Management SoftwareAT-S62◆User’s GuideAT-8524M LAYER 2+ FAST ETHERNET SWITCHVERSION 1.1.1®PN 613-50485-00 Rev C
Table of Contents10Data Authentication ...
Chapter 6: Port ParametersSection I: Basic Operations 100The problem with broadcast frames is that too many of them traversing a network can impact ne
AT-S62 User’s GuideSection I: Basic Operations 101If you select Auto for Auto-Negotiation, which is the default setting, the switch will set both spee
Chapter 6: Port ParametersSection I: Basic Operations 102The possible settings for the duplex mode are Full-duplex and Half-duplex.7 - HOL Blocking Pr
AT-S62 User’s GuideSection I: Basic Operations 103The HOL Limit parameter can help prevent this problem from occurring. This parameter sets a threshol
Chapter 6: Port ParametersSection I: Basic Operations 104The options in the Flow Control menu are described below:1 - Flow ControlDisabled - No flow c
AT-S62 User’s GuideSection I: Basic Operations 105Selecting this option displays the Back Pressure menu shown in Figure 26.Figure 26 Back Pressure Me
Chapter 6: Port ParametersSection I: Basic Operations 106X - Reset PortResets the speed and duplex mode of the selected port to the default value of A
AT-S62 User’s GuideSection I: Basic Operations 107Setting the Rate LimitThis feature allows you to set the maximum number of ingress packets the switc
Chapter 6: Port ParametersSection I: Basic Operations 108The Rate Limiting menu is shown in Figure 27.Figure 27 Rate Limiting Menu5. Type 4 to select
109Chapter 7MAC Address TableThe chapter contains the procedures for viewing the static and dynamic MAC address table.This chapter contains the follow
AT-S62 User’s Guide11Chapter 30Management Access Control List ...
Chapter 7: MAC Address TableSection I: Basic Operations 110MAC Address OverviewEvery hardware device that you connect to your Ethernet network has a u
AT-S62 User’s GuideSection I: Basic Operations 111The type of MAC address described above is referred to as a dynamic MAC address. Dynamic MAC address
Chapter 7: MAC Address TableSection I: Basic Operations 112Displaying MAC AddressesThe management software has two menu selections for displaying the
AT-S62 User’s GuideSection I: Basic Operations 1133. Select the desired option. The options are explained below:1 - Display AllThis selection displays
Chapter 7: MAC Address TableSection I: Basic Operations 114An example of a multicast MAC address table is shown in Figure 31.Figure 31 Display All Me
AT-S62 User’s GuideSection I: Basic Operations 1155 - Display Specified MACDisplays the port number on which a MAC address was assigned or learned.In
Chapter 7: MAC Address TableSection I: Basic Operations 116Adding Static Unicast and Multicast MAC AddressesThis section contains the procedure for ad
AT-S62 User’s GuideSection I: Basic Operations 117to the port where the multicast application is located will result in the failure of the multicast p
Chapter 7: MAC Address TableSection I: Basic Operations 118Deleting Unicast and Multicast MAC AddressesTo delete a dynamic or static unicast or multic
AT-S62 User’s GuideSection I: Basic Operations 119Deleting All Dynamic MAC AddressesTo delete all dynamic unicast and multicast MAC address from the M
Table of Contents12Chapter 37Port Trunking ...
Chapter 7: MAC Address TableSection I: Basic Operations 120Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addres
121Chapter 8Port TrunkingThis chapter contains the procedures for creating, modifying, and deleting port trunks. Sections in the chapter include:❑ Por
Chapter 8: Port TrunkingSection I: Basic Operations 122Port Trunking OverviewA port trunk is an economical way for you to increase the bandwidth betwe
AT-S62 User’s GuideSection I: Basic Operations 123❑ When cabling a trunk, the order of the connections should be maintained on both nodes. The lowest
Chapter 8: Port TrunkingSection I: Basic Operations 124❑ Source IP Address (Layer 3)❑ Destination IP Address (Layer 3)❑ Source IP Address / Destinatio
AT-S62 User’s GuideSection I: Basic Operations 125Figure 34 Load Distribution MethodNow assume that you configured the port trunk on Switch #1 with t
Chapter 8: Port TrunkingSection I: Basic Operations 126For example, when Workstation B sends a packet to the server, Switch #1 uses Port 15 of the tru
AT-S62 User’s GuideSection I: Basic Operations 127When another node sends a packet over the trunk, its address is assigned to the next lowest port in
Chapter 8: Port TrunkingSection I: Basic Operations 128Even though there is only one source, all the data links in the trunk are used. For instance, i
AT-S62 User’s GuideSection I: Basic Operations 129Creating a Port TrunkThis section contains the procedure for creating a port trunk on the switch. Be
AT-S62 User’s Guide13Configuring the SNMPv3 Access Table ...
Chapter 8: Port TrunkingSection I: Basic Operations 130The Port Trunking menu is shown in Figure 35.Figure 35 Port Trunking MenuThis menu lists any t
AT-S62 User’s GuideSection I: Basic Operations 1316. To set the load distribution method, type 3 to toggle the selection through the following possibl
Chapter 8: Port TrunkingSection I: Basic Operations 132Modifying a Port TrunkThis section contains the procedure for modifying a port trunk on the swi
AT-S62 User’s GuideSection I: Basic Operations 133The Modify Trunk menu is displayed. The menu displays the operating specifications of the selected t
Chapter 8: Port TrunkingSection I: Basic Operations 1347. To change the ports of a trunk, type 4 to select Trunk Ports and, when prompted, enter the n
AT-S62 User’s GuideSection I: Basic Operations 135Deleting a Port TrunkCautionDisconnect the cables from the port trunk on the switch before performin
136Chapter 9Port MirroringThis chapter contains the procedures for creating and deleting a port mirror. Sections in the chapter include:❑ Port Mirrori
AT-S62 User’s GuideSection I: Basic Operations 137Port Mirroring OverviewThe port mirroring feature allows you to unobtrusively monitor the traffic be
Chapter 9: Port MirroringSection I: Basic Operations 138Creating a Port MirrorTo create a port mirror, perform the following procedure:1. From the Mai
AT-S62 User’s GuideSection I: Basic Operations 1395. Type 2 to select Mirror-To Port and, when prompted, enter the number of the port to function as t
Table of Contents14Chapter 47GARP VLAN Registration Protocol ...
Chapter 9: Port MirroringSection I: Basic Operations 140Deleting a Port MirrorTo delete a port mirror, perform the following procedure:1. From the Mai
141Chapter 10Ethernet StatisticsThis chapter contains the procedures for displaying data traffic statistics. The chapter contains the following sectio
Chapter 10: Ethernet StatisticsSection I: Basic Operations 142Displaying Port StatisticsTo display Ethernet port statistics, perform the following pro
AT-S62 User’s GuideSection I: Basic Operations 143Multicast Frames ReceivedNumber of multicast frames received on the port.Multicast Frames SentNumber
Chapter 10: Ethernet StatisticsSection I: Basic Operations 144Clearing Port CountersTo return the statistics counters of a port to zero, perform the f
145Section IIAdvanced OperationsThe chapters in this section explain how to manage an AT-8524M switch from a local or Telnet management session. The c
146Chapter 11File SystemThis chapter describes the AT-S62 file system, and how you can use the file system to copy, rename, and delete system files. T
AT-S62 User’s GuideSection II: Advanced Operations 147File System OverviewThe AT-S62 management software has a file system for storing system files. Y
Chapter 11: File SystemSection II: Advanced Operations 148File NamingConventionsThe file system is a flat file system which means directories are not
AT-S62 User’s GuideSection II: Advanced Operations 149Working with Boot Configuration FilesA boot configuration file contains a series of commands tha
AT-S62 User’s Guide15Denial of Service Prevention Default Settings ...
Chapter 11: File SystemSection II: Advanced Operations 150Phase 1: Creating a Configuration FileBefore you begin to configure the switch with the para
AT-S62 User’s GuideSection II: Advanced Operations 151The following prompt is displayed:Enter the file name (or None):5. Enter a file name for the new
Chapter 11: File SystemSection II: Advanced Operations 152NoteOnly the active boot configuration file is changed when you select the Save Configuratio
AT-S62 User’s GuideSection II: Advanced Operations 153The following prompt is displayed:Enter the file name:5. Enter the file name of the configuratio
Chapter 11: File SystemSection II: Advanced Operations 154The contents of the configuration file are displayed in the View File menu. An example is sh
AT-S62 User’s GuideSection II: Advanced Operations 155Here are several guidelines for editing a boot configuration file:❑ The text editor must be able
Chapter 11: File SystemSection II: Advanced Operations 156Copying, Renaming, and Deleting System FilesUse this procedure to copy, rename, and delete s
AT-S62 User’s GuideSection II: Advanced Operations 1575. To rename a system file, do the following:a. From the File Operations menu, type 5 to select
Chapter 11: File SystemSection II: Advanced Operations 158Displaying System FilesUse this procedure to display a list of the system files currently st
AT-S62 User’s GuideSection II: Advanced Operations 159The List Files menu is displayed. An example of the menu is shown in Figure 43.Figure 43 List F
16List of FiguresChapter 1Overview ...
160Chapter 12File Downloads and UploadsThis chapter contains procedures for downloading a new AT-S62 image file onto the switch. This chapter also con
AT-S62 User’s GuideSection II: Advanced Operations 161Downloading the AT-S62 Image File onto a SwitchThis section contains two procedures for download
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 162of an enhanced stack. You cannot use TFTP on a slave switch, since that type
AT-S62 User’s GuideSection II: Advanced Operations 163NoteOptions 3 and 4 are described in Uploading a System File on page 177.5. Type 1 to select Dow
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 164The following prompt is displayed:You are going to invoke the Xmodem download
AT-S62 User’s GuideSection II: Advanced Operations 16511. Click the Browse button and specify the location and file to be downloaded onto the switch.1
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 1663. From the System Administration menu, type 9 to select System Utilities.The
AT-S62 User’s GuideSection II: Advanced Operations 167Downloading an AT-S62 Image File Switch to SwitchThe previous section contained the procedure fo
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 168NoteYou cannot download AT-S62 software onto any other type of enhanced stack
AT-S62 User’s GuideSection II: Advanced Operations 169Downloading an AT-S62 Configuration File Switch to SwitchThis procedure downloads a boot configu
AT-S62 User’s Guide17Figure 24: Head of Line Blocking ...
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 170After you enter a name, the following prompt is displayed:Enter the list of s
AT-S62 User’s GuideSection II: Advanced Operations 171Downloading a System FileThis section contains the procedures for downloading a system file into
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 172server software and the file to be downloaded must be stored on the server.❑
AT-S62 User’s GuideSection II: Advanced Operations 173c. Enter the directory path and file name of the system file on the TFTP server to be downloaded
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 17411. From the HyperTerminal main window, select the Transfer menu. Then select
AT-S62 User’s GuideSection II: Advanced Operations 175The software immediately begins to download onto the switch. The Xmodem File Send window in Figu
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 176NoteOptions 3 and 4 in the menu are described in Uploading a System File on p
AT-S62 User’s GuideSection II: Advanced Operations 177Uploading a System FileThe procedures in this section are used to upload a system file from a sw
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 178need to perform the upload from a local management session of the switch usin
AT-S62 User’s GuideSection II: Advanced Operations 179d. Enter the name of the system file on the switch that you want to upload to the TFTP server. Y
List of Figures18Figure 60: Show Port CoS Priorities Menu ...
Chapter 12: File Downloads and UploadsSection II: Advanced Operations 18011. From the HyperTerminal main window, select the Transfer menu. Then select
AT-S62 User’s GuideSection II: Advanced Operations 181The System Utilities menu is shown in Figure 9 on page 64.4. For the System Utilities menu, type
182Chapter 13Event LogThis chapter describes the event log. Sections in the chapter include:❑ Event Log Overview on page 183❑ Enabling or Disabling th
AT-S62 User’s GuideSection II: Advanced Operations 183Event Log OverviewA managed switch is a complex piece of computer equipment that includes both h
Chapter 13: Event LogSection II: Advanced Operations 184Enabling or Disabling the Event LogTo enable or disable the event log, do the following:1. Fro
AT-S62 User’s GuideSection II: Advanced Operations 185Displaying EventsTo view the event log, do the following:1. From the Main Menu, type 5 to select
Chapter 13: Event LogSection II: Advanced Operations 186Figure 54 shows an example of the event log in the Full display mode. The Normal display mode
AT-S62 User’s GuideSection II: Advanced Operations 187❑ Date/Time - The date and time the event occurred.❑ Event - The module within the AT-S62 softwa
Chapter 13: Event LogSection II: Advanced Operations 188PKI Public Key InfrastructurePMIRR Port mirroringPSEC Port security (MAC address-based)PTRUNK
AT-S62 User’s GuideSection II: Advanced Operations 189Saving the Event LogThe Event Log menu has the selection “S - Save Log to File” for saving the c
AT-S62 User’s Guide19Figure 106: RSTP Menu ...
