Allied-telesis AT-S62 Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Sprzęt komputerowy Allied-telesis AT-S62. Allied Telesis AT-S62 User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 862
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
Management
Software
AT-S62
User’s Guide
AT-8524M LAYER 2+
FAST ETHERNET SWITCH
VERSION 1.1.1
®
PN 613-50485-00 Rev C
Przeglądanie stron 0
1 2 3 4 5 6 ... 861 862

Podsumowanie treści

Strona 1 - User’s Guide

Management SoftwareAT-S62◆User’s GuideAT-8524M LAYER 2+ FAST ETHERNET SWITCHVERSION 1.1.1®PN 613-50485-00 Rev C

Strona 2

Table of Contents10Data Authentication ...

Strona 3

Chapter 6: Port ParametersSection I: Basic Operations 100The problem with broadcast frames is that too many of them traversing a network can impact ne

Strona 4

AT-S62 User’s GuideSection I: Basic Operations 101If you select Auto for Auto-Negotiation, which is the default setting, the switch will set both spee

Strona 5 - Section II

Chapter 6: Port ParametersSection I: Basic Operations 102The possible settings for the duplex mode are Full-duplex and Half-duplex.7 - HOL Blocking Pr

Strona 6 - Section III

AT-S62 User’s GuideSection I: Basic Operations 103The HOL Limit parameter can help prevent this problem from occurring. This parameter sets a threshol

Strona 7 - Section IV

Chapter 6: Port ParametersSection I: Basic Operations 104The options in the Flow Control menu are described below:1 - Flow ControlDisabled - No flow c

Strona 8 - Section V

AT-S62 User’s GuideSection I: Basic Operations 105Selecting this option displays the Back Pressure menu shown in Figure 26.Figure 26 Back Pressure Me

Strona 9 - Section VII

Chapter 6: Port ParametersSection I: Basic Operations 106X - Reset PortResets the speed and duplex mode of the selected port to the default value of A

Strona 10 - Table of Contents

AT-S62 User’s GuideSection I: Basic Operations 107Setting the Rate LimitThis feature allows you to set the maximum number of ingress packets the switc

Strona 11 - Section VIII

Chapter 6: Port ParametersSection I: Basic Operations 108The Rate Limiting menu is shown in Figure 27.Figure 27 Rate Limiting Menu5. Type 4 to select

Strona 12

109Chapter 7MAC Address TableThe chapter contains the procedures for viewing the static and dynamic MAC address table.This chapter contains the follow

Strona 13

AT-S62 User’s Guide11Chapter 30Management Access Control List ...

Strona 14

Chapter 7: MAC Address TableSection I: Basic Operations 110MAC Address OverviewEvery hardware device that you connect to your Ethernet network has a u

Strona 15

AT-S62 User’s GuideSection I: Basic Operations 111The type of MAC address described above is referred to as a dynamic MAC address. Dynamic MAC address

Strona 16 - List of Figures

Chapter 7: MAC Address TableSection I: Basic Operations 112Displaying MAC AddressesThe management software has two menu selections for displaying the

Strona 17

AT-S62 User’s GuideSection I: Basic Operations 1133. Select the desired option. The options are explained below:1 - Display AllThis selection displays

Strona 18

Chapter 7: MAC Address TableSection I: Basic Operations 114An example of a multicast MAC address table is shown in Figure 31.Figure 31 Display All Me

Strona 19

AT-S62 User’s GuideSection I: Basic Operations 1155 - Display Specified MACDisplays the port number on which a MAC address was assigned or learned.In

Strona 20

Chapter 7: MAC Address TableSection I: Basic Operations 116Adding Static Unicast and Multicast MAC AddressesThis section contains the procedure for ad

Strona 21

AT-S62 User’s GuideSection I: Basic Operations 117to the port where the multicast application is located will result in the failure of the multicast p

Strona 22

Chapter 7: MAC Address TableSection I: Basic Operations 118Deleting Unicast and Multicast MAC AddressesTo delete a dynamic or static unicast or multic

Strona 23

AT-S62 User’s GuideSection I: Basic Operations 119Deleting All Dynamic MAC AddressesTo delete all dynamic unicast and multicast MAC address from the M

Strona 24

Table of Contents12Chapter 37Port Trunking ...

