Allied-telesis AT-S62 User Manual

Browse online or download User Manual for Computer hardware Allied-telesis AT-S62. Allied Telesis AT-S62 User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 862
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Management
Software
AT-S62
User’s Guide
AT-8524M LAYER 2+
FAST ETHERNET SWITCH
VERSION 1.1.1
®
PN 613-50485-00 Rev C
Page view 0
1 2 3 4 5 6 ... 861 862

Summary of Contents

Page 1 - User’s Guide

Management SoftwareAT-S62◆User’s GuideAT-8524M LAYER 2+ FAST ETHERNET SWITCHVERSION 1.1.1®PN 613-50485-00 Rev C

Page 2

Table of Contents10Data Authentication ...

Page 3

Chapter 6: Port ParametersSection I: Basic Operations 100The problem with broadcast frames is that too many of them traversing a network can impact ne

Page 4

AT-S62 User’s GuideSection I: Basic Operations 101If you select Auto for Auto-Negotiation, which is the default setting, the switch will set both spee

Page 5 - Section II

Chapter 6: Port ParametersSection I: Basic Operations 102The possible settings for the duplex mode are Full-duplex and Half-duplex.7 - HOL Blocking Pr

Page 6 - Section III

AT-S62 User’s GuideSection I: Basic Operations 103The HOL Limit parameter can help prevent this problem from occurring. This parameter sets a threshol

Page 7 - Section IV

Chapter 6: Port ParametersSection I: Basic Operations 104The options in the Flow Control menu are described below:1 - Flow ControlDisabled - No flow c

Page 8 - Section V

AT-S62 User’s GuideSection I: Basic Operations 105Selecting this option displays the Back Pressure menu shown in Figure 26.Figure 26 Back Pressure Me

Page 9 - Section VII

Chapter 6: Port ParametersSection I: Basic Operations 106X - Reset PortResets the speed and duplex mode of the selected port to the default value of A

Page 10 - Table of Contents

AT-S62 User’s GuideSection I: Basic Operations 107Setting the Rate LimitThis feature allows you to set the maximum number of ingress packets the switc

Page 11 - Section VIII

Chapter 6: Port ParametersSection I: Basic Operations 108The Rate Limiting menu is shown in Figure 27.Figure 27 Rate Limiting Menu5. Type 4 to select

Page 12

109Chapter 7MAC Address TableThe chapter contains the procedures for viewing the static and dynamic MAC address table.This chapter contains the follow

Page 13

AT-S62 User’s Guide11Chapter 30Management Access Control List ...

Page 14

Chapter 7: MAC Address TableSection I: Basic Operations 110MAC Address OverviewEvery hardware device that you connect to your Ethernet network has a u

Page 15

AT-S62 User’s GuideSection I: Basic Operations 111The type of MAC address described above is referred to as a dynamic MAC address. Dynamic MAC address

Page 16 - List of Figures

Chapter 7: MAC Address TableSection I: Basic Operations 112Displaying MAC AddressesThe management software has two menu selections for displaying the

Page 17

AT-S62 User’s GuideSection I: Basic Operations 1133. Select the desired option. The options are explained below:1 - Display AllThis selection displays

Page 18

Chapter 7: MAC Address TableSection I: Basic Operations 114An example of a multicast MAC address table is shown in Figure 31.Figure 31 Display All Me

Page 19

AT-S62 User’s GuideSection I: Basic Operations 1155 - Display Specified MACDisplays the port number on which a MAC address was assigned or learned.In

Page 20

Chapter 7: MAC Address TableSection I: Basic Operations 116Adding Static Unicast and Multicast MAC AddressesThis section contains the procedure for ad

Page 21

AT-S62 User’s GuideSection I: Basic Operations 117to the port where the multicast application is located will result in the failure of the multicast p

Page 22

Chapter 7: MAC Address TableSection I: Basic Operations 118Deleting Unicast and Multicast MAC AddressesTo delete a dynamic or static unicast or multic

Page 23

AT-S62 User’s GuideSection I: Basic Operations 119Deleting All Dynamic MAC AddressesTo delete all dynamic unicast and multicast MAC address from the M

Page 24

Table of Contents12Chapter 37Port Trunking ...

Page 25 - How This Guide is Organized

Chapter 7: MAC Address TableSection I: Basic Operations 120Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addres

Page 26

121Chapter 8Port TrunkingThis chapter contains the procedures for creating, modifying, and deleting port trunks. Sections in the chapter include:❑ Por

Page 27 - Document Conventions

Chapter 8: Port TrunkingSection I: Basic Operations 122Port Trunking OverviewA port trunk is an economical way for you to increase the bandwidth betwe

Page 28

AT-S62 User’s GuideSection I: Basic Operations 123❑ When cabling a trunk, the order of the connections should be maintained on both nodes. The lowest

Page 29 - Contacting Allied Telesyn

Chapter 8: Port TrunkingSection I: Basic Operations 124❑ Source IP Address (Layer 3)❑ Destination IP Address (Layer 3)❑ Source IP Address / Destinatio

Page 30 - Management Software Updates

AT-S62 User’s GuideSection I: Basic Operations 125Figure 34 Load Distribution MethodNow assume that you configured the port trunk on Switch #1 with t

Page 31 - Overview

Chapter 8: Port TrunkingSection I: Basic Operations 126For example, when Workstation B sends a packet to the server, Switch #1 uses Port 15 of the tru

Page 32 - Management Overview

AT-S62 User’s GuideSection I: Basic Operations 127When another node sends a packet over the trunk, its address is assigned to the next lowest port in

Page 33

Chapter 8: Port TrunkingSection I: Basic Operations 128Even though there is only one source, all the data links in the trunk are used. For instance, i

Page 34 - Local Management Session

AT-S62 User’s GuideSection I: Basic Operations 129Creating a Port TrunkThis section contains the procedure for creating a port trunk on the switch. Be

Page 35 - Telnet Management Session

AT-S62 User’s Guide13Configuring the SNMPv3 Access Table ...

Page 36 - Chapter 1: Overview

Chapter 8: Port TrunkingSection I: Basic Operations 130The Port Trunking menu is shown in Figure 35.Figure 35 Port Trunking MenuThis menu lists any t

Page 37 - SNMP Management Session

AT-S62 User’s GuideSection I: Basic Operations 1316. To set the load distribution method, type 3 to toggle the selection through the following possibl

Page 38 - Management Access Levels

Chapter 8: Port TrunkingSection I: Basic Operations 132Modifying a Port TrunkThis section contains the procedure for modifying a port trunk on the swi

Page 39 - Basic Operations

AT-S62 User’s GuideSection I: Basic Operations 133The Modify Trunk menu is displayed. The menu displays the operating specifications of the selected t

Page 40 - Management Session

Chapter 8: Port TrunkingSection I: Basic Operations 1347. To change the ports of a trunk, type 4 to select Trunk Ports and, when prompted, enter the n

Page 41

AT-S62 User’s GuideSection I: Basic Operations 135Deleting a Port TrunkCautionDisconnect the cables from the port trunk on the switch before performin

Page 42 - Starting a Local

136Chapter 9Port MirroringThis chapter contains the procedures for creating and deleting a port mirror. Sections in the chapter include:❑ Port Mirrori

Page 43

AT-S62 User’s GuideSection I: Basic Operations 137Port Mirroring OverviewThe port mirroring feature allows you to unobtrusively monitor the traffic be

Page 44 - Quitting a Local

Chapter 9: Port MirroringSection I: Basic Operations 138Creating a Port MirrorTo create a port mirror, perform the following procedure:1. From the Mai

Page 45

AT-S62 User’s GuideSection I: Basic Operations 1395. Type 2 to select Mirror-To Port and, when prompted, enter the number of the port to function as t

Page 46 - Quitting a

Table of Contents14Chapter 47GARP VLAN Registration Protocol ...

Page 47 - Saving Your Parameter Changes

Chapter 9: Port MirroringSection I: Basic Operations 140Deleting a Port MirrorTo delete a port mirror, perform the following procedure:1. From the Mai

Page 48 - Enhanced Stacking

141Chapter 10Ethernet StatisticsThis chapter contains the procedures for displaying data traffic statistics. The chapter contains the following sectio

Page 49 - Enhanced Stacking Overview

Chapter 10: Ethernet StatisticsSection I: Basic Operations 142Displaying Port StatisticsTo display Ethernet port statistics, perform the following pro

Page 50 - Chapter 3: Enhanced Stacking

AT-S62 User’s GuideSection I: Basic Operations 143Multicast Frames ReceivedNumber of multicast frames received on the port.Multicast Frames SentNumber

Page 51 - IP Address

Chapter 10: Ethernet StatisticsSection I: Basic Operations 144Clearing Port CountersTo return the statistics counters of a port to zero, perform the f

Page 52

145Section IIAdvanced OperationsThe chapters in this section explain how to manage an AT-8524M switch from a local or Telnet management session. The c

Page 53

146Chapter 11File SystemThis chapter describes the AT-S62 file system, and how you can use the file system to copy, rename, and delete system files. T

Page 54

AT-S62 User’s GuideSection II: Advanced Operations 147File System OverviewThe AT-S62 management software has a file system for storing system files. Y

Page 55 - Returning to

Chapter 11: File SystemSection II: Advanced Operations 148File NamingConventionsThe file system is a flat file system which means directories are not

Page 56 - Basic Switch Parameters

AT-S62 User’s GuideSection II: Advanced Operations 149Working with Boot Configuration FilesA boot configuration file contains a series of commands tha

Page 57

AT-S62 User’s Guide15Denial of Service Prevention Default Settings ...

Page 58 - Address?

Chapter 11: File SystemSection II: Advanced Operations 150Phase 1: Creating a Configuration FileBefore you begin to configure the switch with the para

Page 59

AT-S62 User’s GuideSection II: Advanced Operations 151The following prompt is displayed:Enter the file name (or None):5. Enter a file name for the new

Page 60

Chapter 11: File SystemSection II: Advanced Operations 152NoteOnly the active boot configuration file is changed when you select the Save Configuratio

Page 61

AT-S62 User’s GuideSection II: Advanced Operations 153The following prompt is displayed:Enter the file name:5. Enter the file name of the configuratio

Page 62

Chapter 11: File SystemSection II: Advanced Operations 154The contents of the configuration file are displayed in the View File menu. An example is sh

Page 63

AT-S62 User’s GuideSection II: Advanced Operations 155Here are several guidelines for editing a boot configuration file:❑ The text editor must be able

Page 64

Chapter 11: File SystemSection II: Advanced Operations 156Copying, Renaming, and Deleting System FilesUse this procedure to copy, rename, and delete s

Page 65

AT-S62 User’s GuideSection II: Advanced Operations 1575. To rename a system file, do the following:a. From the File Operations menu, type 5 to select

Page 66

Chapter 11: File SystemSection II: Advanced Operations 158Displaying System FilesUse this procedure to display a list of the system files currently st

Page 67 - Setting the System Time

AT-S62 User’s GuideSection II: Advanced Operations 159The List Files menu is displayed. An example of the menu is shown in Figure 43.Figure 43 List F

Page 68

16List of FiguresChapter 1Overview ...

Page 69 - D - Disabled) ->

160Chapter 12File Downloads and UploadsThis chapter contains procedures for downloading a new AT-S62 image file onto the switch. This chapter also con

Page 70 - -> 600

AT-S62 User’s GuideSection II: Advanced Operations 161Downloading the AT-S62 Image File onto a SwitchThis section contains two procedures for download

Page 71

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 162of an enhanced stack. You cannot use TFTP on a slave switch, since that type

Page 72 - Configuring the Console Timer

AT-S62 User’s GuideSection II: Advanced Operations 163NoteOptions 3 and 4 are described in Uploading a System File on page 177.5. Type 1 to select Dow

Page 73

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 164The following prompt is displayed:You are going to invoke the Xmodem download

Page 74

AT-S62 User’s GuideSection II: Advanced Operations 16511. Click the Browse button and specify the location and file to be downloaded onto the switch.1

Page 75

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 1663. From the System Administration menu, type 9 to select System Utilities.The

Page 76

AT-S62 User’s GuideSection II: Advanced Operations 167Downloading an AT-S62 Image File Switch to SwitchThe previous section contained the procedure fo

Page 77

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 168NoteYou cannot download AT-S62 software onto any other type of enhanced stack

Page 78

AT-S62 User’s GuideSection II: Advanced Operations 169Downloading an AT-S62 Configuration File Switch to SwitchThis procedure downloads a boot configu

Page 79

AT-S62 User’s Guide17Figure 24: Head of Line Blocking ...

Page 80 - ° to 90° Celsius

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 170After you enter a name, the following prompt is displayed:Enter the list of s

Page 81

AT-S62 User’s GuideSection II: Advanced Operations 171Downloading a System FileThis section contains the procedures for downloading a system file into

Page 82 - SNMPv1 and SNMPv2c Overview

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 172server software and the file to be downloaded must be stored on the server.❑

Page 83

AT-S62 User’s GuideSection II: Advanced Operations 173c. Enter the directory path and file name of the system file on the TFTP server to be downloaded

Page 84 - Default SNMP

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 17411. From the HyperTerminal main window, select the Transfer menu. Then select

Page 85

AT-S62 User’s GuideSection II: Advanced Operations 175The software immediately begins to download onto the switch. The Xmodem File Send window in Figu

Page 86

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 176NoteOptions 3 and 4 in the menu are described in Uploading a System File on p

Page 87

AT-S62 User’s GuideSection II: Advanced Operations 177Uploading a System FileThe procedures in this section are used to upload a system file from a sw

Page 88 - Enter Trap Receiver IP Addr:

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 178need to perform the upload from a local management session of the switch usin

Page 89

AT-S62 User’s GuideSection II: Advanced Operations 179d. Enter the name of the system file on the switch that you want to upload to the TFTP server. Y

Page 90 - Enter SNMP Community Name:

List of Figures18Figure 60: Show Port CoS Priorities Menu ...

Page 91

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 18011. From the HyperTerminal main window, select the Transfer menu. Then select

Page 92

AT-S62 User’s GuideSection II: Advanced Operations 181The System Utilities menu is shown in Figure 9 on page 64.4. For the System Utilities menu, type

Page 93

182Chapter 13Event LogThis chapter describes the event log. Sections in the chapter include:❑ Event Log Overview on page 183❑ Enabling or Disabling th

Page 94

AT-S62 User’s GuideSection II: Advanced Operations 183Event Log OverviewA managed switch is a complex piece of computer equipment that includes both h

Page 95 - Displaying Port Status

Chapter 13: Event LogSection II: Advanced Operations 184Enabling or Disabling the Event LogTo enable or disable the event log, do the following:1. Fro

Page 96

AT-S62 User’s GuideSection II: Advanced Operations 185Displaying EventsTo view the event log, do the following:1. From the Main Menu, type 5 to select

Page 97 - Flow Ctl

Chapter 13: Event LogSection II: Advanced Operations 186Figure 54 shows an example of the event log in the Full display mode. The Normal display mode

Page 98

AT-S62 User’s GuideSection II: Advanced Operations 187❑ Date/Time - The date and time the event occurred.❑ Event - The module within the AT-S62 softwa

Page 99

Chapter 13: Event LogSection II: Advanced Operations 188PKI Public Key InfrastructurePMIRR Port mirroringPSEC Port security (MAC address-based)PTRUNK

Page 100 - Chapter 6: Port Parameters

AT-S62 User’s GuideSection II: Advanced Operations 189Saving the Event LogThe Event Log menu has the selection “S - Save Log to File” for saving the c

Page 101 - 6 - Duplex ... Full

AT-S62 User’s Guide19Figure 106: RSTP Menu ...