Chapter 13: Event LogSection II: Advanced Operations 190Clearing the Event LogTo clear all events from the log, perform the following procedure:1. Fro
191Chapter 14Quality of ServiceThis chapter contains the procedures for configuring Quality of Service (QoS). Sections in the chapter include:❑ Qualit
Chapter 14: Quality of ServiceSection II: Advanced Operations 192Quality of Service OverviewWhen a port on an Ethernet switch becomes oversubscribed—i
AT-S62 User’s GuideSection II: Advanced Operations 193Each switch port has four egress queues. The queues are Q0, Q1, Q2, and Q3. Q0 is the lowest pri
Chapter 14: Quality of ServiceSection II: Advanced Operations 194You can configure a port to completely ignore the priority levels in its tagged packe
AT-S62 User’s GuideSection II: Advanced Operations 195The problem with this method is that some low priority packets might never be transmitted out th
Chapter 14: Quality of ServiceSection II: Advanced Operations 196Configuring CoSAs explained in Quality of Service Overview on page 192, a tagged pack
AT-S62 User’s GuideSection II: Advanced Operations 197NoteOptions 4, 5, and 6 are not available in all versions of the AT-S62 management software. Con
Chapter 14: Quality of ServiceSection II: Advanced Operations 198The Configure Port COS Priorities menu is shown in Figure 57.Figure 57 Configure Por
AT-S62 User’s GuideSection II: Advanced Operations 199NoteThe tagged information in a frame is not changed as the frame traverses the switch. A tagged
Copyright © 2004 Allied Telesyn, Inc. 960 Stewart Drive Suite B, Sunnyvale, CA 94085 USAAll rights reserved. No part of this publication may be reprod
List of Figures20Chapter 23MAC Address Security ...
Chapter 14: Quality of ServiceSection II: Advanced Operations 200Mapping CoS Priorities to Egress QueuesThis procedure explains how to change the defa
AT-S62 User’s GuideSection II: Advanced Operations 201Configuring Egress SchedulingThis procedure explains how to select and configure a scheduling me
Chapter 14: Quality of ServiceSection II: Advanced Operations 202Displaying Port CoS PrioritiesThe following procedure displays a menu that lists the
203Chapter 15IGMP SnoopingThis chapter explains how to activate and configure the Internet Group Management Protocol (IGMP) snooping feature on the sw
Chapter 15: IGMP SnoopingSection II: Advanced Operations 204IGMP Snooping OverviewIGMP snooping is best explained by first defining IGMP. This protoco
AT-S62 User’s GuideSection II: Advanced Operations 205Without IGMP snooping a switch would be obligated to flood multicast packets out all of its port
Chapter 15: IGMP SnoopingSection II: Advanced Operations 206Activating IGMP SnoopingTo activate or deactivate IGMP snooping on the switch and to confi
AT-S62 User’s GuideSection II: Advanced Operations 207The options in the menu are defined below:1 - IGMP Snooping StatusEnables and disables IGMP snoo
Chapter 15: IGMP SnoopingSection II: Advanced Operations 208When selecting a value for this parameter, it is important to note that the value you ente
AT-S62 User’s GuideSection II: Advanced Operations 209Displaying a List of Host NodesYou can use the AT-S62 software to display a list of the multicas
AT-S62 User’s Guide21Chapter 30Management Access Control List ...
Chapter 15: IGMP SnoopingSection II: Advanced Operations 210HostIP - The IP address of the host node connected to the port.Status - The status of the
AT-S62 User’s GuideSection II: Advanced Operations 211Displaying a List of Multicast RoutersA multicast router is a router that is receiving multicast
212Chapter 16Denial of Service DefenseThis chapter contains procedures on how to configure the switch to protect your network against Denial of Servic
AT-S62 User’s GuideSection II: Advanced Operations 213Denial of Service Defense OverviewThe AT-S62 management software can help protect your network a
Chapter 16: Denial of Service DefenseSection II: Advanced Operations 214SMURF Attack This DoS attack is instigated by an attacker sending a ICMP Echo
AT-S62 User’s GuideSection II: Advanced Operations 215Here is a overview of how the process takes place. This example assumes that you have activated
Chapter 16: Denial of Service DefenseSection II: Advanced Operations 216If one is found, the following occurs:❑ The switch sends a SNMP trap to the ma
AT-S62 User’s GuideSection II: Advanced Operations 217IP OptionsAttackIn the basic scenario of an IP attack, an attacker sends packets containing bad
Chapter 16: Denial of Service DefenseSection II: Advanced Operations 218Enabling or Disabling Denial of Service PreventionTo configure DoS defense, pe
AT-S62 User’s GuideSection II: Advanced Operations 219The LAN IP Subnet menu is shown in Figure 66.Figure 66 LAN IP Subnet Menub. Type 1 to select IP
List of Figures22Chapter 39File Downloads and Uploads ...
Chapter 16: Denial of Service DefenseSection II: Advanced Operations 220A menu is displayed containing either one or two options, depending on the DoS
221Section IIISNMPv3 OperationsThis section contains the following chapter:❑ Chapter 17: SNMPv3 Configuration on page 222
222Chapter 17SNMPv3 ConfigurationThis chapter provides a description of the AT-S62 implementation of the SNMPv3 protocol. In addition, it provides pro
AT-S62 User’s GuideSection III: SNMPv3 Operations 223SNMPv3 OverviewThe SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c protocol implementat
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 224With the SNMPv3 protocol, you create users, determine the protocol used for message
AT-S62 User’s GuideSection III: SNMPv3 Operations 225SNMPv3 PrivacyProtocolAfter you have configured an authentication protocol, you have the option o
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 226The AT-S62 software supports the MIB tree, starting with the Internet MIBs, as defin
AT-S62 User’s GuideSection III: SNMPv3 Operations 227To determine the destination of the message, you configure the IP address of the host. This confi
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 228First, you create a user in the Configure SNMPv3 User Table. Then you define the MIB
AT-S62 User’s GuideSection III: SNMPv3 Operations 229See Figure 70 for an illustration of how the message notification tables are linked.Figure 70 SN
AT-S62 User’s Guide23Figure 259: Monitoring, SNMPv3 Access Table Page ...
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 230SNMPv3 User TableThe Configure SNMPv3 User Table menu allows you to create an SNMPv3
AT-S62 User’s GuideSection III: SNMPv3 Operations 231SNMPv3 SecurityToGroup TableThe Configure SNMPv3 SecurityToGroup Table Menu allows you to associa
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 232SNMPv3 Community TableThe Configure SNMPv3 Community Table Menu allows you to config
AT-S62 User’s GuideSection III: SNMPv3 Operations 233Configuring the SNMPv3 ProtocolThis section describes how to configure the SNMPv3 protocol using
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 234Configuring the SNMPv3 User TableThis section contains a description of the SNMPv3 U
AT-S62 User’s GuideSection III: SNMPv3 Operations 235The Configure SNMPv3 Table Menu is shown in Figure 71.Figure 71 Configure SNMPv3 Table MenuNoteT
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2365. To create a new user table, type 1 to select Create SNMPv3 Table Entry.The follow
AT-S62 User’s GuideSection III: SNMPv3 Operations 237NoteIf you have the non encrypted version of the AT-S62 software, then the Privacy Protocol field
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 238NoteThe Row Status parameter is a read-only field in the Telnet and Local interfaces
AT-S62 User’s GuideSection III: SNMPv3 Operations 239Modifying the Authentication Protocol and PasswordTo modify the Authentication Protocol and Passw
List of Figures24Chapter 52RADIUS and TACACS+ Authentication Protocols ...
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2406. Enter one of the following:M-MD5This value represents the MD5 authentication prot
AT-S62 User’s GuideSection III: SNMPv3 Operations 241Modifying the Privacy Protocol and PasswordTo modify the Privacy Protocol and Password in an SNMP
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2427. Enter a privacy password of up to 32-alphanumeric characters.The following prompt
AT-S62 User’s GuideSection III: SNMPv3 Operations 243N-NonVolatileSelect this storage type if you want the ability to save an entry in the SNMPv3 User
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 244Configuring the SNMPv3 View TableThis section contains a description of the SNMPv3 V
AT-S62 User’s GuideSection III: SNMPv3 Operations 245The Configure SNMPv3 View Table Menu is shown in Figure 74.Figure 74 Configure SNMPv3 View Table
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 246The following prompt is displayed:Enter Subtree Mask (Hex format):6. Enter a subtree
AT-S62 User’s GuideSection III: SNMPv3 Operations 2479. After making changes, type R until you return to the Main Menu. Then type S to select Save Con
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 248Modifying anSNMPv3 ViewTable EntryThis section describes how to modify parameters in
AT-S62 User’s GuideSection III: SNMPv3 Operations 249The Modify SNMPv3 View Table Menu is shown in Figure 75.Figure 75 Modify SNMPv3 View Table Menu4
25PrefaceThis guide contains instructions on how to configure an AT-8524M Layer 2+ Fast Ethernet Switch using the menu and web browser interfaces of t
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 250The View Subtree parameter defines a MIB View and the Subtree Mask further restricts
AT-S62 User’s GuideSection III: SNMPv3 Operations 251The following prompt is displayed:Enter View Type [I-Included, E-Excluded]:7. Choose one of the f
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2527. Select one of the following storage types for this table entry:V - VolatileSelect
AT-S62 User’s GuideSection III: SNMPv3 Operations 253Configuring the SNMPv3 Access TableThis section contains a description of the SNMPv3 Access Table
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 254The Configure SNMPv3 Access Table Menu is shown in Figure 76.Figure 76 Configure SN
AT-S62 User’s GuideSection III: SNMPv3 Operations 255NoteThe Context Prefix and the Context Match fields are a read only fields. The Context Prefix fi
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 256greatest level of security. You can select this value if you configured the Security
AT-S62 User’s GuideSection III: SNMPv3 Operations 257NoteThe Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2582-v2cSelect this value to associate the Group Name with the SNMPv2c protocol.3-v3Sel
AT-S62 User’s GuideSection III: SNMPv3 Operations 259Modifying anSNMPv3 AccessTable EntryThis section describes how to modify parameters in an SNMPv3
Preface26Section III: SNMPv3 OperationsThe chapter in this section explains how to configure the switch for SNMPv3. (The instructions for SNMPv1 and S
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 260The Modify SNMPv3 Access Table is shown in Figure 77.Figure 77 Modify SNMPv3 Access
AT-S62 User’s GuideSection III: SNMPv3 Operations 261The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv, P-AuthPriv]
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 262Modifying the Write View Name To modify the Write View Name parameter in an SNMPv3 A
AT-S62 User’s GuideSection III: SNMPv3 Operations 2637. Enter the Security Level configured for this Group Name. You cannot change the value of the Se
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 264Modifying the Notify View NameTo modify the Notify View Name parameter in an SNMPv3
AT-S62 User’s GuideSection III: SNMPv3 Operations 2657. Enter the Security Level configured for this Group Name. You cannot change the value of the Se
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 266Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Access T
AT-S62 User’s GuideSection III: SNMPv3 Operations 2677. Enter the Security Level configured for this Group Name. You cannot change the value of the Se
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 268Configuring the SNMPv3 SecurityToGroup TableThis section contains a description of t
AT-S62 User’s GuideSection III: SNMPv3 Operations 269The Configure SNMPv3 SecurityToGroup Table Menu is shown in Figure 78.Figure 78 Configure SNMPv3
AT-S62 User’s Guide27Document ConventionsThis document uses the following conventions:NoteNotes provide additional information.CautionCautions inform
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 270The following prompt is displayed:Enter Group Name:6. Enter a Group Name that you co
AT-S62 User’s GuideSection III: SNMPv3 Operations 271Deleting anSNMPv3SecurityToGroupTable EntryYou may want to delete an entry from the SNMPv3 Securi
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 272The following prompt is displayed:Do you want to delete this table entry? (Y/N): [Ye
AT-S62 User’s GuideSection III: SNMPv3 Operations 273The Modify SecurityToGroup Table is displayed as shown Figure 78.Figure 79 Modify SNMPv3 Securit
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2743-v3Select this value to associate the User Name with the SNMPv3 protocol. The follo
AT-S62 User’s GuideSection III: SNMPv3 Operations 275Select one of the following SNMP protocols:1-v1Select this value if this User Name is configured
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 276Configuring the SNMPv3 Notify TableThis section contains a description of the SNMPv3
AT-S62 User’s GuideSection III: SNMPv3 Operations 277The Configure SNMPv3 Notify Table Menu is shown in Figure 80.Figure 80 Configure SNMPv3 Notify T
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 278I-InformIndicates this notify table is used to send inform messages. With this messa
AT-S62 User’s GuideSection III: SNMPv3 Operations 279NoteTo display a Group Name and its associated parameters from the Configure SNMPv3 SecurityToGro
Preface28Where to Find Web-based GuidesThe installation and user guides for all Allied Telesyn products are available in Portable Document Format (PDF
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 280The Modify SNMPv3 Notify Table Menu is displayed as shown in Figure 81.Figure 81 Mo
AT-S62 User’s GuideSection III: SNMPv3 Operations 281Modifying a Notify TypeTo modify the Notify Type parameter in an SNMPv3 Notify Table entry, perfo
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 282Modifying a Storage TypeTo modify the Storage Type parameter in an SNMPv3 Notify Tab
AT-S62 User’s GuideSection III: SNMPv3 Operations 283Configuring the SNMPv3 Target Address TableThis section contains a description of the SNMPv3 Targ
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 284Creating anSNMPv3 TargetAddress TableEntryTo create an entry in the Configure SNMPv3
AT-S62 User’s GuideSection III: SNMPv3 Operations 285Use the following format for an IP address:XXX.XXX.XXX.XXXThe following prompt is displayed:Enter
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 286This name can consist of up to 32-alphanumeric characters. The value configured here
AT-S62 User’s GuideSection III: SNMPv3 Operations 287The Configure SNMPv3 Target Address Table Menu is shown in Figure 84 on page 297.NoteTo display
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 288Modifying a Target IP AddressTo modify the target IP address in an SNMPv3 Target Add
AT-S62 User’s GuideSection III: SNMPv3 Operations 2894. To change the Target IP Address, type 1 to select Set Target IP Address.The following prompt i
AT-S62 User’s Guide29Contacting Allied TelesynThis section provides Allied Telesyn contact information for technical support as well as sales or corpo
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 290This is the name of the SNMP manager, or host, that manages the SNMP activity on you
AT-S62 User’s GuideSection III: SNMPv3 Operations 2916. Enter a timeout value in milliseconds.When an Inform message is generated, it requires a respo
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2926. Enter the number of times the switch will retry, or resend, the Inform message.Th
AT-S62 User’s GuideSection III: SNMPv3 Operations 293Modifying the Target Parameters FieldTo modify the Target Parameters field in an SNMPv3 Target Ad
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 294Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Target A
AT-S62 User’s GuideSection III: SNMPv3 Operations 2957. After making changes, type R until you return to the Main Menu. Then type S to select Save Con
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 296Configuring the SNMPv3 Target Parameters TableThis section contains a description of
AT-S62 User’s GuideSection III: SNMPv3 Operations 297There are three functions you can perform with the Configure SNMPv3 Target Parameters Table Menu.