Strona 25 - How This Guide is Organized

Chapter 7: MAC Address TableSection I: Basic Operations 120Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addres

Strona 26

121Chapter 8Port TrunkingThis chapter contains the procedures for creating, modifying, and deleting port trunks. Sections in the chapter include:❑ Por

Strona 27 - Document Conventions

Chapter 8: Port TrunkingSection I: Basic Operations 122Port Trunking OverviewA port trunk is an economical way for you to increase the bandwidth betwe

Strona 28

AT-S62 User’s GuideSection I: Basic Operations 123❑ When cabling a trunk, the order of the connections should be maintained on both nodes. The lowest

Strona 29 - Contacting Allied Telesyn

Chapter 8: Port TrunkingSection I: Basic Operations 124❑ Source IP Address (Layer 3)❑ Destination IP Address (Layer 3)❑ Source IP Address / Destinatio

Strona 30 - Management Software Updates

AT-S62 User’s GuideSection I: Basic Operations 125Figure 34 Load Distribution MethodNow assume that you configured the port trunk on Switch #1 with t

Strona 31 - Overview

Chapter 8: Port TrunkingSection I: Basic Operations 126For example, when Workstation B sends a packet to the server, Switch #1 uses Port 15 of the tru

Strona 32 - Management Overview

AT-S62 User’s GuideSection I: Basic Operations 127When another node sends a packet over the trunk, its address is assigned to the next lowest port in

Strona 33

Chapter 8: Port TrunkingSection I: Basic Operations 128Even though there is only one source, all the data links in the trunk are used. For instance, i

Strona 34 - Local Management Session

AT-S62 User’s GuideSection I: Basic Operations 129Creating a Port TrunkThis section contains the procedure for creating a port trunk on the switch. Be

Strona 35 - Telnet Management Session

AT-S62 User’s Guide13Configuring the SNMPv3 Access Table ...

Strona 36 - Chapter 1: Overview

Chapter 8: Port TrunkingSection I: Basic Operations 130The Port Trunking menu is shown in Figure 35.Figure 35 Port Trunking MenuThis menu lists any t

Strona 37 - SNMP Management Session

AT-S62 User’s GuideSection I: Basic Operations 1316. To set the load distribution method, type 3 to toggle the selection through the following possibl

Strona 38 - Management Access Levels

Chapter 8: Port TrunkingSection I: Basic Operations 132Modifying a Port TrunkThis section contains the procedure for modifying a port trunk on the swi

Strona 39 - Basic Operations

AT-S62 User’s GuideSection I: Basic Operations 133The Modify Trunk menu is displayed. The menu displays the operating specifications of the selected t

Strona 40 - Management Session

Chapter 8: Port TrunkingSection I: Basic Operations 1347. To change the ports of a trunk, type 4 to select Trunk Ports and, when prompted, enter the n

Strona 41

AT-S62 User’s GuideSection I: Basic Operations 135Deleting a Port TrunkCautionDisconnect the cables from the port trunk on the switch before performin

Strona 42 - Starting a Local

136Chapter 9Port MirroringThis chapter contains the procedures for creating and deleting a port mirror. Sections in the chapter include:❑ Port Mirrori

Strona 43

AT-S62 User’s GuideSection I: Basic Operations 137Port Mirroring OverviewThe port mirroring feature allows you to unobtrusively monitor the traffic be

Strona 44 - Quitting a Local

Chapter 9: Port MirroringSection I: Basic Operations 138Creating a Port MirrorTo create a port mirror, perform the following procedure:1. From the Mai

Strona 45

AT-S62 User’s GuideSection I: Basic Operations 1395. Type 2 to select Mirror-To Port and, when prompted, enter the number of the port to function as t

Strona 46 - Quitting a

Table of Contents14Chapter 47GARP VLAN Registration Protocol ...

Strona 47 - Saving Your Parameter Changes

Chapter 9: Port MirroringSection I: Basic Operations 140Deleting a Port MirrorTo delete a port mirror, perform the following procedure:1. From the Mai

Strona 48 - Enhanced Stacking

141Chapter 10Ethernet StatisticsThis chapter contains the procedures for displaying data traffic statistics. The chapter contains the following sectio

Strona 49 - Enhanced Stacking Overview

Chapter 10: Ethernet StatisticsSection I: Basic Operations 142Displaying Port StatisticsTo display Ethernet port statistics, perform the following pro

