613-000536 Rev. BManagementSoftwareAT-S86User’s GuideFor the AT-FS750/48 Fast Ethernet Smart SwitchVersion 1.0
Tables10
Chapter 10: STP and RSTP100Figure 30. Edge PortA port can be both a point-to-point and an edge port at the same time. It operates in full-duplex and h
AT-S86 Management Software User’s Guide101not to activate RSTP on an AT-FS750/48 Fast Ethernet Smart Switch even when all other switches are running S
Chapter 10: STP and RSTP102Enabling or Disabling Spanning TreeThe AT-S86 management software supports STP and RSTP. However, only one spanning tree pr
AT-S86 Management Software User’s Guide103Root MAC AddressThe MAC address of the root bridge.Switch MAC AddressThe MAC address of the switch. This val
Chapter 10: STP and RSTP104STP EnabledSTP is enabled.RSTP EnabledRSTP is enabled.3. Do one of the following: Click OK to save the changes. Click Rel
AT-S86 Management Software User’s Guide105Configuring the STP Bridge SettingsThis section contains the procedure for configuring a bridge’s STP settin
Chapter 10: STP and RSTP1065. In the Bridge Priority field, enter a number for the priority number for the bridge. This number is used to determine th
AT-S86 Management Software User’s Guide107Configuring the Spanning Tree Port SettingsTo configure the spanning tree port settings, perform the followi
Chapter 10: STP and RSTP108AutoThe switch automatically detects if the port is functioning as a point-to-point port.YesSets the port to always functio
109Chapter 11SecurityThis chapter provides information on the AT-S86 security features as described in the following sections: “Port-based Network A
11PrefaceThis guide contains instructions on how to use the AT-S86 management software to manage and monitor the AT-FS750/48 Fast Ethernet Smart Switc
Chapter 11: Security110Port-based Network Access ControlPort-based Network Access Control (IEEE 802.1x) uses the RADIUS protocol to control who can se
AT-S86 Management Software User’s Guide111The Port Access Control page is shown in Figure 34.Figure 34. Port Access Control Page2. In the Reauthentica
Chapter 11: Security1126. In the Quiet Period field, enter a number for the number of seconds that the port remains in the quiet state following a fai
AT-S86 Management Software User’s Guide113Force-authorizedDisables IEEE 802.1X port-based authentication and causes the port to transition to the auth
Chapter 11: Security1149. Click Save.Viewing the PortAccess ControlStatusTo view the port access control status, perform the following procedure:1. Fr
AT-S86 Management Software User’s Guide115To initialize a port, perform the following procedure:1. From the main menu, select Security > Port Acces
Chapter 11: Security116Setting Up a Dial-In UserYou should set up a dial-in user account for each person who needs to access the switch for management
AT-S86 Management Software User’s Guide117The Save Configuration page is shown in Figure 3 on page 21.8. Click Save.Modifying a Dial-in UserTo modify
Chapter 11: Security118The Save Configuration page is shown in Figure 3 on page 21.6. Click Save.
AT-S86 Management Software User’s Guide119RADIUSRADIUS is an acronym for Remote Authentication Dial In User Services, an authentication protocol. You
Preface12Where to Find Web-based GuidesThe installation and user guides for all Allied Telesis products are available in portable document format (PDF
Chapter 11: Security120subnets, be sure to specify a default gateway in the IP Setup page (Figure 2 on page 20) so that the switch and server can comm
AT-S86 Management Software User’s Guide121The RADIUS page is shown in Figure 37.Figure 37. RADIUS Page2. In the Authentication Server IP field, specif
Chapter 11: Security122
123Chapter 12StatisticsThis chapter contains the following sections: “Statistics Overview” on page 124 “Viewing the Traffic Comparison Statistic” on
Chapter 12: Statistics124Statistics OverviewStatistics provide important information for troubleshooting switch problems at the port level. The AT-S86
AT-S86 Management Software User’s Guide125Viewing the Traffic Comparison StatisticTo compare a specific type of traffic between all ports on the switc
Chapter 12: Statistics126Inbound Non-unicast Packet RateThe number of good packets received per unit of time (specified by the Auto Refresh parameter)
AT-S86 Management Software User’s Guide127Inbound Non-unicast PacketsThe total number of good packets received that were directed to the broadcast or
Chapter 12: Statistics128A chart, such as the one in Figure 39, is displayed.Figure 39. Sample Traffic Comparison Chart
AT-S86 Management Software User’s Guide129Viewing the Error GroupsThe error groups chart allows you to view a pre-defined group of errors for the port
AT-S86 Management Software User’s Guide13Contacting Allied Telesis This section provides Allied Telesis contact information for technical support as w
Chapter 12: Statistics130A chart, such as the one in is shown Figure 41, is displayed..Figure 41. Sample Error Chart
AT-S86 Management Software User’s Guide131Viewing the Historical StatusTo view the statistics from one or more ports over a period of time, perform th
Chapter 12: Statistics132Inbound Unicast PacketsThe total number of good packets received that were not directed to the broadcast or multicast address
AT-S86 Management Software User’s Guide133An example of a historical status chart is shown in Figure 43 Figure 43. Sample Historical Status Chart
Chapter 12: Statistics134
135Chapter 13MAC AddressesThis chapter contains the following sections: “MAC Address Overview” on page 136 “Working with Dynamic MAC Addresses” on p
Chapter 13: MAC Addresses136MAC Address OverviewEach hardware device that you connect to your Ethernet network has a unique MAC address assigned to it
AT-S86 Management Software User’s Guide137Dynamic MAC addresses are not stored indefinitely in the MAC address table. The switch deletes a dynamic MAC
Chapter 13: MAC Addresses138Working with Dynamic MAC AddressesThis section contains the following procedures: “Displaying the Dynamic MAC Addresses,”
AT-S86 Management Software User’s Guide139The page is redisplayed to contain a list similar to the one in Figure 45.Figure 45. Dynamic MAC Addresses A
Preface14
Chapter 13: MAC Addresses1404. To view the port number on which a MAC address was assigned or learned, click MAC Address, enter the MAC address, and c
AT-S86 Management Software User’s Guide141 Click Reload to clear the changes and start over.4. To permanently save these settings in the configuratio
Chapter 13: MAC Addresses142Working with Static MAC AddressesThis section contains the following procedures: “Adding a Static MAC Address” on page 14
AT-S86 Management Software User’s Guide143None - No packet filtering takes place for this MAC address.Destination - Packets are filtered when this MAC
Chapter 13: MAC Addresses1442. Click First, Previous, Next, or Last to move through the list of MAC addresses to highlight the one you want to remove.
145Chapter 14Downloading New Management SoftwareThe procedure in this chapter is: “Downloading New Management Software” on page 146
Chapter 14: Downloading New Management Software146Downloading New Management SoftwareTo download a new version of the AT-S86 management software, perf
147IndexAaging timechanging 140defined 137BBPDU. See bridge protocol data unitbridge forwarding delaySpanning Tree Protocol (STP) 103, 105bridge hello
Index148name 42open access status 42source port 58Spanning Tree Protocol (STP)and VLANs 101bridge forwarding delay 103, 105bridge hello time 103bridge
15Chapter 1Getting StartedThis chapter contains the following sections: “Starting a Management Session” on page 16 “Quitting a Management Session” o
Chapter 1: Getting Started16Starting a Management SessionTo start a management session on the switch, perform the following procedure:1. In a web brow
AT-S86 Management Software User’s Guide17Subnet Mask, and Gateway Address” on page 20.Add an administrative user and password who can access the switc
Chapter 1: Getting Started18Quitting a Management SessionTo quit a management session, close the web browser.
19Chapter 2Basic Switch ParametersThis chapter contains the following sections: “Configuring the IP Address, Subnet Mask, and Gateway Address” on pag
Copyright © 2006 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied
Chapter 2: Basic Switch Parameters20Configuring the IP Address, Subnet Mask, and Gateway AddressWarningBe sure to record the switch’s IP address in a
AT-S86 Management Software User’s Guide217. Log into the switch using its new IP address.8. From the main menu, select Save Configuration.The Save Con
Chapter 2: Basic Switch Parameters22Enabling or Disabling DHCPTo enable or disable the DHCP client, perform the following procedure:1. From the main m
AT-S86 Management Software User’s Guide23Configuring System Administration InformationYou can allow multiple users to access and administer the system
Chapter 2: Basic Switch Parameters246. To permanently save these settings in the configuration file, from the main menu, select Save Configuration.The
AT-S86 Management Software User’s Guide25NoteBe careful not to delete all the users. You should have at least one user, with a password, to manage the
Chapter 2: Basic Switch Parameters26Configuring the System Management InformationThis section explains how to assign a name to the switch, as well as
AT-S86 Management Software User’s Guide27 Click Reload to clear the fields and start over.6. To permanently save these settings in the configuration
Chapter 2: Basic Switch Parameters28Setting Up IP Address AccessYou can restrict remote management of the switch by creating an IP access list. The sw
AT-S86 Management Software User’s Guide296. Click Save.Modifying an IPAddress in the IPAccess ListTo modify an IP address in the IP access list, perfo
3Preface ...
Chapter 2: Basic Switch Parameters30Enabling orDisabling IPAccessTo enable or disable IP access for the users, perform the following procedure:1. From
AT-S86 Management Software User’s Guide31Rebooting the SwitchNoteThe reboot process stops network traffic and you lose your connection to the switch.T
Chapter 2: Basic Switch Parameters32Returning the AT-S86 Management Software to the Default ValuesTo restore the management software to the factory de
33Chapter 3Port ConfigurationThis chapter contains the following procedures: “Enabling or Disabling a Port” on page 34 “Setting a Port’s Speed and D
Chapter 3: Port Configuration34Enabling or Disabling a PortTo enable or disable a port, perform the following procedure:1. From the main menu, select
AT-S86 Management Software User’s Guide35Setting a Port’s Speed and Duplex ModeTo set the speed and duplex mode on the port, perform the following pro
Chapter 3: Port Configuration366. To permanently save these settings in the configuration file, from the main menu, select Save Configuration.The Save
AT-S86 Management Software User’s Guide37Enabling or Disabling Flow ControlA switch port uses flow control to control the flow of ingress packets from
Chapter 3: Port Configuration38Configuring Bandwidth ControlIf the performance of your network is affected by heavy traffic, you can use bandwidth con
AT-S86 Management Software User’s Guide39b. In the Control list, select Enable to enable the control, or Disable to disable it.c. In the Mode list, se
Contents4Modifying a Trunk ...
Chapter 3: Port Configuration40
41Chapter 4SNMPThis chapter contains the following topics: “SNMP Overview” on page 42 “Setting Up the SNMP Community Table” on page 44 “Setting Up
Chapter 4: SNMP42SNMP OverviewThe Simple Network Management Program (SNMP) is another way for you to manage the switch. This type of management involv
AT-S86 Management Software User’s Guide43Trap ReceiversA trap is a signal sent to one or more management workstations by the switch to indicate the oc
Chapter 4: SNMP44Setting Up the SNMP Community TableTo define the SNMP community names and their settings, perform the following procedure:1. From the
AT-S86 Management Software User’s Guide45Setting Up the Host TableWhen you assign a host IP address to a community string, you identify which manageme
Chapter 4: SNMP466. Click Save.
AT-S86 Management Software User’s Guide47Setting Up SNMP Trap ReceiversTo set up the SNMP trap receivers, perform the following procedure:1. From the
Chapter 4: SNMP48
49Chapter 5Port TrunkingThis chapter contains the following sections: “Port Trunking Overview” on page 50 “Creating a Port Trunk” on page 52 “Modif
AT-S86 Management Software User’s Guide5RADIUS ...
Chapter 5: Port Trunking50Port Trunking OverviewA port trunk is an economical way for you to increase the bandwidth between the Ethernet switch and an
AT-S86 Management Software User’s Guide51Also note that a static trunk does not provide for redundancy or link backup. If a port in a static trunk los
Chapter 5: Port Trunking52Creating a Port TrunkTo create a port trunk, perform the following procedure:1. From the main menu, select Bridge > Trunk
AT-S86 Management Software User’s Guide536. Do one of the following: Click OK to save the trunk. Click Reload to clear the trunk name and port selec
Chapter 5: Port Trunking54Modifying a TrunkTo modify a port trunk, perform the following procedure:1. From the main menu, select Bridge > Trunking.
AT-S86 Management Software User’s Guide55Removing a TrunkTo remove a port trunk, perform the following procedure:1. From the main menu, select Bridge
Chapter 5: Port Trunking56
57Chapter 6Port MirroringThis chapter describes port mirroring and contains the following topics: “Port Mirroring Overview” on page 58 “Configuring
Chapter 6: Port Mirroring58Port Mirroring OverviewThe port mirroring feature allows you to unobtrusively monitor the traffic being received and transm
AT-S86 Management Software User’s Guide59Configuring Port MirroringTo configure port mirroring, perform the following procedure:1. From the main menu,
Contents6
Chapter 6: Port Mirroring60A check mark is placed for each port you select, as for example Figure 18.Figure 18. Ingress Ports Selected3. Select the po
AT-S86 Management Software User’s Guide616. Do one of the following: Click OK to save the port mirror. Click Reload to clear the port mirror and sta
Chapter 6: Port Mirroring62Modifying a Port MirrorTo modify a port mirror, perform the following procedure.1. From the main menu, select Bridge > M
63Chapter 7VLANsThis chapter about VLANs contains the following sections: “VLAN Overview” on page 64 “Port-based VLAN Overview” on page 66 “Tagged
Chapter 7: VLANs64VLAN OverviewA VLAN is a group of ports on an Ethernet switch that form a logical Ethernet segment. The ports of a VLAN form an inde
AT-S86 Management Software User’s Guide65management software. You can change the VLAN memberships through the management software without moving the w
Chapter 7: VLANs66Port-based VLAN OverviewAs explained in “VLAN Overview” on page 64, a VLAN consists of a group of ports on an Ethernet switch that f
AT-S86 Management Software User’s Guide67Tagged VLAN OverviewThe second type of VLAN supported by the AT-S86 management software is the tagged VLAN. V
Chapter 7: VLANs68match one of the Group IDs assigned to the port, the packet is discarded.Port VLANIdentifierWhen an untagged packet is received on a
AT-S86 Management Software User’s Guide69Creating a Port-Based VLANThis section contains the following procedures: “Creating a Port-Based VLAN”, next
7Figure 1. Main Page ...