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2983. To create an SNMPv3 Target Parameters Table, type 1 to select Create SNMPv3 Table
AT-S62 User’s GuideSection III: SNMPv3 Operations 2997. Select one of the following Security Levels:NoteThe value you configure for the Security Level
3Table of ContentsList of Figures ...
Preface30Management Software UpdatesYou can download new releases of management software for our managed products from either of the following Interne
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 300entry with a NonVolatile storage type, the S - Save Configuration Changes option app
AT-S62 User’s GuideSection III: SNMPv3 Operations 3015. Enter Y to delete the SNMPv3 Target Address Table entry or N to save it.6. After making change
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 302NoteYou cannot modify an entry in the SNMPv3 Target Parameter Table that contains a
AT-S62 User’s GuideSection III: SNMPv3 Operations 303The Modify SNMPv3 Target Parameters Table Menu is shown in Figure 85.Figure 85 Modify SNMPv3 Tar
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 304Modifying the Security ModelFor the Security or User Name you have selected, the val
AT-S62 User’s GuideSection III: SNMPv3 Operations 3052-v2cSelect this value if this User Name is associated with the SNMPv2c protocol. 3-v3Select this
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 306Select one of the following Security Levels:NoteThe value you configure for the Secu
AT-S62 User’s GuideSection III: SNMPv3 Operations 307The Configure SNMPv3 Table Menu is shown in Figure 71 on page 235.2. From the Configure SNMPv3 T
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 3082. From the Configure SNMPv3 Table Menu, type 8 to select Configure SNMPv3 Target Ad
AT-S62 User’s GuideSection III: SNMPv3 Operations 309Configuring the SNMPv3 Community TableThis section contains a description of the SNMPv3 Community
31Chapter 1OverviewThis chapter reviews the functions of the AT-S62 management software, the types of sessions you can use to access the software, and
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 310For each SNMPv3 Community Table entry, you can configure the following parameters:❑
AT-S62 User’s GuideSection III: SNMPv3 Operations 311The Configure SNMPv3 Community Table Menu is shown in Figure 86.Figure 86 Configure SNMPv3 Commu
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 312The following prompt is displayed:Enter Security Name:6. Enter the name of an SNMPv1
AT-S62 User’s GuideSection III: SNMPv3 Operations 3139. After making changes, type R until you return to the Main Menu. Then type S to select Save Con
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 314Modifying anSNMPv3CommunityTable EntryFor each entry in the SNMPv3 Community Table,
AT-S62 User’s GuideSection III: SNMPv3 Operations 315The Modify SNMPv3 Community Table Menu is shown in Figure 87.Figure 87 Modify SNMPv3 Community T
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 316Modifying the Security NameTo modify the Security Name parameter in an SNMPv3 Commun
AT-S62 User’s GuideSection III: SNMPv3 Operations 3172. From the Configure SNMPv3 Table Menu, type 9 to select Configure SNMPv3 Community Table.The Co
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 318The following prompt is displayed:Enter Community Index:5. Enter the Community Index
AT-S62 User’s GuideSection III: SNMPv3 Operations 319Displaying SNMPv3 Table MenusThe procedures in this section describe how to display the SNMPv3 Ta
Chapter 1: Overview32Management OverviewThe AT-S62 management software is intended for the AT-8524M switch. You use the software to monitor and adjust
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 320The Display SNMPv3 Table Menu is shown in Figure 88.Figure 88 Display SNMPv3 Table
AT-S62 User’s GuideSection III: SNMPv3 Operations 321Displaying theDisplay SNMPv3View TableMenuThis section describes how to display the Display SNMPv
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 322Displaying theDisplay SNMPv3Access TableMenuThis section describes how to display th
AT-S62 User’s GuideSection III: SNMPv3 Operations 323Displaying theDisplay SNMPv3SecurityToGroupTable MenuThis section describes how to display the Di
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 324Displaying theDisplay SNMPv3Notify TableMenuThis section describes how to display th
AT-S62 User’s GuideSection III: SNMPv3 Operations 325Displaying theDisplay SNMPv3Target AddressTable MenuThis section describes how to display the Dis
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 326Displaying theDisplay SNMPv3TargetParametersTable MenuThis section describes how to
AT-S62 User’s GuideSection III: SNMPv3 Operations 327Displaying theDisplay SNMPv3CommunityTable MenuThis section describes how to display the Display
328Section IVSpanning Tree ProtocolsThe chapters in this section explain the spanning tree protocols. The chapters include:❑ Chapter 18: Spanning Tree
329Chapter 18Spanning Tree and Rapid Spanning Tree ProtocolsThis chapter provides background information on the Spanning Tree Protocol (STP) and Rapid
AT-S62 User’s Guide33There are four different ways to access the management software on an AT-8524M switch. These methods are referred to in this guid
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 330STP and RSTP OverviewThe performance of a Ethernet network can be severely impaired by
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 331Bridge Priorityand the RootBridgeThe first task that bridges running spanning tree perform i
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 332Path Costs and Port CostsAfter the root bridge has been selected, the bridges must dete
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 333Table 14 lists the STP port costs with Auto-Detect when a port is part of a port trunk.Table
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 334Port PriorityIf two paths have the same cost, the bridges must choose between them to s
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 335To forestall the formation of temporary data loops during topology changes, a port designate
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 336Point-to-Point Ports and Edge PortsNoteThis section applies only to RSTP and MSTP.Part
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 337If a port is operating in half-duplex mode and is not connected to any further bridges parti
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 338Mixed STP andRSTP NetworkRSTP IEEE 802.1w is fully compliant with STP IEEE 802.1d. Your
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 339You can avoid this problem by not activating spanning tree or by connecting VLANs using tagg
Chapter 1: Overview34Local Management SessionYou establish a local management session with an AT-8524M switch by connecting a terminal or a PC with a
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 340Enabling or Disabling a Spanning Tree ProtocolThe AT-S62 software supports STP, RSTP, a
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3414. If you selected STP as the active spanning tree protocol, go to Configuring STP on page 3
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 342Configuring STPThis section contains the following procedures:❑ Configuring STP Bridge
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3432. Adjust the bridge STP settings as needed. The parameters are described below.1 - Bridge P
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 3443. After making changes, type R until you return to the Main Menu. Then type S to selec
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 345The Configure STP Port Settings menu is shown in Figure 104.Figure 104 Configure STP Port S
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 346Displaying STPPort SettingsTo display STP port settings, perform the following procedur
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 347Configuring RSTPThis section contains the following procedures:❑ Configuring RSTP Bridge Set
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 3482. Adjust the parameters as needed. The parameters are defined below.1 - Force VersionT
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3496 - Bridge IdentifierThe MAC address of the bridge. The bridge identifier is used as a tie b
AT-S62 User’s Guide35Telnet Management SessionYou can use any management workstation on your network that has the Telnet application protocol to manag
Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 350The Configure RSTP Port Settings menu is shown in Figure 108.Figure 108 Configure RSTP
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 351Displaying PortRSTP StatusThe RSTP Port Parameters menu has two selections for displaying a
352Chapter 19Multiple Spanning Tree ProtocolThis chapter provides background information on the Multiple Spanning Tree Protocol (MSTP). The chapter al
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 353MSTP OverviewAs explained in the previous chapter, STP and RSTP are single-instance spanning
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 354MultipleSpanning TreeInstance (MSTI)The individual spanning trees in
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 355If the switches were running STP or RSTP, one of the links would be blocked because the link
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 356Figure 110 illustrates the same two AT-8524M switches and the same t
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 357A MSTI can contain more than one VLAN. This is illustrated in Figure 111 where there are two
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 358MSTI GuidelinesHere are several guidelines to keep in mind about MST
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 359The revision level is an arbitrary number you assign to a region. You can use the number to
Chapter 1: Overview36Web Browser Management SessionYou can also use a web browser from a management workstation on your network to manage a switch. Th
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 360Figure 112 illustrates the concept of regions. It shows one MSTP reg
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 361The AT-8524M switch determines regional boundaries by examining the MSTP BPDUs received on t
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 362❑ The regional root of a MSTI must be in the same region as the MSTI
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 363MSTP with STP and RSTPMSTP is fully compatible with STP and RSTP. If a port on an AT-8524M r
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 364❑ An MSTI cannot span multiple regions.❑ Each MSTI must have a regio
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 365This is illustrated in Figure 113. Port 8 in Switch A is a member of a VLAN assigned to MSTI
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 366A problem can arise if you assign some VLANs to MSTIs while leaving
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 367This is illustrated in Figure 115. The example show two switches, each residing in a differe
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 368Here is an example. Let’s assume that you have two regions that cont
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 369Configuring MSTP Bridge SettingsThis section contains the procedure for configuring a bridge
AT-S62 User’s Guide37SNMP Management SessionAnother way to remotely manage the switch is with an SNMP management program. AT-S62 software supports SNM
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3703. Adjust the MSTP settings as needed. Changes are immediately activ
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3715 - Max HopsMSTP regions use this parameter to discard BPDUs. The Max Hop counter in a BPDU
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 372Configuring the CIST PriorityThis procedure explains how to adjust t
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3732. To change the CIST priority, type 1.The following prompt is displayed:Enter new priority
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 374Creating, Deleting, and Modifying MSTI IDsThe following procedures e
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 375Regional Root IDIdentifies the regional root for the MSTI by its MAC address.Path CostSpecif
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3763. After making changes, type R until you return to the Main Menu. T
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 377Associating VLANs to MSTI IDsWhen you create a new MSTI ID, you are given the opportunity of
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 378The VLAN-MSTI Association Menu is shown in Figure 119.Figure 119 VL
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 379The MSTI ID retains any VLANs already associated with it when new VLANs are added.4. After m
Chapter 1: Overview38Management Access LevelsThere are two levels of management access in the AT-S62 management software: Manager and Operator. Manage
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 380Configuring MSTP Port SettingsTo configure a port’s MSTP parameters,
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3814. Adjust the port settings as needed. The selections are described below:1 - Port PriorityT
Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3825 - Edge PortThis parameter defines whether the port is functioning
AT-S62 User’s GuideSection IV: Spanning Tree Protocols 383Displaying MSTP Port Settings and StatusThe MSTP Port Parameters menu, shown in Figure 120 o
384Section VVirtual LANsThe chapters in this section explain virtual LANs (VLANs). The chapters include:❑ Chapter 20: Tagged and Port-based Virtual LA
385 Chapter 20Tagged and Port-based Virtual LANsThis chapter contains background information on tagged and port-based virtual LANs (VLANs). It also co
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 386VLAN OverviewA VLAN is a group of ports on an Ethernet switch that form a log
AT-S62 User’s GuideSection V: Virtual LANs 387But with VLANS, you can change the LAN segment assignment of an end node connected to the switch through
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 388Port-based VLAN OverviewAs explained in the VLAN Overview on page 386, a VLAN
AT-S62 User’s GuideSection V: Virtual LANs 389If a VLAN spans multiple switches, then the VID for the VLAN on the different switches should be the sam
39Section IBasic OperationsThe chapters in this section cover a variety of basic switch features and functions. The chapters include:❑ Chapter 2: Star
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 390For example, if you were creating a port-based VLAN on a switch and you had a
AT-S62 User’s GuideSection V: Virtual LANs 391VLANs that span switches, many ports could end up being used ineffectively just to interconnect the vari
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 392Each VLAN has been assigned a unique VID. You assign this number when you cre
AT-S62 User’s GuideSection V: Virtual LANs 393Port-basedExample 2Figure 123 illustrates more port-based VLANs. In this example, two VLANs, Sales and E
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 394The table below lists the port assignments for the Sales, Engineering, and Pr
AT-S62 User’s GuideSection V: Virtual LANs 395Tagged VLAN OverviewThe second type of user-configured VLAN is the tagged VLAN. VLAN membership in a tag
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 396❑ Tagged and Untagged Ports❑ Port VLAN IdentifierNoteFor an explanation of VL
AT-S62 User’s GuideSection V: Virtual LANs 397General Rulesfor Creating aTagged VLANBelow is a summary of the rules to observe when creating a tagged
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 398Tagged VLANExampleFigure 124 illustrates how tagged ports can be used to inte
AT-S62 User’s GuideSection V: Virtual LANs 399The port assignments for the VLANs are as follows:This example is nearly identical to the Port-based Exa
Table of Contents4Chapter 3Enhanced Stacking ...