Page 102

Chapter 13: Event LogSection II: Advanced Operations 190Clearing the Event LogTo clear all events from the log, perform the following procedure:1. Fro

Page 103 - AT-S62 User’s Guide

191Chapter 14Quality of ServiceThis chapter contains the procedures for configuring Quality of Service (QoS). Sections in the chapter include:❑ Qualit

Page 104

Chapter 14: Quality of ServiceSection II: Advanced Operations 192Quality of Service OverviewWhen a port on an Ethernet switch becomes oversubscribed—i

Page 105

AT-S62 User’s GuideSection II: Advanced Operations 193Each switch port has four egress queues. The queues are Q0, Q1, Q2, and Q3. Q0 is the lowest pri

Page 106

Chapter 14: Quality of ServiceSection II: Advanced Operations 194You can configure a port to completely ignore the priority levels in its tagged packe

Page 107 - Setting the Rate Limit

AT-S62 User’s GuideSection II: Advanced Operations 195The problem with this method is that some low priority packets might never be transmitted out th

Page 108

Chapter 14: Quality of ServiceSection II: Advanced Operations 196Configuring CoSAs explained in Quality of Service Overview on page 192, a tagged pack

Page 109 - MAC Address Table

AT-S62 User’s GuideSection II: Advanced Operations 197NoteOptions 4, 5, and 6 are not available in all versions of the AT-S62 management software. Con

Page 110 - MAC Address Overview

Chapter 14: Quality of ServiceSection II: Advanced Operations 198The Configure Port COS Priorities menu is shown in Figure 57.Figure 57 Configure Por

Page 111

AT-S62 User’s GuideSection II: Advanced Operations 199NoteThe tagged information in a frame is not changed as the frame traverses the switch. A tagged

Page 112 - Displaying MAC Addresses

Copyright © 2004 Allied Telesyn, Inc. 960 Stewart Drive Suite B, Sunnyvale, CA 94085 USAAll rights reserved. No part of this publication may be reprod

Page 113

List of Figures20Chapter 23MAC Address Security ...

Page 114 - Chapter 7: MAC Address Table

Chapter 14: Quality of ServiceSection II: Advanced Operations 200Mapping CoS Priorities to Egress QueuesThis procedure explains how to change the defa

Page 115

AT-S62 User’s GuideSection II: Advanced Operations 201Configuring Egress SchedulingThis procedure explains how to select and configure a scheduling me

Page 116 - Enter port-list: ->

Chapter 14: Quality of ServiceSection II: Advanced Operations 202Displaying Port CoS PrioritiesThe following procedure displays a menu that lists the

Page 117

203Chapter 15IGMP SnoopingThis chapter explains how to activate and configure the Internet Group Management Protocol (IGMP) snooping feature on the sw

Page 118

Chapter 15: IGMP SnoopingSection II: Advanced Operations 204IGMP Snooping OverviewIGMP snooping is best explained by first defining IGMP. This protoco

Page 119

AT-S62 User’s GuideSection II: Advanced Operations 205Without IGMP snooping a switch would be obligated to flood multicast packets out all of its port

Page 120 - Changing the Aging Time

Chapter 15: IGMP SnoopingSection II: Advanced Operations 206Activating IGMP SnoopingTo activate or deactivate IGMP snooping on the switch and to confi

Page 121 - Port Trunking

AT-S62 User’s GuideSection II: Advanced Operations 207The options in the menu are defined below:1 - IGMP Snooping StatusEnables and disables IGMP snoo

Page 122 - Port Trunking Overview

Chapter 15: IGMP SnoopingSection II: Advanced Operations 208When selecting a value for this parameter, it is important to note that the value you ente

Page 123 - Distribution

AT-S62 User’s GuideSection II: Advanced Operations 209Displaying a List of Host NodesYou can use the AT-S62 software to display a list of the multicas

Page 124 - Chapter 8: Port Trunking

AT-S62 User’s Guide21Chapter 30Management Access Control List ...

Page 125

Chapter 15: IGMP SnoopingSection II: Advanced Operations 210HostIP - The IP address of the host node connected to the port.Status - The status of the

Page 126

AT-S62 User’s GuideSection II: Advanced Operations 211Displaying a List of Multicast RoutersA multicast router is a router that is receiving multicast

Page 127

212Chapter 16Denial of Service DefenseThis chapter contains procedures on how to configure the switch to protect your network against Denial of Servic

Page 128

AT-S62 User’s GuideSection II: Advanced Operations 213Denial of Service Defense OverviewThe AT-S62 management software can help protect your network a

Page 129 - Creating a Port Trunk

Chapter 16: Denial of Service DefenseSection II: Advanced Operations 214SMURF Attack This DoS attack is instigated by an attacker sending a ICMP Echo

Page 130 - Create Trunk

AT-S62 User’s GuideSection II: Advanced Operations 215Here is a overview of how the process takes place. This example assumes that you have activated

Page 131

Chapter 16: Denial of Service DefenseSection II: Advanced Operations 216If one is found, the following occurs:❑ The switch sends a SNMP trap to the ma

Page 132 - Modifying a Port Trunk

AT-S62 User’s GuideSection II: Advanced Operations 217IP OptionsAttackIn the basic scenario of an IP attack, an attacker sends packets containing bad

Page 133 - Modify Trunk

Chapter 16: Denial of Service DefenseSection II: Advanced Operations 218Enabling or Disabling Denial of Service PreventionTo configure DoS defense, pe

Page 134

AT-S62 User’s GuideSection II: Advanced Operations 219The LAN IP Subnet menu is shown in Figure 66.Figure 66 LAN IP Subnet Menub. Type 1 to select IP

Page 135 - Deleting a Port Trunk

List of Figures22Chapter 39File Downloads and Uploads ...

Page 136 - Port Mirroring

Chapter 16: Denial of Service DefenseSection II: Advanced Operations 220A menu is displayed containing either one or two options, depending on the DoS

Page 137 - Port Mirroring Overview

221Section IIISNMPv3 OperationsThis section contains the following chapter:❑ Chapter 17: SNMPv3 Configuration on page 222

Page 138 - Creating a Port Mirror

222Chapter 17SNMPv3 ConfigurationThis chapter provides a description of the AT-S62 implementation of the SNMPv3 protocol. In addition, it provides pro

Page 139

AT-S62 User’s GuideSection III: SNMPv3 Operations 223SNMPv3 OverviewThe SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c protocol implementat

Page 140 - Deleting a Port Mirror

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 224With the SNMPv3 protocol, you create users, determine the protocol used for message

Page 141 - Ethernet Statistics

AT-S62 User’s GuideSection III: SNMPv3 Operations 225SNMPv3 PrivacyProtocolAfter you have configured an authentication protocol, you have the option o

Page 142 - Displaying Port Statistics

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 226The AT-S62 software supports the MIB tree, starting with the Internet MIBs, as defin

Page 143

AT-S62 User’s GuideSection III: SNMPv3 Operations 227To determine the destination of the message, you configure the IP address of the host. This confi

Page 144 - Clearing Port Counters

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 228First, you create a user in the Configure SNMPv3 User Table. Then you define the MIB

Page 145 - Advanced Operations

AT-S62 User’s GuideSection III: SNMPv3 Operations 229See Figure 70 for an illustration of how the message notification tables are linked.Figure 70 SN

Page 146 - File System

AT-S62 User’s Guide23Figure 259: Monitoring, SNMPv3 Access Table Page ...

Page 147 - File System Overview

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 230SNMPv3 User TableThe Configure SNMPv3 User Table menu allows you to create an SNMPv3

Page 148 - Conventions

AT-S62 User’s GuideSection III: SNMPv3 Operations 231SNMPv3 SecurityToGroup TableThe Configure SNMPv3 SecurityToGroup Table Menu allows you to associa

Page 149 - Configuration

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 232SNMPv3 Community TableThe Configure SNMPv3 Community Table Menu allows you to config

Page 150 - Chapter 11: File System

AT-S62 User’s GuideSection III: SNMPv3 Operations 233Configuring the SNMPv3 ProtocolThis section describes how to configure the SNMPv3 protocol using

Page 151 - Enter the file name:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 234Configuring the SNMPv3 User TableThis section contains a description of the SNMPv3 U

Page 152 - Active Boot

AT-S62 User’s GuideSection III: SNMPv3 Operations 235The Configure SNMPv3 Table Menu is shown in Figure 71.Figure 71 Configure SNMPv3 Table MenuNoteT

Page 153 - Viewing a Boot

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2365. To create a new user table, type 1 to select Create SNMPv3 Table Entry.The follow

Page 154 - Editing a Boot

AT-S62 User’s GuideSection III: SNMPv3 Operations 237NoteIf you have the non encrypted version of the AT-S62 software, then the Privacy Protocol field

Page 155 - Troubleshoot

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 238NoteThe Row Status parameter is a read-only field in the Telnet and Local interfaces

Page 156 - Press any key

AT-S62 User’s GuideSection III: SNMPv3 Operations 239Modifying the Authentication Protocol and PasswordTo modify the Authentication Protocol and Passw

Page 157

List of Figures24Chapter 52RADIUS and TACACS+ Authentication Protocols ...

Page 158 - Displaying System Files

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2406. Enter one of the following:M-MD5This value represents the MD5 authentication prot

Page 159

AT-S62 User’s GuideSection III: SNMPv3 Operations 241Modifying the Privacy Protocol and PasswordTo modify the Privacy Protocol and Password in an SNMP

Page 160 - File Downloads and Uploads

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2427. Enter a privacy password of up to 32-alphanumeric characters.The following prompt

Page 161

AT-S62 User’s GuideSection III: SNMPv3 Operations 243N-NonVolatileSelect this storage type if you want the ability to save an entry in the SNMPv3 User

Page 162 - Return to Previous Menu

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 244Configuring the SNMPv3 View TableThis section contains a description of the SNMPv3 V

Page 163

AT-S62 User’s GuideSection III: SNMPv3 Operations 245The Configure SNMPv3 View Table Menu is shown in Figure 74.Figure 74 Configure SNMPv3 View Table

Page 164

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 246The following prompt is displayed:Enter Subtree Mask (Hex format):6. Enter a subtree

Page 165

AT-S62 User’s GuideSection III: SNMPv3 Operations 2479. After making changes, type R until you return to the Main Menu. Then type S to select Save Con

Page 166

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 248Modifying anSNMPv3 ViewTable EntryThis section describes how to modify parameters in

Page 167

AT-S62 User’s GuideSection III: SNMPv3 Operations 249The Modify SNMPv3 View Table Menu is shown in Figure 75.Figure 75 Modify SNMPv3 View Table Menu4

Page 168 - [Yes/No]

25PrefaceThis guide contains instructions on how to configure an AT-8524M Layer 2+ Fast Ethernet Switch using the menu and web browser interfaces of t

Page 169

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 250The View Subtree parameter defines a MIB View and the Subtree Mask further restricts

Page 170

AT-S62 User’s GuideSection III: SNMPv3 Operations 251The following prompt is displayed:Enter View Type [I-Included, E-Excluded]:7. Choose one of the f

Page 171 - Downloading a System File

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2527. Select one of the following storage types for this table entry:V - VolatileSelect

Page 172 - Management

AT-S62 User’s GuideSection III: SNMPv3 Operations 253Configuring the SNMPv3 Access TableThis section contains a description of the SNMPv3 Access Table

Page 173

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 254The Configure SNMPv3 Access Table Menu is shown in Figure 76.Figure 76 Configure SN

Page 174

AT-S62 User’s GuideSection III: SNMPv3 Operations 255NoteThe Context Prefix and the Context Match fields are a read only fields. The Context Prefix fi

Page 175

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 256greatest level of security. You can select this value if you configured the Security

Page 176

AT-S62 User’s GuideSection III: SNMPv3 Operations 257NoteThe Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active

Page 177 - Uploading a System File

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2582-v2cSelect this value to associate the Group Name with the SNMPv2c protocol.3-v3Sel

Page 178 - Uploading a

AT-S62 User’s GuideSection III: SNMPv3 Operations 259Modifying anSNMPv3 AccessTable EntryThis section describes how to modify parameters in an SNMPv3

Page 179

Preface26Section III: SNMPv3 OperationsThe chapter in this section explains how to configure the switch for SNMPv3. (The instructions for SNMPv1 and S

Page 180

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 260The Modify SNMPv3 Access Table is shown in Figure 77.Figure 77 Modify SNMPv3 Access

Page 181

AT-S62 User’s GuideSection III: SNMPv3 Operations 261The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv, P-AuthPriv]

Page 182 - Event Log

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 262Modifying the Write View Name To modify the Write View Name parameter in an SNMPv3 A

Page 183 - Event Log Overview

AT-S62 User’s GuideSection III: SNMPv3 Operations 2637. Enter the Security Level configured for this Group Name. You cannot change the value of the Se

Page 184 - Chapter 13: Event Log

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 264Modifying the Notify View NameTo modify the Notify View Name parameter in an SNMPv3

Page 185 - Displaying Events

AT-S62 User’s GuideSection III: SNMPv3 Operations 2657. Enter the Security Level configured for this Group Name. You cannot change the value of the Se

Page 186

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 266Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Access T

Page 187

AT-S62 User’s GuideSection III: SNMPv3 Operations 2677. Enter the Security Level configured for this Group Name. You cannot change the value of the Se

Page 188

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 268Configuring the SNMPv3 SecurityToGroup TableThis section contains a description of t

Page 189 - Saving the Event Log

AT-S62 User’s GuideSection III: SNMPv3 Operations 269The Configure SNMPv3 SecurityToGroup Table Menu is shown in Figure 78.Figure 78 Configure SNMPv3

Page 190 - Clearing the Event Log

AT-S62 User’s Guide27Document ConventionsThis document uses the following conventions:NoteNotes provide additional information.CautionCautions inform

Page 191 - Quality of Service

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 270The following prompt is displayed:Enter Group Name:6. Enter a Group Name that you co

Page 192 - Quality of Service Overview

AT-S62 User’s GuideSection III: SNMPv3 Operations 271Deleting anSNMPv3SecurityToGroupTable EntryYou may want to delete an entry from the SNMPv3 Securi

Page 193

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 272The following prompt is displayed:Do you want to delete this table entry? (Y/N): [Ye

Page 194

AT-S62 User’s GuideSection III: SNMPv3 Operations 273The Modify SecurityToGroup Table is displayed as shown Figure 78.Figure 79 Modify SNMPv3 Securit

Page 195

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2743-v3Select this value to associate the User Name with the SNMPv3 protocol. The follo

Page 196 - Configuring CoS

AT-S62 User’s GuideSection III: SNMPv3 Operations 275Select one of the following SNMP protocols:1-v1Select this value if this User Name is configured

Page 197

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 276Configuring the SNMPv3 Notify TableThis section contains a description of the SNMPv3

Page 198

AT-S62 User’s GuideSection III: SNMPv3 Operations 277The Configure SNMPv3 Notify Table Menu is shown in Figure 80.Figure 80 Configure SNMPv3 Notify T

Page 199

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 278I-InformIndicates this notify table is used to send inform messages. With this messa

Page 200

AT-S62 User’s GuideSection III: SNMPv3 Operations 279NoteTo display a Group Name and its associated parameters from the Configure SNMPv3 SecurityToGro

Page 201 - Configuring Egress Scheduling

Preface28Where to Find Web-based GuidesThe installation and user guides for all Allied Telesyn products are available in Portable Document Format (PDF

Page 202

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 280The Modify SNMPv3 Notify Table Menu is displayed as shown in Figure 81.Figure 81 Mo

Page 203 - IGMP Snooping

AT-S62 User’s GuideSection III: SNMPv3 Operations 281Modifying a Notify TypeTo modify the Notify Type parameter in an SNMPv3 Notify Table entry, perfo

Page 204 - IGMP Snooping Overview

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 282Modifying a Storage TypeTo modify the Storage Type parameter in an SNMPv3 Notify Tab

Page 205

AT-S62 User’s GuideSection III: SNMPv3 Operations 283Configuring the SNMPv3 Target Address TableThis section contains a description of the SNMPv3 Targ

Page 206 - Activating IGMP Snooping

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 284Creating anSNMPv3 TargetAddress TableEntryTo create an entry in the Configure SNMPv3

Page 207

AT-S62 User’s GuideSection III: SNMPv3 Operations 285Use the following format for an IP address:XXX.XXX.XXX.XXXThe following prompt is displayed:Enter

Page 208 - Chapter 15: IGMP Snooping

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 286This name can consist of up to 32-alphanumeric characters. The value configured here

Page 209

AT-S62 User’s GuideSection III: SNMPv3 Operations 287The Configure SNMPv3 Target Address Table Menu is shown in Figure 84 on page 297.NoteTo display

Page 210

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 288Modifying a Target IP AddressTo modify the target IP address in an SNMPv3 Target Add

Page 211

AT-S62 User’s GuideSection III: SNMPv3 Operations 2894. To change the Target IP Address, type 1 to select Set Target IP Address.The following prompt i

Page 212 - Denial of Service Defense

AT-S62 User’s Guide29Contacting Allied TelesynThis section provides Allied Telesyn contact information for technical support as well as sales or corpo

Page 213 - SYN Flood

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 290This is the name of the SNMP manager, or host, that manages the SNMP activity on you

Page 214

AT-S62 User’s GuideSection III: SNMPv3 Operations 2916. Enter a timeout value in milliseconds.When an Inform message is generated, it requires a respo

Page 215

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2926. Enter the number of times the switch will retry, or resend, the Inform message.Th

Page 216 - Ping of Death

AT-S62 User’s GuideSection III: SNMPv3 Operations 293Modifying the Target Parameters FieldTo modify the Target Parameters field in an SNMPv3 Target Ad

Page 217 - Guidelines

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 294Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Target A

Page 218

AT-S62 User’s GuideSection III: SNMPv3 Operations 2957. After making changes, type R until you return to the Main Menu. Then type S to select Save Con

Page 219

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 296Configuring the SNMPv3 Target Parameters TableThis section contains a description of

Page 220

AT-S62 User’s GuideSection III: SNMPv3 Operations 297There are three functions you can perform with the Configure SNMPv3 Target Parameters Table Menu.