Chapter 7: VLANs70A check mark is placed for each port you select, as for example Figure 21.Figure 21. Port-based VLAN Ports Selected5. Or, click Atta
AT-S86 Management Software User’s Guide71selectively click the ones you do not want included.4. Do one of the following: Click OK to save the changes
Chapter 7: VLANs72Creating a Tagged VLANThis section contains the following procedures: “Creating a Tagged VLAN”, next “Modifying a Tagged VLAN” on
AT-S86 Management Software User’s Guide73The page is refreshed to show the ports without any designations and other parameters you need to define to c
Chapter 7: VLANs74Figure 24 shows an example of a tagged VLAN with the ports selected. Figure 24. Tagged VLAN Ports Selected7. To start over, click De
AT-S86 Management Software User’s Guide75 Click twice to assign the port as an untagged member of the VLAN. A “U” is placed on that port Click Detac
Chapter 7: VLANs76Changing a Port’s VLAN ModeThe switch can operate in only one VLAN mode at a time: tagged VLAN mode (802.1Q), or port-based VLAN mod
AT-S86 Management Software User’s Guide777. To permanently save these settings in the configuration file, from the main menu, select Save Configuratio
Chapter 7: VLANs78
79Chapter 8Class of Service (CoS)This chapter contains the following topics: “CoS Overview” on page 80 “Configuring CoS” on page 84 “Mapping CoS Pr
Figures8
Chapter 8: Class of Service (CoS)80CoS OverviewWhen a port on an Ethernet switch becomes oversubscribed—its egress queues contain more packets than th
AT-S86 Management Software User’s Guide81and the four egress queues of a switch port.For example, if a tagged packet with a priority level of 3 entere
Chapter 8: Class of Service (CoS)82The procedure for changing the default mappings is found in “Mapping CoS Priorities to Egress Queues” on page 86. N
AT-S86 Management Software User’s Guide83With this type of scheduling, a port transmits all packets out of higher priority queues before transmitting
Chapter 8: Class of Service (CoS)84Configuring CoSTo configure CoS, perform the following procedure:1. From the main menu, select Bridge > Default
AT-S86 Management Software User’s Guide858. Click Save.
Chapter 8: Class of Service (CoS)86Mapping CoS Priorities to Egress QueuesThis procedure explains how to change the default mappings of CoS priorities
AT-S86 Management Software User’s Guide87Specifying the Scheduling AlgorithmTo change the scheduling algorithm, perform the following procedure.1. Fro
Chapter 8: Class of Service (CoS)88
89Chapter 9IGMPThis chapter contains the following topics: “IGMP Snooping Overview” on page 90 “Enabling or Disabling IGMP Snooping” on page 92
9Table 1. Default Mappings of IEEE 802.1p Priority Levels to Priority Queues ...81Ta
Chapter 9: IGMP90IGMP Snooping OverviewThe IGMP protocol enables routers to create lists of nodes that are members of multicast groups. (A multicast g
AT-S86 Management Software User’s Guide91switch ports connected to host nodes.Without IGMP snooping a switch would have to flood multicast packets out
Chapter 9: IGMP92Enabling or Disabling IGMP SnoopingTo enable or disable IGMP Snooping, perform the following procedure:1. From the main menu, select
93Chapter 10STP and RSTPThis chapter provides background information on the Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP). The
Chapter 10: STP and RSTP94STP OverviewThe performance of a Ethernet network can be negatively impacted by the formation of a data loop in the network
AT-S86 Management Software User’s Guide95You can change the bridge priority number in the AT-S86 management software. You can designate which switch o
Chapter 10: STP and RSTP96port on a bridge is typically based on port speed. The faster the port, the lower the port cost. The exceptions to this are:
AT-S86 Management Software User’s Guide97Port PriorityIf two paths have the same port cost, the bridges must select a preferred path. In some instance
Chapter 10: STP and RSTP98software. The appropriate value for this parameter depends on a number of variables; the size of your network is a primary f
AT-S86 Management Software User’s Guide99Point-to-Point and Edge PortsNoteThis section applies only to RSTP.Part of the task of configuring RSTP is de
Comments to this Manuals