40Chapter 2Starting a Local or Telnet Management SessionThis chapter contains the procedure for starting a local or Telnet management session on an AT
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 400Creating a Port-based or Tagged VLANTo create a new port-based or tagged VLAN
AT-S62 User’s GuideSection V: Virtual LANs 401The Configure VLANs menu is shown in Figure 126.Figure 126 Configure VLANs Menu3. From the Configure VL
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 402NoteA VLAN must be assigned a name.5. Type 2 to select VLAN ID (VID) and ente
AT-S62 User’s GuideSection V: Virtual LANs 4039. Press any key.The VLAN Configuration menu in Figure 125 on page 400 is redisplayed.10. To verify that
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 404Example of Creating a Port-based VLANThe following procedure creates the Sale
AT-S62 User’s GuideSection V: Virtual LANs 405Example of Creating a Tagged VLANThe following procedure creates the Engineering VLAN in the top switch
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 406Modifying a VLANYou can use this procedure to add or remove ports from a port
AT-S62 User’s GuideSection V: Virtual LANs 407The following prompt is displayed:Enter new value -> [1 to 4096] ->5. Enter the VID of the VLAN yo
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 4083 - Tagged PortsUse this selection to add or remove tagged ports from the VLA
AT-S62 User’s GuideSection V: Virtual LANs 409If you added or removed from the VLAN a port with one or more static MAC addresses assigned to it, you m
AT-S62 User’s GuideSection I: Basic Operations 41Local Management SessionTo establish a local management session, you connect a terminal or PC with a
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 410Displaying VLANsTo view the name, VID number, and member ports of all the VLA
AT-S62 User’s GuideSection V: Virtual LANs 411Deleting a VLANThis procedure deletes port-based and tagged VLANs from the switch. All untagged ports in
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 412NoteYou cannot delete the Default_VLAN, which has a VID of 1.The Delete VLAN
AT-S62 User’s GuideSection V: Virtual LANs 4139. Repeat this procedure starting with Step 4 to delete other VLANs.10. After making changes, type R unt
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 414Deleting All VLANsThis section contains the procedure for deleting all port-b
AT-S62 User’s GuideSection V: Virtual LANs 415Displaying PVIDs and Port PrioritiesThe following procedure displays a menu that lists the PVIDs for all
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 416Enabling or Disabling Ingress FilteringThere are rules a switch follows when
AT-S62 User’s GuideSection V: Virtual LANs 417Activating or deactivating ingress filtering has no effect on the switch’s handling of priority tags. A
Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 418Specifying a Management VLANThe management VLAN is the VLAN on which an AT-85
AT-S62 User’s GuideSection V: Virtual LANs 419Now assume that you decide to create a VLAN called NMS with a VID of 24 for the sole purpose of remote n
Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 42Starting a LocalManagementSessionTo start a local management ses
420Chapter 21GARP VLAN Registration ProtocolThis chapter describes the GARP VLAN Registration Protocol (GVRP). It contains the following sections:❑ Ba
AT-S62 User’s GuideSection V: Virtual LANs 421Basic Overview of GARP VLAN Registration Protocol (GVRP)The GARP VLAN Registration Protocol (GVRP) allow
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 422Figure 134 provides an example of how GVRP works.Figure 134 GVRP Example Switch
AT-S62 User’s GuideSection V: Virtual LANs 4233. Switch #2 sends a PDU out port 15 containing all of the VIDs of the VLANs on the switch, including th
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 424❑ Resetting a switch erases all dynamic GVRP VLANs and dynamic GVRP port assignm
AT-S62 User’s GuideSection V: Virtual LANs 425GVRP-inactiveIntermediateSwitchesThe presence of a GVRP-inactive switch between GVRP-active devices may
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 426Technical Overview of Generic Attribute Registration Protocol (GARP)The purpose
AT-S62 User’s GuideSection V: Virtual LANs 427The architecture of GARP is shown in Figure 135. Figure 135 GARP Architecture The GARP Application comp
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 428An instance of GID consists of the set of state machines that define the current
AT-S62 User’s GuideSection V: Virtual LANs 429The Applicant is therefore looking after the interests of all would-be Participants. This allows the Reg
AT-S62 User’s GuideSection I: Basic Operations 434. When prompted, enter a username and password.To configure the switch settings, enter “manager” as
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 430Configuring GVRPThis section contains the procedure for configuring GVRP. The ti
AT-S62 User’s GuideSection V: Virtual LANs 4316. Choose one of the following:E to enable GIP.D to disable GIP.NoteDo not disable GIP if you intend to
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 432Enabling or Disabling GVRP on a PortThis procedure enables and disables GVRP on
AT-S62 User’s GuideSection V: Virtual LANs 4335. Enter a port. You can configure more than one port at a time.The Configure GVRP Port Settings Menu is
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 4349. After making changes, type R until you return to the Main Menu. Then type S t
AT-S62 User’s GuideSection V: Virtual LANs 435Converting a Dynamic GVRP VLANThis procedure converts a dynamic GVRP VLAN into a static VLAN. You can pe
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 436Displaying GVRP Parameters and StatisticsTo display GVRP counters, database, sta
AT-S62 User’s GuideSection V: Virtual LANs 437GVRP Counters Option 1 - Display GVRP Counters in the Other GARP Port Parameters displays the GVRP Count
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 438Figure 143 GVRP Counters Menu (page 2)The GVRP counters in the menus are define
AT-S62 User’s GuideSection V: Virtual LANs 439Receive Discarded: Port Not ListeningNumber of GARP PDUs discarded because the port that received the PD
Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 44To select a menu item, type the corresponding letter or number.P
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 440Transmit GARP Messages: JoinInTotal number of GARP JoinIn messages transmitted f
AT-S62 User’s GuideSection V: Virtual LANs 441GVRP Database Option 2 - Display GVRP Database in the Other GARP Port Parameters displays the GVRP Datab
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 442GIP ConnectedPorts RingOption 3 - Display GIP Connected Ports Ring in the Other
AT-S62 User’s GuideSection V: Virtual LANs 443GVRP StateMachineOption 4 - Display GVRP State Machine in the Other GARP Port Parameters displays the GV
Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 444App Applicant state machine for the GID index on that particular port. One of:No
AT-S62 User’s GuideSection V: Virtual LANs 445App (Continued) Non-Participant Management state:“Von” Very Anxious Observer“Aon” Anxious Observer“Qon”
446 Chapter 22Multiple VLAN ModesThis chapter describes the multiple VLAN modes and how to select a mode.This chapter contains the following sections:
AT-S62 User’s GuideSection V: Virtual LANs 447Multiple VLAN Mode OverviewThe Multiple VLAN modes can simplify the task of configuring the switch in ne
Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 448A user designated port on the switch functions as an uplink port, which can be connected to
AT-S62 User’s GuideSection V: Virtual LANs 449This highly segmented configuration is useful in situations where traffic generated by each end node or
AT-S62 User’s GuideSection I: Basic Operations 45Telnet Management SessionYou can use the Telnet application protocol from a workstation on your netwo
Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 450Another difference with this mode is that the uplink port is untagged. Consequently, you wou
AT-S62 User’s GuideSection V: Virtual LANs 451Selecting a VLAN ModeThe following procedure explains how to select a VLAN mode. Available modes are:❑ U
Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 452Displaying VLAN InformationTo view the VLANs on the switch while the unit is operating in Mu
453Section VIPort SecurityThe chapters in this section explain the port security features of the AT-8524M switch The chapters include:❑ Chapter 23: MA
454Chapter 23MAC Address SecurityThis chapter explains how you can use the dynamic or static MAC addresses learned or assigned on the ports of the swi
AT-S62 User’s GuideSection VI: Port Security 455MAC Address Security OverviewThis feature can enhance the security of your network. You can use it to
Chapter 23: MAC Address SecuritySection VI: Port Security 456Secured The Secured security level instructs a port to forward frames using only static
AT-S62 User’s GuideSection VI: Port Security 457Intrusion action defines what a port will do when it receives an invalid frame. For a port operating u
Chapter 23: MAC Address SecuritySection VI: Port Security 458Configuring MAC Address Port SecurityTo set the port security level, perform the followi
AT-S62 User’s GuideSection VI: Port Security 4595. Press 1 to change the port security on your specified port list. The following prompt appears:Enter
Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 46NoteYou can run only one Telnet management session on a switch a
Chapter 23: MAC Address SecuritySection VI: Port Security 4608. To set the intrusion action for a port in the limited security mode, do the following
AT-S62 User’s GuideSection VI: Port Security 461Displaying Port Security LevelsTo view the current security levels for the ports on the switch, do the
Chapter 23: MAC Address SecuritySection VI: Port Security 462Intruder ActionThe column specifies the action taken by a port if it receives an invalid
463Chapter 24802.1x Port-based Access ControlThis chapter explains 802.1x Port-based Access Control and how you can use this feature to restrict acces
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 464802.1x Port-based Access Control OverviewThe AT-S62 management software prov
AT-S62 User’s GuideSection VI: Port Security 465❑ Authentication server - The authentication server is the network device that has the RADIUS server s
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 466Port Roles Part of the task to implementing this feature is specifying the r
AT-S62 User’s GuideSection VI: Port Security 467Figure 153 Example of the Authenticator RoleAs mentioned earlier, the switch itself does not authenti
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 468Figure 154 Example of the Supplicant RoleNoteThe use of this port role shou
AT-S62 User’s GuideSection VI: Port Security 469The information sent by the switch to the RADIUS server for an event includes:❑ The port number where
AT-S62 User’s GuideSection I: Basic Operations 47Saving Your Parameter ChangesWhen you make a change to a switch parameter, the change is, in most cas
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4703. You must configure the RADIUS client software in the AT-S62 management so
AT-S62 User’s GuideSection VI: Port Security 471NoteConnecting multiple supplicants to a port set to the authenticator role does not conform to the IE
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 472❑ Ports used to interconnect switches should typically be set to the none ro
AT-S62 User’s GuideSection VI: Port Security 473Enabling and Disabling Port-based Access ControlThis procedure explains how to enable and disable port
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 474Setting Port RolesThis procedure sets port roles. For an explanation of port
AT-S62 User’s GuideSection VI: Port Security 4758. Once you have set port roles, you can go to the next procedure to configure port security parameter
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 476Configuring Authenticator Port ParametersNoteA port must be set to the authe
AT-S62 User’s GuideSection VI: Port Security 477The Configure Authenticator Port Access Parameters menu is shown in Figure 159.Figure 159 Configure A
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4782 - Quiet PeriodSets the number of seconds that the port remains in the quie
AT-S62 User’s GuideSection VI: Port Security 479The two selections are:❑ Ingress - An authenticator port, when in the unauthorized state, will discard
Section I: Basic Operations 48Chapter 3Enhanced StackingThis chapter explains the enhanced stacking feature. The sections in this chapter include:❑ En
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 480Configuring Supplicant Port ParametersNoteA port must be set to the supplica
AT-S62 User’s GuideSection VI: Port Security 481The Configure Supplicant Port Access Parameters menu is shown in Figure 159.Figure 161 Configure Supp
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 482network. The username can be from 1 to 64 alphanumeric characters (A to Z, a
AT-S62 User’s GuideSection VI: Port Security 483Configuring RADIUS AccountingThe AT-S62 management software supports RADIUS accounting for ports opera
Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4844. Configure the parameters as needed. Changes take affect immediately on th
485Section VIIManagement SecurityThe chapters in this section explain the management security features of the AT-S62 software. The chapters include:❑
486Chapter 25Web ServerThe chapter provides an overview of the web server feature and the procedure for configuring the server. It contains the follow
AT-S62 User’s GuideSection VII: Management Security 487Web Server OverviewThe AT-S62 management software comes with web server software so you can rem
Chapter 25: Web ServerSection VII: Management Security 488General Steps toConfiguring theWeb Server forEncryptionThere are several procedures you need
AT-S62 User’s GuideSection VII: Management Security 4896. Once you have received the appropriate certificates from the CA, download them into the AT-S
AT-S62 User’s GuideSection I: Basic Operations 49Enhanced Stacking OverviewThe enhanced stacking feature can make it easier for you to manage the AT-8
Chapter 25: Web ServerSection VII: Management Security 490Configuring the Web ServerThis procedure explains how to enable and disable the web server a
AT-S62 User’s GuideSection VII: Management Security 491Menu option 4 is displayed only for HTTPS operation. The option is hidden for HTTP.3. Type 1 to
492Chapter 26Encryption KeysThis chapter describes how to improve the security of your switches with encryption keys. Because of the complexity of the
AT-S62 User’s GuideSection VII: Management Security 493Basic OverviewProtecting your managed switches from unauthorized management access is an import
Chapter 26: Encryption KeysSection VII: Management Security 494SSH encryption requires two key pairs on the switch— a server key pair and a host key p
AT-S62 User’s GuideSection VII: Management Security 495Technical OverviewThe encryption feature provides the following data security services:❑ data e
Chapter 26: Encryption KeysSection VII: Management Security 496❑ Electronic Code Book (ECB) is the fundamental DES function. Plaintext is divided into
AT-S62 User’s GuideSection VII: Management Security 497Asymmetrical (Public Key) EncryptionAsymmetrical encryption algorithms use two keys—one for enc
Chapter 26: Encryption KeysSection VII: Management Security 498Typically a MAC is calculated using a keyed one-way hash algorithm. A keyed one-way has
AT-S62 User’s GuideSection VII: Management Security 499The Diffie-Hellman algorithm, which is used by the AT-S62 management software, is one of the mo
AT-S62 User’s Guide5Load Distribution Methods ...