Page 221 - SNMPv3 Operations

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2983. To create an SNMPv3 Target Parameters Table, type 1 to select Create SNMPv3 Table

Page 222 - SNMPv3 Configuration

AT-S62 User’s GuideSection III: SNMPv3 Operations 2997. Select one of the following Security Levels:NoteThe value you configure for the Security Level

Page 223 - SNMPv3 Overview

3Table of ContentsList of Figures ...

Page 224 - Protocols

Preface30Management Software UpdatesYou can download new releases of management software for our managed products from either of the following Interne

Page 225 - SNMPv3 MIB

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 300entry with a NonVolatile storage type, the S - Save Configuration Changes option app

Page 226 - Notification

AT-S62 User’s GuideSection III: SNMPv3 Operations 3015. Enter Y to delete the SNMPv3 Target Address Table entry or N to save it.6. After making change

Page 227

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 302NoteYou cannot modify an entry in the SNMPv3 Target Parameter Table that contains a

Page 228 - SNMPv3 Access Table

AT-S62 User’s GuideSection III: SNMPv3 Operations 303The Modify SNMPv3 Target Parameters Table Menu is shown in Figure 85.Figure 85 Modify SNMPv3 Tar

Page 229

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 304Modifying the Security ModelFor the Security or User Name you have selected, the val

Page 230

AT-S62 User’s GuideSection III: SNMPv3 Operations 3052-v2cSelect this value if this User Name is associated with the SNMPv2c protocol. 3-v3Select this

Page 231

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 306Select one of the following Security Levels:NoteThe value you configure for the Secu

Page 232

AT-S62 User’s GuideSection III: SNMPv3 Operations 307The Configure SNMPv3 Table Menu is shown in Figure 71 on page 235.2. From the Configure SNMPv3 T

Page 233

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 3082. From the Configure SNMPv3 Table Menu, type 8 to select Configure SNMPv3 Target Ad

Page 234 - Table Entry

AT-S62 User’s GuideSection III: SNMPv3 Operations 309Configuring the SNMPv3 Community TableThis section contains a description of the SNMPv3 Community

Page 235

31Chapter 1OverviewThis chapter reviews the functions of the AT-S62 management software, the types of sessions you can use to access the software, and

Page 236 - N-None]:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 310For each SNMPv3 Community Table entry, you can configure the following parameters:❑

Page 237 - Enter Privacy Password:

AT-S62 User’s GuideSection III: SNMPv3 Operations 311The Configure SNMPv3 Community Table Menu is shown in Figure 86.Figure 86 Configure SNMPv3 Commu

Page 238 - [Yes/No]->

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 312The following prompt is displayed:Enter Security Name:6. Enter the name of an SNMPv1

Page 239

AT-S62 User’s GuideSection III: SNMPv3 Operations 3139. After making changes, type R until you return to the Main Menu. Then type S to select Save Con

Page 240

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 314Modifying anSNMPv3CommunityTable EntryFor each entry in the SNMPv3 Community Table,

Page 241

AT-S62 User’s GuideSection III: SNMPv3 Operations 315The Modify SNMPv3 Community Table Menu is shown in Figure 87.Figure 87 Modify SNMPv3 Community T

Page 242

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 316Modifying the Security NameTo modify the Security Name parameter in an SNMPv3 Commun

Page 243

AT-S62 User’s GuideSection III: SNMPv3 Operations 3172. From the Configure SNMPv3 Table Menu, type 9 to select Configure SNMPv3 Community Table.The Co

Page 244 - SNMPv3 View

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 318The following prompt is displayed:Enter Community Index:5. Enter the Community Index

Page 245

AT-S62 User’s GuideSection III: SNMPv3 Operations 319Displaying SNMPv3 Table MenusThe procedures in this section describe how to display the SNMPv3 Ta

Page 246

Chapter 1: Overview32Management OverviewThe AT-S62 management software is intended for the AT-8524M switch. You use the software to monitor and adjust

Page 247 - Deleting an

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 320The Display SNMPv3 Table Menu is shown in Figure 88.Figure 88 Display SNMPv3 Table

Page 248 - Modifying an

AT-S62 User’s GuideSection III: SNMPv3 Operations 321Displaying theDisplay SNMPv3View TableMenuThis section describes how to display the Display SNMPv

Page 249

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 322Displaying theDisplay SNMPv3Access TableMenuThis section describes how to display th

Page 250 - 1.3.6.1.2.1.6

AT-S62 User’s GuideSection III: SNMPv3 Operations 323Displaying theDisplay SNMPv3SecurityToGroupTable MenuThis section describes how to display the Di

Page 251

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 324Displaying theDisplay SNMPv3Notify TableMenuThis section describes how to display th

Page 252

AT-S62 User’s GuideSection III: SNMPv3 Operations 325Displaying theDisplay SNMPv3Target AddressTable MenuThis section describes how to display the Dis

Page 253 - SNMPv3 Access

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 326Displaying theDisplay SNMPv3TargetParametersTable MenuThis section describes how to

Page 254

AT-S62 User’s GuideSection III: SNMPv3 Operations 327Displaying theDisplay SNMPv3CommunityTable MenuThis section describes how to display the Display

Page 255 - P-AuthPriv]:

328Section IVSpanning Tree ProtocolsThe chapters in this section explain the spanning tree protocols. The chapters include:❑ Chapter 18: Spanning Tree

Page 256 - Enter Notify View Name:

329Chapter 18Spanning Tree and Rapid Spanning Tree ProtocolsThis chapter provides background information on the Spanning Tree Protocol (STP) and Rapid

Page 257

AT-S62 User’s Guide33There are four different ways to access the management software on an AT-8524M switch. These methods are referred to in this guid

Page 258 - A-AuthNoPriv, P-AuthPriv]:

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 330STP and RSTP OverviewThe performance of a Ethernet network can be severely impaired by

Page 259

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 331Bridge Priorityand the RootBridgeThe first task that bridges running spanning tree perform i

Page 260

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 332Path Costs and Port CostsAfter the root bridge has been selected, the bridges must dete

Page 261

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 333Table 14 lists the STP port costs with Auto-Detect when a port is part of a port trunk.Table

Page 262 - Enter Group Name:

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 334Port PriorityIf two paths have the same cost, the bridges must choose between them to s

Page 263

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 335To forestall the formation of temporary data loops during topology changes, a port designate

Page 264

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 336Point-to-Point Ports and Edge PortsNoteThis section applies only to RSTP and MSTP.Part

Page 265

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 337If a port is operating in half-duplex mode and is not connected to any further bridges parti

Page 266

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 338Mixed STP andRSTP NetworkRSTP IEEE 802.1w is fully compliant with STP IEEE 802.1d. Your

Page 267

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 339You can avoid this problem by not activating spanning tree or by connecting VLANs using tagg

Page 268 - SecurityToGroup

Chapter 1: Overview34Local Management SessionYou establish a local management session with an AT-8524M switch by connecting a terminal or a PC with a

Page 269

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 340Enabling or Disabling a Spanning Tree ProtocolThe AT-S62 software supports STP, RSTP, a

Page 270

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3414. If you selected STP as the active spanning tree protocol, go to Configuring STP on page 3

Page 271

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 342Configuring STPThis section contains the following procedures:❑ Configuring STP Bridge

Page 272 - Table Entr

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3432. Adjust the bridge STP settings as needed. The parameters are described below.1 - Bridge P

Page 273

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 3443. After making changes, type R until you return to the Main Menu. Then type S to selec

Page 274

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 345The Configure STP Port Settings menu is shown in Figure 104.Figure 104 Configure STP Port S

Page 275

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 346Displaying STPPort SettingsTo display STP port settings, perform the following procedur

Page 276 - SNMPv3 Notify

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 347Configuring RSTPThis section contains the following procedures:❑ Configuring RSTP Bridge Set

Page 277

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 3482. Adjust the parameters as needed. The parameters are defined below.1 - Force VersionT

Page 278

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3496 - Bridge IdentifierThe MAC address of the bridge. The bridge identifier is used as a tie b

Page 279

AT-S62 User’s Guide35Telnet Management SessionYou can use any management workstation on your network that has the Telnet application protocol to manag

Page 280

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 350The Configure RSTP Port Settings menu is shown in Figure 108.Figure 108 Configure RSTP

Page 281 - Enter Notify Name:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 351Displaying PortRSTP StatusThe RSTP Port Parameters menu has two selections for displaying a

Page 282

352Chapter 19Multiple Spanning Tree ProtocolThis chapter provides background information on the Multiple Spanning Tree Protocol (MSTP). The chapter al

Page 283

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 353MSTP OverviewAs explained in the previous chapter, STP and RSTP are single-instance spanning

Page 284 - Address Table

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 354MultipleSpanning TreeInstance (MSTI)The individual spanning trees in

Page 285

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 355If the switches were running STP or RSTP, one of the links would be blocked because the link

Page 286

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 356Figure 110 illustrates the same two AT-8524M switches and the same t

Page 287

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 357A MSTI can contain more than one VLAN. This is illustrated in Figure 111 where there are two

Page 288

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 358MSTI GuidelinesHere are several guidelines to keep in mind about MST

Page 289 - Enter IP Address:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 359The revision level is an arbitrary number you assign to a region. You can use the number to

Page 290

Chapter 1: Overview36Web Browser Management SessionYou can also use a web browser from a management workstation on your network to manage a switch. Th

Page 291

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 360Figure 112 illustrates the concept of regions. It shows one MSTP reg

Page 292 - Enter Tag List:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 361The AT-8524M switch determines regional boundaries by examining the MSTP BPDUs received on t

Page 293 - Enter Target Parameters:

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 362❑ The regional root of a MSTI must be in the same region as the MSTI

Page 294

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 363MSTP with STP and RSTPMSTP is fully compatible with STP and RSTP. If a port on an AT-8524M r

Page 295

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 364❑ An MSTI cannot span multiple regions.❑ Each MSTI must have a regio

Page 296

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 365This is illustrated in Figure 113. Port 8 in Switch A is a member of a VLAN assigned to MSTI

Page 297 - Parameters

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 366A problem can arise if you assign some VLANs to MSTIs while leaving

Page 298 - Enter Target Parameters Name:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 367This is illustrated in Figure 115. The example show two switches, each residing in a differe

Page 299

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 368Here is an example. Let’s assume that you have two regions that cont

Page 300

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 369Configuring MSTP Bridge SettingsThis section contains the procedure for configuring a bridge

Page 301

AT-S62 User’s Guide37SNMP Management SessionAnother way to remotely manage the switch is with an SNMP management program. AT-S62 software supports SNM

Page 302

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3703. Adjust the MSTP settings as needed. Changes are immediately activ

Page 303

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3715 - Max HopsMSTP regions use this parameter to discard BPDUs. The Max Hop counter in a BPDU

Page 304

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 372Configuring the CIST PriorityThis procedure explains how to adjust t

Page 305

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3732. To change the CIST priority, type 1.The following prompt is displayed:Enter new priority

Page 306

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 374Creating, Deleting, and Modifying MSTI IDsThe following procedures e

Page 307

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 375Regional Root IDIdentifies the regional root for the MSTI by its MAC address.Path CostSpecif

Page 308

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3763. After making changes, type R until you return to the Main Menu. T

Page 309

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 377Associating VLANs to MSTI IDsWhen you create a new MSTI ID, you are given the opportunity of

Page 310 - Community

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 378The VLAN-MSTI Association Menu is shown in Figure 119.Figure 119 VL

Page 311

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 379The MSTI ID retains any VLANs already associated with it when new VLANs are added.4. After m

Page 312 - Enter Transport Tag:

Chapter 1: Overview38Management Access LevelsThere are two levels of management access in the AT-S62 management software: Manager and Operator. Manage

Page 313

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 380Configuring MSTP Port SettingsTo configure a port’s MSTP parameters,

Page 314

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3814. Adjust the port settings as needed. The selections are described below:1 - Port PriorityT

Page 315

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3825 - Edge PortThis parameter defines whether the port is functioning

Page 316 - Enter Community Index:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 383Displaying MSTP Port Settings and StatusThe MSTP Port Parameters menu, shown in Figure 120 o

Page 317

384Section VVirtual LANsThe chapters in this section explain virtual LANs (VLANs). The chapters include:❑ Chapter 20: Tagged and Port-based Virtual LA

Page 318

385 Chapter 20Tagged and Port-based Virtual LANsThis chapter contains background information on tagged and port-based virtual LANs (VLANs). It also co

Page 319 - Displaying SNMPv3 Table Menus

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 386VLAN OverviewA VLAN is a group of ports on an Ethernet switch that form a log

Page 320

AT-S62 User’s GuideSection V: Virtual LANs 387But with VLANS, you can change the LAN segment assignment of an end node connected to the switch through

Page 321 - View Table

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 388Port-based VLAN OverviewAs explained in the VLAN Overview on page 386, a VLAN

Page 322 - Access Table

AT-S62 User’s GuideSection V: Virtual LANs 389If a VLAN spans multiple switches, then the VID for the VLAN on the different switches should be the sam

Page 323

39Section IBasic OperationsThe chapters in this section cover a variety of basic switch features and functions. The chapters include:❑ Chapter 2: Star

Page 324 - Notify Table

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 390For example, if you were creating a port-based VLAN on a switch and you had a

Page 325 - Table Menu

AT-S62 User’s GuideSection V: Virtual LANs 391VLANs that span switches, many ports could end up being used ineffectively just to interconnect the vari

Page 326

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 392Each VLAN has been assigned a unique VID. You assign this number when you cre

Page 327

AT-S62 User’s GuideSection V: Virtual LANs 393Port-basedExample 2Figure 123 illustrates more port-based VLANs. In this example, two VLANs, Sales and E

Page 328 - Spanning Tree Protocols

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 394The table below lists the port assignments for the Sales, Engineering, and Pr

Page 329 - Spanning Tree and Rapid

AT-S62 User’s GuideSection V: Virtual LANs 395Tagged VLAN OverviewThe second type of user-configured VLAN is the tagged VLAN. VLAN membership in a tag

Page 330 - STP and RSTP Overview

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 396❑ Tagged and Untagged Ports❑ Port VLAN IdentifierNoteFor an explanation of VL

Page 331 - Bridge Priority

AT-S62 User’s GuideSection V: Virtual LANs 397General Rulesfor Creating aTagged VLANBelow is a summary of the rules to observe when creating a tagged

Page 332 - Chapter 18: STP and RSTP

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 398Tagged VLANExampleFigure 124 illustrates how tagged ports can be used to inte

Page 333

AT-S62 User’s GuideSection V: Virtual LANs 399The port assignments for the VLANs are as follows:This example is nearly identical to the Port-based Exa

Page 334

Table of Contents4Chapter 3Enhanced Stacking ...

Page 335

40Chapter 2Starting a Local or Telnet Management SessionThis chapter contains the procedure for starting a local or Telnet management session on an AT

Page 336

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 400Creating a Port-based or Tagged VLANTo create a new port-based or tagged VLAN

Page 337 - Edge Port

AT-S62 User’s GuideSection V: Virtual LANs 401The Configure VLANs menu is shown in Figure 126.Figure 126 Configure VLANs Menu3. From the Configure VL

Page 338 - Spanning Tree

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 402NoteA VLAN must be assigned a name.5. Type 2 to select VLAN ID (VID) and ente

Page 339

AT-S62 User’s GuideSection V: Virtual LANs 4039. Press any key.The VLAN Configuration menu in Figure 125 on page 400 is redisplayed.10. To verify that

Page 340

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 404Example of Creating a Port-based VLANThe following procedure creates the Sale

Page 341

AT-S62 User’s GuideSection V: Virtual LANs 405Example of Creating a Tagged VLANThe following procedure creates the Engineering VLAN in the top switch

Page 342 - Configuring STP

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 406Modifying a VLANYou can use this procedure to add or remove ports from a port

Page 343

AT-S62 User’s GuideSection V: Virtual LANs 407The following prompt is displayed:Enter new value -> [1 to 4096] ->5. Enter the VID of the VLAN yo

Page 344 - Port Settings

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 4083 - Tagged PortsUse this selection to add or remove tagged ports from the VLA

Page 345

AT-S62 User’s GuideSection V: Virtual LANs 409If you added or removed from the VLAN a port with one or more static MAC addresses assigned to it, you m

Page 346 - Displaying STP

AT-S62 User’s GuideSection I: Basic Operations 41Local Management SessionTo establish a local management session, you connect a terminal or PC with a

Page 347 - Configuring RSTP

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 410Displaying VLANsTo view the name, VID number, and member ports of all the VLA

Page 348

AT-S62 User’s GuideSection V: Virtual LANs 411Deleting a VLANThis procedure deletes port-based and tagged VLANs from the switch. All untagged ports in

Page 349 - Settings

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 412NoteYou cannot delete the Default_VLAN, which has a VID of 1.The Delete VLAN

Page 350

AT-S62 User’s GuideSection V: Virtual LANs 4139. Repeat this procedure starting with Step 4 to delete other VLANs.10. After making changes, type R unt

Page 351 - RSTP Status

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 414Deleting All VLANsThis section contains the procedure for deleting all port-b

Page 352 - Chapter 19

AT-S62 User’s GuideSection V: Virtual LANs 415Displaying PVIDs and Port PrioritiesThe following procedure displays a menu that lists the PVIDs for all

Page 353 - MSTP Overview

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 416Enabling or Disabling Ingress FilteringThere are rules a switch follows when

Page 354 - Instance (MSTI)

AT-S62 User’s GuideSection V: Virtual LANs 417Activating or deactivating ingress filtering has no effect on the switch’s handling of priority tags. A

Page 355 - AT- 8524M

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 418Specifying a Management VLANThe management VLAN is the VLAN on which an AT-85

Page 356

AT-S62 User’s GuideSection V: Virtual LANs 419Now assume that you decide to create a VLAN called NMS with a VID of 24 for the sole purpose of remote n

Page 357

Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 42Starting a LocalManagementSessionTo start a local management ses

Page 358 - Associations

420Chapter 21GARP VLAN Registration ProtocolThis chapter describes the GARP VLAN Registration Protocol (GVRP). It contains the following sections:❑ Ba

Page 359

AT-S62 User’s GuideSection V: Virtual LANs 421Basic Overview of GARP VLAN Registration Protocol (GVRP)The GARP VLAN Registration Protocol (GVRP) allow

Page 360 - AT-8524M

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 422Figure 134 provides an example of how GVRP works.Figure 134 GVRP Example Switch

Page 361

AT-S62 User’s GuideSection V: Virtual LANs 4233. Switch #2 sends a PDU out port 15 containing all of the VIDs of the VLANs on the switch, including th

Page 362

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 424❑ Resetting a switch erases all dynamic GVRP VLANs and dynamic GVRP port assignm

Page 363 - Summary of

AT-S62 User’s GuideSection V: Virtual LANs 425GVRP-inactiveIntermediateSwitchesThe presence of a GVRP-inactive switch between GVRP-active devices may

Page 364

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 426Technical Overview of Generic Attribute Registration Protocol (GARP)The purpose

Page 365

AT-S62 User’s GuideSection V: Virtual LANs 427The architecture of GARP is shown in Figure 135. Figure 135 GARP Architecture The GARP Application comp

Page 366

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 428An instance of GID consists of the set of state machines that define the current

Page 367 - AT-8524M AT-8524M

AT-S62 User’s GuideSection V: Virtual LANs 429The Applicant is therefore looking after the interests of all would-be Participants. This allows the Reg

Page 368

AT-S62 User’s GuideSection I: Basic Operations 434. When prompted, enter a username and password.To configure the switch settings, enter “manager” as

Page 369

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 430Configuring GVRPThis section contains the procedure for configuring GVRP. The ti

Page 370

AT-S62 User’s GuideSection V: Virtual LANs 4316. Choose one of the following:E to enable GIP.D to disable GIP.NoteDo not disable GIP if you intend to

Page 371

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 432Enabling or Disabling GVRP on a PortThis procedure enables and disables GVRP on

Page 372 - Configuring the CIST Priority

AT-S62 User’s GuideSection V: Virtual LANs 4335. Enter a port. You can configure more than one port at a time.The Configure GVRP Port Settings Menu is

Page 373 - 4096]: [0 to 15] ->

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 4349. After making changes, type R until you return to the Main Menu. Then type S t

Page 374

AT-S62 User’s GuideSection V: Virtual LANs 435Converting a Dynamic GVRP VLANThis procedure converts a dynamic GVRP VLAN into a static VLAN. You can pe

Page 375

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 436Displaying GVRP Parameters and StatisticsTo display GVRP counters, database, sta

Page 376

AT-S62 User’s GuideSection V: Virtual LANs 437GVRP Counters Option 1 - Display GVRP Counters in the Other GARP Port Parameters displays the GVRP Count

Page 377 - Associating VLANs to MSTI IDs

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 438Figure 143 GVRP Counters Menu (page 2)The GVRP counters in the menus are define

Page 378 - VLAN to an

AT-S62 User’s GuideSection V: Virtual LANs 439Receive Discarded: Port Not ListeningNumber of GARP PDUs discarded because the port that received the PD

Page 379 - Enter the list of VLANs:

Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 44To select a menu item, type the corresponding letter or number.P

Page 380

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 440Transmit GARP Messages: JoinInTotal number of GARP JoinIn messages transmitted f

Page 381

AT-S62 User’s GuideSection V: Virtual LANs 441GVRP Database Option 2 - Display GVRP Database in the Other GARP Port Parameters displays the GVRP Datab

Page 382

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 442GIP ConnectedPorts RingOption 3 - Display GIP Connected Ports Ring in the Other

Page 383

AT-S62 User’s GuideSection V: Virtual LANs 443GVRP StateMachineOption 4 - Display GVRP State Machine in the Other GARP Port Parameters displays the GV

Page 384 - Virtual LANs

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 444App Applicant state machine for the GID index on that particular port. One of:No

Page 385 - Chapter 20

AT-S62 User’s GuideSection V: Virtual LANs 445App (Continued) Non-Participant Management state:“Von” Very Anxious Observer“Aon” Anxious Observer“Qon”

Page 386 - VLAN Overview

446 Chapter 22Multiple VLAN ModesThis chapter describes the multiple VLAN modes and how to select a mode.This chapter contains the following sections:

Page 387 - Section V: Virtual LANs 387

AT-S62 User’s GuideSection V: Virtual LANs 447Multiple VLAN Mode OverviewThe Multiple VLAN modes can simplify the task of configuring the switch in ne

Page 388 - Port-based VLAN Overview

Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 448A user designated port on the switch functions as an uplink port, which can be connected to

Page 389 - Section V: Virtual LANs 389

AT-S62 User’s GuideSection V: Virtual LANs 449This highly segmented configuration is useful in situations where traffic generated by each end node or

Page 390 - Section V: Virtual LANs 390

AT-S62 User’s GuideSection I: Basic Operations 45Telnet Management SessionYou can use the Telnet application protocol from a workstation on your netwo

Page 391 - Example 1

Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 450Another difference with this mode is that the uplink port is untagged. Consequently, you wou

Page 392 - Section V: Virtual LANs 392

AT-S62 User’s GuideSection V: Virtual LANs 451Selecting a VLAN ModeThe following procedure explains how to select a VLAN mode. Available modes are:❑ U

Page 393 - Example 2

Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 452Displaying VLAN InformationTo view the VLANs on the switch while the unit is operating in Mu

Page 394 - Section V: Virtual LANs 394

453Section VIPort SecurityThe chapters in this section explain the port security features of the AT-8524M switch The chapters include:❑ Chapter 23: MA

Page 395 - Tagged VLAN Overview

454Chapter 23MAC Address SecurityThis chapter explains how you can use the dynamic or static MAC addresses learned or assigned on the ports of the swi

Page 396 - Section V: Virtual LANs 396

AT-S62 User’s GuideSection VI: Port Security 455MAC Address Security OverviewThis feature can enhance the security of your network. You can use it to

Page 397 - Tagged VLAN

Chapter 23: MAC Address SecuritySection VI: Port Security 456Secured The Secured security level instructs a port to forward frames using only static

Page 398

AT-S62 User’s GuideSection VI: Port Security 457Intrusion action defines what a port will do when it receives an invalid frame. For a port operating u

Page 399 - Section V: Virtual LANs 399

Chapter 23: MAC Address SecuritySection VI: Port Security 458Configuring MAC Address Port SecurityTo set the port security level, perform the followi

Page 400 - Section V: Virtual LANs 400

AT-S62 User’s GuideSection VI: Port Security 4595. Press 1 to change the port security on your specified port list. The following prompt appears:Enter

Page 401 - Section V: Virtual LANs 401

Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 46NoteYou can run only one Telnet management session on a switch a

Page 402 - Section V: Virtual LANs 402

Chapter 23: MAC Address SecuritySection VI: Port Security 4608. To set the intrusion action for a port in the limited security mode, do the following

Page 403 - Section V: Virtual LANs 403

AT-S62 User’s GuideSection VI: Port Security 461Displaying Port Security LevelsTo view the current security levels for the ports on the switch, do the

Page 404 - Section V: Virtual LANs 404

Chapter 23: MAC Address SecuritySection VI: Port Security 462Intruder ActionThe column specifies the action taken by a port if it receives an invalid

Page 405 - Section V: Virtual LANs 405

463Chapter 24802.1x Port-based Access ControlThis chapter explains 802.1x Port-based Access Control and how you can use this feature to restrict acces

Page 406 - Modifying a VLAN

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 464802.1x Port-based Access Control OverviewThe AT-S62 management software prov

Page 407 - Section V: Virtual LANs 407

AT-S62 User’s GuideSection VI: Port Security 465❑ Authentication server - The authentication server is the network device that has the RADIUS server s

Page 408 - Press any key to continue

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 466Port Roles Part of the task to implementing this feature is specifying the r

Page 409 - Section V: Virtual LANs 409

AT-S62 User’s GuideSection VI: Port Security 467Figure 153 Example of the Authenticator RoleAs mentioned earlier, the switch itself does not authenti

Page 410 - Displaying VLANs

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 468Figure 154 Example of the Supplicant RoleNoteThe use of this port role shou

Page 411 - Deleting a VLAN

AT-S62 User’s GuideSection VI: Port Security 469The information sent by the switch to the RADIUS server for an event includes:❑ The port number where

Page 412 - Section V: Virtual LANs 412

AT-S62 User’s GuideSection I: Basic Operations 47Saving Your Parameter ChangesWhen you make a change to a switch parameter, the change is, in most cas

Page 413 - Section V: Virtual LANs 413

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4703. You must configure the RADIUS client software in the AT-S62 management so

Page 414 - Deleting All VLANs

AT-S62 User’s GuideSection VI: Port Security 471NoteConnecting multiple supplicants to a port set to the authenticator role does not conform to the IE

Page 415 - Section V: Virtual LANs 415

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 472❑ Ports used to interconnect switches should typically be set to the none ro

Page 416 - Section V: Virtual LANs 416

AT-S62 User’s GuideSection VI: Port Security 473Enabling and Disabling Port-based Access ControlThis procedure explains how to enable and disable port

Page 417 - Disable) ->

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 474Setting Port RolesThis procedure sets port roles. For an explanation of port

Page 418 - Specifying a Management VLAN

AT-S62 User’s GuideSection VI: Port Security 4758. Once you have set port roles, you can go to the next procedure to configure port security parameter

Page 419 - Press any key to continue

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 476Configuring Authenticator Port ParametersNoteA port must be set to the authe

Page 420 - Chapter 21

AT-S62 User’s GuideSection VI: Port Security 477The Configure Authenticator Port Access Parameters menu is shown in Figure 159.Figure 159 Configure A

Page 421 - Section V: Virtual LANs 421

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4782 - Quiet PeriodSets the number of seconds that the port remains in the quie

Page 422

AT-S62 User’s GuideSection VI: Port Security 479The two selections are:❑ Ingress - An authenticator port, when in the unauthorized state, will discard

Page 423 - Section V: Virtual LANs 423

Section I: Basic Operations 48Chapter 3Enhanced StackingThis chapter explains the enhanced stacking feature. The sections in this chapter include:❑ En

Page 424 - Security

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 480Configuring Supplicant Port ParametersNoteA port must be set to the supplica

Page 425 - Switches

AT-S62 User’s GuideSection VI: Port Security 481The Configure Supplicant Port Access Parameters menu is shown in Figure 159.Figure 161 Configure Supp

Page 426 - Protocol (GARP)

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 482network. The username can be from 1 to 64 alphanumeric characters (A to Z, a

Page 427 - Section V: Virtual LANs 427

AT-S62 User’s GuideSection VI: Port Security 483Configuring RADIUS AccountingThe AT-S62 management software supports RADIUS accounting for ports opera

Page 428 - Section V: Virtual LANs 428

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4844. Configure the parameters as needed. Changes take affect immediately on th

Page 429 - Section V: Virtual LANs 429

485Section VIIManagement SecurityThe chapters in this section explain the management security features of the AT-S62 software. The chapters include:❑

Page 430 - Configuring GVRP

486Chapter 25Web ServerThe chapter provides an overview of the web server feature and the procedure for configuring the server. It contains the follow

Page 431 - > 1000

AT-S62 User’s GuideSection VII: Management Security 487Web Server OverviewThe AT-S62 management software comes with web server software so you can rem

Page 432 - Section V: Virtual LANs 432

Chapter 25: Web ServerSection VII: Management Security 488General Steps toConfiguring theWeb Server forEncryptionThere are several procedures you need

Page 433 - Section V: Virtual LANs 433

AT-S62 User’s GuideSection VII: Management Security 4896. Once you have received the appropriate certificates from the CA, download them into the AT-S

Page 434 - Your changes are saved

AT-S62 User’s GuideSection I: Basic Operations 49Enhanced Stacking OverviewThe enhanced stacking feature can make it easier for you to manage the AT-8

Page 435 - Section V: Virtual LANs 435

Chapter 25: Web ServerSection VII: Management Security 490Configuring the Web ServerThis procedure explains how to enable and disable the web server a

Page 436 - Section V: Virtual LANs 436

AT-S62 User’s GuideSection VII: Management Security 491Menu option 4 is displayed only for HTTPS operation. The option is hidden for HTTP.3. Type 1 to

Page 437 - Section V: Virtual LANs 437

492Chapter 26Encryption KeysThis chapter describes how to improve the security of your switches with encryption keys. Because of the complexity of the

Page 438 - Section V: Virtual LANs 438

AT-S62 User’s GuideSection VII: Management Security 493Basic OverviewProtecting your managed switches from unauthorized management access is an import

Page 439 - Section V: Virtual LANs 439

Chapter 26: Encryption KeysSection VII: Management Security 494SSH encryption requires two key pairs on the switch— a server key pair and a host key p

Page 440 - Section V: Virtual LANs 440

AT-S62 User’s GuideSection VII: Management Security 495Technical OverviewThe encryption feature provides the following data security services:❑ data e

Page 441 - Section V: Virtual LANs 441

Chapter 26: Encryption KeysSection VII: Management Security 496❑ Electronic Code Book (ECB) is the fundamental DES function. Plaintext is divided into

Page 442 - Ports Ring

AT-S62 User’s GuideSection VII: Management Security 497Asymmetrical (Public Key) EncryptionAsymmetrical encryption algorithms use two keys—one for enc

Page 443 - GVRP State

Chapter 26: Encryption KeysSection VII: Management Security 498Typically a MAC is calculated using a keyed one-way hash algorithm. A keyed one-way has

Page 444 - Section V: Virtual LANs 444

AT-S62 User’s GuideSection VII: Management Security 499The Diffie-Hellman algorithm, which is used by the AT-S62 management software, is one of the mo

Page 445 - Section V: Virtual LANs 445

AT-S62 User’s Guide5Load Distribution Methods ...

