AT-S101 Management Software User’s Guide
5
Port Priority..................................................................................................................................................................136
Forwarding Delay and Topology Changes .........................................................................................................................138
Hello Time and Bridge Protocol Data Units (BPDU)....................................................................................................138
Point-to-Point and Edge Ports.....................................................................................................................................139
Mixed STP and RSTP Networks.........................................................................................................................................142
Spanning Tree and VLANs.................................................................................................................................................143
Basic STP and RSTP Configuration...................................................................................................................................145
Configuring RSTP Port Settings .........................................................................................................................................148
Configuring the Basic RSTP Port Settings ..................................................................................................................148
Configuring the Advanced RSTP Port Settings...........................................................................................................150
Viewing the Spanning Tree Topology.................................................................................................................................154
Chapter 14: 802.1x Port-based Network Access Control .............................................................................................157
Overview.............................................................................................................................................................................158
Authentication Process................................................................................................................................................159
Authenticator Ports......................................................................................................................................................159
General Steps .............................................................................................................................................................161
Port-based Network Access Control Guidelines..........................................................................................................161
Guest VLANs......................................................................................................................................................................164
Configuring 802.1x Port-based Network Access Control....................................................................................................165
Chapter 15: RADIUS Authentication Protocol ..............................................................................................................169
Overview.............................................................................................................................................................................170
RADIUS Implementation Guidelines ...........................................................................................................................170
Configuring the RADIUS Client...........................................................................................................................................171
Chapter 16: Destination MAC Filter ...............................................................................................................................173
Overview.............................................................................................................................................................................174
Configuring a Destination MAC Filter .................................................................................................................................175
Deleting a Destination MAC Filter.......................................................................................................................................177
Chapter 17: Power over Ethernet (PoE) .........................................................................................................................179
Overview.............................................................................................................................................................................180
Power Budgeting .........................................................................................................................................................181
Setting Power over Ethernet...............................................................................................................................................182
Chapter 18: Classifiers ....................................................................................................................................................185
Overview.............................................................................................................................................................................186
Classifier Criteria ................................................................................................................................................................187
Guidelines...........................................................................................................................................................................191
Creating Classifiers.............................................................................................................................................................192
Chapter 19: Access Control Policies .............................................................................................................................195
Overview.............................................................................................................................................................................196
ACP Components...............................................................................................................................................................197
Guidelines...........................................................................................................................................................................198
Creating Profile Action........................................................................................................................................................199
Creating an In-profile Action ...............................................................................................................................................201
Creating an Out-Profile Action............................................................................................................................................203
Creating an Access Control Port List..................................................................................................................................205
Creating a Policy ................................................................................................................................................................206
Displaying a Policy Sequence ............................................................................................................................................208
Chapter 20: Management Software Updates .................................................................................................................209
Overview.............................................................................................................................................................................210
Upgrading a Firmware Image Using HTTP.........................................................................................................................211
Upgrading a Firmware Image Using TFTP .........................................................................................................................213
Downloading or Uploading a Configuration File via HTTP .................................................................................................215
Downloading or Uploading a Configuration File via TFTP..................................................................................................217
Chapter 21: Statistics ......................................................................................................................................................219
Overview.............................................................................................................................................................................220
Displaying Traffic Comparison Statistics ............................................................................................................................221