 8
Document Conventions ................................................................................................................... 8
Contacting Allied Telesis ................................................................................................................. 8
Getting Started........................................................................................................................ 9
Starting the Application.................................................................................................................... 9
Using the Web Browser Interface .................................................................................................. 11
Viewing the Device Representation.........................................................................................................11
User Interface Components.....................................................................................................................12
Using the Management Buttons ..............................................................................................................13
Adding, Modifying and Deleting Information ............................................................................................14
Saving Configurations..............................................................................................................................15
Logging Out ................................................................................................................................... 15
Resetting the Device ..................................................................................................................... 16
Defining System Information................................................................................................. 17
Configuring System Time...................................................................................................... 19
Setting the System Clock.........................................................................................................................19
Configuring SNTP....................................................................................................................................20
Configuring Daylight Saving Time ...........................................................................................................21
Configuring Device Security.................................................................................................. 25
Configuring Management Security ................................................................................................26
Defining Access Profiles ..........................................................................................................................26
Defining Profile Rules ..............................................................................................................................30
Defining Authentication Profiles...............................................................................................................33
Mapping Authentication Profiles ..............................................................................................................36
Configuring Server Based Authentication...................................................................................... 38
Configuring TACACS+ ............................................................................................................................38
Configuring RADIUS................................................................................................................................41
Configuring Local Users ..........................................................................................................................44
Defining Line Passwords .........................................................................................................................46
Configuring Network Security ........................................................................................................ 47
Managing Port Security ...........................................................................................................................47
Defining 802.1x Port Access....................................................................................................................50
Enabling Storm Control............................................................................................................................53
Defining Access Control ................................................................................................................ 55
Defining MAC Based ACL .......................................................................................................................55
Defining IP Based ACL ............................................................................................................................60
Defining ACL Binding...............................................................................................................................66

Table of Contents

Page 3
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents