Allied Telesis AT-S63 User Manual

Browse online or download User Manual for Network switches Allied Telesis AT-S63. Allied Telesis AT-S63 User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 582
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
613-001022 Rev. C
Management
Software
AT-S63
Features Guide
For Stand-alone AT-9400 Switches
and AT-9400Ts Stacks
AT-S63 Version 2.2.0 for AT-9400 Layer 2+ Switches
AT-S63 Version 4.1.0 for AT-9400 Basic Layer 3 Switches
Page view 0
1 2 3 4 5 6 ... 581 582

Summary of Contents

Page 1 - Features Guide

613-001022 Rev. CManagement SoftwareAT-S63◆Features GuideFor Stand-alone AT-9400 Switchesand AT-9400Ts StacksAT-S63 Version 2.2.0 for AT-9400 Layer 2+

Page 2

Contents10Section VIII: Port Security ...413Chapter 35: MAC Address-

Page 3

Chapter 5: MAC Address Table100 Section I: Basic Operations

Page 4

Section I: Basic Operations 101Chapter 6Static Port TrunksThis chapter describes static port trunks. Sections in the chapter include: “Supported Plat

Page 5

Chapter 6: Static Port Trunks102 Section I: Basic OperationsSupported PlatformsRefer to Table 33 and Table 34 for the AT-9400 Switches and the managem

Page 6

AT-S63 Management Software Features GuideSection I: Basic Operations 103OverviewA static port trunk is a group of two to eight ports that function as

Page 7

Chapter 6: Static Port Trunks104 Section I: Basic OperationsLoad Distribution MethodsThis section discusses the load distribution methods of static po

Page 8

AT-S63 Management Software Features GuideSection I: Basic Operations 105A similar method is used for the two load distribution methods that employ bot

Page 9

Chapter 6: Static Port Trunks106 Section I: Basic OperationsGuidelinesHere are the guidelines to static trunks: Allied Telesis recommends limiting st

Page 10 - Contents

Section I: Basic Operations 107Chapter 7LACP Port TrunksThis chapter explains Link Aggregation Control Protocol (LACP) port trunks. Sections in the ch

Page 11

Chapter 7: LACP Port Trunks108 Section I: Basic OperationsSupported PlatformsRefer to Table 35 and Table 36 for the AT-9400 Switches and the managemen

Page 12

AT-S63 Management Software Features GuideSection I: Basic Operations 109OverviewLACP (Link Aggregation Control Protocol) port trunks perform the same

Page 13

AT-S63 Management Software Features Guide11Chapter 39: PKI Certificates and SSL ...

Page 14

Chapter 7: LACP Port Trunks110 Section I: Basic OperationsLACP System PriorityIt is possible for two devices interconnected by an aggregate trunk to e

Page 15

AT-S63 Management Software Features GuideSection I: Basic Operations 111Adminkey ParameterThe adminkey is a hexadecimal value from 1 to FFFF that iden

Page 16

Chapter 7: LACP Port Trunks112 Section I: Basic OperationsLoad Distribution MethodsThe load distribution method determines the manner in which the swi

Page 17

AT-S63 Management Software Features GuideSection I: Basic Operations 113GuidelinesThe following guidelines apply to creating aggregators: LACP must b

Page 18

Chapter 7: LACP Port Trunks114 Section I: Basic Operations When creating a new aggregator, you can specify either a name for the aggregator or an adm

Page 19

Section I: Basic Operations 115Chapter 8Port MirrorThis chapter explains the port mirror feature. Sections in the chapter include: “Supported Platfor

Page 20

Chapter 8: Port Mirror116 Section I: Basic OperationsSupported PlatformsRefer to Table 37 and Table 38 for the AT-9400 Switches and the management int

Page 21

AT-S63 Management Software Features GuideSection I: Basic Operations 117OverviewThe port mirror feature allows for the unobtrusive monitoring of ingre

Page 22 - How This Guide is Organized

Chapter 8: Port Mirror118 Section I: Basic Operations

Page 23

Section I: Basic Operations 119Chapter 9Link-flap ProtectionThis chapter explains link-flap protection. The sections in this chapter include: “Suppor

Page 24

Contents12Internet Protocol Version 4 Packet Routing...

Page 25 - Product Documentation

Chapter 9: Link-flap Protection120 Section I: Basic OperationsSupported PlatformsRefer to Table 39 and Table 40 for the AT-9400 Switches and the manag

Page 26 - Where to Go First

AT-S63 Management Software Features GuideSection I: Basic Operations 121OverviewA port that is unable to maintain a reliable connection to a network n

Page 27 - Starting a Management Session

Chapter 9: Link-flap Protection122 Section I: Basic OperationsGuidelinesHere are the guidelines to link-flap protection: The rate and duration are se

Page 28 - Document Conventions

AT-S63 Management Software Features GuideSection I: Basic Operations 123Configuring the FeatureHere are the commands that are used to configure the li

Page 29 - Contacting Allied Telesis

Chapter 9: Link-flap Protection124 Section I: Basic Operations

Page 30

Section II: Advanced Operations 125Section IIAdvanced OperationsThis section contains the following chapters: Chapter 10, ”File System” on page 127

Page 31 - Basic Operations

126 Section II: Advanced Operations

Page 32

Section II: Advanced Operations 127Chapter 10File SystemThe chapter explains the switch’s file system and contains the following sections: “Overview”

Page 33

Chapter 10: File System128 Section II: Advanced OperationsOverviewThe AT-9400 Switch has a file system in flash memory for storing system files. You c

Page 34 -  Basic Layer 3 Switches

AT-S63 Management Software Features GuideSection II: Advanced Operations 129File Naming ConventionsThe flash memory file system is a flat file system—

Page 35

AT-S63 Management Software Features Guide13Appendix D: MIB Objects ...

Page 36

Chapter 10: File System130 Section II: Advanced OperationsUsing Wildcards to Specify Groups of FilesYou can use the asterisk character (*) as a wildca

Page 37

Section II: Advanced Operations 131Chapter 11Event Logs and the Syslog ClientThis chapter describes how to monitor the activity of a switch by viewing

Page 38

Chapter 11: Event Logs and the Syslog Client132 Section II: Advanced OperationsSupported PlatformsRefer to Table 42 and Table 43 for the AT-9400 Switc

Page 39

AT-S63 Management Software Features GuideSection II: Advanced Operations 133OverviewA managed switch is a complex piece of computer equipment that inc

Page 40 - AT-S63 Management Software

Chapter 11: Event Logs and the Syslog Client134 Section II: Advanced OperationsSyslog ClientThe management software features a syslog client to send e

Page 41 - Management Interfaces

Section II: Advanced Operations 135Chapter 12ClassifiersThis chapter explains classifiers for access control lists and Quality of Service policies. Th

Page 42

Chapter 12: Classifiers136 Section II: Advanced OperationsSupported PlatformsRefer to Table 44 and Table 45 for the AT-9400 Switches and the managemen

Page 43

AT-S63 Management Software Features GuideSection II: Advanced Operations 137OverviewA classifier defines a traffic flow. A traffic flow consists of pa

Page 44

Chapter 12: Classifiers138 Section II: Advanced Operationsis dictated by the QoS policy, as explained in Chapter 15, “Quality of Service” on page 165.

Page 45

AT-S63 Management Software Features GuideSection II: Advanced Operations 139Classifier CriteriaThe components of a classifier are defined in the follo

Page 46

Contents14

Page 47 - Management Access Methods

Chapter 12: Classifiers140 Section II: Advanced OperationsFigure 5. User Priority and VLAN Fields within an Ethernet FrameYou can identify a traffic f

Page 48

AT-S63 Management Software Features GuideSection II: Advanced Operations 141Observe the following guidelines when using this variable: When selecting

Page 49 - Manager Access Levels

Chapter 12: Classifiers142 Section II: Advanced OperationsObserve these guidelines when using this criterion: The Protocol variable must be left blan

Page 50

AT-S63 Management Software Features GuideSection II: Advanced Operations 143Observe this guideline when using these criteria: The Protocol variable m

Page 51 - IP Configuration

Chapter 12: Classifiers144 Section II: Advanced OperationsGuidelinesFollow these guidelines when creating a classifier: Each classifier represents a

Page 52 - Configuration Files

Section II: Advanced Operations 145Chapter 13Access Control ListsThis chapter describes access control lists (ACL) and how they can improve network se

Page 53 - Redundant Twisted Pair Ports

Chapter 13: Access Control Lists146 Section II: Advanced OperationsSupported PlatformsRefer to Table 46 and Table 47 for the AT-9400 Switches and the

Page 54 - AT-9448Ts/XP Switches

AT-S63 Management Software Features GuideSection II: Advanced Operations 147OverviewAn access control list is a filter that controls the ingress traff

Page 55 - History of New Features

Chapter 13: Access Control Lists148 Section II: Advanced Operations4. Finally, if a packet does not meet the criteria of any ACLs on a port, it is acc

Page 56 - AT-9400Ts Stacks

AT-S63 Management Software Features GuideSection II: Advanced Operations 149Parts of an ACLAn ACL must have the following information: Name - An ACL

Page 57

15Figure 1: AT-StackXG Stacking Module...

Page 58

Chapter 13: Access Control Lists150 Section II: Advanced OperationsGuidelinesHere are the rules to creating ACLs: Ports can have multiple permit and

Page 59

AT-S63 Management Software Features GuideSection II: Advanced Operations 151ExamplesThis section contains several examples of ACLs. In this example, p

Page 60 -  MAC address-based

Chapter 13: Access Control Lists152 Section II: Advanced OperationsTo deny traffic from several subnets on the same port, you can create multiple clas

Page 61

AT-S63 Management Software Features GuideSection II: Advanced Operations 153The same result can be achieved by assigning the classifiers to different

Page 62 -  Supplicant Mode for

Chapter 13: Access Control Lists154 Section II: Advanced OperationsIn this example, the traffic on ports 14 and 15 is restricted to packets from the s

Page 63

AT-S63 Management Software Features GuideSection II: Advanced Operations 155The next example limits the ingress traffic on port 17 to IP packets from

Page 64

Chapter 13: Access Control Lists156 Section II: Advanced Operations

Page 65 - Introduction

Section II: Advanced Operations 157Chapter 14Class of ServiceThis chapter describes the Class of Service (CoS) feature. Sections in the chapter includ

Page 66 - Supported Models

Chapter 14: Class of Service158 Section II: Advanced OperationsSupported PlatformsRefer to Table 48 and Table 49 for the AT-9400 Switches and the mana

Page 67 - Stack Port 1

AT-S63 Management Software Features GuideSection II: Advanced Operations 159OverviewWhen a port on an Ethernet switch becomes oversubscribed—its egres

Page 68

Figures16Figure 51: Example of a Tagged VLAN...

Page 69

Chapter 14: Class of Service160 Section II: Advanced OperationsFor example, when a tagged packet with a priority level of 3 enters a port on the switc

Page 70 - Stack Topology

AT-S63 Management Software Features GuideSection II: Advanced Operations 161Note that because all ports must use the same priority-to-egress queue map

Page 71

Chapter 14: Class of Service162 Section II: Advanced OperationsSchedulingA switch port needs a mechanism that specifies the order of transmittal of th

Page 72 - Discovery Process

AT-S63 Management Software Features GuideSection II: Advanced Operations 163Table 52 shows an example.In this example, the port transmits a maximum nu

Page 73 - Master and Member Switches

Chapter 14: Class of Service164 Section II: Advanced OperationsQ6 15Q7 0Table 53. Example of a Weight of Zero for Priority Queue 7 (Continued)Port Egr

Page 74 - Module ID Numbers

Section II: Advanced Operations 165Chapter 15Quality of ServiceThis chapter describes Quality of Service (QoS). Sections in the chapter include: “Sup

Page 75 - Stack Configuration Files

Chapter 15: Quality of Service166 Section II: Advanced OperationsSupported PlatformsRefer to Table 54 and Table 55 for the AT-9400 Switches and the ma

Page 76 - Chapter 2: AT-9400Ts Stacks

AT-S63 Management Software Features GuideSection II: Advanced Operations 167OverviewQuality of Service allows you to prioritize traffic and/or limit t

Page 77 - File Systems

Chapter 15: Quality of Service168 Section II: Advanced OperationsThe QoS functionality described in this chapter sorts packets into various flows, acc

Page 78 - Stack IP Address

AT-S63 Management Software Features GuideSection II: Advanced Operations 169ClassifiersClassifiers identify a particular traffic flow, and range from

Page 79

17Table 1: Basic Operations ...

Page 80

Chapter 15: Quality of Service170 Section II: Advanced OperationsFlow GroupsFlow groups group similar traffic flows together, and allow more specific

Page 81

AT-S63 Management Software Features GuideSection II: Advanced Operations 171Traffic ClassesTraffic classes are the central component of the QoS soluti

Page 82

Chapter 15: Quality of Service172 Section II: Advanced OperationsPoliciesQoS policies consist of a collection of user defined traffic classes. A polic

Page 83

AT-S63 Management Software Features GuideSection II: Advanced Operations 173QoS Policy GuidelinesFollowing is a list of QoS policy guidelines: A clas

Page 84 - Master and Slave Switches

Chapter 15: Quality of Service174 Section II: Advanced OperationsPacket ProcessingYou can use the switch’s QoS tools to perform any combination of the

Page 85 - Common VLAN

AT-S63 Management Software Features GuideSection II: Advanced Operations 175Both the VLAN tag User Priority and the traffic class / flow group priorit

Page 86 - Chapter 3: Enhanced Stacking

Chapter 15: Quality of Service176 Section II: Advanced OperationsReplacing PrioritiesThe traffic class or flow group priority (if set) determines the

Page 87 - Slave Switches

AT-S63 Management Software Features GuideSection II: Advanced Operations 177DiffServ DomainsDifferentiated Services (DiffServ) is a method of dividing

Page 88

Chapter 15: Quality of Service178 Section II: Advanced OperationsTo use the QoS tool set to configure a DiffServ domain:1. As packets come into the do

Page 89 - Enhanced Stacking Guidelines

AT-S63 Management Software Features GuideSection II: Advanced Operations 179ExamplesThe following examples demonstrate how to implement QoS in three s

Page 90

Tables18Table 50: Default Mappings of IEEE 802.1p Priority Levels to Priority Queues ...

Page 91 - SNMPv1 and SNMPv2c

Chapter 15: Quality of Service180 Section II: Advanced OperationsFigure 14. QoS Voice Application ExampleThe parts of the policies are: Classifier -

Page 92

AT-S63 Management Software Features GuideSection II: Advanced Operations 181 Traffic Class - No action is taken by the traffic class, other than to s

Page 93

Chapter 15: Quality of Service182 Section II: Advanced OperationsFigure 15. QoS Video Application ExampleThe parts of the policies are: Classifier -

Page 94 - Community String Attributes

AT-S63 Management Software Features GuideSection II: Advanced Operations 183packets so they leave containing the new level, you would change option 5,

Page 95

Chapter 15: Quality of Service184 Section II: Advanced OperationsPolicyComponentHierarchyThe purpose of this example is to illustrate the hierarchy of

Page 96 - Chapter 4: SNMPv1 and SNMPv2c

AT-S63 Management Software Features GuideSection II: Advanced Operations 185Figure 17. Policy Component Hierarchy ExampleCreate Classifier01 - Classif

Page 97

Chapter 15: Quality of Service186 Section II: Advanced Operations

Page 98

Section II: Advanced Operations 187Chapter 16Group Link ControlThis chapter explains group link control. The sections in this chapter include: “Suppo

Page 99

Chapter 16: Group Link Control188 Section II: Advanced OperationsSupported PlatformsRefer to Table 56 and Table 57 for the AT-9400 Switches and the ma

Page 100 - Chapter 5: MAC Address Table

AT-S63 Management Software Features GuideSection II: Advanced Operations 189OverviewGroup link control is designed to improve the effectiveness of the

Page 101 - Static Port Trunks

AT-S63 Management Software Features Guide19Table 110: Support for 802.1x Port-based Network Access Control ...

Page 102 - Supported Platforms

Chapter 16: Group Link Control190 Section II: Advanced OperationsIn the first diagram a server with two teamed network adapter cards is connected to d

Page 103 - Overview

AT-S63 Management Software Features GuideSection II: Advanced Operations 191But if the failure occurred further upstream between switches 1 and 3, the

Page 104 - Load Distribution Methods

Chapter 16: Group Link Control192 Section II: Advanced OperationsFigure 20. Group Link Control Example 3When a link on an upstream port is reestablish

Page 105

AT-S63 Management Software Features GuideSection II: Advanced Operations 193Figure 21. Group Link Control Example 4 Switch 1NetworkSwitch 3Switch 2

Page 106 - Guidelines

Chapter 16: Group Link Control194 Section II: Advanced OperationsIf connectivity is lost on both ports 17 and 20, the downstream ports 24 and 25 are d

Page 107 - LACP Port Trunks

AT-S63 Management Software Features GuideSection II: Advanced Operations 195This is illustrated in this figure. Switch 1 and switch 3 are connected wi

Page 108

Chapter 16: Group Link Control196 Section II: Advanced OperationsIn this example the primary and backup trunks have four links each.Figure 24. Group L

Page 109

AT-S63 Management Software Features GuideSection II: Advanced Operations 197GuidelinesHere are the guidelines to group link control: The switch or st

Page 110 - LACP System Priority

Chapter 16: Group Link Control198 Section II: Advanced OperationsConfiguring the FeatureHere are a few examples on how to configure the feature. The f

Page 111 - LACP Port Priority Value

AT-S63 Management Software Features GuideSection II: Advanced Operations 199awplus(config-if)# interface 8awplus(config-if)# group link control upstre

Page 112

Copyright  2009 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied

Page 113

Tables20

Page 114 - Chapter 7: LACP Port Trunks

Chapter 16: Group Link Control200 Section II: Advanced Operations

Page 115 - Port Mirror

Section II: Advanced Operations 201Chapter 17Denial of Service DefensesThis chapter explains the defense mechanisms in the management software that ca

Page 116

Chapter 17: Denial of Service Defenses202 Section II: Advanced OperationsSupported PlatformsRefer to Table 60 and Table 61 for the AT-9400 Switches an

Page 117

AT-S63 Management Software Features GuideSection II: Advanced Operations 203OverviewThe AT-S63 Management Software can help protect your network again

Page 118 - Chapter 8: Port Mirror

Chapter 17: Denial of Service Defenses204 Section II: Advanced OperationsSYN Flood AttackIn this type of attack, an attacker sends to a victim a large

Page 119 - Link-flap Protection

AT-S63 Management Software Features GuideSection II: Advanced Operations 205Smurf AttackThis DoS attack is instigated by an attacker sending a ICMP Ec

Page 120

Chapter 17: Denial of Service Defenses206 Section II: Advanced OperationsLand AttackIn this attack, an attacker sends a bogus IP packet where the sour

Page 121

AT-S63 Management Software Features GuideSection II: Advanced Operations 2072. If the source IP address is not local to the network, it discards the p

Page 122

Chapter 17: Denial of Service Defenses208 Section II: Advanced OperationsTeardrop AttackAn attacker sends an IP packet in several fragments with a bog

Page 123 - Configuring the Feature

AT-S63 Management Software Features GuideSection II: Advanced Operations 209Ping of Death AttackThe attacker sends an oversized, fragmented ICMP Echo

Page 124

21PrefaceThis guide describes the features of the AT-9400 Layer 2+ and Basic Layer 3 Gigabit Ethernet Switches and the AT-S63 Management Software.This

Page 125 - Advanced Operations

Chapter 17: Denial of Service Defenses210 Section II: Advanced OperationsIP Options AttackIn the basic scenario of an IP attack, an attacker sends pac

Page 126

AT-S63 Management Software Features GuideSection II: Advanced Operations 211Mirroring TrafficThe Land, Teardrop, Ping of Death, and IP Options defense

Page 127 - File System

Chapter 17: Denial of Service Defenses212 Section II: Advanced OperationsDenial of Service Defense GuidelinesBelow are guidelines to observe when usin

Page 128

Section II: Advanced Operations 213Chapter 18Power Over EthernetThis chapter contains background information on Power over Ethernet (PoE) for the AT-9

Page 129 - File Naming Conventions

Chapter 18: Power Over Ethernet214 Section II: Advanced OperationsSupported PlatformsRefer to Table 62 and Table 63 for the AT-9400 Switch and the man

Page 130 - Chapter 10: File System

AT-S63 Management Software Menus User’s GuideSection II: Advanced Operations 215OverviewPower over Ethernet (PoE) is a mechanism for supplying power t

Page 131 - Chapter 11

Chapter 18: Power Over Ethernet216 Section II: Advanced OperationsPower BudgetingThe AT-9424T/POE Switch has a maximum power budget of 380 watts. The

Page 132

AT-S63 Management Software Menus User’s GuideSection II: Advanced Operations 217Port PrioritizationPort prioritization is used to control which ports

Page 133 - Event Messages

Chapter 18: Power Over Ethernet218 Section II: Advanced OperationsPoE Device ClassesThe IEEE 802.3af standard specifies four levels of classes for pow

Page 134 - Syslog Client

Section III: Snooping Protocols 219Section IIISnooping ProtocolsThe chapters in this section contain overview information on the snooping protocols. T

Page 135 - Classifiers

Preface22How This Guide is OrganizedThis guide has the following sections and chapters: Section I: Basic OperationsChapter 1, “Overview” on page 33Ch

Page 136

220 Section III: Snooping Protocols

Page 137

Section III: Snooping Protocols 221Chapter 19Internet Group Management Protocol SnoopingThis chapter explains the Internet Group Management Protocol (

Page 138 - Service” on page 165

Chapter 19: Internet Group Management Protocol Snooping222 Section III: Snooping ProtocolsSupported PlatformsRefer to Table 64 and Table 65 for the AT

Page 139 - Classifier Criteria

AT-S63 Management Software Features GuideSection III: Snooping Protocols 223OverviewIPv4 routers use IGMP to create lists of nodes that are members of

Page 140 - Protocol (Layer 2)

Chapter 19: Internet Group Management Protocol Snooping224 Section III: Snooping ProtocolsWithout IGMP snooping a switch would have to flood multicast

Page 141

Section III: Snooping Protocols 225Chapter 20 Internet Group Management Protocol Snooping QuerierThis chapter explains IGMP snooping querier and conta

Page 142 - Destination IP Mask (Layer 3)

Chapter 20: Internet Group Management Protocol Snooping Querier226 Section III: Snooping ProtocolsSupported PlatformsRefer to Table 66 and Table 67 fo

Page 143 - TCP Flags

AT-S63 Management Software Features GuideSection III: Snooping Protocols 227OverviewMulticast routers are essential for IP multicasting. They send out

Page 144

Chapter 20: Internet Group Management Protocol Snooping Querier228 Section III: Snooping ProtocolsFigure 25. IGMP Snooping Querier Example 1The next e

Page 145 - Access Control Lists

AT-S63 Management Software Features GuideSection III: Snooping Protocols 229Figure 26. IGMP Snooping Querier Example 2 Multicast source:IP address: 1

Page 146

AT-S63 Management Software Features Guide23Chapter 23, “Ethernet Protection Switching Ring Snooping” on page 243 Section IV: SNMPv3Chapter 24, “SNMPv

Page 147

Chapter 20: Internet Group Management Protocol Snooping Querier230 Section III: Snooping ProtocolsGuidelinesThe guidelines for IGMP snooping querier a

Page 148

AT-S63 Management Software Features GuideSection III: Snooping Protocols 231Configuring the FeatureThe procedures in this section illustrate how to us

Page 149 - Parts of an ACL

Chapter 20: Internet Group Management Protocol Snooping Querier232 Section III: Snooping Protocols5. To confirm that IGMP snooping and IGMP snooping q

Page 150

AT-S63 Management Software Features GuideSection III: Snooping Protocols 2332. To enable IGMP snooping:awplus(config)# ip igmp snooping3. To enable IG

