Allied Telesis AT-8000GS User's Guide Page 1

Browse online or download User's Guide for Network switches Allied Telesis AT-8000GS. Allied Telesis AT-8000GS User`s guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 205
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User’s Guide

613-001021 Rev. AManagementSoftwareAT-S95Web Browser InterfaceUser’s GuideAT-8000GS Series Stackable Gigabit Ethernet SwitchesVersion 1.0.1

Page 2

Getting StartedStarting the ApplicationPage 10Figure 2: System General Page

Page 3 - Contents

Configuring InterfacesDefining MAC Based GroupsPage 100Defining MAC Based GroupsThe MAC Based Groups Page allows network managers to group VLANs based

Page 4

Configuring InterfacesDefining MAC Based GroupsPage 101• Group ID — Defines the protocol group ID to which the interface is added.• VLAN ID — Attaches

Page 5

Configuring InterfacesDefining MAC Based GroupsPage 102To add a mapped group:1. Click Layer 2 > MAC Based Groups. The MAC Based Groups Page opens:2

Page 6

Configuring System LogsPage 103Section 8. Configuring System LogsThis section provides information for managing system logs. System logs enable viewin

Page 7

Configuring System LogsPage 104The Event Log Page page contains fields for defining which events are recorded to which logs. It contains fields for en

Page 8 - Contacting Allied Telesis

Configuring System LogsPage 105• IP Address — Displays the defined IP address of the syslog server.• Minimum Severity — Indicates the defined minimum

Page 9 - Section 1. Getting Started

Configuring System LogsPage 106• Facility — Defines an application from which system logs are sent to the remote server. Only one facility can be assi

Page 10 - Figure 2: System General Page

Configuring System LogsPage 107Figure 80: View Flash Log PageThe View Flash Log Page and View Temporary Log Page list the following information:• Log

Page 11

Configuring Spanning TreeConfiguring Classic Spanning TreePage 108Section 9. Configuring Spanning TreeSpanning Tree Protocol (STP) provides tree topog

Page 12 - User Interface Components

Configuring Spanning TreeConfiguring Classic Spanning TreePage 109Defining STP PropertiesThe Spanning Tree Page contains parameters for enabling and c

Page 13 - Using the Management Buttons

Getting StartedUsing the Web Browser InterfacePage 11Using the Web Browser InterfaceThis section provides general information about the interface, and

Page 14 - Figure 5: Add Local User Page

Configuring Spanning TreeConfiguring Classic Spanning TreePage 110• Path Cost Default Values — Specifies the method used to assign default path cost t

Page 15 - Logging Out

Configuring Spanning TreeConfiguring Classic Spanning TreePage 111Defining STP InterfacesNetwork administrators can assign STP settings to a specific

Page 16 - Resetting the Device

Configuring Spanning TreeConfiguring Classic Spanning TreePage 112• Port Fast — Indicates if Fast Link is enabled on the port. If Fast Link mode is en

Page 17

Configuring Spanning TreeConfiguring Classic Spanning TreePage 113Figure 83: Spanning Tree Configuration PageIn addition to the STP Interface Configur

Page 18

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 114Configuring Rapid Spanning TreeWhile Classic STP prevents Layer 2 forwarding loops in

Page 19 - Setting the System Clock

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 115• Mode — Displays the current STP mode. The STP mode is selected in the Spanning Tree

Page 20 - Configuring SNTP

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 116Configuring Multiple Spanning TreeMultiple Spanning Tree Protocol (MSTP) provides d

Page 21 - Broadcast Time Information

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 117The MSTP Page contains the following fields: • Region Name — User-defined STP regio

Page 22

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 118The MSTP Interface Settings Page contains the following fields: • Instance ID — Lis

Page 23

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1193. Define the fields.4. Click Apply. MSTP is defined for the selected interface.5.

Page 24 - Configuring System Time

Getting StartedUsing the Web Browser InterfacePage 12User Interface ComponentsThe System General Page example shows the interface components.Figure 4:

Page 25 - • Defining Access Control

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 120Defining MSTP Instance MappingsNetwork administrators can assign MSTP mapping to a

Page 26 - Defining Access Profiles

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 121Defining MSTP Instance SettingsMSTP maps VLANs into STP instances. Packets assigned

Page 27

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1223. Define the fields.4. Click Apply. MSTP is defined for the selected instance, and

Page 28

Configuring Multicast ForwardingPage 123Section 10. Configuring Multicast ForwardingMulticast forwarding allows a single packet to be forwarded to mul

Page 29

Configuring Multicast ForwardingPage 124Configuring IGMP SnoopingWhen IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. Th

Page 30 - Defining Profile Rules

Configuring Multicast ForwardingPage 125• IGMP Snooping Status — Indicates if IGMP snooping is enabled on the VLAN. The possible field values are: – E

Page 31

Configuring Multicast ForwardingPage 126Figure 92: IGMP Configuration PageIn addition to the IGMP Page, the IGMP Configuration Page contains the follo

Page 32

Configuring Multicast ForwardingPage 127Figure 93: Multicast Group PageThe Multicast Group Page contains the following fields:• Enable Bridge Multicas

Page 33

Configuring Multicast ForwardingPage 128Figure 94: Add Multicast Group Page 4. Select the VLAN ID.5. Enter the Bridge Multicast MAC Address and the Br

Page 34

Configuring Multicast ForwardingPage 129Defining Multicast Forward All SettingsMulticast forwarding enables transmitting packets from either a specifi

Page 35

Getting StartedUsing the Web Browser InterfacePage 13Using the Management Buttons Management buttons provide an easy method of configuring device info

Page 36

Configuring Multicast ForwardingPage 1302. Select interfaces to modify.3. Click Modify. The Multicast Forward All Configuration Page opens:Figure 97:

Page 37

Configuring SNMPPage 131Section 11. Configuring SNMPSimple Network Management Protocol (SNMP) provides a method for managing network devices. Equipmen

Page 38 - Configuring TACACS+

Configuring SNMPPage 132the MIBs.All parameters are manageable from any SNMP management platform, except the SNMP management station IP address and co

Page 39

Configuring SNMPPage 133Enabling SNMPThe SNMP Global Page provides fields for globally enabling and configuring SNMP on the device.To enable SNMP: 1.

Page 40

Configuring SNMPPage 134Defining SNMP CommunitiesAccess rights are managed by defining communities in the SNMP Community Page. When the community name

Page 41 - Configuring RADIUS

Configuring SNMPPage 135SNMP Communities Basic TableThe SNMP Communities Basic Table contains the following fields:• Management Station — Displays the

Page 42

Configuring SNMPPage 136• Access Mode — Defines the access rights of the community. The possible field values are:– Read Only — Management access is r

Page 43

Configuring SNMPPage 137Figure 101:Community Configuration Page3. Define the Basic or Advanced configuration of the community.4. Click Apply. The SNMP

Page 44 - Configuring Local Users

Configuring SNMPPage 138Defining SNMP GroupsThe SNMP Group Page provides information for creating SNMP groups, and assigning SNMP access control privi

Page 45

Configuring SNMPPage 139– Write — Management access is read-write and changes can be made to the assigned SNMP view.– Notify — Sends traps for the ass

Page 46 - Defining Line Passwords

Getting StartedUsing the Web Browser InterfacePage 14Adding, Modifying and Deleting InformationThe WBI contains and tables for configuring devices. Us

Page 47 - Configuring Network Security

Configuring SNMPPage 140Defining SNMP UsersThe SNMP Users Page enables assigning system users to SNMP groups, as well as defining the user authenticat

Page 48 - Figure 29: Port Security Page

Configuring SNMPPage 141• Authentication — Displays the method used to authenticate users. The possible field values are:– MD5 Key — Users are authent

Page 49

Configuring SNMPPage 142• Authentication Key — Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are en

Page 50 - Defining 802.1x Port Access

Configuring SNMPPage 143Defining SNMP ViewsThe SNMP views provide or block access to device features or portions of features. Feature access is grante

Page 51

Configuring SNMPPage 144Figure 109:Add SNMP VIew Page3. Define the View Name field.4. Select the Subtree ID Tree using one of the following options:–

Page 52

Configuring SNMPPage 145Defining Notification RecipientsThe SNMP Notify Page contains fields for defining SNMP notification recipients. the page conta

Page 53 - Enabling Storm Control

Configuring SNMPPage 146SNMPv1,2c Notification RecipientThe SNMP v1, v2c Recipient table contains the following fields:• Recipients IP — Displays the