Chapter 3: Enhanced StackingSection I: Basic Operations 50There are three basic steps to implementing this feature on your network:1. You must select
Chapter 26: Encryption KeysSection VII: Management Security 500Creating an Encryption KeyThis section contains the procedure for creating an encryptio
AT-S62 User’s GuideSection VII: Management Security 501The Key Management menu is shown in Figure 165.Figure 165 Key Management MenuThis menu lists t
Chapter 26: Encryption KeysSection VII: Management Security 502The Create Key menu is shown in Figure 166.Figure 166 Create Key Menu5. Type 1 to sele
AT-S62 User’s GuideSection VII: Management Security 5039. Type 4 to create a key description.The following prompt is displayed:Enter new Description -
Chapter 26: Encryption KeysSection VII: Management Security 504Deleting an Encryption KeyThis section contains the procedure for deleting an encryptio
AT-S62 User’s GuideSection VII: Management Security 505Modifying an Encryption KeyThe Key Management menu has a selection for modifying the descriptio
Chapter 26: Encryption KeysSection VII: Management Security 506Exporting an Encryption KeyThe following procedure exports the public key of a key pair
AT-S62 User’s GuideSection VII: Management Security 507NoteKey Type is a read-only field. You cannot change this value.3. Type 3 to toggle Key File Fo
Chapter 26: Encryption KeysSection VII: Management Security 508Importing an Encryption KeyUse the following procedure to import a public key from the
AT-S62 User’s GuideSection VII: Management Security 5093. Type 3 to select Key File Format to choose the format of the key. Selections are:HEX - Indic
AT-S62 User’s GuideSection I: Basic Operations 51Figure 4 is an example of the enhanced stacking feature.Figure 4 Enhanced Stacking ExampleThe exampl
510Chapter 27Public Key Infrastructure CertificatesThis chapter contains the procedures for creating Public Key Infrastructure (PKI) certificates for
AT-S62 User’s GuideSection VII: Management Security 511Basic OverviewThis chapter explains how to implement encryption for your web browser management
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 512Public CAs issue certificates typically intended for use by the
AT-S62 User’s GuideSection VII: Management Security 513A certificate name does not have to contain all of these parts. You can use as many or as few a
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 514SSL andEnhancedStackingSecure Sockets Layer (SSL) is supported i
AT-S62 User’s GuideSection VII: Management Security 515Guidelines Here are guidelines for creating certificates:❑ A certificate can have only one publ
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 516Technical OverviewThe Secure Sockets Layer (SSL) feature is a se
AT-S62 User’s GuideSection VII: Management Security 517All application data messages are authenticated by SSL with a message authentication code (MAC)
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 518The Application data message encapsulates the encrypted applicat
AT-S62 User’s GuideSection VII: Management Security 519DigitalSignaturesThe second main service provided by public key encryption is digital signing.
Chapter 3: Enhanced StackingSection I: Basic Operations 52Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the switch can be
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 520❑ The owner’s identity details, such as name, company and addres
AT-S62 User’s GuideSection VII: Management Security 521An organization may own a Certification Authority and issue certificates for use within its own
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 522Out-of-band verification involves both the owner of a certificat
AT-S62 User’s GuideSection VII: Management Security 523Before the switch can use a certificate, it must be retrieved and manually added to the switch’
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 524Creating a Self-signed CertificateThis section contains the proc
AT-S62 User’s GuideSection VII: Management Security 5253. From the Keys/Certificate menu, select 3 to select Public Key Infrastructure (PKI) Configura
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 526The Certificate Database portion of the window lists the certifi
AT-S62 User’s GuideSection VII: Management Security 5279. Enter the ID number of the encryption key you want to use to create the certificate. The enc
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 528Adding a Certificate to the DatabaseOnce you have created a cert
AT-S62 User’s GuideSection VII: Management Security 5296. Type 1 to select Certificate Name and enter a name for the certificate.This is the name for
AT-S62 User’s GuideSection I: Basic Operations 53The Enhanced Stacking menu is shown in Figure 5.Figure 5 Enhanced Stacking MenuThe menu displays the
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 53010. Type 5 to select Add Certificate to add the certificate to t
AT-S62 User’s GuideSection VII: Management Security 531Modifying a CertificateThe procedure in this section modifies a certificate. (The certificate t
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 5323. Type 2 to select State and specify if a certificate is truste
AT-S62 User’s GuideSection VII: Management Security 533Deleting a CertificateThe procedure in this section deletes a certificate from the certificate
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 534Viewing a CertificateThis procedure displays information about a
AT-S62 User’s GuideSection VII: Management Security 5353. Type N to see the second page of certificate details.The View Certificate Details menu (page
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 536MD5 Fingerprint - Indicates the MD5 algorithm. This value provid
AT-S62 User’s GuideSection VII: Management Security 537Generating an Enrollment RequestTo request a certificate from a public or private CA, you need
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 5385. From the Public Key Infrastructure (PKI) Configuration Menu,
AT-S62 User’s GuideSection VII: Management Security 539PEM - Creates the certificate in the Privacy Enhanced Mail (PEM) format, which is an ASCII form
Chapter 3: Enhanced StackingSection I: Basic Operations 54Selecting a Switch in an Enhanced StackBefore you perform a procedure on a switch in an enha
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 540Installing CA Certificates onto a SwitchThis section lists the p
AT-S62 User’s GuideSection VII: Management Security 541Configuring PKIOption 1 - Maximum Number of Certificates in the Public Key Infrastructure (PKI)
Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 542Configuring SSLTo configure the SSL protocol, perform the follow
543Chapter 28Secure Shell (SSH) ProtocolThe chapter contains overview information about the Secure Shell (SSH) protocol and the procedure for configur
Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 544SSH OverviewSecure management is increasingly important in modern networks,
AT-S62 User’s GuideSection VII: Management Security 545❑ Tunnelling of TCP/IP traffic NoteNon-encrypted Secure Shell sessions serve no purpose.SSH Ser
Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 546SSH andEnhancedStackingThe AT-S62 management software allows for encrypted
AT-S62 User’s GuideSection VII: Management Security 547Guidelines Below are the guidelines to observe when configuring SSH:❑ SSH requires two encrypti
Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 548Configuring the SSH ServerThis section describes how to configure the SSH s
AT-S62 User’s GuideSection VII: Management Security 5493. Select 1 - SSH Server Status to enable or disable the SSH server.4. Choose from one of the f
AT-S62 User’s GuideSection I: Basic Operations 553. Type 1 to select Get/Refresh List of Switches.The Master switch polls the subnet for all slave and
Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 550Displaying SSH InformationTo display SSH server information, perform the fo
AT-S62 User’s GuideSection VII: Management Security 551❑ Host Key ID: Indicates the host key ID defined for SSH.❑ Host Key Bits: Indicates the number
552Chapter 29RADIUS and TACACS+ Authentication ProtocolsThis chapter explains how to create new manager accounts on a switch using the two authenticat
AT-S62 User’s GuideSection VII: Management Security 553TACACS+ and RADIUS OverviewTACACS+ and RADIUS are authentication protocols for enhancing the se
Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 554When a network manager logs in to a switch to manage the de
AT-S62 User’s GuideSection VII: Management Security 555the Administration Menu so that the switch and server can communicate with each other.❑ You nee
Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 556When a switch receives a username and password combination
AT-S62 User’s GuideSection VII: Management Security 557Configuring Authentication Protocol SettingsTo configure the RADIUS or TACACS+ settings on the
Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 5585. To disable the server-based authentication feature on th
AT-S62 User’s GuideSection VII: Management Security 559Use per-server secret [Y/N] ->If you will be specifying more than one TACACS+ server and if
Section I: Basic Operations 56Chapter 4Basic Switch ParametersThis chapter contains a variety of information and procedures. There is a discussion on
Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 560f. After making changes, type R until you return to the Mai
AT-S62 User’s GuideSection VII: Management Security 5613 - RADIUS Server 1 Configuration4 - RADIUS Server 1 Configuration5 - RADIUS Server 1 Configura
Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 562d. From the Authentication Menu, type 1 to select Server-ba
563Chapter 30Management Access Control ListThis chapter explains how to create an access control list (ACL) to restrict Telnet and web browser managem
Chapter 30: Management Access Control ListSection VII: Management Security 564Management Access Control List OverviewThe Management Access Control Lis
AT-S62 User’s GuideSection VII: Management Security 565MaskYou need to enter a mask that indicates the parts of the IP address the switch should filte
Chapter 30: Management Access Control ListSection VII: Management Security 566enter them.❑ The protocol is always TCP.❑ The Management ACL does not co
AT-S62 User’s GuideSection VII: Management Security 567Protocol TCPInterface WebA Management ACL can contain multiple ACEs. The two ACEs in this ACL a
Chapter 30: Management Access Control ListSection VII: Management Security 568Creating the Management ACLTo create a Management ACL, perform the follo
AT-S62 User’s GuideSection VII: Management Security 569on the address. For example, to allow all management workstations in the subnet 149.11.11.0 to
AT-S62 User’s GuideSection I: Basic Operations 57When Does a Switch Need an IP Address?One of the tasks to building or expanding a network is deciding
Chapter 30: Management Access Control ListSection VII: Management Security 570Adding, Deleting, and Viewing ACEsYou can add or delete an ACE from the
571Section VIIIWeb Browser ManagementThe chapters in this section explain how to manage an AT-8524M switch using a web browser. The chapters include:❑
Section III: Web Browser Management572❑ Chapter 47, GARP VLAN Registration Protocol on page 775❑ Chapter 48, MAC Address Security on page 782❑ Chapter
573Chapter 31Starting a Web Browser Management SessionThis chapter contains the procedure for starting a web browser management session on an AT-8524M
Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 574Starting a Web Browser Management SessionTo establish a w
AT-S62 User’s GuideSection VIII: Web Browser Management 575The AT-S62 software displays the login page, as shown in Figure 188.Figure 188 AT-S62 Logi
Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 576The main menu is on the left side of the Home page. It co
AT-S62 User’s GuideSection VIII: Web Browser Management 577Saving Your Parameter ChangesWhen you make a change to a switch parameter, the change is, i
Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 578Quitting a Web Browser Management SessionTo exit a web br
579Chapter 32Enhanced StackingThis chapter contains the following procedures:❑ Setting a Switch’s Enhanced Stacking Status on page 580❑ Selecting a Sw
Chapter 4: Basic Switch ParametersSection I: Basic Operations 58How Do YouAssign an IPAddress?After you have decided which, if any, switches on your n
Chapter 32: Enhanced StackingSection VIII: Web Browser Management 580Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the sw
AT-S62 User’s GuideSection VIII: Web Browser Management 581NoteIf the window does not have an Enhanced Stacking tab, you are attempting to change the
Chapter 32: Enhanced StackingSection VIII: Web Browser Management 582Selecting a Switch in an Enhanced StackThe first thing that you should do before
AT-S62 User’s GuideSection VIII: Web Browser Management 583NoteThe master switch on which you started the management session is not included in the li
Chapter 32: Enhanced StackingSection VIII: Web Browser Management 584Displaying the Enhanced Stacking StatusTo display the enhanced stacking status of
585Chapter 33Basic Switch ParametersThis chapter contains the following sections:❑ Configuring an IP Address and Switch Name on page 586❑ Activating t
Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 586Configuring an IP Address and Switch NameNoteFor guidelines on when to assi
AT-S62 User’s GuideSection VIII: Web Browser Management 587NoteThis procedure describes the parameters in the Administration section of the tab. The P
Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 588CommentsThis parameter specifies the location of the switch, (for example,
AT-S62 User’s GuideSection VIII: Web Browser Management 589Activating the BOOTP and DHCP Client SoftwareFor background information on BOOTP and DHCP,
AT-S62 User’s GuideSection I: Basic Operations 59Configuring an IP Address and Switch NameThe procedure in this section explains how to manually assig
Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 590Displaying System InformationTo view basic information about the switch, pe
AT-S62 User’s GuideSection VIII: Web Browser Management 591CommentsThe location of the switch, (for example, 4th Floor - rm 402B). DHCP/BOOTPThe statu
Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 592Configuring the Manager and Operator PasswordsThere are two levels of manag
AT-S62 User’s GuideSection VIII: Web Browser Management 593CautionYou should not use spaces or special characters, such as asterisks (*) and exclamati
Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 594Rebooting a SwitchNoteAny parameters changes that have not been saved will
AT-S62 User’s GuideSection VIII: Web Browser Management 595Pinging a Remote SystemYou can instruct the switch to ping a node on your network. This pro
Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 596Returning the AT-S62 Software to the Factory Default ValuesThe procedure in
AT-S62 User’s GuideSection VIII: Web Browser Management 597The System Utilities tab is shown in Figure 197.Figure 197 System Utilities Tab3. Click th
598Chapter 34SNMPv1 and SNMPv2c Community StringsThis chapter explains how to activate SNMP management on the switch and how to create, modify, and de
AT-S62 User’s GuideSection VIII: Web Browser Management 599Enabling or Disabling SNMP ManagementTo enable or disable SNMP management on the switch, pe
Table of Contents6Chapter 14Quality of Service ...
Chapter 4: Basic Switch ParametersSection I: Basic Operations 602. From the System Administration menu, type 2 to select System Configuration.The Syst
Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 6004. If you want the switch to send authentication failure traps,
AT-S62 User’s GuideSection VIII: Web Browser Management 601Creating a New SNMPv1 or SNMPv2c Community StringTo create a new SNMPv1 or SNMPv2c communit
Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 602Open AccessDisplays the opened or closed access status of the s
AT-S62 User’s GuideSection VIII: Web Browser Management 6035. In the Community Name field, enter the new community string. The name can be from one to
Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 604Modifying a Community StringTo modify a community string, perfo
AT-S62 User’s GuideSection VIII: Web Browser Management 605NoteYou cannot change the name of a community string.6. Use the Status option to either ena
Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 606Deleting a Community StringTo delete a community string, do the
AT-S62 User’s GuideSection VIII: Web Browser Management 607Displaying the SNMP Status and Community StringsTo display the SNMPv1 and SNMPv2c community
Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 608Trap ReceiversIP addresses of management stations to receive SN
609Chapter 35Port ParametersThis chapter explains how to view and change the parameter settings for the individual ports on a switch. Examples of the
AT-S62 User’s GuideSection I: Basic Operations 613 - Subnet MaskThis parameter specifies the subnet mask for the switch. You must specify a subnet mas
Chapter 35: Port ParametersSection VIII: Web Browser Management 610Configuring Port ParametersTo configure the parameter settings of a port on the swi
AT-S62 User’s GuideSection VIII: Web Browser Management 611The Port Configuration page is shown Figure 204.Figure 204 Port Configuration PageNoteThe
Chapter 35: Port ParametersSection VIII: Web Browser Management 612You should note the following concerning the operation of Auto-Negotiation on the s
AT-S62 User’s GuideSection VIII: Web Browser Management 613You might also want to disable a port that is not being used to secure it from unauthorized
Chapter 35: Port ParametersSection VIII: Web Browser Management 614Back PressureSets backpressure on a port. This option only applies to ports operati
AT-S62 User’s GuideSection VIII: Web Browser Management 615MDI/MDIX CrossoverUse this selection to set the wiring configuration of the port. The confi
Chapter 35: Port ParametersSection VIII: Web Browser Management 616Displaying Port Status and StatisticsThe procedure in this section displays the ope
AT-S62 User’s GuideSection VIII: Web Browser Management 617If you select port status, the Port Status page in Figure 206 is displayed.Figure 206 Port
Chapter 35: Port ParametersSection VIII: Web Browser Management 618SpeedThe operating speed of the port. Possible values are:0010 - 10 Mbps0100 - 100
AT-S62 User’s GuideSection VIII: Web Browser Management 619The information in this page is for viewing purposes only. The statistics are defined below
Chapter 4: Basic Switch ParametersSection I: Basic Operations 62Activating the BOOTP and DHCP Client SoftwareThe BOOTP and DHCP application protocols
Chapter 35: Port ParametersSection VIII: Web Browser Management 620Oversize Frames Number of frames exceeding the maximum specified by IEEE 802.3 (151
621Chapter 36MAC Address TableThis chapter contains instructions on how to view the dynamic and static addresses in the MAC address table of the switc
Chapter 36:MAC Address TableSection VIII: Web Browser Management 622Displaying the MAC Address TableTo view the MAC address table, perform the followi
AT-S62 User’s GuideSection VIII: Web Browser Management 623View AllThis selection displays all dynamic addresses learned on the ports of the switch an
Chapter 36:MAC Address TableSection VIII: Web Browser Management 624Adding Static Unicast and Multicast MAC AddressesThis section contains the procedu
AT-S62 User’s GuideSection VIII: Web Browser Management 625the failure of the multicast packets to be properly forwarded to the host nodes. You can sp
Chapter 36:MAC Address TableSection VIII: Web Browser Management 626Deleting Unicast and Multicast MAC AddressesTo delete a static or dynamic unicast
AT-S62 User’s GuideSection VIII: Web Browser Management 627Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addres
628Chapter 37Port TrunkingThis chapter contains the procedure for creating, modifying, or deleting a port trunk from a web browser management session.
AT-S62 User’s GuideSection VIII: Web Browser Management 629Creating a Port TrunkThis section contains the procedure for creating a port trunk on the s
AT-S62 User’s GuideSection I: Basic Operations 63The following prompt is displayed:BOOTP/DHCP (E-Enabled, D-Disabled):4. Type E to enable BOOTP and DH
Chapter 37: Port TrunkingSection VIII: Web Browser Management 630The Port Trunking tab is shown in Figure 210.Figure 210 Port Trunking TabThis tab li
AT-S62 User’s GuideSection VIII: Web Browser Management 631The Add New Trunk page is shown in Figure 211.Figure 211 Add New Trunk Page5. In the Trunk
Chapter 37: Port TrunkingSection VIII: Web Browser Management 632Modifying a Port TrunkThis section contains the procedure for modifying a port trunk
AT-S62 User’s GuideSection VIII: Web Browser Management 633An example of the Modify Trunk page is shown in Figure 212.Figure 212 Modify Trunk PageNot
Chapter 37: Port TrunkingSection VIII: Web Browser Management 634Deleting a Port TrunkCautionDisconnect the cables from the port trunk on the switch b
AT-S62 User’s GuideSection VIII: Web Browser Management 635Displaying the Port TrunksTo display the port trunks, do the following:1. From the Home pag
Chapter 37: Port TrunkingSection VIII: Web Browser Management 636❑ DI - Destination IP address (Layer 3)❑ SI/DI - Source/destination IP address (Layer
637Chapter 38Port MirroringThis chapter contains the procedure for creating or deleting a port mirror. Sections in the chapter include:❑ Creating a Po
Chapter 38: Port MirroringSection VIII: Web Browser Management 638Creating a Port MirrorTo create or delete a port mirror, perform the following proce
AT-S62 User’s GuideSection VIII: Web Browser Management 639Egress Port(s)This column lists the source ports whose egress traffic is mirrored to the de
Chapter 4: Basic Switch ParametersSection I: Basic Operations 64Rebooting a SwitchThis procedure reboots the switch.NoteAny configuration changes not
Chapter 38: Port MirroringSection VIII: Web Browser Management 640Figure 216 shows an example of the Modify Mirror page configured for a port mirror.
AT-S62 User’s GuideSection VIII: Web Browser Management 641Modifying or Disabling a Port MirrorTo modify a port mirror, you perform the same procedure
Chapter 38: Port MirroringSection VIII: Web Browser Management 642Deleting a Port MirrorTo delete a port mirror so that you can use the destination po
AT-S62 User’s GuideSection VIII: Web Browser Management 643Displaying the Port MirrorTo display the port mirror, do the following:1. From the Home pag
644Chapter 39File Downloads and UploadsThis chapter contains the procedure for downloading a new AT-S62 image file onto the switch from a web browser
AT-S62 User’s GuideSection VIII: Web Browser Management 645Downloading a FileThis procedure explains how to download a file from a TFTP server on your
Chapter 39: File Downloads and UploadsSection VIII: Web Browser Management 646switch typically does not have an IP address. Rather, you would need to
AT-S62 User’s GuideSection VIII: Web Browser Management 6475. In the TFTP Remote Filename field, enter the filename of the file on the TFTP server to
Chapter 39: File Downloads and UploadsSection VIII: Web Browser Management 648Uploading a FileThis procedure explains how to upload a file from the sw
AT-S62 User’s GuideSection VIII: Web Browser Management 649NoteThe top portion of the tab is used to return the switch to its factory default settings
AT-S62 User’s GuideSection I: Basic Operations 65Configuring the Manager and Operator PasswordsThere are two levels of management access on an AT-8524
650Chapter 40Event LogThis chapter describes the event log. Sections in the chapter include:❑ Enabling or Disabling the Event Log on page 651❑ Display
AT-S62 User’s GuideSection VIII: Web Browser Management 651Enabling or Disabling the Event LogAllied Telesyn recommends setting the switch’s date and
Chapter 40: Event LogSection VIII: Web Browser Management 6523. For Status in Log Settings, click either Disable or Enable. If you enable the log, the
AT-S62 User’s GuideSection VIII: Web Browser Management 653Displaying EventsTo view the event log, do the following:1. From the Home Page, click eithe
Chapter 40: Event LogSection VIII: Web Browser Management 654Figure 220 shows an example of the event log in the Full display mode. The Normal display
AT-S62 User’s GuideSection VIII: Web Browser Management 655Saving the Event LogYou can save the event log as a file in the file system, from where you
Chapter 40: Event LogSection VIII: Web Browser Management 656Clearing the Event LogTo clear all events from the log, perform the following procedure:1
657Chapter 41Quality of ServiceThis chapter contains instructions on how to configure Quality of Service (QoS). This chapter contains the following pr
Chapter 41: Quality of ServiceSection VIII: Web Browser Management 658Configuring CoSThis procedure explains how to change the egress queue used to ha
AT-S62 User’s GuideSection VIII: Web Browser Management 659The CoS Setting for Port page is shown in Figure 222.Figure 222 CoS Setting for Port Page5
Chapter 4: Basic Switch ParametersSection I: Basic Operations 66NoteA password can be from 0 to 16 alphanumeric characters. Passwords are case-sensiti
Chapter 41: Quality of ServiceSection VIII: Web Browser Management 660NoteThe tagged information in a frame is not changed as the frame traverses the
AT-S62 User’s GuideSection VIII: Web Browser Management 661Mapping CoS Priorities to Egress QueuesThis procedure explains how to change the default ma
Chapter 41: Quality of ServiceSection VIII: Web Browser Management 662NoteThe Configure Egress Weights section in the tab is explained in the next pro
AT-S62 User’s GuideSection VIII: Web Browser Management 663Configuring Egress SchedulingThis procedure explains how to select and configure a scheduli
Chapter 41: Quality of ServiceSection VIII: Web Browser Management 664Displaying the CoS SettingsTo display the CoS settings, do the following:1. From
AT-S62 User’s GuideSection VIII: Web Browser Management 665The page displays the following information:PortThe port number.VLAN IdThe VLAN of which th
Chapter 41: Quality of ServiceSection VIII: Web Browser Management 666Displaying QoS SchedulingTo display QoS scheduling, do the following:1. From the
667Chapter 42IGMP SnoopingThis chapter describes how to configure the IGMP snooping feature on the switch.Sections in the chapter include:❑ Configurin
Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 668Configuring IGMP SnoopingTo configure IGMP snooping from a web browser management ses
AT-S62 User’s GuideSection VIII: Web Browser Management 669host node stops sending reports and times-out. The switch forwards the leave request to the
AT-S62 User’s GuideSection I: Basic Operations 67Setting the System TimeThis procedure explains how to set the switch’s date and time. Setting the sys
Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 670This parameter is useful with networks that contain a large number of multicast group
AT-S62 User’s GuideSection VIII: Web Browser Management 671Displaying a List of Host Nodes and Multicast RoutersYou can use the AT-S62 software to dis
Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 672VLAN IDThe VID of the VLAN in which the port is an untagged member.Member PortThe por
673Chapter 43Denial of Service DefenseThis chapter contains instructions on how to configure the Denial of Service defense feature on the switch. The
Chapter 43: Denial of Service DefenseSection VIII: Web Browser Management 674Configuring Denial of Service Attack DefenseTo configure the ports on the
AT-S62 User’s GuideSection VIII: Web Browser Management 675b. In the DoS Subnet Mask field, enter the LAN’s mask. A binary “1” indicates the switch sh
Chapter 43: Denial of Service DefenseSection VIII: Web Browser Management 6768. Adjust the settings as needed. The parameters are described below.Stat
AT-S62 User’s GuideSection VIII: Web Browser Management 677Displaying the DoS SettingsTo display the DoS settings, do the following:1. From the Home p
678Chapter 44SNMPv3 ProtocolThis chapter provides the following procedures for configuring basic switch parameters using a web browser management sess
AT-S62 User’s GuideSection VIII: Web Browser Management 679Configuring the SNMPv3 ProtocolTo configure the SNMPv3 protocol, you need to configure the
Chapter 4: Basic Switch ParametersSection I: Basic Operations 68The Configure System Time menu is shown in Figure 11.Figure 11 Configure System Time
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 680Enabling the SNMP ProtocolIn order to allow an NMS (an SNMP manager) to access the
AT-S62 User’s GuideSection VIII: Web Browser Management 681The SNMP Tab is shown in Figure 232.Figure 232 Configuration System Page, SNMP Tab3. To e
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6825. Click Apply to update the User Table.6. To save your changes, return to the Gene
AT-S62 User’s GuideSection VIII: Web Browser Management 683Configuring the SNMPv3 User TableYou can create, delete, and modify an SNMPv3 User Table e
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6844. Click the Add button to add a new SNMPv3 User Table entry.The Add New SNMPv3 Use
AT-S62 User’s GuideSection VIII: Web Browser Management 6858. In the Confirm Authentication Password field, re-enter the authentication password.Note
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 68613. Click Apply to update the SNMPv3 User Table.14. To save your changes, return to
AT-S62 User’s GuideSection VIII: Web Browser Management 687The Modify SNMPv3 User Page is shown in Figure 235.Figure 235 Modify SNMPv3 User Page5. I
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6886. In the Authentication Password field, enter an authentication password of up to
AT-S62 User’s GuideSection VIII: Web Browser Management 689NoteThe Row Status parameter is a read-only field in the Web interface. The Active value i
AT-S62 User’s GuideSection I: Basic Operations 69NoteIf the switch is obtaining its IP address and subnet mask from a DHCP sever, you can configure th
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 690Configuring the SNMPv3 View TableYou can create, delete, and modify an SNMPv3 View
AT-S62 User’s GuideSection VIII: Web Browser Management 6914. To create a new SNMPv3 View Table entry click Add.The Add New SNMPv3 View Page is shown
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 692The View Subtree parameter defines a MIB View and the Subtree Mask further restrict
AT-S62 User’s GuideSection VIII: Web Browser Management 693Deleting a ViewTable EntryTo delete an entry in the SNMPv3 View Table, perform the followi
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 694Modifying aView TableEntryTo modify an entry in the SNMPv3 View Table, perform the
AT-S62 User’s GuideSection VIII: Web Browser Management 6956. In the View Type field, enter one of the following view types:IncludedEnter this value
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 696Configuring the SNMPv3 Access TableYou can create, delete, and modify an SNMPv3 Acc
AT-S62 User’s GuideSection VIII: Web Browser Management 697The SNMPv3 Access Table Page is shown in Figure 239.Figure 239 SNMPv3 Access Table Page4.