Page 151 - Examples

Chapter 20: Internet Group Management Protocol Snooping Querier234 Section III: Snooping Protocols

Page 152 - Figure 8. ACL Example 2

Section III: Snooping Protocols 235Chapter 21Multicast Listener Discovery SnoopingThis chapter explains Multicast Listener Discovery (MLD) snooping:

Page 153 - Figure 9. ACL Example 3

Chapter 21: Multicast Listener Discovery Snooping236 Section III: Snooping ProtocolsSupported PlatformsRefer to Table 68 and Table 69 for the AT-9400

Page 154

AT-S63 Management Software Features GuideSection III: Snooping Protocols 237OverviewMLD snooping performs the same function as IGMP snooping. The swit

Page 155 - Figure 12. ACL Example 6

Chapter 21: Multicast Listener Discovery Snooping238 Section III: Snooping Protocols

Page 156

Section III: Snooping Protocols 239Chapter 22 Router Redundancy Protocol SnoopingThis chapter explains Router Redundancy Protocol (RRP) snooping and c

Page 157 - Class of Service

Preface24Appendix B, “SNMPv3 Configuration Examples” on page 543Appendix C, “Features and Standards” on page 549Appendix D, “MIB Objects” on page 557

Page 158

Chapter 22: Router Redundancy Protocol Snooping240 Section III: Snooping ProtocolsSupported PlatformsRefer to Table 70 and Table 71 for the AT-9400 Sw

Page 159

AT-S63 Management Software Features GuideSection III: Snooping Protocols 241OverviewThe Router Redundancy Protocol (RRP) allows multiple routers to sh

Page 160 - Chapter 14: Class of Service

Chapter 22: Router Redundancy Protocol Snooping242 Section III: Snooping ProtocolsGuidelinesThe following guidelines apply to the RRP snooping feature

Page 161

Section III: Snooping Protocols 243Chapter 23Ethernet Protection Switching Ring SnoopingThis chapter has the following sections: “Supported Platforms

Page 162 - Scheduling

Chapter 23: Ethernet Protection Switching Ring Snooping244 Section III: Snooping ProtocolsSupported PlatformsRefer to Table 72 and Table 73 for the AT

Page 163

AT-S63 Management Software Features GuideSection III: Snooping Protocols 245OverviewEthernet Protection Switching Ring is a feature found on selected

Page 164

Chapter 23: Ethernet Protection Switching Ring Snooping246 Section III: Snooping ProtocolsAfter creating the VLANs, you activate EPSR snooping by spec

Page 165 - Quality of Service

AT-S63 Management Software Features GuideSection III: Snooping Protocols 247RestrictionsEPSR snooping has three important restrictions. All the restri

Page 166

Chapter 23: Ethernet Protection Switching Ring Snooping248 Section III: Snooping ProtocolsFigure 29. Double Fault Condition in EPSR SnoopingNow assume

Page 167

AT-S63 Management Software Features GuideSection III: Snooping Protocols 249GuidelinesThe guidelines to EPSR snooping are: The AT-9400 Switch can sup

Page 168

AT-S63 Management Software Features Guide25Product DocumentationFor overview information on the features of the AT-9400 Switches and the AT-S63 Manage

Page 169

Chapter 23: Ethernet Protection Switching Ring Snooping250 Section III: Snooping Protocols

Page 170 - Flow Groups

Section IV: SNMPv3 251Section IVSNMPv3The chapter in this section contains overview information on SNMPv3. The chapter is: Chapter 24, ”SNMPv3” on pa

Page 171 - Traffic Classes

252 Section IV: SNMPv3

Page 172 - Policies

Section IV: SNMPv3 253Chapter 24SNMPv3This chapter provides a description of the AT-S63 implementation of the SNMPv3 protocol. The following sections

Page 173 - QoS Policy Guidelines

Chapter 24: SNMPv3254 Section IV: SNMPv3Supported PlatformsRefer to Table 74 and Table 75 for the AT-9400 Switches and the management interfaces that

Page 174 - Packet Prioritization

AT-S63 Management Software Features GuideSection IV: SNMPv3 255OverviewThe SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c protocol implemen

Page 175

Chapter 24: SNMPv3256 Section IV: SNMPv3SNMPv3 Authentication ProtocolsThe SNMPv3 protocol supports two authentication protocols—HMAC-MD5-96 (MD5) and

Page 176 - DSCP Values

AT-S63 Management Software Features GuideSection IV: SNMPv3 257SNMPv3 Privacy ProtocolAfter you have configured an authentication protocol, you have t

Page 177 - DiffServ Domains

Chapter 24: SNMPv3258 Section IV: SNMPv3SNMPv3 MIB ViewsThe SNMPv3 protocol allows you to configure MIB views for users and groups. The MIB tree is de

Page 178

AT-S63 Management Software Features GuideSection IV: SNMPv3 259After you specify a MIB subtree view you have the option of further restricting a view

Page 179

Preface26Where to Go FirstAllied Telesis recommends that you read Chapter 1, “Overview” on page 33 in this guide before you begin to manage the switch

Page 180

Chapter 24: SNMPv3260 Section IV: SNMPv3SNMPv3 Storage TypesEach SNMPv3 table entry has its own storage type. You can choose between nonvolatile stora

Page 181 - Applications

AT-S63 Management Software Features GuideSection IV: SNMPv3 261SNMPv3 Message NotificationWhen you generate an SNMPv3 message from the switch, there a

Page 182

Chapter 24: SNMPv3262 Section IV: SNMPv3SNMPv3 Tables The SNMPv3 configuration is neatly divided into configuring SNMPv3 user information and configur

Page 183

AT-S63 Management Software Features GuideSection IV: SNMPv3 263 Configure SNMPv3 Notify Table Configure SNMPv3 Target Address Table Configure SNMPv

Page 184 - Hierarchy

Chapter 24: SNMPv3264 Section IV: SNMPv3 “SNMPv3 Target Parameters Table” on page 265 “SNMPv3 Community Table” on page 265SNMPv3 UserTableThe Config

Page 185

AT-S63 Management Software Features GuideSection IV: SNMPv3 265SNMPv3 NotifyTableThe Configure SNMPv3 Notify Table menu allows you to define the type

Page 186

Chapter 24: SNMPv3266 Section IV: SNMPv3SNMPv3 Configuration ExampleYou may want to have two classes of SNMPv3 users—Managers and Operators. In this s

Page 187 - Group Link Control

Section V: Spanning Tree Protocols 267Section VSpanning Tree ProtocolsThe section has the following chapters: Chapter 25, “Spanning Tree and Rapid Sp

Page 188

268 Section V: Spanning Tree Protocols

Page 189

Section V: Spanning Tree Protocols 269Chapter 25Spanning Tree and Rapid Spanning Tree ProtocolsThis chapter provides background information on the Spa

Page 190

AT-S63 Management Software Features Guide27Starting a Management SessionFor instructions on how to start a local or remote management session on the A

Page 191

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols270 Section V: Spanning Tree ProtocolsSupported PlatformsRefer to Table 76 and Table 77 for

Page 192

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 271OverviewThe performance of a Ethernet network can be negatively impacte

Page 193

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols272 Section V: Spanning Tree ProtocolsBridge Priority and the Root BridgeThe first task tha

Page 194

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 273Path Costs andPort CostsAfter the root bridge has been selected, the br

Page 195

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols274 Section V: Spanning Tree ProtocolsTable 80 lists the STP port costs with Auto-Detect wh

Page 196

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 275Table 83. Port Priority Value IncrementsIncrementBridge Priority Increm

Page 197

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols276 Section V: Spanning Tree ProtocolsForwarding Delay and Topology ChangesIf there is a ch

Page 198

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 277seconds and the default is two seconds. Consequently, if the AT-9400 Sw

Page 199

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols278 Section V: Spanning Tree ProtocolsFigure 34. Edge PortA port can be both a point-to-poi

Page 200

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 279Mixed STP and RSTP NetworksRSTP IEEE 802.1w is fully compliant with STP

Page 201 - Denial of Service Defenses

Preface28Document ConventionsThis document uses the following conventions:NoteNotes provide additional information.CautionCautions inform you that per

Page 202

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols280 Section V: Spanning Tree ProtocolsSpanning Tree and VLANsThe STP and RSTP implementatio

Page 203

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 281RSTP BPDU GuardThis feature monitors RSTP edge ports on stand-alone swi

Page 204 - SYN Flood Attack

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols282 Section V: Spanning Tree Protocols BPDU guard is supported only on RSTP. It is not sup

Page 205 - Smurf Attack

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 283RSTP Loop GuardAlthough RSTP is intended to detect and prevent the form

Page 206 - Land Attack

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols284 Section V: Spanning Tree ProtocolsThis feature is supported on the base ports of the sw

Page 207

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 285Figure 38. Loop Guard Example 2But if loop guard is enabled on port 14

Page 208 - Teardrop Attack

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols286 Section V: Spanning Tree ProtocolsIn the first example the root bridge stops transmitti

Page 209 - Ping of Death Attack

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 287Figure 41. Loop Guard Example 5 Switch 3Switch 1Old root bridgeRSTP s

Page 210 - IP Options Attack

Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols288 Section V: Spanning Tree Protocols

Page 211 - Mirroring Traffic

Section V: Spanning Tree Protocols 289Chapter 26Multiple Spanning Tree ProtocolThis chapter provides background information on the Multiple Spanning T

Page 212

AT-S63 Management Software Features Guide29Contacting Allied TelesisThis section provides Allied Telesis contact information for technical support and

Page 213 - Power Over Ethernet

Chapter 26: Multiple Spanning Tree Protocol290 Section V: Spanning Tree ProtocolsSupported PlatformsRefer to Table 84 and Table 85 for the AT-9400 Swi

Page 214

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 291OverviewAs mentioned in Chapter 25, ”Spanning Tree and Rapid Spanning T

Page 215

Chapter 26: Multiple Spanning Tree Protocol292 Section V: Spanning Tree ProtocolsMultiple Spanning Tree Instance (MSTI)The individual spanning trees i

Page 216 - Power Budgeting

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 293Figure 42. VLAN Fragmentation with STP or RSTPBlocked PortFAULTRPSMASTE

Page 217 - Port Prioritization

Chapter 26: Multiple Spanning Tree Protocol294 Section V: Spanning Tree ProtocolsFigure 43 illustrates the same two AT-9400 Switches and the same two

Page 218 - PoE Device Classes

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 295A MSTI can contain more than one VLAN. This is illustrated in Figure 44

Page 219 - Snooping Protocols

Chapter 26: Multiple Spanning Tree Protocol296 Section V: Spanning Tree ProtocolsMSTI GuidelinesThe following are several guidelines to keep in mind a

Page 220

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 297VLAN and MSTI AssociationsPart of the task to configuring MSTP involves

Page 221 - Snooping

Chapter 26: Multiple Spanning Tree Protocol298 Section V: Spanning Tree ProtocolsPorts in Multiple MSTIsA port can be a member of more than one MSTI a

Page 222

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 299Multiple Spanning Tree RegionsAnother important concept of MSTP is regi

Page 223

3Preface ...

Page 224

Preface30

Page 225 - Snooping Querier

Chapter 26: Multiple Spanning Tree Protocol300 Section V: Spanning Tree ProtocolsFigure 45 illustrates the concept of regions. It shows one MSTP regio

Page 226

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 301The same is true for any ports connected to bridges running the single-

Page 227

Chapter 26: Multiple Spanning Tree Protocol302 Section V: Spanning Tree ProtocolsCommon andInternalSpanning Tree(CIST)MSTP has a default spanning tree

Page 228

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 303Summary of GuidelinesCareful planning is essential for the successful i

Page 229

Chapter 26: Multiple Spanning Tree Protocol304 Section V: Spanning Tree ProtocolsNoteThe AT-S63 MSTP implementation complies fully with the new IEEE 8

Page 230

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 305Associating VLANs to MSTIsAllied Telesis recommends that you assign all

Page 231

Chapter 26: Multiple Spanning Tree Protocol306 Section V: Spanning Tree ProtocolsFigure 47. CIST and VLAN Guideline - Example 2When port 4 on switch B

Page 232

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 307Connecting VLANs Across Different RegionsSpecial consideration needs to

Page 233

Chapter 26: Multiple Spanning Tree Protocol308 Section V: Spanning Tree ProtocolsAnother approach is to group those VLANs that need to span regions in

Page 234

Section VI: Virtual LANs 309Section VIVirtual LANsThe chapters in this section discuss the various types of virtual LANs supported by the AT-9400 Swit

Page 235 - Chapter 21

Section I: Basic Operations 31Section IBasic OperationsThe chapters in this section contain background information on basic switch features. The chapt

Page 236

310 Section VI: Virtual LANs

Page 237

Section VI: Virtual LANs 311Chapter 27 Port-based and Tagged VLANsThis chapter contains overview information about port-based and tagged virtual LANs

Page 238

Chapter 27: Port-based and Tagged VLANs312 Section VI: Virtual LANsSupported PlatformsRefer to Table 86 and Table 87 for the AT-9400 Switches and the

Page 239 - Chapter 22

AT-S63 Management Software Features GuideSection VI: Virtual LANs 313OverviewA VLAN is a group of ports on an Ethernet switch that form a logical Ethe

Page 240

Chapter 27: Port-based and Tagged VLANs314 Section VI: Virtual LANsManagement Software. You can change the VLAN memberships through the management sof

Page 241

AT-S63 Management Software Features GuideSection VI: Virtual LANs 315Port-based VLAN OverviewAs explained in “Overview” on page 313, a VLAN consists o

Page 242

Chapter 27: Port-based and Tagged VLANs316 Section VI: Virtual LANsthree AT-9400 Switches, you would assign the Marketing VLAN on each switch the same

Page 243

AT-S63 Management Software Features GuideSection VI: Virtual LANs 317Guidelines toCreating a Port-based VLANBelow are the guidelines to creating a por

Page 244

Chapter 27: Port-based and Tagged VLANs318 Section VI: Virtual LANsPort-basedExample 1Figure 49 illustrates an example of one AT-9424T/SP Gigabit Ethe

Page 245

AT-S63 Management Software Features GuideSection VI: Virtual LANs 319In the example, each VLAN has one port connected to the router. The router interc

Page 246

32 Section I: Basic Operations

Page 247 - Restrictions

Chapter 27: Port-based and Tagged VLANs320 Section VI: Virtual LANsThe table below lists the port assignments for the Sales, Engineering, and Producti

Page 248

AT-S63 Management Software Features GuideSection VI: Virtual LANs 321Tagged VLAN OverviewThe second type of VLAN supported by the AT-S63 Management So

Page 249

Chapter 27: Port-based and Tagged VLANs322 Section VI: Virtual LANs Port VLAN IdentifierNoteFor explanations of VLAN name and VLAN identifier, refer

Page 250

AT-S63 Management Software Features GuideSection VI: Virtual LANs 323Tagged VLANExampleFigure 51 illustrates how tagged ports can be used to interconn

Page 251 - Section IV

Chapter 27: Port-based and Tagged VLANs324 Section VI: Virtual LANsThe port assignments for the VLANs are as follows:This example is nearly identical

Page 252 - 252 Section IV: SNMPv3

Section VI: Virtual LANs 325Chapter 28GARP VLAN Registration ProtocolThis chapter describes the GARP VLAN Registration Protocol (GVRP) and contains th

Page 253 - Chapter 24

Chapter 28: GARP VLAN Registration Protocol326 Section VI: Virtual LANsSupported PlatformsRefer to Table 88 and Table 89 for the AT-9400 Switches and

Page 254

AT-S63 Management Software Features GuideSection VI: Virtual LANs 327OverviewThe GARP VLAN Registration Protocol (GVRP) allows network devices to shar

Page 255

Chapter 28: GARP VLAN Registration Protocol328 Section VI: Virtual LANsFigure 52 provides an example of how GVRP works.Figure 52. GVRP Example Switche

Page 256 - 256 Section IV: SNMPv3

AT-S63 Management Software Features GuideSection VI: Virtual LANs 329as an tagged dynamic GVRP port. If the port is already a member of the VLAN, then

Page 257 - SNMPv3 Privacy Protocol

33Chapter 1OverviewThis chapter has the following sections: “Layer 2+ and Basic Layer 3 Switches” on page 34 “AT-S63 Management Software” on page 40

Page 258 - SNMPv3 MIB Views

Chapter 28: GARP VLAN Registration Protocol330 Section VI: Virtual LANsGuidelinesFollowing are guidelines to observe when using this feature: GVRP is

Page 259 - Section IV: SNMPv3 259

AT-S63 Management Software Features GuideSection VI: Virtual LANs 331GVRP and Network SecurityGVRP should be used with caution because it can expose y

Page 260 - SNMPv3 Storage Types

Chapter 28: GARP VLAN Registration Protocol332 Section VI: Virtual LANsGVRP-inactive Intermediate SwitchesIf two GVRP-active devices are separated by

Page 261 - SNMPv3 Message Notification

AT-S63 Management Software Features GuideSection VI: Virtual LANs 333Generic Attribute Registration Protocol (GARP) OverviewThe following is a technic

Page 262 - SNMPv3 Tables

Chapter 28: GARP VLAN Registration Protocol334 Section VI: Virtual LANsGARP architecture is shown in Figure 53. Figure 53. GARP Architecture The GARP

Page 263

AT-S63 Management Software Features GuideSection VI: Virtual LANs 335Figure 54. GID Architecture GARP registers and deregisters attribute values throu

Page 264 - 264 Section IV: SNMPv3

Chapter 28: GARP VLAN Registration Protocol336 Section VI: Virtual LANsTo control the applicant state machine, an applicant administrative control par

Page 265 - Section IV: SNMPv3 265

Section VI: Virtual LANs 337Chapter 29Multiple VLAN ModesThis chapter describes the multiple VLAN modes. This chapter contains the following sections:

Page 266 - SNMPv3 Configuration Example

Chapter 29: Multiple VLAN Modes338 Section VI: Virtual LANsSupported PlatformsRefer to Table 90 and Table 91 for the AT-9400 Switches and the manageme

Page 267 - Spanning Tree Protocols

AT-S63 Management Software Features GuideSection VI: Virtual LANs 339OverviewThe multiple VLAN modes are designed to simplify the task of configuring

Page 268

Chapter 1: Overview34Layer 2+ and Basic Layer 3 SwitchesThe switches in the AT-9400 Gigabit Ethernet Series are divided into two groups: Layer 2+ Swi

Page 269 - Protocols

Chapter 29: Multiple VLAN Modes340 Section VI: Virtual LANs802.1Q- Compliant Multiple VLAN ModeIn this mode, each port is placed into a separate VLAN

Page 270

AT-S63 Management Software Features GuideSection VI: Virtual LANs 341This highly segmented configuration is useful in situations where traffic generat

Page 271

Chapter 29: Multiple VLAN Modes342 Section VI: Virtual LANsNon-802.1Q Compliant Multiple VLAN ModeUnlike the 802.1Q-compliant VLAN mode, which isolate

Page 272

Section VI: Virtual LANs 343Chapter 30 Protected Ports VLANsThis chapter explains protected ports VLANs. It contains the following sections: “Support

Page 273 - Port Costs

Chapter 30: Protected Ports VLANs344 Section VI: Virtual LANsSupported PlatformsRefer to Table 93 and Table 94 for the AT-9400 Switches and the manage

Page 274

AT-S63 Management Software Features GuideSection VI: Virtual LANs 345OverviewThe purpose of a protected ports VLAN is to allow multiple ports on the s

Page 275

Chapter 30: Protected Ports VLANs346 Section VI: Virtual LANsTo create a protected ports VLAN, you perform many of the same steps that you do when you

Page 276 - Data Units

AT-S63 Management Software Features GuideSection VI: Virtual LANs 347GuidelinesFollowing are the guidelines for implementing protected ports VLANS: A

Page 277 - Point-to-Point

Chapter 30: Protected Ports VLANs348 Section VI: Virtual LANs

Page 278 - (Full-duplex Mode)

Section VI: Virtual LANs 349Chapter 31MAC Address-based VLANsThis chapter contains overview information about MAC address-based VLANs. Sections in the

Page 279 - Mixed STP and RSTP Networks

AT-S63 Management Software Features Guide35Multiple manager sessionsYYYYYY YTCP/IP pings YYYYYYYYY YEnhanced stacking YYYYYYYYYSimple Network Time Pro

Page 280 - Spanning Tree and VLANs

Chapter 31: MAC Address-based VLANs350 Section VI: Virtual LANsSupported PlatformsRefer to Table 95 and Table 96 for the AT-9400 Switches and the mana

Page 281 - RSTP BPDU Guard

AT-S63 Management Software Features GuideSection VI: Virtual LANs 351OverviewAs explained in “Overview” on page 313, VLANs are a means for creating in

Page 282

Chapter 31: MAC Address-based VLANs352 Section VI: Virtual LANsEgress PortsImplementing a MAC address-based VLAN involves more than entering the MAC a

Page 283 - RSTP Loop Guard

AT-S63 Management Software Features GuideSection VI: Virtual LANs 353The community characteristic of egress ports relieves you from having to map each

Page 284

Chapter 31: MAC Address-based VLANs354 Section VI: Virtual LANsIf security is a major concern for your network, you might not want to assign a port as

Page 285

AT-S63 Management Software Features GuideSection VI: Virtual LANs 355VLANs That Span SwitchesTo create a MAC address-based VLAN that spans switches, y

Page 286

Chapter 31: MAC Address-based VLANs356 Section VI: Virtual LANsTable 99. Example of a MAC Address-based VLAN Spanning SwitchesSwitch A Switch BVLAN Na

Page 287

AT-S63 Management Software Features GuideSection VI: Virtual LANs 357VLAN HierarchyThe switch’s management software employs a VLAN hierarchy when hand

Page 288

Chapter 31: MAC Address-based VLANs358 Section VI: Virtual LANsSteps to Creating a MAC Address-based VLANHere are the three main steps to creating a M

Page 289 - Chapter 26

AT-S63 Management Software Features GuideSection VI: Virtual LANs 359GuidelinesFollow these guidelines when implementing a MAC address-based VLAN: MA

Page 290

Chapter 1: Overview36Class of Service YYYYYYYYY YQuality of Service YYYYYYYYY YGroup link control YYYYYY YDenial of service defensesYYYYYYYYYPower ove

Page 291

Chapter 31: MAC Address-based VLANs360 Section VI: Virtual LANs Egress ports cannot be part of a static or LACP trunk. Since this type of VLAN does

Page 292

Section VII: Internet Protocol Routing 361Section VIIInternet Protocol RoutingThis section has the following chapters: Chapter 32, “Internet Protocol

Page 293 - AT-9424T/GB

362 Section VII: Internet Protocol Routing

Page 294

363Chapter 32Internet Protocol Version 4 Packet RoutingThis chapter describes Internet Protocol version 4 (IPv4) packet routing on the AT-9400 Basic L

Page 295

Chapter 32: Internet Protocol Version 4 Packet Routing364 Section VII: RoutingSupported PlatformsRefer to Table 100 and Table 101 for the AT-9400 Swit

Page 296 - MSTI Guidelines

AT-S63 Management Software Features GuideSection VII: Routing 365Features” on page 384 and “AT-9408LC/SP AT-9424T/GB, and AT-9424T/SP Switches” on pag

Page 297 - VLAN and MSTI Associations

Chapter 32: Internet Protocol Version 4 Packet Routing366 Section VII: RoutingOverviewThis section contains an overview of the IPv4 routing feature on

Page 298 - Ports in Multiple MSTIs

AT-S63 Management Software Features GuideSection VII: Routing 367At the end of this overview are two examples that illustrate the sequence of commands

Page 299

Chapter 32: Internet Protocol Version 4 Packet Routing368 Section VII: RoutingRouting InterfacesThe IPv4 packet routing feature on the switch is built

Page 300

AT-S63 Management Software Features GuideSection VII: Routing 369NoteRouting interfaces can be configured from either the command line interface or th

Page 301

AT-S63 Management Software Features Guide37Table 4. SNMPv3Layer 2+ Switches Basic Layer 3 Switches08LC 24GB 24SP 24T24T POE24Ts 24XP 48SP 48XP StackSN

Page 302

Chapter 32: Internet Protocol Version 4 Packet Routing370 Section VII: Routingthe other interfaces in the same VLAN must be assigned manually. For exa

Page 303 - Summary of Guidelines

AT-S63 Management Software Features GuideSection VII: Routing 371Interface NamesMany of the IPv4 routing commands have a parameter for an interface na

Page 304

Chapter 32: Internet Protocol Version 4 Packet Routing372 Section VII: RoutingStatic RoutesIn order for the switch to route an IPv4 packet to a remote

Page 305 - Associating VLANs to MSTIs

AT-S63 Management Software Features GuideSection VII: Routing 373The commands for managing static routes are ADD IP ROUTE, DELETE IP ROUTE, and SET IP

Page 306

Chapter 32: Internet Protocol Version 4 Packet Routing374 Section VII: RoutingRouting Information Protocol (RIP)A switch can automatically learn route

Page 307

AT-S63 Management Software Features GuideSection VII: Routing 375NoteA RIP version 2 password is sent in plaintext. The AT-S63 Management Software doe

Page 308

Chapter 32: Internet Protocol Version 4 Packet Routing376 Section VII: RoutingDefault RoutesA default route is a “match all” destination entry in the

Page 309 - Virtual LANs

AT-S63 Management Software Features GuideSection VII: Routing 377Equal-cost Multi-path (ECMP) RoutingWhen there are multiple routes in the routing tab

Page 310 - 310 Section VI: Virtual LANs

Chapter 32: Internet Protocol Version 4 Packet Routing378 Section VII: RoutingECMP also applies to default routes. This enables the switch to store up

Page 311 - Port-based and Tagged VLANs

AT-S63 Management Software Features GuideSection VII: Routing 379Routing TableThe switch maintains its routing information in a table of routes that t

Page 312

Chapter 1: Overview38GARP VLAN Registration ProtocolYYYYYYYYYProtected ports VLANsYYYYYYYYYMAC address-based VLANsYYYYYYTable 6. Virtual LANsLayer 2+

Page 313

Chapter 32: Internet Protocol Version 4 Packet Routing380 Section VII: RoutingRoute Selection ProcessHere is the route selection process the switch go

Page 314 -  Tagged VLANs

AT-S63 Management Software Features GuideSection VII: Routing 381Address Resolution Protocol (ARP) TableThe switch maintains an ARP table of IP addres

Page 315 - Port-based VLAN Overview

Chapter 32: Internet Protocol Version 4 Packet Routing382 Section VII: RoutingInternet Control Message Protocol (ICMP)ICMP allows routers to send erro

Page 316 - Identifier

AT-S63 Management Software Features GuideSection VII: Routing 383Time to Live Exceeded (11) If the TTL field in a packet falls to zero the switch will

Page 317

Chapter 32: Internet Protocol Version 4 Packet Routing384 Section VII: RoutingRouting Interfaces and Management FeaturesRouting interfaces are primary

Page 318 - Example 1

AT-S63 Management Software Features GuideSection VII: Routing 385As an example, assume you decided not to implement the IPv4 routing feature on a swit

Page 319 - Example 2

Chapter 32: Internet Protocol Version 4 Packet Routing386 Section VII: RoutingPinging a RemoteDeviceThis function is used to validate the existence of

Page 320 - 320 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VII: Routing 387Local InterfaceThe local interface is used with the enhanced stacking feature. It is

Page 321 - Tagged VLAN Overview

Chapter 32: Internet Protocol Version 4 Packet Routing388 Section VII: RoutingAT-9408LC/SP AT-9424T/GB, and AT-9424T/SP SwitchesThe AT-9408LC/SP, AT-9

Page 322

AT-S63 Management Software Features GuideSection VII: Routing 389NoteThe AT-9408LC/SP, AT-9424T/GB, and AT-9424T/SP Switches do not use the ARP table

Page 323 - Tagged VLAN

AT-S63 Management Software Features Guide39Table 8. Port SecurityLayer 2+ Switches Basic Layer 3 Switches08LC 24GB 24SP 24T24T POE24Ts 24XP 48SP 48XP

Page 324 - 324 Section VI: Virtual LANs

Chapter 32: Internet Protocol Version 4 Packet Routing390 Section VII: RoutingRouting Command ExampleThis section contains an example of the IPv4 rout

Page 325 - Chapter 28

AT-S63 Management Software Features GuideSection VII: Routing 391Creating theVLANsThe first step is to create the VLANs for the local subnets on the s

Page 326

Chapter 32: Internet Protocol Version 4 Packet Routing392 Section VII: Routingcommand.Adding a StaticRoute andDefault RouteBuilding on our example, as

Page 327

AT-S63 Management Software Features GuideSection VII: Routing 393Adding RIP Rather than adding the static routes to remote destinations, or perhaps to

Page 328

Chapter 32: Internet Protocol Version 4 Packet Routing394 Section VII: RoutingNon-routing Command ExampleThis example illustrates how to assign an IP

Page 329 - Section VI: Virtual LANs 329

AT-S63 Management Software Features GuideSection VII: Routing 395The following command creates a default route for the example and specifies the next

Page 330

Chapter 32: Internet Protocol Version 4 Packet Routing396 Section VII: RoutingUpgrading from AT-S63 Version 1.3.0 or EarlierWhen the AT-9400 Switch ru

Page 331 - GVRP and Network Security

397Chapter 33BOOTP Relay AgentThis chapter has the following sections: “Supported Platforms” on page 398 “Overview” on page 399 “Guidelines” on pag

Page 332 - 332 Section VI: Virtual LANs

Chapter 33: BOOTP Relay Agent398 Section VII: RoutingSupported PlatformsRefer to Table 104 and Table 105 for the AT-9400 Switches and the management i

Page 333 - Section VI: Virtual LANs 333

AT-S63 Management Software Features GuideSection VII: Routing 399OverviewThe AT-S63 Management Software comes with a BOOTP relay agent for relaying BO

Page 334 - 334 Section VI: Virtual LANs

Contents4Chapter 2: AT-9400Ts Stacks ...

Page 335 - Section VI: Virtual LANs 335

Chapter 1: Overview40AT-S63 Management SoftwareThe AT-9400 Switch is managed with the AT-S63 Management Software. The software comes preinstalled on t

Page 336 - 336 Section VI: Virtual LANs

Chapter 33: BOOTP Relay Agent400 Section VII: RoutingA routing interface that receives a BOOTP reply from a server inspects the broadcast flag field i

Page 337 - Multiple VLAN Modes

AT-S63 Management Software Features GuideSection VII: Routing 401GuidelinesThese guidelines apply to the BOOTP relay agent: A routing interface funct

Page 338

Chapter 33: BOOTP Relay Agent402 Section VII: Routing

Page 339

403Chapter 34Virtual Router Redundancy ProtocolThe chapter has the following sections: “Supported Platforms” on page 404 “Overview” on page 405 “Ma

Page 340 - 340 Section VI: Virtual LANs

Chapter 34: Virtual Router Redundancy Protocol404 Section VII: RoutingSupported PlatformsRefer to Table 106 and Table 107 for the AT-9400 Switches and

Page 341 - Section VI: Virtual LANs 341

AT-S63 Management Software Features GuideSection VII: Routing 405OverviewThis chapter describes the Virtual Router Redundancy Protocol (VRRP) of the A

Page 342 - 342 Section VI: Virtual LANs

Chapter 34: Virtual Router Redundancy Protocol406 Section VII: RoutingMaster SwitchThe virtual router has a virtual MAC address known by all the switc

Page 343 - Protected Ports VLANs

AT-S63 Management Software Features GuideSection VII: Routing 407Backup SwitchesAll the other switches participating in the virtual router are designa

Page 344

Chapter 34: Virtual Router Redundancy Protocol408 Section VII: RoutingInterface MonitoringThe virtual router can monitor certain interfaces to change

Page 345

AT-S63 Management Software Features GuideSection VII: Routing 409Port MonitoringPort monitoring is the process of detecting the failure of ports that

Page 346 - 346 Section VI: Virtual LANs

AT-S63 Management Software Features Guide41Management InterfacesThe AT-S63 Management Software has four management interfaces: Standard command line

Page 347

Chapter 34: Virtual Router Redundancy Protocol410 Section VII: RoutingVRRP on the SwitchVRRP is disabled by default. When a virtual router is created

Page 348 - 348 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VII: Routing 411prevents a switch from inadvertently backing up another switch. The authentication ty

Page 349 - MAC Address-based VLANs

Chapter 34: Virtual Router Redundancy Protocol412 Section VII: Routing

Page 350

Section VIII: Port Security 413Section VIIIPort SecurityThe chapters in this section contain overview information on the port security features of the

Page 351

414 Section VIII: Port Security

Page 352 - Egress Ports

Section VIII: Port Security 415Chapter 35MAC Address-based Port SecurityThe sections in this chapter include: “Supported Platforms” on page 416 “Ove

Page 353 - Section VI: Virtual LANs 353

Chapter 35: MAC Address-based Port Security416 Section VIII: Port SecuritySupported PlatformsRefer to Table 108 and Table 109 for the AT-9400 Switches

Page 354 - 354 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VIII: Port Security 417OverviewYou can use this feature to enhance the security of your network by co

Page 355 - VLANs That Span Switches

Chapter 35: MAC Address-based Port Security418 Section VIII: Port SecuritySecured This security level uses only static MAC addresses assigned to a por

Page 356 - 356 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VIII: Port Security 419Invalid Frames and Intrusion ActionsWhen a port receives an invalid frame, it

Page 357 - VLAN Hierarchy

Chapter 1: Overview42In other cases, a management interface might support only part of a function. For example, you can set a switch or stack’s name,

Page 358 - 358 Section VI: Virtual LANs

Chapter 35: MAC Address-based Port Security420 Section VIII: Port SecurityGuidelinesThe following guidelines apply to MAC address-based port security:

Page 359

Section VIII: Port Security 421Chapter 36802.1x Port-based Network Access ControlThe sections in this chapter are: “Supported Platforms” on page 422

Page 360

Chapter 36: 802.1x Port-based Network Access Control422 Section VIII: Port SecuritySupported PlatformsRefer to Table 110 and Table 111 for the AT-9400

Page 361 - Internet Protocol Routing

AT-S63 Management Software Features GuideSection VIII: Port Security 423OverviewThe AT-S63 Management Software has several different methods for prote

Page 362

Chapter 36: 802.1x Port-based Network Access Control424 Section VIII: Port Security Authentication server - The authentication server is the network

Page 363 - Chapter 32

AT-S63 Management Software Features GuideSection VIII: Port Security 425Authentication ProcessBelow is a brief overview of the authentication process

Page 364

Chapter 36: 802.1x Port-based Network Access Control426 Section VIII: Port SecurityPort RolesPart of the task of implementing this feature is specifyi

Page 365 - Section VII: Routing 365

AT-S63 Management Software Features GuideSection VIII: Port Security 427Assigning unique username and password combinations to your network users and

Page 366

Chapter 36: 802.1x Port-based Network Access Control428 Section VIII: Port SecurityNoteA supplicant connected to an authenticator port set to force-au

Page 367 - Section VII: Routing 367

AT-S63 Management Software Features GuideSection VIII: Port Security 429Authenticator Ports with Single and Multiple SupplicantsAn authenticator port

Page 368 - Routing Interfaces

AT-S63 Management Software Features Guide43Baud rate of the Terminal Port Y Y Y Y YManagement console timer Y Y Y Y YTelnet server YYY YYConsole start

Page 369 - Subnet Mask

Chapter 36: 802.1x Port-based Network Access Control430 Section VIII: Port SecurityFigure 57. Authenticator Port in Single Operating Mode with a Singl

Page 370 - 370 Section VII: Routing

AT-S63 Management Software Features GuideSection VIII: Port Security 431Figure 58. Single Operating Mode with Multiple Clients Using the Piggy-back Fe

Page 371 - Interface Names

Chapter 36: 802.1x Port-based Network Access Control432 Section VIII: Port SecurityIf the clients are connected to an 802.1x-compliant device, such as

Page 372 - Static Routes

AT-S63 Management Software Features GuideSection VIII: Port Security 433Figure 60. Single Operating Mode with Multiple Clients Using the Piggy-back Fe

Page 373 - IP ROUTE, and SET IP ROUTE

Chapter 36: 802.1x Port-based Network Access Control434 Section VIII: Port SecurityAn example of this authenticator operating mode is illustrated in F

Page 374 - 374 Section VII: Routing

AT-S63 Management Software Features GuideSection VIII: Port Security 435none, port 6 on switch A will discard the packets because switch B would not b

Page 375

Chapter 36: 802.1x Port-based Network Access Control436 Section VIII: Port SecuritySupplicant and VLAN AssociationsOne of the challenges to managing a

Page 376 - Default Routes

AT-S63 Management Software Features GuideSection VIII: Port Security 437Single OperatingModeHere are the operating characteristics for the switch when

Page 377 - Section VII: Routing 377

Chapter 36: 802.1x Port-based Network Access Control438 Section VIII: Port SecurityGuest VLANAn authenticator port in the unauthorized state typically

Page 378 - 378 Section VII: Routing

AT-S63 Management Software Features GuideSection VIII: Port Security 439RADIUS AccountingThe AT-S63 Management Software supports RADIUS accounting for

Page 379 - Routing Table

Chapter 1: Overview444. You cannot upload or download files to a compact flash card with the web browser windows. Also, that interface does not suppor

Page 380 - Route Selection Process

Chapter 36: 802.1x Port-based Network Access Control440 Section VIII: Port SecurityGeneral StepsHere are the general steps to implementing 802.1x Port

Page 381 -  1024 dynamic entries

AT-S63 Management Software Features GuideSection VIII: Port Security 441GuidelinesThe following are general guidelines to using this feature: Ports o

Page 382 - 382 Section VII: Routing

Chapter 36: 802.1x Port-based Network Access Control442 Section VIII: Port Security An authenticator port cannot be part of a static port trunk, LACP

Page 383 - Section VII: Routing 383

AT-S63 Management Software Features GuideSection VIII: Port Security 443Here are guidelines for adding VLAN assignments to supplicant accounts on a RA

Page 384 - Network Servers

Chapter 36: 802.1x Port-based Network Access Control444 Section VIII: Port Security

Page 385 - Section VII: Routing 385

Section IX: Management Security 445Section IXManagement SecurityThe chapters in this section describe the management security features of the AT-9400

Page 386 - Accessing DHCP

446 Section IX: Management Security

Page 387 - Local Interface

Section IX: Management Security 447Chapter 37Web ServerThe sections in this chapter are: “Supported Platforms” on page 448 “Overview” on page 449 “

Page 388 - 388 Section VII: Routing

Chapter 37: Web Server448 Section IX: Management SecuritySupported PlatformsRefer to Table 112 and Table 113 for the AT-9400 Switches and the manageme

Page 389 - Section VII: Routing 389

AT-S63 Management Software Features GuideSection IX: Management Security 449OverviewThe AT-S63 Management Software has a web server and a special web

Page 390 - Routing Command Example

AT-S63 Management Software Features Guide45Multiple Spanning Tree Protocol (MSTP)YYYYTable 15. Management Interfaces for Spanning Tree ProtocolsStand-

Page 391 - Interfaces

Chapter 37: Web Server450 Section IX: Management SecurityConfiguring the Web Server for HTTPThe following steps configure the web server for non-secur

Page 392 - Default Route

AT-S63 Management Software Features GuideSection IX: Management Security 451Configuring the Web Server for HTTPSThe following sections outline the ste

Page 393 - Selecting the

Chapter 37: Web Server452 Section IX: Management Security6. After receiving the certificates from the CA, download them into the switch’s file system

Page 394 - Non-routing Command Example

Section IX: Management Security 453Chapter 38Encryption KeysThe sections in this chapter are: “Supported Platforms” on page 454 “Overview” on page 4

Page 395 - Section VII: Routing 395

Chapter 38: Encryption Keys454 Section IX: Management SecuritySupported PlatformsRefer to Table 114 and Table 115 for the AT-9400 Switches and the man

Page 396 - 396 Section VII: Routing

AT-S63 Management Software Features GuideSection IX: Management Security 455OverviewProtecting your managed switches from unauthorized management acce

Page 397 - BOOTP Relay Agent

Chapter 38: Encryption Keys456 Section IX: Management SecurityEncryption Key LengthWhen you create a key pair, you have to specify its length in bits.

Page 398

AT-S63 Management Software Features GuideSection IX: Management Security 457Encryption Key GuidelinesObserve the following guidelines when creating an

Page 399

Chapter 38: Encryption Keys458 Section IX: Management SecurityTechnical OverviewThe encryption feature provides the following data security services:

Page 400 - 400 Section VII: Routing

AT-S63 Management Software Features GuideSection IX: Management Security 459algorithm and key. For a given input block of plaintext ECB always produce

Page 401

Chapter 1: Overview46Table 18. Management Interfaces for Port SecurityStand-alone Switches StacksSCL ACL M WB SCL ACL WBMAC address-based port securit

Page 402 - 402 Section VII: Routing

Chapter 38: Encryption Keys460 Section IX: Management Securitysecret. Only the decryption, or private key, needs to be kept secret. The other name for

Page 403 - Chapter 34

AT-S63 Management Software Features GuideSection IX: Management Security 461 It is very hard to find another message and key which give the same hash

Page 404

Chapter 38: Encryption Keys462 Section IX: Management SecurityA Diffie-Hellman algorithm requires more processing overhead than RSA-based key exchange

Page 405

Section IX: Management Security 463Chapter 39PKI Certificates and SSLThe sections in this chapter are: “Supported Platforms” on page 464 “Overview”

Page 406 - Master Switch

Chapter 39: PKI Certificates and SSL464 Section IX: Management SecuritySupported PlatformsRefer to Table 116 and Table 117 for the AT-9400 Switches an

Page 407 - Backup Switches

AT-S63 Management Software Features GuideSection IX: Management Security 465OverviewThis chapter describes the second part of the encryption feature o

Page 408 - Interface Monitoring

Chapter 39: PKI Certificates and SSL466 Section IX: Management Securitynetwork equipment. With private CAs, companies can keep track of the certificat

Page 409 - Port Monitoring

AT-S63 Management Software Features GuideSection IX: Management Security 467Distinguished NamesPart of the task to creating a self-signed certificate

Page 410 - VRRP on the Switch

Chapter 39: PKI Certificates and SSL468 Section IX: Management SecurityIf your network has a Domain Name System and you mapped a name to the IP addres

Page 411

AT-S63 Management Software Features GuideSection IX: Management Security 469SSL and Enhanced StackingSecure Sockets Layer (SSL) is supported in an enh

Page 412 - 412 Section VII: Routing

AT-S63 Management Software Features Guide47Management Access MethodsYou can access the AT-S63 Management Software on a switch several ways: Local ses

Page 413 - Port Security

Chapter 39: PKI Certificates and SSL470 Section IX: Management SecurityGuidelinesThe guidelines for creating certificates are: A certificate can have

Page 414

AT-S63 Management Software Features GuideSection IX: Management Security 471Technical OverviewThis section describes the Secure Sockets Layer (SSL) fe

Page 415 - Chapter 35

Chapter 39: PKI Certificates and SSL472 Section IX: Management SecuritySSL uses asymmetrical (Public Key) encryption to establish a connection between

Page 416

AT-S63 Management Software Features GuideSection IX: Management Security 473To verify the authenticity of a server, the server has a public and privat

Page 417

Chapter 39: PKI Certificates and SSL474 Section IX: Management Securitythis, and other attacks, PKI provides a means for secure transfer of public key

Page 418

AT-S63 Management Software Features GuideSection IX: Management Security 475Elements of aPublic KeyInfrastructureA public key infrastructure is a set

Page 419

Chapter 39: PKI Certificates and SSL476 Section IX: Management SecurityCertificateValidationTo validate a certificate, the end entity verifies the sig

Page 420

AT-S63 Management Software Features GuideSection IX: Management Security 477PKIImplementationThe following sections discuss the implementation of PKI

Page 421 - Chapter 36

Chapter 39: PKI Certificates and SSL478 Section IX: Management Security

Page 422

Section IX: Management Security 479Chapter 40Secure Shell (SSH)The sections in this chapter are: “Supported Platforms” on page 480 “Overview” on pag

Page 423

Chapter 1: Overview48Remote SecureShell (SSH)SessionsThe AT-S63 Management Software also has a Secure Shell (SSH) server for remote management from SS

Page 424

Chapter 40: Secure Shell (SSH)480 Section IX: Management SecuritySupported PlatformsRefer to Table 118 and Table 119 for the AT-9400 Switches and the

Page 425 - Authentication Process

AT-S63 Management Software Features GuideSection IX: Management Security 481OverviewSecure management is increasingly important in modern networks, as

Page 426 - Port Roles

Chapter 40: Secure Shell (SSH)482 Section IX: Management SecuritySupport for SSHThe AT-S63 implementation of the SSH protocol is compliant with the SS

Page 427 - Operational Settings

AT-S63 Management Software Features GuideSection IX: Management Security 483SSH ServerWhen the SSH server is enabled, connections from SSH clients are

Page 428

Chapter 40: Secure Shell (SSH)484 Section IX: Management SecuritySSH ClientsThe SSH protocol provides a secure connection between the switch and SSH c

Page 429 - Single Operating

AT-S63 Management Software Features GuideSection IX: Management Security 485SSH and Enhanced StackingThe AT-S63 Management Software allows for encrypt

Page 430

Chapter 40: Secure Shell (SSH)486 Section IX: Management SecurityBecause enhanced stacking does not allow for SSH encrypted management sessions betwee

Page 431

AT-S63 Management Software Features GuideSection IX: Management Security 487SSH Configuration GuidelinesHere are the guidelines to configuring SSH: S

Page 432

Chapter 40: Secure Shell (SSH)488 Section IX: Management SecurityGeneral Steps to Configuring SSHConfiguring the SSH server involves the following pro

Page 433 - Operating Mode

Section IX: Management Security 489Chapter 41TACACS+ and RADIUS ProtocolsThis chapter describes the two authentication protocols TACACS+ and RADIUS. S

Page 434

AT-S63 Management Software Features Guide49Manager Access LevelsThe AT-S63 Management Software has two manager access levels of manager and operator.

Page 435

Chapter 41: TACACS+ and RADIUS Protocols490 Section IX: Management SecuritySupported PlatformsRefer to Table 120 and Table 121 for the AT-9400 Switche

Page 436

AT-S63 Management Software Features GuideSection IX: Management Security 491OverviewTACACS+ and RADIUS are authentication protocols that can enhance t

Page 437

Chapter 41: TACACS+ and RADIUS Protocols492 Section IX: Management SecurityWhen a network manager logs in to a switch to manage the device, the switch

Page 438 - Guest VLAN

AT-S63 Management Software Features GuideSection IX: Management Security 493GuidelinesHere are the main steps to using the TACACS+ or RADIUS client on

Page 439 - RADIUS Accounting

Chapter 41: TACACS+ and RADIUS Protocols494 Section IX: Management Securitymaximum length for a password is 16 alphanumeric characters and spaces.– T

Page 440 - General Steps

AT-S63 Management Software Features GuideSection IX: Management Security 495NoteIf no authentication server responds or if no servers have been define

Page 441

Chapter 41: TACACS+ and RADIUS Protocols496 Section IX: Management Security

Page 442

Section IX: Management Security 497Chapter 42Management Access Control ListThis chapter explains how to restrict Telnet and web browser management acc

Page 443

Chapter 42: Management Access Control List498 Section IX: Management SecuritySupported PlatformsRefer to Table 122 and Table 123 for the AT-9400 Switc

Page 444

AT-S63 Management Software Features GuideSection IX: Management Security 499OverviewThis chapter explains how to restrict remote management access to

Page 445 - Management Security

AT-S63 Management Software Features Guide5Load Distribution Methods...

