Allied Telesis AT-8000S ユーザーズマニュアル
Table of Contents
Page 1
Viewing the Device Representation.........................................................................................................12
User Interface Components.....................................................................................................................13
Using the Management Buttons ..............................................................................................................14
Adding, Modifying and Deleting Information ............................................................................................15
Saving Configurations..............................................................................................................................16
User Interface Components.....................................................................................................................13
Using the Management Buttons ..............................................................................................................14
Adding, Modifying and Deleting Information ............................................................................................15
Saving Configurations..............................................................................................................................16
Defining Access Profiles ..........................................................................................................................28
Defining Profile Rules ..............................................................................................................................31
Defining Authentication Profiles...............................................................................................................34
Mapping Authentication Profiles ..............................................................................................................37
Configuring Server Based Authentication................................................................................................38
Configuring TACACS+ ............................................................................................................................38
Configuring RADIUS................................................................................................................................41
Configuring Local Users ..........................................................................................................................43
Defining Profile Rules ..............................................................................................................................31
Defining Authentication Profiles...............................................................................................................34
Mapping Authentication Profiles ..............................................................................................................37
Configuring Server Based Authentication................................................................................................38
Configuring TACACS+ ............................................................................................................................38
Configuring RADIUS................................................................................................................................41
Configuring Local Users ..........................................................................................................................43
Network Security Overview......................................................................................................................46
Managing Port Security ...........................................................................................................................46
Defining 802.1x Port Access....................................................................................................................49
Enabling Storm Control............................................................................................................................52
Managing Port Security ...........................................................................................................................46
Defining 802.1x Port Access....................................................................................................................49
Enabling Storm Control............................................................................................................................52