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6985. In the Group Name field, enter a descriptive name of the group.The Group Name ca
AT-S62 User’s GuideSection VIII: Web Browser Management 699v2cSelect this value to associate the Group Name with the SNMPv2c protocol.v3Select this v
AT-S62 User’s Guide7Configuring the SNMPv3 SecurityToGroup Table ...
Chapter 4: Basic Switch ParametersSection I: Basic Operations 70g. Type 6 - Poll Interval to specify the time interval between queries to the SNTP ser
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 700NonVolatileSelect this storage type if you want the ability to save an entry in the
AT-S62 User’s GuideSection VIII: Web Browser Management 701Modifying anAccess TableEntryTo modify an entry in the SNMPv3 Access Table, perform the fo
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 702This parameter allows the users assigned to this Group Name to view the information
AT-S62 User’s GuideSection VIII: Web Browser Management 703Configuring the SNMPv3 SecurityToGroup TableYou can create, delete, and modify an SNMPv3 S
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7044. To create an SNMPv3 SecurityToGroup Table entry, click Add.The Add New SNMPv3 Se
AT-S62 User’s GuideSection VIII: Web Browser Management 705There are four default values for this field that are reserved for SNMPv1 and SNMPv2c impl
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 706The SNMPv3 SecurityToGroup Table Page is shown in Figure 242 on page 703.4. Click t
AT-S62 User’s GuideSection VIII: Web Browser Management 7075. In the Group Name field, enter a Group Name that you configured in the SNMPv3 Access Ta
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 708Configuring the SNMPv3 Notify TableYou can create, delete, and modify an SNMPv3 Not
AT-S62 User’s GuideSection VIII: Web Browser Management 7094. To create an SNMPv3 Notify Table entry, click Add.The Add New SNMPv3 Notify Page is sho
AT-S62 User’s GuideSection I: Basic Operations 71Configuring the Console Startup ModeYou can configure the AT-S62 software to display either the Main
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 710NonVolatileSelect this storage type if you want the ability to save an entry in the
AT-S62 User’s GuideSection VIII: Web Browser Management 711Modifying aNotify TableEntryTo modify an entry in the SNMPv3 Notify Table, perform the fol
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7127. In the Storage Type field, select one of the following storage types for this ta
AT-S62 User’s GuideSection VIII: Web Browser Management 713Configuring the SNMPv3 Target Address TableYou can create, delete, and modify an SNMPv3 Ta
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 714The SNMPv3 Target Address Table Page is shown in Figure 248.Figure 248 SNMPv3 Targ
AT-S62 User’s GuideSection VIII: Web Browser Management 7155. In the Target Address Name field, enter the name of the SNMP manager, or host, that man
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 716NonVolatileSelect this storage type if you want the ability to save an entry in the
AT-S62 User’s GuideSection VIII: Web Browser Management 717ModifyingTarget AddressTable EntryTo modify an entry in the SNMPv3 Target Address Table, p
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7187. In the UDP Port Number field, enter a UDP port number.You can enter a UDP port i
AT-S62 User’s GuideSection VIII: Web Browser Management 71914. To save your changes, return to the General Tab and click Save Changes.
Chapter 4: Basic Switch ParametersSection I: Basic Operations 72Configuring the Console TimerThe AT-S62 management software uses the console timer, al
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 720Configuring the SNMPv3 Target Parameters TableYou can create, delete, and modify an
AT-S62 User’s GuideSection VIII: Web Browser Management 7214. To create an SNMPv3 Target Parameters Table entry, click Add.The Add New SNMPv3 Target
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7227. In the Security Model field, select one of the following SNMP protocols as the S
AT-S62 User’s GuideSection VIII: Web Browser Management 723This level provides the greatest level of security. You can select this value if you confi
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 724A warning message is displayed. Click OK to remove the Target Parameters Table entr
AT-S62 User’s GuideSection VIII: Web Browser Management 725NoteEnter a value for the Message Processing Model field only if you select SNMPv1 or SNMP
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 726NoteIf you have selected SNMPv1 or SNMPv2c as the Security Model, you must select N
AT-S62 User’s GuideSection VIII: Web Browser Management 727Configuring the SNMPv3 Community TableYou can create, delete, and modify an SNMPv3 Communi
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 728Figure 254 SNMPv3 Community Table Page4. To create an SNMPv3 Community Table entry
AT-S62 User’s GuideSection VIII: Web Browser Management 7295. In the Community Index field, enter a numerical value for this Community.This parameter
AT-S62 User’s GuideSection I: Basic Operations 73Enabling or Disabling the Telnet ServerThis procedure explains how to enable and disable the Telnet s
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 730making changes to an SNMPv3 Community Table entry with a NonVolatile storage type,
AT-S62 User’s GuideSection VIII: Web Browser Management 731Modifying anSNMPv3CommunityTable EntryTo modify an entry in the SNMPv3 Community Table, pe
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7326. In the Security Name field, enter a name of an SNMPv1 and SNMPv2c user.This name
AT-S62 User’s GuideSection VIII: Web Browser Management 733Displaying SNMPv3 TablesThis section contains procedures to display the SNMPv3 Tables. The
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 734Displaying UserTable EntriesTo display entries in the SNMPv3 User Table, perform th
AT-S62 User’s GuideSection VIII: Web Browser Management 735Displaying ViewTable EntriesTo display entries in the SNMPv3 View Table, perform the follo
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 736DisplayingAccess TableEntriesTo display entries in the SNMPv3 Access Table, perform
AT-S62 User’s GuideSection VIII: Web Browser Management 737DisplayingSecurityToGroupTable EntriesTo display entries in the SNMPv3 SecurityToGroup Tab
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 738DisplayingNotify TableEntriesTo display entries in the SNMPv3 Notify Table, perform
AT-S62 User’s GuideSection VIII: Web Browser Management 739DisplayingTarget AddressTable EntriesTo display entries in the SNMPv3 Target Address Table
Chapter 4: Basic Switch ParametersSection I: Basic Operations 74Setting the Baud Rate of the RS-232 Terminal PortThe default baud rate of the RS-232 T
Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 740DisplayingTargetParametersTable EntriesTo display entries in the SNMPv3 Target Para
AT-S62 User’s GuideSection VIII: Web Browser Management 741DisplayingSNMPv3CommunityTable EntriesTo display entries in the SNMPv3 Community Table, pe
742Chapter 45STP, RSTP, and MSTPThis chapter explains how to configure the STP, RSTP and MSTP parameters on an AT-8524M switch from a web browser mana
AT-S62 User’s GuideSection VIII: Web Browser Management 743Enabling or Disabling Spanning TreeTo enable or disable spanning tree on the switch, do the
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7447. Click Apply.8. If you activated STP, go to Configuring STP on page 745. If y
AT-S62 User’s GuideSection VIII: Web Browser Management 745Configuring STPCautionThe bridge provides default STP parameters that are adequate for most
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7462. Adjust the STP bridge settings as needed. The parameters are described below
AT-S62 User’s GuideSection VIII: Web Browser Management 747Bridge IdentifierThe MAC address of the bridge. The bridge identifier is used as a tie brea
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 748Configuring RSTPCautionThe bridge provides default RSTP parameters that are ade
AT-S62 User’s GuideSection VIII: Web Browser Management 7492. Adjust the parameters are desired. The parameters are defined below.1 - Force VersionThi
AT-S62 User’s GuideSection I: Basic Operations 75Pinging a Remote SystemYou can instruct the switch to ping a remote device on your network. This proc
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7506 - Bridge IdentifierThe MAC address of the bridge. The bridge identifier is us
AT-S62 User’s GuideSection VIII: Web Browser Management 7514 - Edge PortThis parameter defines whether the port is functioning as an edge port. For an
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 752Configuring MSTPThis section is divided into the following procedures:❑ Configu
AT-S62 User’s GuideSection VIII: Web Browser Management 753The MSTP Spanning Tree tab is shown in Figure 270.Figure 270 MSTP Spanning Tree TabNoteThi
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7545. Adjust the bridge MSTP settings as needed. The parameters are described belo
AT-S62 User’s GuideSection VIII: Web Browser Management 755❑ MaxAge must be less than (2 x (ForwardingDelay - 1))Bridge Max HopsMSTP regions use this
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7562. To create or delete an MSTI ID and to associate VLANs to MSTIs, do the follo
AT-S62 User’s GuideSection VIII: Web Browser Management 757The Modify MSTI window is shown in Figure 272.Figure 272 Modify MSTI Windowc. In the Prior
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 758ConfiguringMSTP PortParametersTo configure MSTP port parameters, perform the fo
AT-S62 User’s GuideSection VIII: Web Browser Management 759Point-to-PointThis parameter defines whether the port is functioning as a point-to-point po
Chapter 4: Basic Switch ParametersSection I: Basic Operations 76Returning the AT-S62 Software to the Factory Default ValuesThe procedure in this secti
Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 760Displaying Spanning Tree SettingsTo display the parameter settings for the acti
761Chapter 46Virtual LANsThis chapter explains how to create, modify, and delete port-based and tagged VLANs from a web browser management session. Th
Chapter 46: Virtual LANsSection VIII: Web Browser Management 762Creating a New Port-Based or Tagged VLANTo create a new port-based or tagged VLAN, per
AT-S62 User’s GuideSection VIII: Web Browser Management 763The VLAN Mode and Uplink Port options are explained in Selecting a VLAN Mode on page 771. T
Chapter 46: Virtual LANsSection VIII: Web Browser Management 764If this VLAN will be unique in your network, then its VID should also be unique. If th
AT-S62 User’s GuideSection VIII: Web Browser Management 7658. Click Apply.NoteAny untagged ports that you assign to the new VLAN are automatically rem
Chapter 46: Virtual LANsSection VIII: Web Browser Management 766Modifying a Port-Based or Tagged VLANThis procedure explains how to add or remove port
AT-S62 User’s GuideSection VIII: Web Browser Management 7677. After making the necessary changes, click Apply. NoteUntagged ports that are added to a
Chapter 46: Virtual LANsSection VIII: Web Browser Management 768Deleting a Port-Based or Tagged VLANTo delete a port-based or tagged VLAN from the swi
AT-S62 User’s GuideSection VIII: Web Browser Management 769Displaying VLANsTo display the current VLANs on a switch, perform the following procedure:1
AT-S62 User’s GuideSection I: Basic Operations 77The following prompt is displayed:This operation requires a switch reboot. Continue? [Yes/No] ->4.
Chapter 46: Virtual LANsSection VIII: Web Browser Management 770Uplink PortThis column is applicable only when the switch is operating in one of the t
AT-S62 User’s GuideSection VIII: Web Browser Management 771Selecting a VLAN ModeThe AT-S62 management software features three VLAN modes:❑ Port-based
Chapter 46: Virtual LANsSection VIII: Web Browser Management 7726. Click Apply.The new mode is automatically activated on the switch. 7. To permanentl
AT-S62 User’s GuideSection VIII: Web Browser Management 773Specifying a Management VLANThe management VLAN is the VLAN through which an AT-8524M switc
Chapter 46: Virtual LANsSection VIII: Web Browser Management 774Now let’s assume that you decide to create a VLAN called NMS with a VID of 24 for the
775Chapter 47GARP VLAN Registration ProtocolThis chapter about web server security contains the following procedures:❑ Configuring GVRP on page 776❑ E
Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 776Configuring GVRPTo configure the GVRP parameters, perform the follo
AT-S62 User’s GuideSection VIII: Web Browser Management 777Join TimeSets the duration of the Join Period timer. The range is from 10 to 60 centisecon
Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 778Enabling or Disabling GVRP on a PortThis procedure enables and disa
AT-S62 User’s GuideSection VIII: Web Browser Management 7798. To permanently save the change, use the Save Changes button in the General tab. For dir
Chapter 4: Basic Switch ParametersSection I: Basic Operations 78Viewing System Hardware and Software InformationThe procedure in this section displays
Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 780Displaying the GVRP SettingsUse this procedure to view the GVRP set
AT-S62 User’s GuideSection VIII: Web Browser Management 781View GVRP State Machine for VLANRefer to Table 23 on page 443 for descriptions of the stat
782Chapter 48MAC Address SecurityThis chapter explains how to display the MAC address security levels on the ports on the switch. It contains the foll
AT-S62 User’s GuideSection VIII: Web Browser Management 783Displaying MAC Address Security LevelsTo display the MAC address security level of a port,
Chapter 48: MAC Address SecuritySection VIII: Web Browser Management 784This page is for viewing purposes only. The columns in the page are defined be
785Chapter 49802.1x Port-based Access ControlThis chapter contains instructions on how to configure the 802.1x port-based access control feature on th
Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 786Enabling and Disabling Port-based Access ControlThis procedure exp
AT-S62 User’s GuideSection VIII: Web Browser Management 7873. To enable or disable the feature, do the following:a. Click the Enable Port Access check
Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 788Setting Port RolesTo set port roles for port-based access control,
AT-S62 User’s GuideSection VIII: Web Browser Management 7897. To configure authenticator port settings, go to Configuring Authenticator Port Parameter
AT-S62 User’s GuideSection I: Basic Operations 79The System Hardware Information menu is shown in Figure 14.Figure 14 System Hardware Information Men
Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 790Configuring Authenticator Port ParametersTo configure authenticato
AT-S62 User’s GuideSection VIII: Web Browser Management 791authentication of the client. This is the default setting❑ Force-unauthorized: Causes the p
Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 7924. Click Apply.5. To permanently save the changes, use the Save Ch
AT-S62 User’s GuideSection VIII: Web Browser Management 793Configuring Supplicant Port ParametersTo configure supplicant port parameters, perform the
Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 794Held PeriodSpecifies the amount of time in seconds the supplicant
AT-S62 User’s GuideSection VIII: Web Browser Management 795Displaying the Port-based Access Control SettingsTo display the port-based access control s
Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 796A port status page is displayed, as shown in Figure 288.Figure 288
797Chapter 50Secure Shell ProtocolThis chapter contains the procedure for configuring the SSH protocol settings. Sections in this chapter include:❑ Co
Chapter 50: Secure Shell ProtocolSection VIII: Web Browser Management 798Configuring the SSH ServerThis section describes how to configure the SSH ser
AT-S62 User’s GuideSection VIII: Web Browser Management 7994. Configure the parameters as needed. The parameters are described below: StatusEnables an
Table of Contents8Summary of Guidelines ...