Page 446 - Multiple VLAN Modes

Chapter 3: Enhanced StackingSection I: Basic Operations 50There are three basic steps to implementing this feature on your network:1. You must select

Page 447 - Multiple VLAN Mode Overview

Chapter 26: Encryption KeysSection VII: Management Security 500Creating an Encryption KeyThis section contains the procedure for creating an encryptio

Page 448 - Section V: Virtual LANs 448

AT-S62 User’s GuideSection VII: Management Security 501The Key Management menu is shown in Figure 165.Figure 165 Key Management MenuThis menu lists t

Page 449 - Multiple VLAN

Chapter 26: Encryption KeysSection VII: Management Security 502The Create Key menu is shown in Figure 166.Figure 166 Create Key Menu5. Type 1 to sele

Page 450 - Section V: Virtual LANs 450

AT-S62 User’s GuideSection VII: Management Security 5039. Type 4 to create a key description.The following prompt is displayed:Enter new Description -

Page 451 - Selecting a VLAN Mode

Chapter 26: Encryption KeysSection VII: Management Security 504Deleting an Encryption KeyThis section contains the procedure for deleting an encryptio

Page 452 - Displaying VLAN Information

AT-S62 User’s GuideSection VII: Management Security 505Modifying an Encryption KeyThe Key Management menu has a selection for modifying the descriptio

Page 453 - Port Security

Chapter 26: Encryption KeysSection VII: Management Security 506Exporting an Encryption KeyThe following procedure exports the public key of a key pair

Page 454 - MAC Address Security

AT-S62 User’s GuideSection VII: Management Security 507NoteKey Type is a read-only field. You cannot change this value.3. Type 3 to toggle Key File Fo

Page 455 - MAC Address Security Overview

Chapter 26: Encryption KeysSection VII: Management Security 508Importing an Encryption KeyUse the following procedure to import a public key from the

Page 456 - Section VI: Port Security 456

AT-S62 User’s GuideSection VII: Management Security 5093. Type 3 to select Key File Format to choose the format of the key. Selections are:HEX - Indic

Page 457 - Section VI: Port Security 457

AT-S62 User’s GuideSection I: Basic Operations 51Figure 4 is an example of the enhanced stacking feature.Figure 4 Enhanced Stacking ExampleThe exampl

Page 458 - Section VI: Port Security 458

510Chapter 27Public Key Infrastructure CertificatesThis chapter contains the procedures for creating Public Key Infrastructure (PKI) certificates for

Page 459 - Section VI: Port Security 459

AT-S62 User’s GuideSection VII: Management Security 511Basic OverviewThis chapter explains how to implement encryption for your web browser management

Page 460 - Disable):

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 512Public CAs issue certificates typically intended for use by the

Page 461 - Section VI: Port Security 461

AT-S62 User’s GuideSection VII: Management Security 513A certificate name does not have to contain all of these parts. You can use as many or as few a

Page 462 - Section VI: Port Security 462

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 514SSL andEnhancedStackingSecure Sockets Layer (SSL) is supported i

Page 463 - Chapter 24

AT-S62 User’s GuideSection VII: Management Security 515Guidelines Here are guidelines for creating certificates:❑ A certificate can have only one publ

Page 464 - Section VI: Port Security 464

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 516Technical OverviewThe Secure Sockets Layer (SSL) feature is a se

Page 465

AT-S62 User’s GuideSection VII: Management Security 517All application data messages are authenticated by SSL with a message authentication code (MAC)

Page 466 - Section VI: Port Security 466

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 518The Application data message encapsulates the encrypted applicat

Page 467 - Fast Ethernet Switch

AT-S62 User’s GuideSection VII: Management Security 519DigitalSignaturesThe second main service provided by public key encryption is digital signing.

Page 468 - Accounting

Chapter 3: Enhanced StackingSection I: Basic Operations 52Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the switch can be

Page 469 - Section VI: Port Security 469

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 520❑ The owner’s identity details, such as name, company and addres

Page 470 - Access Control

AT-S62 User’s GuideSection VII: Management Security 521An organization may own a Certification Authority and issue certificates for use within its own

Page 471 - Section VI: Port Security 471

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 522Out-of-band verification involves both the owner of a certificat

Page 472 - Section VI: Port Security 472

AT-S62 User’s GuideSection VII: Management Security 523Before the switch can use a certificate, it must be retrieved and manually added to the switch’

Page 473 - Section VI: Port Security 473

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 524Creating a Self-signed CertificateThis section contains the proc

Page 474 - Setting Port Roles

AT-S62 User’s GuideSection VII: Management Security 5253. From the Keys/Certificate menu, select 3 to select Public Key Infrastructure (PKI) Configura

Page 475 - Section VI: Port Security 475

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 526The Certificate Database portion of the window lists the certifi

Page 476 - Section VI: Port Security 476

AT-S62 User’s GuideSection VII: Management Security 5279. Enter the ID number of the encryption key you want to use to create the certificate. The enc

Page 477 - Section VI: Port Security 477

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 528Adding a Certificate to the DatabaseOnce you have created a cert

Page 478 - Section VI: Port Security 478

AT-S62 User’s GuideSection VII: Management Security 5296. Type 1 to select Certificate Name and enter a name for the certificate.This is the name for

Page 479 - Section VI: Port Security 479

AT-S62 User’s GuideSection I: Basic Operations 53The Enhanced Stacking menu is shown in Figure 5.Figure 5 Enhanced Stacking MenuThe menu displays the

Page 480 - Section VI: Port Security 480

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 53010. Type 5 to select Add Certificate to add the certificate to t

Page 481 - Section VI: Port Security 481

AT-S62 User’s GuideSection VII: Management Security 531Modifying a CertificateThe procedure in this section modifies a certificate. (The certificate t

Page 482 - Section VI: Port Security 482

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 5323. Type 2 to select State and specify if a certificate is truste

Page 483 - Configuring RADIUS Accounting

AT-S62 User’s GuideSection VII: Management Security 533Deleting a CertificateThe procedure in this section deletes a certificate from the certificate

Page 484 - Section VI: Port Security 484

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 534Viewing a CertificateThis procedure displays information about a

Page 485 - Management Security

AT-S62 User’s GuideSection VII: Management Security 5353. Type N to see the second page of certificate details.The View Certificate Details menu (page

Page 486 - Web Server

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 536MD5 Fingerprint - Indicates the MD5 algorithm. This value provid

Page 487 - Web Server Overview

AT-S62 User’s GuideSection VII: Management Security 537Generating an Enrollment RequestTo request a certificate from a public or private CA, you need

Page 488 - Encryption

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 5385. From the Public Key Infrastructure (PKI) Configuration Menu,

Page 489

AT-S62 User’s GuideSection VII: Management Security 539PEM - Creates the certificate in the Privacy Enhanced Mail (PEM) format, which is an ASCII form

Page 490 - Configuring the Web Server

Chapter 3: Enhanced StackingSection I: Basic Operations 54Selecting a Switch in an Enhanced StackBefore you perform a procedure on a switch in an enha

Page 491 - Enter SSL Key ID ->

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 540Installing CA Certificates onto a SwitchThis section lists the p

Page 492 - Encryption Keys

AT-S62 User’s GuideSection VII: Management Security 541Configuring PKIOption 1 - Maximum Number of Certificates in the Public Key Infrastructure (PKI)

Page 493 - Basic Overview

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 542Configuring SSLTo configure the SSL protocol, perform the follow

Page 494 - Encryption Key

543Chapter 28Secure Shell (SSH) ProtocolThe chapter contains overview information about the Secure Shell (SSH) protocol and the procedure for configur

Page 495 - Technical Overview

Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 544SSH OverviewSecure management is increasingly important in modern networks,

Page 496 - Chapter 26: Encryption Keys

AT-S62 User’s GuideSection VII: Management Security 545❑ Tunnelling of TCP/IP traffic NoteNon-encrypted Secure Shell sessions serve no purpose.SSH Ser

Page 497

Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 546SSH andEnhancedStackingThe AT-S62 management software allows for encrypted

Page 498 - Algorithms

AT-S62 User’s GuideSection VII: Management Security 547Guidelines Below are the guidelines to observe when configuring SSH:❑ SSH requires two encrypti

Page 499

Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 548Configuring the SSH ServerThis section describes how to configure the SSH s

Page 500 - Creating an Encryption Key

AT-S62 User’s GuideSection VII: Management Security 5493. Select 1 - SSH Server Status to enable or disable the SSH server.4. Choose from one of the f

Page 501

AT-S62 User’s GuideSection I: Basic Operations 553. Type 1 to select Get/Refresh List of Switches.The Master switch polls the subnet for all slave and

Page 502

Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 550Displaying SSH InformationTo display SSH server information, perform the fo

Page 503 - Enter new Description ->

AT-S62 User’s GuideSection VII: Management Security 551❑ Host Key ID: Indicates the host key ID defined for SSH.❑ Host Key Bits: Indicates the number

Page 504 - Deleting an Encryption Key

552Chapter 29RADIUS and TACACS+ Authentication ProtocolsThis chapter explains how to create new manager accounts on a switch using the two authenticat

Page 505 - Modifying an Encryption Key

AT-S62 User’s GuideSection VII: Management Security 553TACACS+ and RADIUS OverviewTACACS+ and RADIUS are authentication protocols for enhancing the se

Page 506 - Exporting an Encryption Key

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 554When a network manager logs in to a switch to manage the de

Page 507

AT-S62 User’s GuideSection VII: Management Security 555the Administration Menu so that the switch and server can communicate with each other.❑ You nee

Page 508 - Importing an Encryption Key

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 556When a switch receives a username and password combination

Page 509

AT-S62 User’s GuideSection VII: Management Security 557Configuring Authentication Protocol SettingsTo configure the RADIUS or TACACS+ settings on the

Page 510 - Certificates

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 5585. To disable the server-based authentication feature on th

Page 511

AT-S62 User’s GuideSection VII: Management Security 559Use per-server secret [Y/N] ->If you will be specifying more than one TACACS+ server and if

Page 512 - Distinguished

Section I: Basic Operations 56Chapter 4Basic Switch ParametersThis chapter contains a variety of information and procedures. There is a discussion on

Page 513

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 560f. After making changes, type R until you return to the Mai

Page 514

AT-S62 User’s GuideSection VII: Management Security 5613 - RADIUS Server 1 Configuration4 - RADIUS Server 1 Configuration5 - RADIUS Server 1 Configura

Page 515

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 562d. From the Authentication Menu, type 1 to select Server-ba

Page 516

563Chapter 30Management Access Control ListThis chapter explains how to create an access control list (ACL) to restrict Telnet and web browser managem

Page 517 - Verification

Chapter 30: Management Access Control ListSection VII: Management Security 564Management Access Control List OverviewThe Management Access Control Lis

Page 518

AT-S62 User’s GuideSection VII: Management Security 565MaskYou need to enter a mask that indicates the parts of the IP address the switch should filte

Page 519 - Signatures

Chapter 30: Management Access Control ListSection VII: Management Security 566enter them.❑ The protocol is always TCP.❑ The Management ACL does not co

Page 520 - Infrastructure

AT-S62 User’s GuideSection VII: Management Security 567Protocol TCPInterface WebA Management ACL can contain multiple ACEs. The two ACEs in this ACL a

Page 521 - Validation

Chapter 30: Management Access Control ListSection VII: Management Security 568Creating the Management ACLTo create a Management ACL, perform the follo

Page 522 - Implementation

AT-S62 User’s GuideSection VII: Management Security 569on the address. For example, to allow all management workstations in the subnet 149.11.11.0 to

Page 523

AT-S62 User’s GuideSection I: Basic Operations 57When Does a Switch Need an IP Address?One of the tasks to building or expanding a network is deciding

Page 524

Chapter 30: Management Access Control ListSection VII: Management Security 570Adding, Deleting, and Viewing ACEsYou can add or delete an ACE from the

Page 525

571Section VIIIWeb Browser ManagementThe chapters in this section explain how to manage an AT-8524M switch using a web browser. The chapters include:❑

Page 526

Section III: Web Browser Management572❑ Chapter 47, GARP VLAN Registration Protocol on page 775❑ Chapter 48, MAC Address Security on page 782❑ Chapter

Page 527

573Chapter 31Starting a Web Browser Management SessionThis chapter contains the procedure for starting a web browser management session on an AT-8524M

Page 528

Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 574Starting a Web Browser Management SessionTo establish a w

Page 529 - Switch 12 - sw12.cer

AT-S62 User’s GuideSection VIII: Web Browser Management 575The AT-S62 software displays the login page, as shown in Figure 188.Figure 188 AT-S62 Logi

Page 530

Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 576The main menu is on the left side of the Home page. It co

Page 531 - Modifying a Certificate

AT-S62 User’s GuideSection VIII: Web Browser Management 577Saving Your Parameter ChangesWhen you make a change to a switch parameter, the change is, i

Page 532

Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 578Quitting a Web Browser Management SessionTo exit a web br

Page 533 - Deleting a Certificate

579Chapter 32Enhanced StackingThis chapter contains the following procedures:❑ Setting a Switch’s Enhanced Stacking Status on page 580❑ Selecting a Sw

Page 534 - Viewing a Certificate

Chapter 4: Basic Switch ParametersSection I: Basic Operations 58How Do YouAssign an IPAddress?After you have decided which, if any, switches on your n

Page 535

Chapter 32: Enhanced StackingSection VIII: Web Browser Management 580Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the sw

Page 536

AT-S62 User’s GuideSection VIII: Web Browser Management 581NoteIf the window does not have an Enhanced Stacking tab, you are attempting to change the

Page 537

Chapter 32: Enhanced StackingSection VIII: Web Browser Management 582Selecting a Switch in an Enhanced StackThe first thing that you should do before

Page 538

AT-S62 User’s GuideSection VIII: Web Browser Management 583NoteThe master switch on which you started the management session is not included in the li

Page 539 - 12.csr]

Chapter 32: Enhanced StackingSection VIII: Web Browser Management 584Displaying the Enhanced Stacking StatusTo display the enhanced stacking status of

Page 540

585Chapter 33Basic Switch ParametersThis chapter contains the following sections:❑ Configuring an IP Address and Switch Name on page 586❑ Activating t

Page 541 - Configuring PKI

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 586Configuring an IP Address and Switch NameNoteFor guidelines on when to assi

Page 542 - Configuring SSL

AT-S62 User’s GuideSection VIII: Web Browser Management 587NoteThis procedure describes the parameters in the Administration section of the tab. The P

Page 543 - Secure Shell (SSH) Protocol

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 588CommentsThis parameter specifies the location of the switch, (for example,

Page 544 - SSH Overview

AT-S62 User’s GuideSection VIII: Web Browser Management 589Activating the BOOTP and DHCP Client SoftwareFor background information on BOOTP and DHCP,

Page 545

AT-S62 User’s GuideSection I: Basic Operations 59Configuring an IP Address and Switch NameThe procedure in this section explains how to manually assig

Page 546

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 590Displaying System InformationTo view basic information about the switch, pe

Page 547

AT-S62 User’s GuideSection VIII: Web Browser Management 591CommentsThe location of the switch, (for example, 4th Floor - rm 402B). DHCP/BOOTPThe statu

Page 548 - Configuring the SSH Server

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 592Configuring the Manager and Operator PasswordsThere are two levels of manag

Page 549

AT-S62 User’s GuideSection VIII: Web Browser Management 593CautionYou should not use spaces or special characters, such as asterisks (*) and exclamati

Page 550 - Displaying SSH Information

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 594Rebooting a SwitchNoteAny parameters changes that have not been saved will

Page 551

AT-S62 User’s GuideSection VIII: Web Browser Management 595Pinging a Remote SystemYou can instruct the switch to ping a node on your network. This pro

Page 552 - Authentication Protocols

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 596Returning the AT-S62 Software to the Factory Default ValuesThe procedure in

Page 553 - TACACS+ and RADIUS Overview

AT-S62 User’s GuideSection VIII: Web Browser Management 597The System Utilities tab is shown in Figure 197.Figure 197 System Utilities Tab3. Click th

Page 554

598Chapter 34SNMPv1 and SNMPv2c Community StringsThis chapter explains how to activate SNMP management on the switch and how to create, modify, and de

Page 555

AT-S62 User’s GuideSection VIII: Web Browser Management 599Enabling or Disabling SNMP ManagementTo enable or disable SNMP management on the switch, pe

Page 556

Table of Contents6Chapter 14Quality of Service ...

Page 557

Chapter 4: Basic Switch ParametersSection I: Basic Operations 602. From the System Administration menu, type 2 to select System Configuration.The Syst

Page 558

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 6004. If you want the switch to send authentication failure traps,

Page 559 - Disabled) ->

AT-S62 User’s GuideSection VIII: Web Browser Management 601Creating a New SNMPv1 or SNMPv2c Community StringTo create a new SNMPv1 or SNMPv2c communit

Page 560

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 602Open AccessDisplays the opened or closed access status of the s

Page 561

AT-S62 User’s GuideSection VIII: Web Browser Management 6035. In the Community Name field, enter the new community string. The name can be from one to

Page 562 - RADIUS Status

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 604Modifying a Community StringTo modify a community string, perfo

Page 563 - Chapter 30

AT-S62 User’s GuideSection VIII: Web Browser Management 605NoteYou cannot change the name of a community string.6. Use the Status option to either ena

Page 564 - Parts of a

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 606Deleting a Community StringTo delete a community string, do the

Page 565 - ACL Guidelines

AT-S62 User’s GuideSection VIII: Web Browser Management 607Displaying the SNMP Status and Community StringsTo display the SNMPv1 and SNMPv2c community

Page 566 - ACL Examples

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 608Trap ReceiversIP addresses of management stations to receive SN

Page 567

609Chapter 35Port ParametersThis chapter explains how to view and change the parameter settings for the individual ports on a switch. Examples of the

Page 568 - Creating the Management ACL

AT-S62 User’s GuideSection I: Basic Operations 613 - Subnet MaskThis parameter specifies the subnet mask for the switch. You must specify a subnet mas

Page 569

Chapter 35: Port ParametersSection VIII: Web Browser Management 610Configuring Port ParametersTo configure the parameter settings of a port on the swi

Page 570

AT-S62 User’s GuideSection VIII: Web Browser Management 611The Port Configuration page is shown Figure 204.Figure 204 Port Configuration PageNoteThe

Page 571

Chapter 35: Port ParametersSection VIII: Web Browser Management 612You should note the following concerning the operation of Auto-Negotiation on the s

Page 572

AT-S62 User’s GuideSection VIII: Web Browser Management 613You might also want to disable a port that is not being used to secure it from unauthorized

Page 573 - Starting a Web Browser

Chapter 35: Port ParametersSection VIII: Web Browser Management 614Back PressureSets backpressure on a port. This option only applies to ports operati

Page 574 - Switch’s IP Address

AT-S62 User’s GuideSection VIII: Web Browser Management 615MDI/MDIX CrossoverUse this selection to set the wiring configuration of the port. The confi

Page 575

Chapter 35: Port ParametersSection VIII: Web Browser Management 616Displaying Port Status and StatisticsThe procedure in this section displays the ope

Page 576

AT-S62 User’s GuideSection VIII: Web Browser Management 617If you select port status, the Port Status page in Figure 206 is displayed.Figure 206 Port

Page 577

Chapter 35: Port ParametersSection VIII: Web Browser Management 618SpeedThe operating speed of the port. Possible values are:0010 - 10 Mbps0100 - 100

Page 578

AT-S62 User’s GuideSection VIII: Web Browser Management 619The information in this page is for viewing purposes only. The statistics are defined below

Page 579

Chapter 4: Basic Switch ParametersSection I: Basic Operations 62Activating the BOOTP and DHCP Client SoftwareThe BOOTP and DHCP application protocols

Page 580 - Chapter 32: Enhanced Stacking

Chapter 35: Port ParametersSection VIII: Web Browser Management 620Oversize Frames Number of frames exceeding the maximum specified by IEEE 802.3 (151

Page 581

621Chapter 36MAC Address TableThis chapter contains instructions on how to view the dynamic and static addresses in the MAC address table of the switc

Page 582

Chapter 36:MAC Address TableSection VIII: Web Browser Management 622Displaying the MAC Address TableTo view the MAC address table, perform the followi

Page 583

AT-S62 User’s GuideSection VIII: Web Browser Management 623View AllThis selection displays all dynamic addresses learned on the ports of the switch an

Page 584

Chapter 36:MAC Address TableSection VIII: Web Browser Management 624Adding Static Unicast and Multicast MAC AddressesThis section contains the procedu

Page 585

AT-S62 User’s GuideSection VIII: Web Browser Management 625the failure of the multicast packets to be properly forwarded to the host nodes. You can sp

Page 586

Chapter 36:MAC Address TableSection VIII: Web Browser Management 626Deleting Unicast and Multicast MAC AddressesTo delete a static or dynamic unicast

Page 587

AT-S62 User’s GuideSection VIII: Web Browser Management 627Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addres

Page 588

628Chapter 37Port TrunkingThis chapter contains the procedure for creating, modifying, or deleting a port trunk from a web browser management session.

Page 589

AT-S62 User’s GuideSection VIII: Web Browser Management 629Creating a Port TrunkThis section contains the procedure for creating a port trunk on the s

Page 590 - Displaying System Information

AT-S62 User’s GuideSection I: Basic Operations 63The following prompt is displayed:BOOTP/DHCP (E-Enabled, D-Disabled):4. Type E to enable BOOTP and DH

Page 591

Chapter 37: Port TrunkingSection VIII: Web Browser Management 630The Port Trunking tab is shown in Figure 210.Figure 210 Port Trunking TabThis tab li

Page 592

AT-S62 User’s GuideSection VIII: Web Browser Management 631The Add New Trunk page is shown in Figure 211.Figure 211 Add New Trunk Page5. In the Trunk

Page 593

Chapter 37: Port TrunkingSection VIII: Web Browser Management 632Modifying a Port TrunkThis section contains the procedure for modifying a port trunk

Page 594 - Rebooting a Switch

AT-S62 User’s GuideSection VIII: Web Browser Management 633An example of the Modify Trunk page is shown in Figure 212.Figure 212 Modify Trunk PageNot

Page 595 - Pinging a Remote System

Chapter 37: Port TrunkingSection VIII: Web Browser Management 634Deleting a Port TrunkCautionDisconnect the cables from the port trunk on the switch b

Page 596

AT-S62 User’s GuideSection VIII: Web Browser Management 635Displaying the Port TrunksTo display the port trunks, do the following:1. From the Home pag

Page 597

Chapter 37: Port TrunkingSection VIII: Web Browser Management 636❑ DI - Destination IP address (Layer 3)❑ SI/DI - Source/destination IP address (Layer

Page 598 - Community Strings

637Chapter 38Port MirroringThis chapter contains the procedure for creating or deleting a port mirror. Sections in the chapter include:❑ Creating a Po

Page 599

Chapter 38: Port MirroringSection VIII: Web Browser Management 638Creating a Port MirrorTo create or delete a port mirror, perform the following proce

Page 600

AT-S62 User’s GuideSection VIII: Web Browser Management 639Egress Port(s)This column lists the source ports whose egress traffic is mirrored to the de

Page 601

Chapter 4: Basic Switch ParametersSection I: Basic Operations 64Rebooting a SwitchThis procedure reboots the switch.NoteAny configuration changes not

Page 602

Chapter 38: Port MirroringSection VIII: Web Browser Management 640Figure 216 shows an example of the Modify Mirror page configured for a port mirror.

Page 603

AT-S62 User’s GuideSection VIII: Web Browser Management 641Modifying or Disabling a Port MirrorTo modify a port mirror, you perform the same procedure

Page 604 - Modifying a Community String

Chapter 38: Port MirroringSection VIII: Web Browser Management 642Deleting a Port MirrorTo delete a port mirror so that you can use the destination po

Page 605

AT-S62 User’s GuideSection VIII: Web Browser Management 643Displaying the Port MirrorTo display the port mirror, do the following:1. From the Home pag

Page 606 - Deleting a Community String

644Chapter 39File Downloads and UploadsThis chapter contains the procedure for downloading a new AT-S62 image file onto the switch from a web browser

Page 607

AT-S62 User’s GuideSection VIII: Web Browser Management 645Downloading a FileThis procedure explains how to download a file from a TFTP server on your

Page 608

Chapter 39: File Downloads and UploadsSection VIII: Web Browser Management 646switch typically does not have an IP address. Rather, you would need to

Page 609 - Port Parameters

AT-S62 User’s GuideSection VIII: Web Browser Management 6475. In the TFTP Remote Filename field, enter the filename of the file on the TFTP server to

Page 610 - Configuring Port Parameters

Chapter 39: File Downloads and UploadsSection VIII: Web Browser Management 648Uploading a FileThis procedure explains how to upload a file from the sw

Page 611

AT-S62 User’s GuideSection VIII: Web Browser Management 649NoteThe top portion of the tab is used to return the switch to its factory default settings

Page 612 - Chapter 35: Port Parameters

AT-S62 User’s GuideSection I: Basic Operations 65Configuring the Manager and Operator PasswordsThere are two levels of management access on an AT-8524

Page 613

650Chapter 40Event LogThis chapter describes the event log. Sections in the chapter include:❑ Enabling or Disabling the Event Log on page 651❑ Display

Page 614

AT-S62 User’s GuideSection VIII: Web Browser Management 651Enabling or Disabling the Event LogAllied Telesyn recommends setting the switch’s date and

Page 615

Chapter 40: Event LogSection VIII: Web Browser Management 6523. For Status in Log Settings, click either Disable or Enable. If you enable the log, the

Page 616

AT-S62 User’s GuideSection VIII: Web Browser Management 653Displaying EventsTo view the event log, do the following:1. From the Home Page, click eithe

Page 617

Chapter 40: Event LogSection VIII: Web Browser Management 654Figure 220 shows an example of the event log in the Full display mode. The Normal display

Page 618

AT-S62 User’s GuideSection VIII: Web Browser Management 655Saving the Event LogYou can save the event log as a file in the file system, from where you

Page 619

Chapter 40: Event LogSection VIII: Web Browser Management 656Clearing the Event LogTo clear all events from the log, perform the following procedure:1

Page 620

657Chapter 41Quality of ServiceThis chapter contains instructions on how to configure Quality of Service (QoS). This chapter contains the following pr

Page 621

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 658Configuring CoSThis procedure explains how to change the egress queue used to ha

Page 622 - Chapter 36:MAC Address Table

AT-S62 User’s GuideSection VIII: Web Browser Management 659The CoS Setting for Port page is shown in Figure 222.Figure 222 CoS Setting for Port Page5

Page 623

Chapter 4: Basic Switch ParametersSection I: Basic Operations 66NoteA password can be from 0 to 16 alphanumeric characters. Passwords are case-sensiti

Page 624

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 660NoteThe tagged information in a frame is not changed as the frame traverses the

Page 625

AT-S62 User’s GuideSection VIII: Web Browser Management 661Mapping CoS Priorities to Egress QueuesThis procedure explains how to change the default ma

Page 626

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 662NoteThe Configure Egress Weights section in the tab is explained in the next pro

Page 627

AT-S62 User’s GuideSection VIII: Web Browser Management 663Configuring Egress SchedulingThis procedure explains how to select and configure a scheduli

Page 628

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 664Displaying the CoS SettingsTo display the CoS settings, do the following:1. From

Page 629

AT-S62 User’s GuideSection VIII: Web Browser Management 665The page displays the following information:PortThe port number.VLAN IdThe VLAN of which th

Page 630 - Chapter 37: Port Trunking

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 666Displaying QoS SchedulingTo display QoS scheduling, do the following:1. From the

Page 631

667Chapter 42IGMP SnoopingThis chapter describes how to configure the IGMP snooping feature on the switch.Sections in the chapter include:❑ Configurin

Page 632

Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 668Configuring IGMP SnoopingTo configure IGMP snooping from a web browser management ses

Page 633

AT-S62 User’s GuideSection VIII: Web Browser Management 669host node stops sending reports and times-out. The switch forwards the leave request to the

Page 634

AT-S62 User’s GuideSection I: Basic Operations 67Setting the System TimeThis procedure explains how to set the switch’s date and time. Setting the sys

Page 635 - Displaying the Port Trunks

Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 670This parameter is useful with networks that contain a large number of multicast group

Page 636 - The ports of the trunk

AT-S62 User’s GuideSection VIII: Web Browser Management 671Displaying a List of Host Nodes and Multicast RoutersYou can use the AT-S62 software to dis

Page 637

Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 672VLAN IDThe VID of the VLAN in which the port is an untagged member.Member PortThe por

Page 638

673Chapter 43Denial of Service DefenseThis chapter contains instructions on how to configure the Denial of Service defense feature on the switch. The

Page 639

Chapter 43: Denial of Service DefenseSection VIII: Web Browser Management 674Configuring Denial of Service Attack DefenseTo configure the ports on the

Page 640 - Chapter 38: Port Mirroring

AT-S62 User’s GuideSection VIII: Web Browser Management 675b. In the DoS Subnet Mask field, enter the LAN’s mask. A binary “1” indicates the switch sh

Page 641

Chapter 43: Denial of Service DefenseSection VIII: Web Browser Management 6768. Adjust the settings as needed. The parameters are described below.Stat

Page 642

AT-S62 User’s GuideSection VIII: Web Browser Management 677Displaying the DoS SettingsTo display the DoS settings, do the following:1. From the Home p

Page 643 - Displaying the Port Mirror

678Chapter 44SNMPv3 ProtocolThis chapter provides the following procedures for configuring basic switch parameters using a web browser management sess

Page 644

AT-S62 User’s GuideSection VIII: Web Browser Management 679Configuring the SNMPv3 ProtocolTo configure the SNMPv3 protocol, you need to configure the

Page 645 - Downloading a File

Chapter 4: Basic Switch ParametersSection I: Basic Operations 68The Configure System Time menu is shown in Figure 11.Figure 11 Configure System Time

Page 646

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 680Enabling the SNMP ProtocolIn order to allow an NMS (an SNMP manager) to access the

Page 647

AT-S62 User’s GuideSection VIII: Web Browser Management 681The SNMP Tab is shown in Figure 232.Figure 232 Configuration System Page, SNMP Tab3. To e

Page 648 - Uploading a File

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6825. Click Apply to update the User Table.6. To save your changes, return to the Gene

Page 649

AT-S62 User’s GuideSection VIII: Web Browser Management 683Configuring the SNMPv3 User TableYou can create, delete, and modify an SNMPv3 User Table e

Page 650

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6844. Click the Add button to add a new SNMPv3 User Table entry.The Add New SNMPv3 Use

Page 651

AT-S62 User’s GuideSection VIII: Web Browser Management 6858. In the Confirm Authentication Password field, re-enter the authentication password.Note

Page 652 - Chapter 40: Event Log

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 68613. Click Apply to update the SNMPv3 User Table.14. To save your changes, return to

Page 653

AT-S62 User’s GuideSection VIII: Web Browser Management 687The Modify SNMPv3 User Page is shown in Figure 235.Figure 235 Modify SNMPv3 User Page5. I

Page 654

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6886. In the Authentication Password field, enter an authentication password of up to

Page 655

AT-S62 User’s GuideSection VIII: Web Browser Management 689NoteThe Row Status parameter is a read-only field in the Web interface. The Active value i

Page 656

AT-S62 User’s GuideSection I: Basic Operations 69NoteIf the switch is obtaining its IP address and subnet mask from a DHCP sever, you can configure th

Page 657

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 690Configuring the SNMPv3 View TableYou can create, delete, and modify an SNMPv3 View

Page 658

AT-S62 User’s GuideSection VIII: Web Browser Management 6914. To create a new SNMPv3 View Table entry click Add.The Add New SNMPv3 View Page is shown

Page 659

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 692The View Subtree parameter defines a MIB View and the Subtree Mask further restrict

Page 660

AT-S62 User’s GuideSection VIII: Web Browser Management 693Deleting a ViewTable EntryTo delete an entry in the SNMPv3 View Table, perform the followi

Page 661

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 694Modifying aView TableEntryTo modify an entry in the SNMPv3 View Table, perform the

Page 662

AT-S62 User’s GuideSection VIII: Web Browser Management 6956. In the View Type field, enter one of the following view types:IncludedEnter this value

Page 663

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 696Configuring the SNMPv3 Access TableYou can create, delete, and modify an SNMPv3 Acc

Page 664 - Displaying the CoS Settings

AT-S62 User’s GuideSection VIII: Web Browser Management 697The SNMPv3 Access Table Page is shown in Figure 239.Figure 239 SNMPv3 Access Table Page4.