Page 446

Chapter 1: Overview50Installation and Management ConfigurationsThe AT-9400 Switches can be installed in three configurations.Stand-aloneSwitchesAll th

Page 447 - Web Server

Chapter 42: Management Access Control List500 Section IX: Management SecurityParts of a Management ACEAn ACE has the following three parts:  IP addre

Page 448

AT-S63 Management Software Features GuideSection IX: Management Security 501GuidelinesBelow are guidelines for the management ACL: The default settin

Page 449

Chapter 42: Management Access Control List502 Section IX: Management SecurityExamplesFollowing are several examples of ACEs.This ACE allows the manage

Page 450 - Chapter 37: Web Server

AT-S63 Management Software Features GuideSection IX: Management Security 503The two ACEs in this management ACL permit remote management from the mana

Page 451

Chapter 42: Management Access Control List504 Section IX: Management Security

Page 452

505Appendix AAT-S63 Management Software Default SettingsThis appendix lists the factory default settings for the AT-S63 Management Software. The featu

Page 453 - Encryption Keys

Appendix A: AT-S63 Management Software Default Settings506 “System Name, Administrator, and Comments Settings” on page 537 “Telnet Server” on page 5

Page 454

AT-S63 Management Software Features Guide507Address Resolution Protocol CacheThe following table lists the ARP cache default setting.ARP Cache Setting

Page 455

Appendix A: AT-S63 Management Software Default Settings508Boot Configuration FileThe following table lists the names of the default configuration file

Page 456 - Encryption Key Length

AT-S63 Management Software Features Guide509BOOTP Relay AgentThe following table lists the default setting for the BOOTP relay agent.BOOTP Relay Agent

Page 457 - Encryption Key Guidelines

AT-S63 Management Software Features Guide51IP ConfigurationDo you intend to remotely manage the switch with a Telnet or Secure Shell client, or a web

Page 458 - Technical Overview

Appendix A: AT-S63 Management Software Default Settings510Class of ServiceThe following table lists the default mappings of IEEE 802.1p priority level

Page 459

AT-S63 Management Software Features Guide511Denial of Service DefensesThe following table lists the default settings for the Denial of Service prevent

Page 460 - Authentication

Appendix A: AT-S63 Management Software Default Settings512802.1x Port-Based Network Access ControlThe following table describes the 802.1x Port-based

Page 461 - Algorithms

AT-S63 Management Software Features Guide513The following table lists the default settings for a supplicant port.VLAN Assignment EnabledSecure VLAN On

Page 462 - Chapter 38: Encryption Keys

Appendix A: AT-S63 Management Software Default Settings514Enhanced StackingThe following table lists the enhanced stacking default setting.Enhanced St

Page 463 - PKI Certificates and SSL

AT-S63 Management Software Features Guide515Ethernet Protection Switching Ring (EPSR) SnoopingThe following table lists the EPSR default setting.EPSR

Page 464

Appendix A: AT-S63 Management Software Default Settings516Event LogsThe following table lists the default settings for both the permanent and temporar

Page 465 - Types of Certificates

AT-S63 Management Software Features Guide517GVRPThis section provides the default settings for GVRP.GVRP Setting DefaultStatus DisabledGIP Status Enab

Page 466

Appendix A: AT-S63 Management Software Default Settings518IGMP SnoopingThe following table lists the IGMP Snooping default settings.IGMP Snooping Sett

Page 467 - Distinguished Names

AT-S63 Management Software Features Guide519Internet Protocol Version 4 Packet RoutingThe following table lists the IPv4 packet routing default settin

Page 468

Chapter 1: Overview52Configuration FilesStand-alone switches and stacks store their parameter settings in configuration files in their file systems. T

Page 469 - SSL and Enhanced Stacking

Appendix A: AT-S63 Management Software Default Settings520Link-flap ProtectionThe following table lists the default settings for link-flap protection.

Page 470

AT-S63 Management Software Features Guide521MAC Address-based Port SecurityThe following table lists the MAC address-based port security default setti

Page 471

Appendix A: AT-S63 Management Software Default Settings522MAC Address TableThe following table lists the default setting for the MAC address table.MAC

Page 472

AT-S63 Management Software Features Guide523Management Access Control ListThe following table lists the default setting for the management access cont

Page 473

Appendix A: AT-S63 Management Software Default Settings524Manager and Operator AccountThe following table lists the manager and operator account defau

Page 474 - X.509 Certificates

AT-S63 Management Software Features Guide525Multicast Listener Discovery SnoopingThe following table lists the MLD Snooping default settings.MLD Snoop

Page 475 - Infrastructure

Appendix A: AT-S63 Management Software Default Settings526Public Key InfrastructureThe following table lists the PKI default settings, including the g

Page 476 - Revocation Lists

AT-S63 Management Software Features Guide527Port SettingsThe following table lists the port configuration default settings.Port Configuration Setting

Page 477 - Implementation

Appendix A: AT-S63 Management Software Default Settings528RJ-45 Serial Terminal PortThe following table lists the RJ-45 serial terminal port default s

Page 478

AT-S63 Management Software Features Guide529Router Redundancy Protocol SnoopingThe following table lists the RRP Snooping default setting.RRP Snooping

Page 479 - Secure Shell (SSH)

AT-S63 Management Software Features Guide53Redundant Twisted Pair PortsSeveral AT-9400 Switches have twisted pair ports and GBIC or SFP slots that are

Page 480

Appendix A: AT-S63 Management Software Default Settings530Server-based Authentication (RADIUS and TACACS+)This section describes the server-based auth

Page 481

AT-S63 Management Software Features Guide531Simple Network Management ProtocolThe following table describes the SNMP default settings.SNMP Communities

Page 482 - Support for SSH

Appendix A: AT-S63 Management Software Default Settings532Simple Network Time ProtocolThe following table lists the SNTP default settings.SNTP Setting

Page 483 - SSH Server

AT-S63 Management Software Features Guide533Spanning Tree Protocols (STP, RSTP, and MSTP)This section provides the spanning tree, STP RSTP, and MSTP,

Page 484 - SSH Clients

Appendix A: AT-S63 Management Software Default Settings534MultipleSpanning TreeProtocolThe following table lists the MSTP default settings.Loop Guard

Page 485 - SSH and Enhanced Stacking

AT-S63 Management Software Features Guide535Secure Shell ServerThe following table lists the SSH default settings.The SSH port number is not adjustabl

Page 486

Appendix A: AT-S63 Management Software Default Settings536Secure Sockets LayerThe following table lists the SSL default settings.SSL Setting DefaultMa

Page 487 - SSH Configuration Guidelines

AT-S63 Management Software Features Guide537System Name, Administrator, and Comments SettingsThe following table describes the IP default settings.IP

Page 488

Appendix A: AT-S63 Management Software Default Settings538Telnet ServerThe following table lists the Telnet server default settings.The Telnet port nu

Page 489 - TACACS+ and RADIUS Protocols

AT-S63 Management Software Features Guide539Virtual Router Redundancy ProtocolThe following table lists the VRRP default setting.VRRP Setting DefaultS

Page 490

Chapter 1: Overview54NoteThese guidelines do not apply to the SFP slots on the AT-9408LC/SP Switch and the XFP slots on the AT-9424Ts/XP and AT-9448Ts

Page 491

Appendix A: AT-S63 Management Software Default Settings540VLANsThis section provides the VLAN default settings.VLAN Setting DefaultDefault VLAN Name D

Page 492

AT-S63 Management Software Features Guide541Web ServerThe following table lists the web server default settings.Web Server Configuration Setting Defau

Page 493

Appendix A: AT-S63 Management Software Default Settings542

Page 494

543Appendix BSNMPv3 Configuration ExamplesThis appendix provides two examples of SNMPv3 configuration using the SNMPv3 Table menus and a worksheet to

Page 495

Appendix B: SNMPv3 Configuration Examples544SNMPv3 Configuration Examples This appendix provides SNMPv3 configuration examples for the following type

Page 496

AT-S63 Management Software Features Guide545Configure SNMPv3 SecurityToGroup TableUser Name:systemadmin24Security Model:v3Group Name: ManagersStorage

Page 497 - Chapter 42

Appendix B: SNMPv3 Configuration Examples546Configure SNMPv3 View Table Menu View Name: internetView Subtree OID: 1.3.6.1 (or internet)Subtree Mask: V

Page 498

AT-S63 Management Software Features Guide547Security ModelSecurity LevelRead View NameWrite View NameNotify View NameStorage TypeSNMPv3 SecurityToGrou

Page 499

Appendix B: SNMPv3 Configuration Examples548Security ModelSecurity LevelStorage TypeSNMPv3 Parameters (Continued)

Page 500 - Parts of a Management ACE

549Appendix CFeatures and StandardsThis appendix lists the features and standards of the AT-9400 Switch. Section include: ”10/100/1000Base-T Twisted

Page 501

AT-S63 Management Software Features Guide55History of New FeaturesThe following sections outline the history of new features in the AT-S63 Management

Page 502

Appendix C: Features and Standards55010/100/1000Base-T Twisted Pair PortsIEEE 802.1d BridgingIEEE 802.3 10Base-TIEEE 802.3u 100Base-TXIEEE 802.3ab 100

Page 503

AT-S63 Management Software Features Guide551Fiber Optic Ports (AT-9408LC/SP Switch)IEEE 802.1d BridgingIEEE 802.3z 1000Base-SX— Head of Line Blocking—

Page 504

Appendix C: Features and Standards552RFC 826 Address Resolution Protocol— Equal Cost Multi-path— Split Horizon and Split Horizon with Poison Reverse—

Page 505 - Settings

AT-S63 Management Software Features Guide553Management Access MethodsEnhanced StackingOut-of-band management (serial port) In-band management (over t

Page 506 - “Web Server” on page 541

Appendix C: Features and Standards554Port SecurityIEEE 802.1x Port-based Network Access Control: Supports multiple supplicants per port and the follo

Page 507 - ARP Cache Timeout 150 seconds

AT-S63 Management Software Features Guide555RFC 1757 RMON Groups 1, 2, 3, and 9Traffic ControlRFC 2386 Quality of Service featuring:— Layer 2, 3, and

Page 508 - Boot Configuration File

Appendix C: Features and Standards556— MAC Address-based VLANs (Not supported on the AT-9408LC/SP, AT-9424T/GB, and AT-9424T/SP switches.)IEEE 802.3ac

Page 509

557Appendix DMIB ObjectsThis appendix lists the SNMP MIB objects in the private Allied Telesis MIBs that apply to the AT-S63 Management Software and t

Page 510

Appendix D: MIB Objects558Access Control ListsTable 31. Access Control Lists (AtiStackSwitch MIB)Object Name OIDatiStkSwACLConfigTable 1.3.6.1.4.1.207

Page 511

AT-S63 Management Software Features Guide559Class of ServiceTable 32. CoS Scheduling (AtiStackSwitch MIB)Object Name OIDatiSwQoSGroup 1.3.6.1.4.1.207.

Page 512

Chapter 1: Overview56already familiar with the commands in the AlliedWare Plus operating system, you may find this new interface more convenient to us

Page 513

Appendix D: MIB Objects560Date, Time, and SNTP ClientTable 36. Date, Time, and SNTP Client (AtiStackSwitch MIB)Object Name OIDatiStkSysSystemTimeConfi

Page 514 - Enhanced Stacking

AT-S63 Management Software Features Guide561Denial of Service DefensesTable 37. LAN Address and Subnet Mask (AtiStackSwitch MIB)Object Name OIDatiStkD

Page 515 - EPSR State Disabled

Appendix D: MIB Objects562Enhanced StackingTable 39. Switch Mode and Discovery (AtiStackInfo MIB)Object Name OIDatiswitchEnhancedStackingInfo 1.3.6.1.

Page 516 - Event Logs

AT-S63 Management Software Features Guide563GVRPTable 41. GVFP Switch Configuration (AtiStackSwitch MIB)Object Name OIDatiStkSwGVRPConfig 1.3.6.1.4.1.