Page 54

Configuring SNMPPage 147Figure 111: Add Notify Page 3. Define the relevant fields.4. Click Apply. The notification recipient settings are saved and th

Page 55 - Defining Access Control

Configuring SNMPPage 148Figure 112: SNMP Notify Configuration Page3. Define the fields.4. Click Apply. The SNMP Notification configuration is modified

Page 56

Configuring SNMPPage 149Defining Notification FiltersThe SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a

Page 57 - Adding ACE Rules

Getting StartedLogging OutPage 154. Define the fields. 5. Click Apply. The fields are modified, and the information is saved to the device. To delete

Page 58

Configuring SNMPPage 150To add an SNMP notification filter:1. Click the Add button. The Add SNMP Notification Filter Page opens:Figure 114: Add SNMP N

Page 59

Configuring Power Over EthernetPage 151Section 12. Configuring Power Over EthernetThis section describes configuring Power over Ethernet (PoE) for an

Page 60 - Defining IP Based ACL

Configuring Power Over EthernetPage 152Figure 115: Power Over Ethernet Page The Power Over Ethernet Page contains the following fields:Global PoE Conf

Page 61

Configuring Power Over EthernetPage 153Defining Power Over Ethernet ConfigurationTo modify PoE port settings: 1. In the Power Over Ethernet Page Zoom

Page 62

Configuring Power Over EthernetPage 154– Fault — Indicates one of the following:– The powered device test has failed. For example, a port could not be

Page 63

Configuring ServicesPage 155Section 13. Configuring ServicesThis section describes Quality of Service related configurations. QoS supports activating

Page 64

Configuring ServicesPage 156Enabling Class of Service (CoS)The CoS Page enables configuring the CoS ports or trunks on the device.To configure CoS por

Page 65

Configuring ServicesPage 157• Select the interfaces displayed in the table.– Ports of Unit — Specifies the port and stacking member for which the CoS

Page 66 - Defining ACL Binding

Configuring ServicesPage 158Configuring CoS Queueing and SchedulingThe CoS Queuing & Scheduling Page provides fields for configuring CoS Priority

Page 67

Configuring ServicesPage 159Mapping CoS Values to QueuesThe Configure CoS Page contains fields for classifying CoS settings to traffic queues.To set C

Page 68 - • Defining Trusted Interfaces

Getting StartedResetting the DevicePage 16Resetting the DeviceThe Reset option enables resetting the device from a remote location. NoteSave all chang

Page 69

Configuring ServicesPage 160Mapping DSCP Values to QueuesThe Configure DSCP Page contains fields for classifying DSCP settings to traffic queues. For

Page 70

Configuring ServicesPage 161The Configure DSCP Page contains the following fields:• Restore Defaults — Restores the device factory defaults for mappin

Page 71 - Defining Trusted Interfaces

Configuring ServicesPage 162As a default the Bandwidth Page opens displaying the port options. The fields are identical when displaying the trunk CoS.

Page 72

System UtilitiesPage 163Section 14. System UtilitiesThe configuration file structure involves the following configuration files:• Startup Configuratio

Page 73

System UtilitiesPage 164Restoring the Default Configurationin the System Utilities Page, the Reset to Factory Defaults function restores the Configura

Page 74

System UtilitiesPage 1652. Select the After Reset image file.3. Click Apply (below the table). The factory defaults are restored, and the device is up

Page 75 - Section 6. Configuring Ports

System UtilitiesPage 166If the TFTP Operation is Configuration, the possible values are:– Running Configuration — Contains the configuration currently

Page 76 - Configuring Ports

System UtilitiesPage 167Viewing Integrated Cable TestsThe Cable Test Page contains fields for performing tests on copper cables. Cable testing provide

Page 77

System UtilitiesPage 168• Cable Length — Indicates the approximate cable length. This test can only be performed when the port is up and operating at

Page 78

System UtilitiesPage 169Viewing Optical TransceiversThe Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Opti

Page 79 - Configuring Port Mirroring

Defining System InformationPage 17Section 2. Defining System InformationThe contains general device information, including system name and its IP add

Page 80

System UtilitiesPage 170Resetting the DeviceThe Reset page enables the user to reset the system. Save all changes to the Running Configuration file be

Page 81

Viewing StatisticsViewing Device StatisticsPage 171Section 15. Viewing StatisticsThe device provides statistics for RMON, interfaces, and Etherlike. T

Page 82 - Aggregating Ports

Viewing StatisticsViewing Device StatisticsPage 172The Interface Statistics Page contains the following fields:• Select the interfaces displayed in th

Page 83

Viewing StatisticsViewing Device StatisticsPage 173Viewing Etherlike Statistics The Etherlike Statistics Page displays interface statistics. To view E

Page 84

Viewing StatisticsViewing Device StatisticsPage 174• Excessive Collisions — Displays the number of excessive collisions received on the selected inter

Page 85

Viewing StatisticsManaging RMON StatisticsPage 175Managing RMON StatisticsThis section contains the following topics: • Viewing RMON Statistics• Confi

Page 86 - Defining Port Trunking

Viewing StatisticsManaging RMON StatisticsPage 176• Refresh Rate — Defines the frequency of the RMON statistics updates. The possible field values are

Page 87

Viewing StatisticsManaging RMON StatisticsPage 177Configuring RMON HistoryThe RMON History Page contains information about samples of data taken from

Page 88 - Configuring LACP

Viewing StatisticsManaging RMON StatisticsPage 1782. Click Add. The Add RMON History Page opens:Figure 134:Add RMON History PageIn addition to the RMO

Page 89

Viewing StatisticsManaging RMON StatisticsPage 179Viewing the RMON History TableThe RMON History Table Page contains interface specific statistical ne

Page 90 - Defining MAC Addresses

Defining System InformationPage 18• Default Gateway — The IP address of a router for remote management of the device. The address must be entered in t

Page 91

Viewing StatisticsManaging RMON StatisticsPage 180• CRC Align Errors — Displays the number of CRC and Align errors that have occurred on the interface

Page 92

Viewing StatisticsManaging RMON StatisticsPage 181Configuring RMON EventsThe RMON Events Page contains fields for defining, modifying and viewing RMON

Page 93 - Configuring VLANs

Viewing StatisticsManaging RMON StatisticsPage 182Figure 138:Add RMON Events Page3. Define the Community, Description, Type and Owner fields.4. Click

Page 94 - Defining VLAN Properties

Viewing StatisticsManaging RMON StatisticsPage 183Viewing the RMON Events LogsThe RMON Events Logs Page contains interface specific statistical networ

Page 95

Viewing StatisticsManaging RMON StatisticsPage 184Defining RMON Alarms The RMON Alarm Page contains fields for setting network alarms. Network alarms

Page 96

Viewing StatisticsManaging RMON StatisticsPage 185• Rising Event — Displays the event that triggers the specific alarm. The possible field values are

Page 97

Viewing StatisticsManaging RMON StatisticsPage 186Figure 143:Alarm Configuration Page3. Define the fields.4. Click Apply. The RMON alarm is saved, and

Page 98 - Defining GVRP

Managing StackingStacking OverviewPage 187Section 16. Managing StackingThis section describes the stacking control management and includes the followi

Page 99

Managing StackingStacking OverviewPage 188Stacking Chain TopologyIn a chain topology, there are two units that have only one neighbor. Every unit has

Page 100 - Defining MAC Based Groups

Managing StackingStacking OverviewPage 189Each port in the stack has a specific Unit ID, port type, and port number, which are part of both the config

Page 101 - Page 101

Configuring System TimePage 19Section 3. Configuring System TimeThe System Time Page provides information for configuring system time parameters, incl

Page 102 - Configuring Interfaces

Managing StackingConfiguring Stacking ManagementPage 190Configuring Stacking ManagementThe Stacking Page allows network managers to either reset the e

Page 103 - Defining Log Settings

System DefaultsPage 191Appendix A. System DefaultsThis section contains the system defaults, and includes the following topics:• RS-232 Port Settings•

Page 104 - Page 104

System DefaultsRS-232 Port SettingsPage 192RS-232 Port SettingsThe following table contains the RS-232 port setting defaults: Port DefaultsThe followi

Page 105 - Adding Log Servers

System DefaultsConfiguration DefaultsPage 193Configuration DefaultsThe following are the initial device configuration defaults: Security DefaultsThe f

Page 106 - Modifying Log Servers

System DefaultsSpanning Tree DefaultsPage 194Spanning Tree DefaultsThe following are the spanning tree defaults:Address Table DefaultsThe following th

Page 107 - Page 107

System DefaultsTrunking DefaultsPage 195Trunking DefaultsThe following are the trunking defaults:Multicast DefaultsThe following are the Multicast def

Page 108 - Page 108

Downloading Software with CLIConnecting a TerminalPage 196Appendix B. Downloading Software with CLIThis section describes how to download system files

Page 109 - Defining STP Properties

Downloading Software with CLIInitial ConfigurationPage 197Initial ConfigurationBefore a device can download system software, the device must have an i

Page 110 - Page 110

Downloading Software with CLIDownloading SoftwarePage 198To check the configuration, enter the command “show ip interface” as illustrated in the follo

Page 111 - Defining STP Interfaces

Downloading Software with CLIDownloading SoftwarePage 1992. Enter the copy command to download the boot file.3. Enter the “bootvar” command to determi

Page 112 - Page 112

Copyright © 2008 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied

Page 113 - Configuring Spanning Tree

Configuring System TimePage 20The Clock Source and System Time sections of the System Time Page contain the following fields:• Clock Source — The sour

Page 114 - Page 114

Downloading Software with CLIDownloading SoftwarePage 2005. Enter the “copy” command to download the system file.6. Reboot the device. The device boot

Page 115 - Page 115

Downloading Software with CLIDownloading SoftwarePage 201Stacking Member Software DownloadEnsure the stack has been correctly connected as described i

Page 116 - Defining MSTP Properties

Downloading Software with CLIDownloading SoftwarePage 2025. Enter the “copy” command to download the system file.6. Reboot the devices being updated.

Page 117 - Defining MSTP Interfaces

IndexPage 203IndexSymbols802.1x port access 50AAbsolute 184Access level 44Access profiles 26access profilesrules 30ACE 55ACL 55, 66ACL Binding 66Alarm

Page 118 - Page 118

IndexPage 204Guest VLAN 50GVRP 99configuration 98GVRP configuration 98, 99HHost 101HTTP 28, 37IIGMP 124IGMPv1 and 2 124IGMPv3 124Informational 104inte

Page 119

IndexPage 205RSTP 114Rules 28SSamples 177Scheduling 158Secure HTTP 28, 37Secure Telnet 28Secure telnet 36security802.1x port access 50server based aut

Page 120

Configuring System TimePage 21Broadcast Time InformationBroadcast information is used when the server IP address is unknown. When a broadcast message

Page 121 - Page 121

Configuring System TimePage 22– Time — The time at which DST begins. The field format is HH:MM. For example: 05:30.• To — Indicates the time that DST

Page 122

Configuring System TimePage 23• Canada — From the first Sunday in April until the last Sunday of October. Daylight Saving Time is usually regulated by

Page 123 - • Configuring IGMP Snooping

Configuring System TimePage 24• Turkey — From the last weekend of March until the last weekend of October.• United Kingdom — From the last weekend of

Page 124 - Configuring IGMP Snooping

Configuring Device SecurityPage 25Section 4. Configuring Device SecurityThis section describes setting security parameters for ports, device managemen

Page 125 - Page 125

Configuring Device SecurityConfiguring Management SecurityPage 26Configuring Management SecurityThis section provides information for configuring devi

Page 126 - Page 126

Configuring Device SecurityConfiguring Management SecurityPage 27Figure 10: Access Profile PageThe Access Profile Page contains a table listing the cu

Page 127 - Page 127

Configuring Device SecurityConfiguring Management SecurityPage 28Figure 11: Add Access Profile PageThe Add Access Profile Page contains the following

Page 128 - Page 128

Configuring Device SecurityConfiguring Management SecurityPage 29• Action — Defines the action attached to the access rule. The possible field values

Page 129 - Page 129

Page 3 ContentsPreface...

