AT-S63 Management Software Menus User’s Guide
9
Chapter 28: MAC Address-based VLANs .................................................................................................. 533
Creating a MAC Address-based VLAN .......................................................................................................... 534
Adding and Deleting MAC Addresses................. ........................................................................................... 536
Adding and Deleting Egress Ports.................................................................................................................. 538
Deleting a MAC Address-based VLAN.................................................................................... .......................540
Displaying MAC Address-based VLANs......................................................................................................... 542
Section VII: Internet Protocol Routing ................................................................. 545Chapter 29: Internet Protocol Version 4 Routing Interfaces ............................................................... .... 547
Creating a New Routing Interface .................................................................................................................. 548
Modifying a Routing Interface........................................................................................ .................................551
Deleting a Routing Interface....................................................... .................................................................... 554
Displaying the IP Address of the Local Interface..................................................................................... ....... 555
Setting the Default Route or Default Gateway................................................................................................ 556
Setting the Local Interface....................................................................................... ....................................... 557
Setting the ARP Cache Timeout..................................................................................................................... 558
Section VIII: Port Security ..................................................................................... 559Chapter 30: MAC Address-based Port Security ...................................................... ................................. 561
Configuring MAC Address Port Security ........................................................................................................ 562
Displaying Port Security Levels........................................................ .............................................................. 566
Chapter 31: 802.1x Port-based Network Access Control ............................. ........................................... 569
Setting Port Roles.................................................................................................................................... ....... 570
Enabling or Disabling 802.1x Port-based Network Access Control................................................................ 572
Configuring Authenticator Port Parameters............................................................................. ....................... 573
Configuring Supplicant Port Parameters................ ........................................................................................ 579
Displaying the Port Access Parameters................. ........................................................................................ 582
Configuring RADIUS Accounting................................................................................... .................................584
Section IX: Management Security ......................................................................... 587Chapter 32: Web Server ............................................................. ................................................................. 589
Configuring the Web Server................................ ........................................................................................... 590
General Steps for Configuring the Web Server for Encryption....................................................................... 593
General Steps for a Self-signed Certificate.............................................................................................. 593
General Steps for a Public or Private CA Certificate................................................................................ 593
Chapter 33: Encryption Keys ..................................................................................................................... 595
Creating an Encryption Key................................................................................. ........................................... 596
Deleting an Encryption Key....................... ..................................................................................................... 600
Modifying an Encryption Key...................................................... .................................................................... 601
Exporting an Encryption Key............................... ........................................................................................... 602
Importing an Encryption Key .......................................................................................................................... 605
Displaying the Encryption Keys........................................................ .............................................................. 608
Chapter 34: PKI Certificates and SSL ........................................................................................................ 611
Creating a Self-signed Certificate............................................................................................ .......................612
Adding a Certificate to the Database................................................................................ .............................. 616
Modifying a Certificate......................................................... ........................................................................... 619
Deleting a Certificate........................ .............................................................................................................. 622
Viewing a Certificate............................................................................................ ........................................... 624
Generating an Enrollment Request........................ ........................................................................................ 627