Strona 50 - Chapter 3: Enhanced Stacking

AT-S62 User’s GuideSection I: Basic Operations 143Multicast Frames ReceivedNumber of multicast frames received on the port.Multicast Frames SentNumber

Strona 51 - IP Address

Chapter 10: Ethernet StatisticsSection I: Basic Operations 144Clearing Port CountersTo return the statistics counters of a port to zero, perform the f

Strona 52

145Section IIAdvanced OperationsThe chapters in this section explain how to manage an AT-8524M switch from a local or Telnet management session. The c

Strona 53

146Chapter 11File SystemThis chapter describes the AT-S62 file system, and how you can use the file system to copy, rename, and delete system files. T

Strona 54

AT-S62 User’s GuideSection II: Advanced Operations 147File System OverviewThe AT-S62 management software has a file system for storing system files. Y

Strona 55 - Returning to

Chapter 11: File SystemSection II: Advanced Operations 148File NamingConventionsThe file system is a flat file system which means directories are not

Strona 56 - Basic Switch Parameters

AT-S62 User’s GuideSection II: Advanced Operations 149Working with Boot Configuration FilesA boot configuration file contains a series of commands tha

Strona 57

AT-S62 User’s Guide15Denial of Service Prevention Default Settings ...

Strona 58 - Address?

Chapter 11: File SystemSection II: Advanced Operations 150Phase 1: Creating a Configuration FileBefore you begin to configure the switch with the para

Strona 59

AT-S62 User’s GuideSection II: Advanced Operations 151The following prompt is displayed:Enter the file name (or None):5. Enter a file name for the new

Strona 60

Chapter 11: File SystemSection II: Advanced Operations 152NoteOnly the active boot configuration file is changed when you select the Save Configuratio

Strona 61

AT-S62 User’s GuideSection II: Advanced Operations 153The following prompt is displayed:Enter the file name:5. Enter the file name of the configuratio

Strona 62

Chapter 11: File SystemSection II: Advanced Operations 154The contents of the configuration file are displayed in the View File menu. An example is sh

Strona 63

AT-S62 User’s GuideSection II: Advanced Operations 155Here are several guidelines for editing a boot configuration file:❑ The text editor must be able

Strona 64

Chapter 11: File SystemSection II: Advanced Operations 156Copying, Renaming, and Deleting System FilesUse this procedure to copy, rename, and delete s

Strona 65

AT-S62 User’s GuideSection II: Advanced Operations 1575. To rename a system file, do the following:a. From the File Operations menu, type 5 to select

Strona 66

Chapter 11: File SystemSection II: Advanced Operations 158Displaying System FilesUse this procedure to display a list of the system files currently st

Strona 67 - Setting the System Time

AT-S62 User’s GuideSection II: Advanced Operations 159The List Files menu is displayed. An example of the menu is shown in Figure 43.Figure 43 List F

Strona 68

16List of FiguresChapter 1Overview ...

Strona 69 - D - Disabled) ->

160Chapter 12File Downloads and UploadsThis chapter contains procedures for downloading a new AT-S62 image file onto the switch. This chapter also con

Strona 70 - -> 600

AT-S62 User’s GuideSection II: Advanced Operations 161Downloading the AT-S62 Image File onto a SwitchThis section contains two procedures for download

Strona 71

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 162of an enhanced stack. You cannot use TFTP on a slave switch, since that type

Strona 72 - Configuring the Console Timer

AT-S62 User’s GuideSection II: Advanced Operations 163NoteOptions 3 and 4 are described in Uploading a System File on page 177.5. Type 1 to select Dow

Strona 73

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 164The following prompt is displayed:You are going to invoke the Xmodem download

Strona 74

AT-S62 User’s GuideSection II: Advanced Operations 16511. Click the Browse button and specify the location and file to be downloaded onto the switch.1

Strona 75

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 1663. From the System Administration menu, type 9 to select System Utilities.The

Strona 76

AT-S62 User’s GuideSection II: Advanced Operations 167Downloading an AT-S62 Image File Switch to SwitchThe previous section contained the procedure fo

Strona 77

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 168NoteYou cannot download AT-S62 software onto any other type of enhanced stack

Strona 78

AT-S62 User’s GuideSection II: Advanced Operations 169Downloading an AT-S62 Configuration File Switch to SwitchThis procedure downloads a boot configu

Strona 79

AT-S62 User’s Guide17Figure 24: Head of Line Blocking ...