Page 130 - Page 130

Configuring Device SecurityConfiguring Management SecurityPage 30Defining Profile RulesAccess profiles can contain up to 128 rules that determine whic

Page 131 - Section 11. Configuring SNMP

Configuring Device SecurityConfiguring Management SecurityPage 31• Management Method — Defines the management method for which the rule is defined. Us

Page 132 - Page 132

Configuring Device SecurityConfiguring Management SecurityPage 32To modify an access rule:1. Click Mgmt. Security > Profile Rules: The Profile Rule

Page 133 - Enabling SNMP

Configuring Device SecurityConfiguring Management SecurityPage 33Defining Authentication ProfilesAuthentication profiles allow network administrators

Page 134 - Defining SNMP Communities

Configuring Device SecurityConfiguring Management SecurityPage 34– RADIUS — Authenticates the user at the RADIUS server. For more information, see Def

Page 135 - SNMP Communities Basic Table

Configuring Device SecurityConfiguring Management SecurityPage 354. Enter the Profile Name.5. Using the arrows, move the method(s) from the Optional M

Page 136 - Page 136

Configuring Device SecurityConfiguring Management SecurityPage 36Mapping Authentication ProfilesAfter authentication profiles are defined, they can be

Page 137 - Configuring SNMP

Configuring Device SecurityConfiguring Management SecurityPage 37• Secure HTTP — Indicates that authentication methods are used for secure HTTP access

Page 138 - Defining SNMP Groups

Configuring Device SecurityConfiguring Server Based AuthenticationPage 38Configuring Server Based AuthenticationNetwork administrators assign authenti

Page 139 - Figure 103:Add Group Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 39The TACACS+ Page contains the following fields:• Timeout for Reply — Defines

Page 140 - Defining SNMP Users

Page 4 Configuring DHCP Snooping ... 68Defining DHCP Snoo

Page 141 - Page 141

Configuring Device SecurityConfiguring Server Based AuthenticationPage 40To modify TACACS+ server settings:1. Click Mgmt. Protocols > TACACS+. The

Page 142

Configuring Device SecurityConfiguring Server Based AuthenticationPage 41Configuring RADIUSRemote Authorization Dial-In User Service (RADIUS) servers

Page 143 - Defining SNMP Views

Configuring Device SecurityConfiguring Server Based AuthenticationPage 42• Authentication Port — Identifies the authentication port. The authenticatio

Page 144 - Figure 109:Add SNMP VIew Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 43Figure 24: RADIUS Configuration Page3. Define the relevant fields.4. Click Ap

Page 145 - Page 145

Configuring Device SecurityConfiguring Server Based AuthenticationPage 44Configuring Local UsersNetwork administrators can define users, passwords, an

Page 146 - SNMPv3 Notification Recipient

Configuring Device SecurityConfiguring Server Based AuthenticationPage 45Figure 26: Add Local User PageIn addition to the fields in the Local Users Pa

Page 147 - Figure 111: Add Notify Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 46Defining Line PasswordsNetwork administrators can define line passwords in th

Page 148

Configuring Device SecurityConfiguring Network SecurityPage 47Configuring Network SecurityNetwork security manages locked ports.Port-based authenticat

Page 149 - Defining Notification Filters

Configuring Device SecurityConfiguring Network SecurityPage 48Figure 29: Port Security PageThe Port Security Page displays the Zoom View of the select

Page 150 - Page 150

Configuring Device SecurityConfiguring Network SecurityPage 49Figure 30: Port Security Configuration PageThe Port Security Configuration Page contains

Page 151 - Page 151

Page 5 Defining SNMP Views...

Page 152 - Page 152

Configuring Device SecurityConfiguring Network SecurityPage 50Defining 802.1x Port AccessThe 802.1x Port Access Page allows enabling port access globa

Page 153 - Page 153

Configuring Device SecurityConfiguring Network SecurityPage 51The 802.1x Port Access Page also displays the Zoom View of the selected stacking member’

Page 154 - Page 154

Configuring Device SecurityConfiguring Network SecurityPage 52• Admin Port Control — Indicates the port state. The possible field values are:– Auto —E

Page 155 - Page 155

Configuring Device SecurityConfiguring Network SecurityPage 53Enabling Storm ControlStorm control limits the amount of unknown Unicast, Multicast and

Page 156 - Page 156

Configuring Device SecurityConfiguring Network SecurityPage 54Figure 34: Storm Control Configuration PageThe Storm Control Configuration Page contains

Page 157 - Page 157

Configuring Device SecurityDefining Access ControlPage 55Defining Access ControlAccess Control Lists (ACL) allow network managers to define classifica

Page 158 - Page 158

Configuring Device SecurityDefining Access ControlPage 56The MAC Based ACL Page contains the following fields:• ACL Name — Displays the specific MAC b