Page 517

Appendix D: MIB Objects564atiStkSwGVRPCountersPortNotListening 1.3.6.1.4.1.207.8.17.3.8.1.8atiStkSwGVRPCountersInvalidPort 1.3.6.1.4.1.207.8.17.3.8.1.

Page 518 - IGMP Snooping

AT-S63 Management Software Features Guide565MAC Address TableTable 44. MAC Address Table (AtiStackSwitch MIB)Object Name OIDatiStkSwMacAddr2VlanTable

Page 519

Appendix D: MIB Objects566Management Access Control ListTable 46. Management Access Control List Status (AtiStackSwitch MIB)Object Name OIDatiStkSwSys

Page 520

AT-S63 Management Software Features Guide567MiscellaneousTable 48. System Reset (AtiStackSwitch MIB)Object Name OIDatiStkSwSysGroup 1.3.6.1.4.1.207.8.

Page 521

Appendix D: MIB Objects568Port MirroringTable 51. Port Mirroring (AtiStackSwitch MIB)Object Name OIDatiStkSwPortMirroringConfig 1.3.6.1.4.1.207.8.17.2

Page 522 - MAC Address Table

AT-S63 Management Software Features Guide569Quality of ServiceTable 52. Flow Groups (AtiStackSwitch MIB)Object Name OIDatiStkSwQosFlowGrpTable 1.3.6.1

Page 523 - Status Disabled

AT-S63 Management Software Features Guide57NoteThe new MODULE parameter can only be used on stacks that already have Version 4.0.0 or later. To update

Page 524 - Manager and Operator Account

Appendix D: MIB Objects570atiStkSwQosTrafficClassClassPriority 1.3.6.1.4.1.207.8.17.7.6.1.9atiStkSwQosTrafficClassRemarkPriority 1.3.6.1.4.1.207.8.17.

Page 525

AT-S63 Management Software Features Guide571Port Configuration and StatusTable 55. Port Configuration and Status (AtiStackSwitch MIB)Object Name OIDa

Page 526 - Public Key Infrastructure

Appendix D: MIB Objects572Spanning TreeTable 56. Spanning Tree (AtiStackSwitch MIB)Object Name OIDatiStkSwSysConfig 1.3.6.1.4.1.207.8.17.1.1atiStkSwSy

Page 527 - Port Settings

AT-S63 Management Software Features Guide573Static Port TrunkTable 57. Static Port Trunks (AtiStackSwitch MIB)Object Name OIDatiStkSwStaticTrunkTable

Page 528 - RJ-45 Serial Terminal Port

Appendix D: MIB Objects574VLANsThe objects in Table 58 display the specifications of the Default_VLAN.The objects in Table 59 display the names and VI

Page 529 - RRP Snooping Status Disabled

AT-S63 Management Software Features Guide575Table 61. PVID Table (AtiStackSwitch MIB)Object Name OIDatiStkSwPort2VlanTable 1.3.6.1.4.1.207.8.17.3.2ati

Page 530 - Server-based

Appendix D: MIB Objects576

Page 531

577IndexNumerics802.1p priority level in classifiers 139802.1Q-compliant VLAN mode 340802.1x Port-based Network Access Controlauthentication process 4

Page 532 - Simple Network Time Protocol

Index578protocols 140source MAC addresses 139TCP flags 143TCP source and destination ports 143UDP source and destination ports 143VLAN ID 140Common an

Page 533

AT-S63 Management Software Features Guide579Hhello time 276history of new features 55HMAC authentication algorithm 461HMAC-MD5-96 (MD5) authentication

Page 534 - Protocol

Chapter 1: Overview58Version 3.0.0 Table 21 lists the new features in version 3.0.0 of the AT-S63 Management Software.Table 21. New Features in AT-S63

Page 535 - Secure Shell Server

Index580module ID numbersdescribed 74MSTI priority 301MSTI. See Multiple Spanning Tree Instances (MSTI)MSTP. See Multiple Spanning Tree Protocol (MSTP

Page 536 - Secure Sockets Layer

AT-S63 Management Software Features Guide581loop guard 283supported platforms 270redundant twisted pair ports 53regional root 301regions 299revision n

Page 537 - Comments None

Index582static module ID numbersdescribed 74static port trunksdescribedguidelines 106load distribution methods 104supported platforms 102static routes

Page 538 - Telnet Server

AT-S63 Management Software Features Guide59Version 2.1.0 Table 22 lists the new features in version 2.1.0.Version 2.0.0 Table 23 lists the new feature

Page 539 - VRRP Setting Default

Contents6Replacing Priorities...

Page 540

Chapter 1: Overview60Version 1.3.0 Table 24 lists the new features in version 1.3.0 of the AT-S63 Management Software.Table 24. New Features in AT-S63

Page 541

AT-S63 Management Software Features Guide61Version 1.2.0 Table 25 lists the new features in version 1.2.0.Table 25. New Features in AT-S63 Version 1.2

Page 542

Chapter 1: Overview62802.1x Port-based Network Access ControlAdded a new parameter to authenticator ports: Supplicant Mode for supporting multiple su

Page 543 - SNMPv3 Configuration Examples

63Chapter 2AT-9400Ts StacksThis chapter has the following sections: “Supported Platforms” on page 64 “Introduction” on page 65 “AT-S63 Management S

Page 544

Chapter 2: AT-9400Ts Stacks64 Section I: Basic OperationsSupported PlatformsTable 26 and Table 27 list the AT-9400 Switches and the management interfa

Page 545 - Configuration

AT-S63 Management Software Features GuideSection I: Basic Operations 65IntroductionThe switches in the AT-9400 Series are divided into the Layer 2+ gr

Page 546 - Worksheet

Chapter 2: AT-9400Ts Stacks66 Section I: Basic OperationsAT-S63 Management SoftwareStacking requires Version 3.0.0 or later of the AT-S63 Management S

Page 547

AT-S63 Management Software Features GuideSection I: Basic Operations 67AT-StackXG Stacking ModuleTo be part of a stack, the AT-9400Ts Switch must have

Page 548 - SNMPv3 Parameters (Continued)

Chapter 2: AT-9400Ts Stacks68 Section I: Basic OperationsMaximum Number of Switches in a StackStacks of the 24-port AT-9424Ts Switch or the AT-9424Ts/

Page 549 - Features and Standards

AT-S63 Management Software Features GuideSection I: Basic Operations 69Enhanced StackingIf you have prior experience with Allied Telesis products, you

Page 550

AT-S63 Management Software Features Guide7Chapter 23: Ethernet Protection Switching Ring Snooping ...

Page 551 - DHCP and BOOTP Clients

Chapter 2: AT-9400Ts Stacks70 Section I: Basic OperationsStack TopologyThe switches of an AT-9400Ts Stack are cabled with the AT-StackXG Stacking Modu

Page 552

AT-S63 Management Software Features GuideSection I: Basic Operations 71Figure 3. Duplex-ring TopologyBoth topologies offer the same in terms of networ

Page 553 - Management MIBs

Chapter 2: AT-9400Ts Stacks72 Section I: Basic OperationsDiscovery ProcessWhen the switches of a stack are powered on or reset, they synchronize their

Page 554 - System Monitoring

AT-S63 Management Software Features GuideSection I: Basic Operations 73Master and Member SwitchesThe activities of the devices of a stack are coordina

Page 555 - Traffic Control

Chapter 2: AT-9400Ts Stacks74 Section I: Basic OperationsModule ID NumbersThe switches of a stack are identified by module ID numbers. Each switch mus

Page 556

AT-S63 Management Software Features GuideSection I: Basic Operations 75Stack Configuration FilesThe parameter settings of a stack are stored in the ac

Page 557 - MIB Objects

Chapter 2: AT-9400Ts Stacks76 Section I: Basic Operations If the switch determines that its ID number is set to STATIC with the value 1, then it know

Page 558

AT-S63 Management Software Features GuideSection I: Basic Operations 77MAC Address TablesThe MAC address tables of the switches in a stack are all the

Page 559

Chapter 2: AT-9400Ts Stacks78 Section I: Basic OperationsStack IP AddressIf you do not intend to use the packet routing feature, you must still assign

Page 560 - Date, Time, and SNTP Client

AT-S63 Management Software Features GuideSection I: Basic Operations 79Upgrading the AT-S63 Management SoftwareThe AT-9400 Switch must have Version 3.

Page 561

Contents8Associating VLANs to MSTIs...

Page 562

Chapter 2: AT-9400Ts Stacks80 Section I: Basic Operations

Page 563

Section I: Basic Operations 81Chapter 3Enhanced StackingThis chapter contains the following sections: “Supported Platforms” on page 82 “Overview” on

Page 564 - Appendix D: MIB Objects

Chapter 3: Enhanced Stacking82 Section I: Basic OperationsSupported PlatformsTable 29 and Table 30 list the AT-9400 Switches and the management interf

Page 565

AT-S63 Management Software Features GuideSection I: Basic Operations 83OverviewHaving to manage a large number of network devices typically involves s

Page 566

Chapter 3: Enhanced Stacking84 Section I: Basic OperationsMaster and Slave SwitchesAn enhanced stack must have at least one master switch. This switch

Page 567 - Miscellaneous

AT-S63 Management Software Features GuideSection I: Basic Operations 85Common VLANA master switch searches for the other switches in an enhanced stack

Page 568 - Port Mirroring

Chapter 3: Enhanced Stacking86 Section I: Basic OperationsMaster Switch and the Local InterfaceBefore a switch can function as the master switch of an

Page 569

AT-S63 Management Software Features GuideSection I: Basic Operations 87Slave SwitchesThe slave switches of an enhanced stack must be connected to the

Page 570

Chapter 3: Enhanced Stacking88 Section I: Basic OperationsEnhanced Stacking CompatibilityThis version of enhanced stacking is compatible with earlier

Page 571 - Port Configuration and Status

AT-S63 Management Software Features GuideSection I: Basic Operations 89Enhanced Stacking GuidelinesHere are the guidelines to using the enhanced stack

Page 572

AT-S63 Management Software Features Guide9Section VII: Internet Protocol Routing ...361C

Page 573 - Static Port Trunk

Chapter 3: Enhanced Stacking90 Section I: Basic OperationsGeneral StepsHere are the basic steps to implementing the enhanced stacking feature on the A

Page 574

Section I: Basic Operations 91Chapter 4SNMPv1 and SNMPv2cThis chapter describes SNMPv1 and SNMPv2c community strings for SNMP management of the switch

Page 575

Chapter 4: SNMPv1 and SNMPv2c92 Section I: Basic OperationsSupported PlatformsRefer to Table 31 and Table 32 for the AT-9400 Switches and the manageme

Page 576

AT-S63 Management Software Features GuideSection I: Basic Operations 93OverviewYou can manage a switch by viewing and changing the management informat

Page 577 - Numerics

Chapter 4: SNMPv1 and SNMPv2c94 Section I: Basic OperationsCommunity String AttributesA community string has attributes for controlling who can use th

Page 578

AT-S63 Management Software Features GuideSection I: Basic Operations 95the community strings.Each community string can have up to eight trap IP addres

Page 579

Chapter 4: SNMPv1 and SNMPv2c96 Section I: Basic OperationsDefault SNMP Community StringsThe AT-S63 Management Software provides two default community

Page 580

Section I: Basic Operations 97Chapter 5MAC Address TableThis chapter contains background information about the MAC address table.This chapter contains

Page 581

Chapter 5: MAC Address Table98 Section I: Basic OperationsOverviewThe AT-9400 Switch has a MAC address table with a storage capacity of 16,000 entries

Page 582

AT-S63 Management Software Features GuideSection I: Basic Operations 99no longer active.The period of time a switch waits before purging inactive dyna

Comments to this Manuals

Eric 07 Mar 2024 | 00:19:10

Dear manymanuals.pl Admin. Eric here with a quick thought about your website manymanuals.pl... I’m on the internet a lot and I look at a lot of business websites. Like yours, many of them have great content. But all too often, they come up short when it comes to engaging and connecting with anyone who visits. I get it – it’s hard. Studies show 7 out of 10 people who land on a site, abandon it in moments without leaving even a trace. You got the eyeball, but nothing else. Here’s