Chapter 4: Basic Switch ParametersSection I: Basic Operations 80Setting the Switch’s Temperature ThresholdYou can set a temperature threshold on the s
Chapter 50: Secure Shell ProtocolSection VIII: Web Browser Management 800Displaying SSH InformationTo display SSH information, do the following:1. Fro
AT-S62 User’s GuideSection VIII: Web Browser Management 801❑ Server Key ID: Indicates the server key ID defined for SSH.❑ Server Key Bits: Indicates t
802Chapter 51Encryption Keys, PKI, and SSLThis chapter explains how to view the encryption keys, PKI certificates, and SSL settings and includes the f
AT-S62 User’s GuideSection VIII: Web Browser Management 803Displaying Encryption KeysTo display the SSL and SSH encryption key pairs, do the following
Chapter 51: Encryption Keys, SSL, and PKISection VIII: Web Browser Management 804Displaying PKI Settings and CertificatesTo display the self-signed an
AT-S62 User’s GuideSection VIII: Web Browser Management 805MTrust (Manually Trusted)The certificate has been manually verified that it is from a trust
Chapter 51: Encryption Keys, SSL, and PKISection VIII: Web Browser Management 806SubjectThe Subject distinguished name.IssuerThe certificate issuer’s
AT-S62 User’s GuideSection VIII: Web Browser Management 807Displaying the SSL SettingsTo display the SSL settings, perform the following procedure:1.
808Chapter 52RADIUS and TACACS+ Authentication ProtocolsThis chapter contains instructions on how to configure the authentication protocols. This chap
AT-S62 User’s GuideSection VIII: Web Browser Management 809Configuring RADIUS and TACACS+To configure the authentication protocols, perform the follow
81Chapter 5SNMPv1 and SNMPv2c ConfigurationThis chapter explains how to activate SNMP management on the switch and how to create, modify, and delete S
Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 8104. Click Apply.NoteTo configure TACACS+, go to Step 6.
AT-S62 User’s GuideSection VIII: Web Browser Management 811IP Address and Encryption KeyUse these fields to specify the IP addresses and encryption se
Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 812Global Server TimeoutThis parameter specifies the maxim
AT-S62 User’s GuideSection VIII: Web Browser Management 813Displaying the RADIUS or TACSACS+ SettingsTo display the RADIUS or TACACS+ settings on the
Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 814The TACACS+ (Figure 300) or RADIUS (Figure 301) client
815Chapter 53Management Access Control ListThis chapter explains how to create a Management Access Control List (ACL). You can use the ACL to restrict
Chapter 53: Management Access Control ListSection VIII: Web Browser Management 816Creating a Management ACLTo create a Management ACL, perform the fol
AT-S62 User’s GuideSection VIII: Web Browser Management 817been permitted remote management access to the switch. If you enter a subnet. then any mana
Chapter 53: Management Access Control ListSection VIII: Web Browser Management 818Adding or Deleting an ACEYou can add or delete ACEs from the managem
AT-S62 User’s GuideSection VIII: Web Browser Management 819Displaying the Management ACLTo display the ACEs in the Management ACL, do the following:1.
Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 82SNMPv1 and SNMPv2c OverviewThe Simple Network Management Program (SNMP) is
820Appendix AAT-S62 Default SettingsThis appendix lists the AT-S62 factory default settings. It contains the following sections:❑ Basic Switch Default
AT-S62 User’s Guide821Basic Switch Default SettingsThis section lists the default settings for basic switch parameters. The following topics are cover
Appendix A: AT-S62 Default Settings822NoteLogin names and passwords are case-sensitive.RS-232 PortDefault SettingsThe following table lists the RS-232
AT-S62 User’s Guide823SwitchAdministrationDefault SettingsThe following table describes the switch administration default settings.SystemSoftwareDefau
Appendix A: AT-S62 Default Settings824Enhanced Stacking Default SettingThe following table lists the enhanced stacking default setting.Enhanced Stacki
AT-S62 User’s Guide825SNMP Default SettingsThe following table describes the SNMPv1 and SNMPv2c default settings.SNMP Communities Setting DefaultSNMP
Appendix A: AT-S62 Default Settings826Port Configuration Default SettingsThe following table lists the port configuration default settings.Port Config
AT-S62 User’s Guide827Event Log Default SettingsThe following table lists the event log default settings.Event Log Setting DefaultStatus EnabledFull L
Appendix A: AT-S62 Default Settings828Quality of ServiceThe following table lists the default mappings of IEEE 802.1p priority levels to egress port p
AT-S62 User’s Guide829IGMP Snooping Default SettingsThe following table lists the IGMP Snooping default settings.IGMP Snooping Setting DefaultIGMP Sno
AT-S62 User’s GuideSection I: Basic Operations 83Community String NameYou must give the community string a name. The name can be from one to eight alp
Appendix A: AT-S62 Default Settings830Denial of Service Prevention Default SettingsThe following table lists the default settings for the Denial of Se
AT-S62 User’s Guide831STP, RSTP, and MSTP Default SettingsThis section provides the spanning tree, STP RSTP, and MSTP, default settings.Spanning TreeS
Appendix A: AT-S62 Default Settings832MSTP DefaultSettingsThe following table lists the MSTP default settings.Port Priority 128RSTP Setting DefaultMST
AT-S62 User’s Guide833VLAN Default SettingsThis section provides VLAN default settings.VLAN Setting DefaultDefault VLAN Name Default_VLAN (all ports)M
Appendix A: AT-S62 Default Settings834GVRP Default SettingsThis section provides the default settings for GVRP.GVRP Setting DefaultStatus DisabledGIP
AT-S62 User’s Guide835MAC Address Security Default SettingsThe following table lists the MAC address security default settings.MAC Address Security Se
Appendix A: AT-S62 Default Settings836802.1x Port-Based Network Access Control Default SettingsThe following table describes the 802.1x Port Access Co
AT-S62 User’s Guide837Web Server Default SettingsThe following table lists the web server default settings.Web Server Configuration Setting DefaultSta
Appendix A: AT-S62 Default Settings838SSL Default SettingsThe following table lists the SSL default settings.SSL Setting DefaultMaximum Number of Sess
AT-S62 User’s Guide839PKI Default SettingsThe following table lists the PKI default settings, including the generate enrollment request settings.PKI S
Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 84Each community string can have up to eight trap IP addresses.It does not m
Appendix A: AT-S62 Default Settings840SSH Default SettingsThe following table lists the SSH default settings.SSH Setting DefaultStatus DisabledHost Ke
AT-S62 User’s Guide841Server-Based Authentication Default SettingsThis section describes the server-based authentication, RADIUS, and TACACS+ client d
Appendix A: AT-S62 Default Settings842Management Access Control List Default SettingThe following table lists the default setting for the Management A
843Appendix BSNMPv3 Configuration ExamplesThis appendix provides two examples of SNMPv3 configuration using the SNMPv3 Table menus and a worksheet to
Appendix B: SNMPv3 Configuration Examples844SNMPv3 Configuration ExamplesThis appendix provides SNMPv3 configuration examples for the following types
AT-S62 User’s Guide845Configure SNMPv3 SecurityToGroup TableUser Name:systemadmin24Security Model:v3Group Name: ManagersStorage Type: NonVolatileConfi
Appendix B: SNMPv3 Configuration Examples846Configure SNMPv3 View Table Menu View Name: internetView Subtree OID: 1.3.6.1 (or internet)Subtree Mask: V
AT-S62 User’s Guide847SNMPv3 Access Table MenuGroup NameSecurity ModelSecurity LevelRead View NameWrite View NameNotify View NameStorage TypeSNMPv3 Se
Appendix B: SNMPv3 Configuration Examples848Storage TypeSNMPv3 Target Parameters TableTarget Parameters NameUser (Security) NameSecurity ModelSecurity
849IndexNumerics802.1x port-based network access controlaccess role, configuring 474, 788authentication process 465authenticator portconfiguring 476,
AT-S62 User’s GuideSection I: Basic Operations 85Enabling or Disabling SNMP ManagementTo enable or disable SNMP management for the switch, perform the
Index850auto-negotiationconfiguring 100, 611, 612forced 105status 96Bback pressureconfiguring 104, 614default setting 826boot configuration fileconfig
AT-S62 User’s Guide851database storage 522deleting 531, 533described 519displaying 534modifying 531, 533validating 521certificates, SSLauthentication
Index852EECB. See Electronic Code Book (ECB)edge portdefault setting 831described 336Multiple Spanning Tree Protocol (MSTP) 382Rapid Spanning Tree Pro
AT-S62 User’s Guide853Generic Attribute Registration Protocol (GARP)Applicant state machine 428defined 426diagram 427overview 426Registrar state machi
Index854IP Options attack 217Kkey exchange algorithms 498key pair ID, configuring 538LLand attack 214limited port security mode, described 455link sta
AT-S62 User’s Guide855MSTI association to a VLANcreating 378removing 379MSTI priority, defined 361MSTI. See Multiple Spanning Tree Instance (MSTI)mul
Index856PEM certificate format 538Ping of Death attack 216pinging 75, 595PKI certificatesadding to database 528certificate database 522chains 521creat
AT-S62 User’s Guide857port speedconfiguring 96, 611default setting 826port state, displaying, Rapid Spanning Tree Protocol (RSTP) 351port statistics,
Index858MCHECK 382parameters, displaying 760point-to-point port, configuring 350, 750port configuration, displaying 351port cost 350, 750port paramete
AT-S62 User’s Guide859SNMPdefault setting for remote management 821default settings 825SNMP communityconfiguring 680enabling 680SNMP community stringa
Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 86Setting the Authentication Failure TrapAs mentioned in the SNMP Overview s
Index860modifyingstorage type 294target address retries 291target address tag list 292target address timeout 290target address UDP port 289target IP a
AT-S62 User’s Guide861displaying 112, 622STP ID parameter 442strict priority scheduling 194subnet mask 61, 588configuring 61, 588default setting 823Su
Index862setting 69Vversions supported (SSH) parameter 550, 800VID. See VLAN IDview type, modifying 250virtual LAN (VLAN)creating 400, 404, 762default
AT-S62 User’s GuideSection I: Basic Operations 87Creating an SNMP Community StringTo create a new SNMP community string, perform the following procedu
Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 885. Enter the new SNMP community string. The name can be from one to fiftee
AT-S62 User’s GuideSection I: Basic Operations 89Modifying a Community StringTo modify a community string, perform the following procedure:1. From the
AT-S62 User’s Guide9Chapter 22Multiple VLAN Modes ...
Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 90The menu options are described below:1 - Add Attributes to CommunityIf a c
AT-S62 User’s GuideSection I: Basic Operations 913. If you want to remove the IP address of a management workstation from the community string, enter
Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 92Do you want to change Community Status? (Y/N): [Yes/No] ->4. Type Y to
AT-S62 User’s GuideSection I: Basic Operations 93Displaying the SNMP Community StringsTo display the attributes of all the SNMP community strings on t
94Chapter 6Port ParametersThe chapter contains the procedures for viewing and adjusting the parameter settings for the individual ports on a switch. T
AT-S62 User’s GuideSection I: Basic Operations 95Displaying Port StatusTo display the current status and settings of the ports on the switch, perform
Chapter 6: Port ParametersSection I: Basic Operations 96NoteThe speed, duplex mode, and flow control settings will be blank for ports that have not es
AT-S62 User’s GuideSection I: Basic Operations 97Flow CtlThe flow control setting for the port. Possible values are:Disabled - No flow control on the
Chapter 6: Port ParametersSection I: Basic Operations 98Configuring Port ParametersTo configure the parameter settings of a port, perform the followin
AT-S62 User’s GuideSection I: Basic Operations 99If you are configuring multiple ports and the ports have different settings, the Port Configuration m
Comments to this Manuals