Page 665

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6985. In the Group Name field, enter a descriptive name of the group.The Group Name ca

Page 666 - Displaying QoS Scheduling

AT-S62 User’s GuideSection VIII: Web Browser Management 699v2cSelect this value to associate the Group Name with the SNMPv2c protocol.v3Select this v

Page 667

AT-S62 User’s Guide7Configuring the SNMPv3 SecurityToGroup Table ...

Page 668 - Configuring IGMP Snooping

Chapter 4: Basic Switch ParametersSection I: Basic Operations 70g. Type 6 - Poll Interval to specify the time interval between queries to the SNTP ser

Page 669

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 700NonVolatileSelect this storage type if you want the ability to save an entry in the

Page 670 - Chapter 42: IGMP Snooping

AT-S62 User’s GuideSection VIII: Web Browser Management 701Modifying anAccess TableEntryTo modify an entry in the SNMPv3 Access Table, perform the fo

Page 671

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 702This parameter allows the users assigned to this Group Name to view the information

Page 672

AT-S62 User’s GuideSection VIII: Web Browser Management 703Configuring the SNMPv3 SecurityToGroup TableYou can create, delete, and modify an SNMPv3 S

Page 673

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7044. To create an SNMPv3 SecurityToGroup Table entry, click Add.The Add New SNMPv3 Se

Page 674

AT-S62 User’s GuideSection VIII: Web Browser Management 705There are four default values for this field that are reserved for SNMPv1 and SNMPv2c impl

Page 675

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 706The SNMPv3 SecurityToGroup Table Page is shown in Figure 242 on page 703.4. Click t

Page 676

AT-S62 User’s GuideSection VIII: Web Browser Management 7075. In the Group Name field, enter a Group Name that you configured in the SNMPv3 Access Ta

Page 677 - Displaying the DoS Settings

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 708Configuring the SNMPv3 Notify TableYou can create, delete, and modify an SNMPv3 Not

Page 678 - SNMPv3 Protocol

AT-S62 User’s GuideSection VIII: Web Browser Management 7094. To create an SNMPv3 Notify Table entry, click Add.The Add New SNMPv3 Notify Page is sho

Page 679 - AT-S62 User’s Guide

AT-S62 User’s GuideSection I: Basic Operations 71Configuring the Console Startup ModeYou can configure the AT-S62 software to display either the Main

Page 680 - Enabling the SNMP Protocol

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 710NonVolatileSelect this storage type if you want the ability to save an entry in the

Page 681

AT-S62 User’s GuideSection VIII: Web Browser Management 711Modifying aNotify TableEntryTo modify an entry in the SNMPv3 Notify Table, perform the fol

Page 682 - Changes

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7127. In the Storage Type field, select one of the following storage types for this ta

Page 683 - Creating a User

AT-S62 User’s GuideSection VIII: Web Browser Management 713Configuring the SNMPv3 Target Address TableYou can create, delete, and modify an SNMPv3 Ta

Page 684 - Chapter 44: SNMPv3 Protocol

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 714The SNMPv3 Target Address Table Page is shown in Figure 248.Figure 248 SNMPv3 Targ

Page 685

AT-S62 User’s GuideSection VIII: Web Browser Management 7155. In the Target Address Name field, enter the name of the SNMP manager, or host, that man

Page 686 - User Table

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 716NonVolatileSelect this storage type if you want the ability to save an entry in the

Page 687

AT-S62 User’s GuideSection VIII: Web Browser Management 717ModifyingTarget AddressTable EntryTo modify an entry in the SNMPv3 Target Address Table, p

Page 688

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7187. In the UDP Port Number field, enter a UDP port number.You can enter a UDP port i

Page 689

AT-S62 User’s GuideSection VIII: Web Browser Management 71914. To save your changes, return to the General Tab and click Save Changes.

Page 690 - Creating a View

Chapter 4: Basic Switch ParametersSection I: Basic Operations 72Configuring the Console TimerThe AT-S62 management software uses the console timer, al

Page 691

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 720Configuring the SNMPv3 Target Parameters TableYou can create, delete, and modify an

Page 692

AT-S62 User’s GuideSection VIII: Web Browser Management 7214. To create an SNMPv3 Target Parameters Table entry, click Add.The Add New SNMPv3 Target

Page 693 - Deleting a View

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7227. In the Security Model field, select one of the following SNMP protocols as the S

Page 694

AT-S62 User’s GuideSection VIII: Web Browser Management 723This level provides the greatest level of security. You can select this value if you confi

Page 695

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 724A warning message is displayed. Click OK to remove the Target Parameters Table entr

Page 696

AT-S62 User’s GuideSection VIII: Web Browser Management 725NoteEnter a value for the Message Processing Model field only if you select SNMPv1 or SNMP

Page 697

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 726NoteIf you have selected SNMPv1 or SNMPv2c as the Security Model, you must select N

Page 698

AT-S62 User’s GuideSection VIII: Web Browser Management 727Configuring the SNMPv3 Community TableYou can create, delete, and modify an SNMPv3 Communi

Page 699

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 728Figure 254 SNMPv3 Community Table Page4. To create an SNMPv3 Community Table entry

Page 700

AT-S62 User’s GuideSection VIII: Web Browser Management 7295. In the Community Index field, enter a numerical value for this Community.This parameter

Page 701

AT-S62 User’s GuideSection I: Basic Operations 73Enabling or Disabling the Telnet ServerThis procedure explains how to enable and disable the Telnet s

Page 702

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 730making changes to an SNMPv3 Community Table entry with a NonVolatile storage type,

Page 703 - Creating a

AT-S62 User’s GuideSection VIII: Web Browser Management 731Modifying anSNMPv3CommunityTable EntryTo modify an entry in the SNMPv3 Community Table, pe

Page 704

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7326. In the Security Name field, enter a name of an SNMPv1 and SNMPv2c user.This name

Page 705 - Deleting a

AT-S62 User’s GuideSection VIII: Web Browser Management 733Displaying SNMPv3 TablesThis section contains procedures to display the SNMPv3 Tables. The

Page 706

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 734Displaying UserTable EntriesTo display entries in the SNMPv3 User Table, perform th

Page 707

AT-S62 User’s GuideSection VIII: Web Browser Management 735Displaying ViewTable EntriesTo display entries in the SNMPv3 View Table, perform the follo

Page 708

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 736DisplayingAccess TableEntriesTo display entries in the SNMPv3 Access Table, perform

Page 709

AT-S62 User’s GuideSection VIII: Web Browser Management 737DisplayingSecurityToGroupTable EntriesTo display entries in the SNMPv3 SecurityToGroup Tab

Page 710

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 738DisplayingNotify TableEntriesTo display entries in the SNMPv3 Notify Table, perform

Page 711

AT-S62 User’s GuideSection VIII: Web Browser Management 739DisplayingTarget AddressTable EntriesTo display entries in the SNMPv3 Target Address Table

Page 712

Chapter 4: Basic Switch ParametersSection I: Basic Operations 74Setting the Baud Rate of the RS-232 Terminal PortThe default baud rate of the RS-232 T

Page 713

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 740DisplayingTargetParametersTable EntriesTo display entries in the SNMPv3 Target Para

Page 714

AT-S62 User’s GuideSection VIII: Web Browser Management 741DisplayingSNMPv3CommunityTable EntriesTo display entries in the SNMPv3 Community Table, pe

Page 715

742Chapter 45STP, RSTP, and MSTPThis chapter explains how to configure the STP, RSTP and MSTP parameters on an AT-8524M switch from a web browser mana

Page 716

AT-S62 User’s GuideSection VIII: Web Browser Management 743Enabling or Disabling Spanning TreeTo enable or disable spanning tree on the switch, do the

Page 717 - Modifying

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7447. Click Apply.8. If you activated STP, go to Configuring STP on page 745. If y

Page 718

AT-S62 User’s GuideSection VIII: Web Browser Management 745Configuring STPCautionThe bridge provides default STP parameters that are adequate for most

Page 719

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7462. Adjust the STP bridge settings as needed. The parameters are described below

Page 720

AT-S62 User’s GuideSection VIII: Web Browser Management 747Bridge IdentifierThe MAC address of the bridge. The bridge identifier is used as a tie brea

Page 721

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 748Configuring RSTPCautionThe bridge provides default RSTP parameters that are ade

Page 722

AT-S62 User’s GuideSection VIII: Web Browser Management 7492. Adjust the parameters are desired. The parameters are defined below.1 - Force VersionThi

Page 723

AT-S62 User’s GuideSection I: Basic Operations 75Pinging a Remote SystemYou can instruct the switch to ping a remote device on your network. This proc

Page 724

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7506 - Bridge IdentifierThe MAC address of the bridge. The bridge identifier is us

Page 725

AT-S62 User’s GuideSection VIII: Web Browser Management 7514 - Edge PortThis parameter defines whether the port is functioning as an edge port. For an

Page 726

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 752Configuring MSTPThis section is divided into the following procedures:❑ Configu

Page 727

AT-S62 User’s GuideSection VIII: Web Browser Management 753The MSTP Spanning Tree tab is shown in Figure 270.Figure 270 MSTP Spanning Tree TabNoteThi

Page 728

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7545. Adjust the bridge MSTP settings as needed. The parameters are described belo

Page 729

AT-S62 User’s GuideSection VIII: Web Browser Management 755❑ MaxAge must be less than (2 x (ForwardingDelay - 1))Bridge Max HopsMSTP regions use this

Page 730

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7562. To create or delete an MSTI ID and to associate VLANs to MSTIs, do the follo

Page 731

AT-S62 User’s GuideSection VIII: Web Browser Management 757The Modify MSTI window is shown in Figure 272.Figure 272 Modify MSTI Windowc. In the Prior

Page 732

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 758ConfiguringMSTP PortParametersTo configure MSTP port parameters, perform the fo

Page 733 - Displaying SNMPv3 Tables

AT-S62 User’s GuideSection VIII: Web Browser Management 759Point-to-PointThis parameter defines whether the port is functioning as a point-to-point po

Page 734 - Table Entries

Chapter 4: Basic Switch ParametersSection I: Basic Operations 76Returning the AT-S62 Software to the Factory Default ValuesThe procedure in this secti

Page 735 - Displaying View

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 760Displaying Spanning Tree SettingsTo display the parameter settings for the acti

Page 736

761Chapter 46Virtual LANsThis chapter explains how to create, modify, and delete port-based and tagged VLANs from a web browser management session. Th

Page 737

Chapter 46: Virtual LANsSection VIII: Web Browser Management 762Creating a New Port-Based or Tagged VLANTo create a new port-based or tagged VLAN, per

Page 738

AT-S62 User’s GuideSection VIII: Web Browser Management 763The VLAN Mode and Uplink Port options are explained in Selecting a VLAN Mode on page 771. T

Page 739

Chapter 46: Virtual LANsSection VIII: Web Browser Management 764If this VLAN will be unique in your network, then its VID should also be unique. If th

Page 740

AT-S62 User’s GuideSection VIII: Web Browser Management 7658. Click Apply.NoteAny untagged ports that you assign to the new VLAN are automatically rem

Page 741

Chapter 46: Virtual LANsSection VIII: Web Browser Management 766Modifying a Port-Based or Tagged VLANThis procedure explains how to add or remove port

Page 742 - STP, RSTP, and MSTP

AT-S62 User’s GuideSection VIII: Web Browser Management 7677. After making the necessary changes, click Apply. NoteUntagged ports that are added to a

Page 743

Chapter 46: Virtual LANsSection VIII: Web Browser Management 768Deleting a Port-Based or Tagged VLANTo delete a port-based or tagged VLAN from the swi

Page 744 - 7. Click Apply

AT-S62 User’s GuideSection VIII: Web Browser Management 769Displaying VLANsTo display the current VLANs on a switch, perform the following procedure:1

Page 745

AT-S62 User’s GuideSection I: Basic Operations 77The following prompt is displayed:This operation requires a switch reboot. Continue? [Yes/No] ->4.