Page 159 - Mapping CoS Values to Queues

Configuring Device SecurityDefining Access ControlPage 57Figure 36: Add MAC Based ACL Page3. In the ACL Name field, type a name for the ACL.4. Enable

Page 160 - Mapping DSCP Values to Queues

Configuring Device SecurityDefining Access ControlPage 58Figure 37: Add MAC Based ACE Page3. Define the fields.4. Click Apply. The MAC Based ACE rule

Page 161 - Configuring QoS Bandwidth

Configuring Device SecurityDefining Access ControlPage 593. Define the fields.4. Click Apply. The MAC Based ACL configuration is defined, and the devi

Page 162 - Page 162

Page 6 Spanning Tree Defaults ...194Address T

Page 163 - Section 14. System Utilities

Configuring Device SecurityDefining Access ControlPage 60Defining IP Based ACLThe IP Based ACL Page contains information for defining IP Based ACLs, i

Page 164 - Page 164

Configuring Device SecurityDefining Access ControlPage 61– TCP — Transmission Control Protocol (TCP). Enables two hosts to communicate and exchange da

Page 165 - Page 165

Configuring Device SecurityDefining Access ControlPage 62• Destination– IP Address — Matches the destination port IP address to which packets are addr

Page 166 - Page 166

Configuring Device SecurityDefining Access ControlPage 63Figure 40: Add IP Based ACL PageIn addition to the IP Based ACL Page, the Add IP Based ACL Pa

Page 167 - Page 167

Configuring Device SecurityDefining Access ControlPage 64Adding ACE Rules1. Click Network Security > IP Based ACL. The IP Based ACL Page opens.2. C

Page 168 - System Utilities

Configuring Device SecurityDefining Access ControlPage 65Figure 42: IP Based ACL Configuration Page3. Define the fields.4. Click Apply. The IP Based A

Page 169 - Viewing Optical Transceivers

Configuring Device SecurityDefining Access ControlPage 66Defining ACL BindingWhen an ACL is bound to an interface, all the ACE rules that have been de

Page 170

Configuring Device SecurityDefining Access ControlPage 67Figure 44: ACL Binding ConfigurationThe ACL Binding Configuration contains the following fiel

Page 171 - Viewing Device Statistics

Configuring DHCP SnoopingPage 68Section 5. Configuring DHCP SnoopingDHCP Snooping expands network security by providing an extra layer of security bet

Page 172 - Page 172

Configuring DHCP SnoopingPage 69Figure 45: DHCP Snooping General PageThe DHCP Snooping General Page contains the following fields:• Enable DHCP Snoopi

Page 173 - Viewing Etherlike Statistics

PrefaceWeb Browser Interface User’s Guide OverviewPage 7PrefaceThis guide contains instructions on how to configure an AT-S95 Series Layer 2+ Gigabit

Page 174 - Page 174

Configuring DHCP SnoopingPage 70• DHCP Option 82 Insertion — DHCP Option 82 attaches authentication messages to the packets sent to DHCP Server via TC

Page 175 - Managing RMON Statistics

Configuring DHCP SnoopingPage 71Defining Trusted InterfacesThe Trusted Interfaces Page allows network manager to define Trusted interfaces. Trusted in

Page 176 - Page 176

Configuring DHCP SnoopingPage 722. From the global Interface field, define the specific port or trunk.3. In the table, select an interface and click M

Page 177 - Configuring RMON History

Configuring DHCP SnoopingPage 73Binding Addresses to the DHCP Snooping DatabaseThe Binding Database Page contains parameters for querying and adding I

Page 178 - Viewing Statistics

Configuring DHCP SnoopingPage 74Query ResultsThe Query Results table contains the following fields:• MAC Address — Indicates the MAC address found dur

Page 179 - Page 179

Configuring PortsSetting Ports ConfigurationsPage 75Section 6. Configuring PortsPort Configuration includes the following procedures for configuring p

Page 180 - Page 180

Configuring PortsSetting Ports ConfigurationsPage 763. Click Modify. The Port Setting Configuration Page opens:Figure 52: Port Setting Configuration P

Page 181 - Configuring RMON Events

Configuring PortsSetting Ports ConfigurationsPage 77• Admin Status — Displays the link operational status. The possible field values are: – Up — Indic