Strona 80 - ° to 90° Celsius

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 170After you enter a name, the following prompt is displayed:Enter the list of s

Strona 81

AT-S62 User’s GuideSection II: Advanced Operations 171Downloading a System FileThis section contains the procedures for downloading a system file into

Strona 82 - SNMPv1 and SNMPv2c Overview

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 172server software and the file to be downloaded must be stored on the server.❑

Strona 83

AT-S62 User’s GuideSection II: Advanced Operations 173c. Enter the directory path and file name of the system file on the TFTP server to be downloaded

Strona 84 - Default SNMP

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 17411. From the HyperTerminal main window, select the Transfer menu. Then select

Strona 85

AT-S62 User’s GuideSection II: Advanced Operations 175The software immediately begins to download onto the switch. The Xmodem File Send window in Figu

Strona 86

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 176NoteOptions 3 and 4 in the menu are described in Uploading a System File on p

Strona 87

AT-S62 User’s GuideSection II: Advanced Operations 177Uploading a System FileThe procedures in this section are used to upload a system file from a sw

Strona 88 - Enter Trap Receiver IP Addr:

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 178need to perform the upload from a local management session of the switch usin

Strona 89

AT-S62 User’s GuideSection II: Advanced Operations 179d. Enter the name of the system file on the switch that you want to upload to the TFTP server. Y

Strona 90 - Enter SNMP Community Name:

List of Figures18Figure 60: Show Port CoS Priorities Menu ...

Strona 91

Chapter 12: File Downloads and UploadsSection II: Advanced Operations 18011. From the HyperTerminal main window, select the Transfer menu. Then select

Strona 92

AT-S62 User’s GuideSection II: Advanced Operations 181The System Utilities menu is shown in Figure 9 on page 64.4. For the System Utilities menu, type

Strona 93

182Chapter 13Event LogThis chapter describes the event log. Sections in the chapter include:❑ Event Log Overview on page 183❑ Enabling or Disabling th

Strona 94

AT-S62 User’s GuideSection II: Advanced Operations 183Event Log OverviewA managed switch is a complex piece of computer equipment that includes both h

Strona 95 - Displaying Port Status

Chapter 13: Event LogSection II: Advanced Operations 184Enabling or Disabling the Event LogTo enable or disable the event log, do the following:1. Fro

Strona 96

AT-S62 User’s GuideSection II: Advanced Operations 185Displaying EventsTo view the event log, do the following:1. From the Main Menu, type 5 to select

Strona 97 - Flow Ctl

Chapter 13: Event LogSection II: Advanced Operations 186Figure 54 shows an example of the event log in the Full display mode. The Normal display mode

Strona 98

AT-S62 User’s GuideSection II: Advanced Operations 187❑ Date/Time - The date and time the event occurred.❑ Event - The module within the AT-S62 softwa

Strona 99

Chapter 13: Event LogSection II: Advanced Operations 188PKI Public Key InfrastructurePMIRR Port mirroringPSEC Port security (MAC address-based)PTRUNK

Strona 100 - Chapter 6: Port Parameters

AT-S62 User’s GuideSection II: Advanced Operations 189Saving the Event LogThe Event Log menu has the selection “S - Save Log to File” for saving the c

Strona 101 - 6 - Duplex ... Full

AT-S62 User’s Guide19Figure 106: RSTP Menu ...

Strona 102

Chapter 13: Event LogSection II: Advanced Operations 190Clearing the Event LogTo clear all events from the log, perform the following procedure:1. Fro

Strona 103 - AT-S62 User’s Guide

191Chapter 14Quality of ServiceThis chapter contains the procedures for configuring Quality of Service (QoS). Sections in the chapter include:❑ Qualit

Strona 104

Chapter 14: Quality of ServiceSection II: Advanced Operations 192Quality of Service OverviewWhen a port on an Ethernet switch becomes oversubscribed—i

Strona 105

AT-S62 User’s GuideSection II: Advanced Operations 193Each switch port has four egress queues. The queues are Q0, Q1, Q2, and Q3. Q0 is the lowest pri

Strona 106

Chapter 14: Quality of ServiceSection II: Advanced Operations 194You can configure a port to completely ignore the priority levels in its tagged packe

Strona 107 - Setting the Rate Limit

AT-S62 User’s GuideSection II: Advanced Operations 195The problem with this method is that some low priority packets might never be transmitted out th