Page 746

Chapter 46: Virtual LANsSection VIII: Web Browser Management 770Uplink PortThis column is applicable only when the switch is operating in one of the t

Page 747

AT-S62 User’s GuideSection VIII: Web Browser Management 771Selecting a VLAN ModeThe AT-S62 management software features three VLAN modes:❑ Port-based

Page 748

Chapter 46: Virtual LANsSection VIII: Web Browser Management 7726. Click Apply.The new mode is automatically activated on the switch. 7. To permanentl

Page 749

AT-S62 User’s GuideSection VIII: Web Browser Management 773Specifying a Management VLANThe management VLAN is the VLAN through which an AT-8524M switc

Page 750

Chapter 46: Virtual LANsSection VIII: Web Browser Management 774Now let’s assume that you decide to create a VLAN called NMS with a VID of 24 for the

Page 751

775Chapter 47GARP VLAN Registration ProtocolThis chapter about web server security contains the following procedures:❑ Configuring GVRP on page 776❑ E

Page 752 - Configuring MSTP

Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 776Configuring GVRPTo configure the GVRP parameters, perform the follo

Page 753

AT-S62 User’s GuideSection VIII: Web Browser Management 777Join TimeSets the duration of the Join Period timer. The range is from 10 to 60 centisecon

Page 754

Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 778Enabling or Disabling GVRP on a PortThis procedure enables and disa

Page 755 - VLANs to MSTIs

AT-S62 User’s GuideSection VIII: Web Browser Management 7798. To permanently save the change, use the Save Changes button in the General tab. For dir

Page 756

Chapter 4: Basic Switch ParametersSection I: Basic Operations 78Viewing System Hardware and Software InformationThe procedure in this section displays

Page 757

Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 780Displaying the GVRP SettingsUse this procedure to view the GVRP set

Page 758 - MSTP Port

AT-S62 User’s GuideSection VIII: Web Browser Management 781View GVRP State Machine for VLANRefer to Table 23 on page 443 for descriptions of the stat

Page 759

782Chapter 48MAC Address SecurityThis chapter explains how to display the MAC address security levels on the ports on the switch. It contains the foll

Page 760

AT-S62 User’s GuideSection VIII: Web Browser Management 783Displaying MAC Address Security LevelsTo display the MAC address security level of a port,

Page 761

Chapter 48: MAC Address SecuritySection VIII: Web Browser Management 784This page is for viewing purposes only. The columns in the page are defined be

Page 762 - Chapter 46: Virtual LANs

785Chapter 49802.1x Port-based Access ControlThis chapter contains instructions on how to configure the 802.1x port-based access control feature on th

Page 763

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 786Enabling and Disabling Port-based Access ControlThis procedure exp

Page 764

AT-S62 User’s GuideSection VIII: Web Browser Management 7873. To enable or disable the feature, do the following:a. Click the Enable Port Access check

Page 765

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 788Setting Port RolesTo set port roles for port-based access control,

Page 766

AT-S62 User’s GuideSection VIII: Web Browser Management 7897. To configure authenticator port settings, go to Configuring Authenticator Port Parameter

Page 767

AT-S62 User’s GuideSection I: Basic Operations 79The System Hardware Information menu is shown in Figure 14.Figure 14 System Hardware Information Men

Page 768

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 790Configuring Authenticator Port ParametersTo configure authenticato

Page 769

AT-S62 User’s GuideSection VIII: Web Browser Management 791authentication of the client. This is the default setting❑ Force-unauthorized: Causes the p

Page 770

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 7924. Click Apply.5. To permanently save the changes, use the Save Ch

Page 771

AT-S62 User’s GuideSection VIII: Web Browser Management 793Configuring Supplicant Port ParametersTo configure supplicant port parameters, perform the

Page 772 - 6. Click Apply

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 794Held PeriodSpecifies the amount of time in seconds the supplicant

Page 773

AT-S62 User’s GuideSection VIII: Web Browser Management 795Displaying the Port-based Access Control SettingsTo display the port-based access control s

Page 774

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 796A port status page is displayed, as shown in Figure 288.Figure 288

Page 775 - Chapter 47

797Chapter 50Secure Shell ProtocolThis chapter contains the procedure for configuring the SSH protocol settings. Sections in this chapter include:❑ Co

Page 776

Chapter 50: Secure Shell ProtocolSection VIII: Web Browser Management 798Configuring the SSH ServerThis section describes how to configure the SSH ser

Page 777

AT-S62 User’s GuideSection VIII: Web Browser Management 7994. Configure the parameters as needed. The parameters are described below: StatusEnables an

Page 778

Table of Contents8Summary of Guidelines ...

Page 779

Chapter 4: Basic Switch ParametersSection I: Basic Operations 80Setting the Switch’s Temperature ThresholdYou can set a temperature threshold on the s

Page 780 - Displaying the GVRP Settings

Chapter 50: Secure Shell ProtocolSection VIII: Web Browser Management 800Displaying SSH InformationTo display SSH information, do the following:1. Fro

Page 781

AT-S62 User’s GuideSection VIII: Web Browser Management 801❑ Server Key ID: Indicates the server key ID defined for SSH.❑ Server Key Bits: Indicates t

Page 782

802Chapter 51Encryption Keys, PKI, and SSLThis chapter explains how to view the encryption keys, PKI certificates, and SSL settings and includes the f

Page 783

AT-S62 User’s GuideSection VIII: Web Browser Management 803Displaying Encryption KeysTo display the SSL and SSH encryption key pairs, do the following

Page 784

Chapter 51: Encryption Keys, SSL, and PKISection VIII: Web Browser Management 804Displaying PKI Settings and CertificatesTo display the self-signed an

Page 785 - Chapter 49

AT-S62 User’s GuideSection VIII: Web Browser Management 805MTrust (Manually Trusted)The certificate has been manually verified that it is from a trust

Page 786

Chapter 51: Encryption Keys, SSL, and PKISection VIII: Web Browser Management 806SubjectThe Subject distinguished name.IssuerThe certificate issuer’s

Page 787

AT-S62 User’s GuideSection VIII: Web Browser Management 807Displaying the SSL SettingsTo display the SSL settings, perform the following procedure:1.

Page 788

808Chapter 52RADIUS and TACACS+ Authentication ProtocolsThis chapter contains instructions on how to configure the authentication protocols. This chap

Page 789

AT-S62 User’s GuideSection VIII: Web Browser Management 809Configuring RADIUS and TACACS+To configure the authentication protocols, perform the follow

Page 790

81Chapter 5SNMPv1 and SNMPv2c ConfigurationThis chapter explains how to activate SNMP management on the switch and how to create, modify, and delete S

Page 791

Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 8104. Click Apply.NoteTo configure TACACS+, go to Step 6.

Page 792 - Changes on page 577

AT-S62 User’s GuideSection VIII: Web Browser Management 811IP Address and Encryption KeyUse these fields to specify the IP addresses and encryption se

Page 793

Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 812Global Server TimeoutThis parameter specifies the maxim

Page 794

AT-S62 User’s GuideSection VIII: Web Browser Management 813Displaying the RADIUS or TACSACS+ SettingsTo display the RADIUS or TACACS+ settings on the

Page 795

Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 814The TACACS+ (Figure 300) or RADIUS (Figure 301) client

Page 796

815Chapter 53Management Access Control ListThis chapter explains how to create a Management Access Control List (ACL). You can use the ACL to restrict

Page 797 - Secure Shell Protocol

Chapter 53: Management Access Control ListSection VIII: Web Browser Management 816Creating a Management ACLTo create a Management ACL, perform the fol

Page 798

AT-S62 User’s GuideSection VIII: Web Browser Management 817been permitted remote management access to the switch. If you enter a subnet. then any mana

Page 799

Chapter 53: Management Access Control ListSection VIII: Web Browser Management 818Adding or Deleting an ACEYou can add or delete ACEs from the managem

Page 800

AT-S62 User’s GuideSection VIII: Web Browser Management 819Displaying the Management ACLTo display the ACEs in the Management ACL, do the following:1.

Page 801

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 82SNMPv1 and SNMPv2c OverviewThe Simple Network Management Program (SNMP) is

Page 802 - Encryption Keys, PKI, and SSL

820Appendix AAT-S62 Default SettingsThis appendix lists the AT-S62 factory default settings. It contains the following sections:❑ Basic Switch Default

Page 803 - Displaying Encryption Keys

AT-S62 User’s Guide821Basic Switch Default SettingsThis section lists the default settings for basic switch parameters. The following topics are cover

Page 804

Appendix A: AT-S62 Default Settings822NoteLogin names and passwords are case-sensitive.RS-232 PortDefault SettingsThe following table lists the RS-232

Page 805

AT-S62 User’s Guide823SwitchAdministrationDefault SettingsThe following table describes the switch administration default settings.SystemSoftwareDefau

Page 806

Appendix A: AT-S62 Default Settings824Enhanced Stacking Default SettingThe following table lists the enhanced stacking default setting.Enhanced Stacki

Page 807 - Displaying the SSL Settings

AT-S62 User’s Guide825SNMP Default SettingsThe following table describes the SNMPv1 and SNMPv2c default settings.SNMP Communities Setting DefaultSNMP

Page 808

Appendix A: AT-S62 Default Settings826Port Configuration Default SettingsThe following table lists the port configuration default settings.Port Config

Page 809

AT-S62 User’s Guide827Event Log Default SettingsThe following table lists the event log default settings.Event Log Setting DefaultStatus EnabledFull L

Page 810

Appendix A: AT-S62 Default Settings828Quality of ServiceThe following table lists the default mappings of IEEE 802.1p priority levels to egress port p

Page 811

AT-S62 User’s Guide829IGMP Snooping Default SettingsThe following table lists the IGMP Snooping default settings.IGMP Snooping Setting DefaultIGMP Sno

Page 812

AT-S62 User’s GuideSection I: Basic Operations 83Community String NameYou must give the community string a name. The name can be from one to eight alp

Page 813

Appendix A: AT-S62 Default Settings830Denial of Service Prevention Default SettingsThe following table lists the default settings for the Denial of Se

Page 814

AT-S62 User’s Guide831STP, RSTP, and MSTP Default SettingsThis section provides the spanning tree, STP RSTP, and MSTP, default settings.Spanning TreeS

Page 815 - Chapter 53

Appendix A: AT-S62 Default Settings832MSTP DefaultSettingsThe following table lists the MSTP default settings.Port Priority 128RSTP Setting DefaultMST

Page 816 - Creating a Management ACL

AT-S62 User’s Guide833VLAN Default SettingsThis section provides VLAN default settings.VLAN Setting DefaultDefault VLAN Name Default_VLAN (all ports)M

Page 817

Appendix A: AT-S62 Default Settings834GVRP Default SettingsThis section provides the default settings for GVRP.GVRP Setting DefaultStatus DisabledGIP

Page 818 - Adding or Deleting an ACE

AT-S62 User’s Guide835MAC Address Security Default SettingsThe following table lists the MAC address security default settings.MAC Address Security Se

Page 819 - Displaying the Management ACL

Appendix A: AT-S62 Default Settings836802.1x Port-Based Network Access Control Default SettingsThe following table describes the 802.1x Port Access Co

Page 820 - AT-S62 Default Settings

AT-S62 User’s Guide837Web Server Default SettingsThe following table lists the web server default settings.Web Server Configuration Setting DefaultSta

Page 821 - Basic Switch Default Settings

Appendix A: AT-S62 Default Settings838SSL Default SettingsThe following table lists the SSL default settings.SSL Setting DefaultMaximum Number of Sess

Page 822 - SNTP Default

AT-S62 User’s Guide839PKI Default SettingsThe following table lists the PKI default settings, including the generate enrollment request settings.PKI S

Page 823

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 84Each community string can have up to eight trap IP addresses.It does not m

Page 824 - Switch State Slave

Appendix A: AT-S62 Default Settings840SSH Default SettingsThe following table lists the SSH default settings.SSH Setting DefaultStatus DisabledHost Ke

Page 825 - SNMP Default Settings

AT-S62 User’s Guide841Server-Based Authentication Default SettingsThis section describes the server-based authentication, RADIUS, and TACACS+ client d

Page 826

Appendix A: AT-S62 Default Settings842Management Access Control List Default SettingThe following table lists the default setting for the Management A

Page 827 - Event Log Default Settings

843Appendix BSNMPv3 Configuration ExamplesThis appendix provides two examples of SNMPv3 configuration using the SNMPv3 Table menus and a worksheet to

Page 828

Appendix B: SNMPv3 Configuration Examples844SNMPv3 Configuration ExamplesThis appendix provides SNMPv3 configuration examples for the following types

Page 829

AT-S62 User’s Guide845Configure SNMPv3 SecurityToGroup TableUser Name:systemadmin24Security Model:v3Group Name: ManagersStorage Type: NonVolatileConfi

Page 830

Appendix B: SNMPv3 Configuration Examples846Configure SNMPv3 View Table Menu View Name: internetView Subtree OID: 1.3.6.1 (or internet)Subtree Mask: V

Page 831

AT-S62 User’s Guide847SNMPv3 Access Table MenuGroup NameSecurity ModelSecurity LevelRead View NameWrite View NameNotify View NameStorage TypeSNMPv3 Se

Page 832 - MSTP Default

Appendix B: SNMPv3 Configuration Examples848Storage TypeSNMPv3 Target Parameters TableTarget Parameters NameUser (Security) NameSecurity ModelSecurity

Page 833 - VLAN Default Settings

849IndexNumerics802.1x port-based network access controlaccess role, configuring 474, 788authentication process 465authenticator portconfiguring 476,

Page 834 - GVRP Default Settings

AT-S62 User’s GuideSection I: Basic Operations 85Enabling or Disabling SNMP ManagementTo enable or disable SNMP management for the switch, perform the

Page 835

Index850auto-negotiationconfiguring 100, 611, 612forced 105status 96Bback pressureconfiguring 104, 614default setting 826boot configuration fileconfig

Page 836

AT-S62 User’s Guide851database storage 522deleting 531, 533described 519displaying 534modifying 531, 533validating 521certificates, SSLauthentication

Page 837 - Web Server Default Settings

Index852EECB. See Electronic Code Book (ECB)edge portdefault setting 831described 336Multiple Spanning Tree Protocol (MSTP) 382Rapid Spanning Tree Pro

Page 838 - SSL Default Settings

AT-S62 User’s Guide853Generic Attribute Registration Protocol (GARP)Applicant state machine 428defined 426diagram 427overview 426Registrar state machi

Page 839 - PKI Default Settings

Index854IP Options attack 217Kkey exchange algorithms 498key pair ID, configuring 538LLand attack 214limited port security mode, described 455link sta

Page 840 - SSH Default Settings

AT-S62 User’s Guide855MSTI association to a VLANcreating 378removing 379MSTI priority, defined 361MSTI. See Multiple Spanning Tree Instance (MSTI)mul

Page 841

Index856PEM certificate format 538Ping of Death attack 216pinging 75, 595PKI certificatesadding to database 528certificate database 522chains 521creat

Page 842 - Status Disabled

AT-S62 User’s Guide857port speedconfiguring 96, 611default setting 826port state, displaying, Rapid Spanning Tree Protocol (RSTP) 351port statistics,

Page 843 - SNMPv3 Configuration Examples

Index858MCHECK 382parameters, displaying 760point-to-point port, configuring 350, 750port configuration, displaying 351port cost 350, 750port paramete

Page 844

AT-S62 User’s Guide859SNMPdefault setting for remote management 821default settings 825SNMP communityconfiguring 680enabling 680SNMP community stringa

Page 845 - Operator

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 86Setting the Authentication Failure TrapAs mentioned in the SNMP Overview s

Page 846 - Worksheet

Index860modifyingstorage type 294target address retries 291target address tag list 292target address timeout 290target address UDP port 289target IP a

Page 847

AT-S62 User’s Guide861displaying 112, 622STP ID parameter 442strict priority scheduling 194subnet mask 61, 588configuring 61, 588default setting 823Su

Page 848

Index862setting 69Vversions supported (SSH) parameter 550, 800VID. See VLAN IDview type, modifying 250virtual LAN (VLAN)creating 400, 404, 762default

Page 849

AT-S62 User’s GuideSection I: Basic Operations 87Creating an SNMP Community StringTo create a new SNMP community string, perform the following procedu

Page 850

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 885. Enter the new SNMP community string. The name can be from one to fiftee

Page 851

AT-S62 User’s GuideSection I: Basic Operations 89Modifying a Community StringTo modify a community string, perform the following procedure:1. From the

Page 852

AT-S62 User’s Guide9Chapter 22Multiple VLAN Modes ...

Page 853

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 90The menu options are described below:1 - Add Attributes to CommunityIf a c

Page 854

AT-S62 User’s GuideSection I: Basic Operations 913. If you want to remove the IP address of a management workstation from the community string, enter

Page 855

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 92Do you want to change Community Status? (Y/N): [Yes/No] ->4. Type Y to

Page 856

AT-S62 User’s GuideSection I: Basic Operations 93Displaying the SNMP Community StringsTo display the attributes of all the SNMP community strings on t

Page 857

94Chapter 6Port ParametersThe chapter contains the procedures for viewing and adjusting the parameter settings for the individual ports on a switch. T

Page 858

AT-S62 User’s GuideSection I: Basic Operations 95Displaying Port StatusTo display the current status and settings of the ports on the switch, perform

Page 859

Chapter 6: Port ParametersSection I: Basic Operations 96NoteThe speed, duplex mode, and flow control settings will be blank for ports that have not es

Page 860

AT-S62 User’s GuideSection I: Basic Operations 97Flow CtlThe flow control setting for the port. Possible values are:Disabled - No flow control on the

Page 861

Chapter 6: Port ParametersSection I: Basic Operations 98Configuring Port ParametersTo configure the parameter settings of a port, perform the followin

Page 862

AT-S62 User’s GuideSection I: Basic Operations 99If you are configuring multiple ports and the ports have different settings, the Port Configuration m

Comments to this Manuals

No comments