Page 182

Configuring PortsSetting Ports ConfigurationsPage 78• Admin Advertisement — Defines the auto negotiation setting the port advertises. The possible fie

Page 183 - Viewing the RMON Events Logs

Configuring PortsSetting Ports ConfigurationsPage 79Configuring Port MirroringPort mirroring monitors and mirrors network traffic by forwarding copies

Page 184 - Defining RMON Alarms

PrefaceIntended AudiencePage 8• Section 16, “Managing Stacking” — Provides information for stacking, including a stacking overview. • Appendix A, “Dow

Page 185 - Page 185

Configuring PortsSetting Ports ConfigurationsPage 80• Status — Indicates if the port is currently monitored. The possible field values are:– Active —

Page 186

Configuring PortsSetting Ports ConfigurationsPage 813. Define the Type field.4. Click Apply. The Port mirroring is modified, and the device is updated

Page 187 - Section 16. Managing Stacking

Configuring PortsAggregating PortsPage 82Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a single

Page 188 - Stacking Members and Unit ID

Configuring PortsAggregating PortsPage 83Figure 56: Trunk Settings PageThe Trunk Settings Page displays information about the currently defined trunks

Page 189 - Exchanging Stacking Members

Configuring PortsAggregating PortsPage 84– Disable — LACP is disabled on the trunk.• PVE — Enables a port to be a Private VLAN Edge (PVE) port. When a

Page 190 - Figure 144:Stacking Page

Configuring PortsAggregating PortsPage 85• Current Status — Indicates whether the trunk is currently operational or non-operational. The possible fiel

Page 191 - Appendix A. System Defaults

Configuring PortsAggregating PortsPage 86• PVE — Enables a port to be a Private VLAN Edge (PVE) port. When a port is defined as PVE, it bypasses the F

Page 192 - Port Defaults

Configuring PortsAggregating PortsPage 87Figure 59: Port Trunking Configuration PageIn addition to the fields in the The Port Trunking Page, the Port

Page 193 - Configuration Defaults

Configuring PortsAggregating PortsPage 88Configuring LACPTrunk ports can contain different media types if the ports are operating at the same speed. A

Page 194 - VLAN Defaults

Configuring PortsAggregating PortsPage 89Figure 61: LACP Configuration Page3. Define the fields.4. Click Apply. The LACP settings are saved and the de

Page 195 - QoS Defaults

Getting StartedStarting the ApplicationPage 9Section 1. Getting StartedThis section provides an introduction to the Web Browser Interface, and include

Page 196 - Connecting a Terminal

Configuring InterfacesPage 90Section 7. Configuring InterfacesThis section contains information on configuring the interfaces of the device.This secti

Page 197 - Initial Configuration

Configuring InterfacesPage 91The MAC Address Page contains the following fields:• View Static — Displays the static addresses assigned to the ports on

Page 198 - Downloading Software

Configuring InterfacesPage 92To delete all MAC addresses: 1. Click Layer 2 > MAC Address. The MAC Address Page opens.2. Click Delete in the Delete

Page 199 - Downloading Software with CLI

Configuring InterfacesConfiguring VLANsPage 93Configuring VLANs This section describes how to create and configure Virtual LANs (VLANs).VLANs are logi

Page 200

Configuring InterfacesConfiguring VLANsPage 94Defining VLAN PropertiesThe VLAN Page provides information and global parameters for configuring and wor

Page 201

Configuring InterfacesConfiguring VLANsPage 95• Interface Status — Indicates the interface’s membership status in the VLAN. The possible field values

Page 202

Configuring InterfacesConfiguring VLANsPage 96Defining VLAN Interface SettingsThe VLAN Interface Page contains fields for managing ports that are part

Page 203 - Page 203

Configuring InterfacesConfiguring VLANsPage 97• PVID — Port Default VLAN ID. Assigns a VLAN ID to untagged packets. The possible values are 1-4094. VL

Page 204 - Page 204

Configuring InterfacesConfiguring VLANsPage 98Defining GVRPThe GVRP Page enables users to configure GARP VLAN Registration Protocol (GVRP) on the devi

Page 205 - Page 205

Configuring InterfacesConfiguring VLANsPage 99• Select the interfaces displayed in the table.– Ports of Unit — Specifies the port and stacking member

Comments to this Manuals

No comments