Strona 108

Chapter 14: Quality of ServiceSection II: Advanced Operations 196Configuring CoSAs explained in Quality of Service Overview on page 192, a tagged pack

Strona 109 - MAC Address Table

AT-S62 User’s GuideSection II: Advanced Operations 197NoteOptions 4, 5, and 6 are not available in all versions of the AT-S62 management software. Con

Strona 110 - MAC Address Overview

Chapter 14: Quality of ServiceSection II: Advanced Operations 198The Configure Port COS Priorities menu is shown in Figure 57.Figure 57 Configure Por

Strona 111

AT-S62 User’s GuideSection II: Advanced Operations 199NoteThe tagged information in a frame is not changed as the frame traverses the switch. A tagged

Strona 112 - Displaying MAC Addresses

Copyright © 2004 Allied Telesyn, Inc. 960 Stewart Drive Suite B, Sunnyvale, CA 94085 USAAll rights reserved. No part of this publication may be reprod

Strona 113

List of Figures20Chapter 23MAC Address Security ...

Strona 114 - Chapter 7: MAC Address Table

Chapter 14: Quality of ServiceSection II: Advanced Operations 200Mapping CoS Priorities to Egress QueuesThis procedure explains how to change the defa

Strona 115

AT-S62 User’s GuideSection II: Advanced Operations 201Configuring Egress SchedulingThis procedure explains how to select and configure a scheduling me

Strona 116 - Enter port-list: ->

Chapter 14: Quality of ServiceSection II: Advanced Operations 202Displaying Port CoS PrioritiesThe following procedure displays a menu that lists the

Strona 117

203Chapter 15IGMP SnoopingThis chapter explains how to activate and configure the Internet Group Management Protocol (IGMP) snooping feature on the sw

Strona 118

Chapter 15: IGMP SnoopingSection II: Advanced Operations 204IGMP Snooping OverviewIGMP snooping is best explained by first defining IGMP. This protoco

Strona 119

AT-S62 User’s GuideSection II: Advanced Operations 205Without IGMP snooping a switch would be obligated to flood multicast packets out all of its port

Strona 120 - Changing the Aging Time

Chapter 15: IGMP SnoopingSection II: Advanced Operations 206Activating IGMP SnoopingTo activate or deactivate IGMP snooping on the switch and to confi

Strona 121 - Port Trunking

AT-S62 User’s GuideSection II: Advanced Operations 207The options in the menu are defined below:1 - IGMP Snooping StatusEnables and disables IGMP snoo

Strona 122 - Port Trunking Overview

Chapter 15: IGMP SnoopingSection II: Advanced Operations 208When selecting a value for this parameter, it is important to note that the value you ente

Strona 123 - Distribution

AT-S62 User’s GuideSection II: Advanced Operations 209Displaying a List of Host NodesYou can use the AT-S62 software to display a list of the multicas

Strona 124 - Chapter 8: Port Trunking

AT-S62 User’s Guide21Chapter 30Management Access Control List ...

Strona 125

Chapter 15: IGMP SnoopingSection II: Advanced Operations 210HostIP - The IP address of the host node connected to the port.Status - The status of the

Strona 126

AT-S62 User’s GuideSection II: Advanced Operations 211Displaying a List of Multicast RoutersA multicast router is a router that is receiving multicast

Strona 127

212Chapter 16Denial of Service DefenseThis chapter contains procedures on how to configure the switch to protect your network against Denial of Servic

Strona 128

AT-S62 User’s GuideSection II: Advanced Operations 213Denial of Service Defense OverviewThe AT-S62 management software can help protect your network a

Strona 129 - Creating a Port Trunk

Chapter 16: Denial of Service DefenseSection II: Advanced Operations 214SMURF Attack This DoS attack is instigated by an attacker sending a ICMP Echo

Strona 130 - Create Trunk

AT-S62 User’s GuideSection II: Advanced Operations 215Here is a overview of how the process takes place. This example assumes that you have activated

Strona 131

Chapter 16: Denial of Service DefenseSection II: Advanced Operations 216If one is found, the following occurs:❑ The switch sends a SNMP trap to the ma

Strona 132 - Modifying a Port Trunk

AT-S62 User’s GuideSection II: Advanced Operations 217IP OptionsAttackIn the basic scenario of an IP attack, an attacker sends packets containing bad

Strona 133 - Modify Trunk

Chapter 16: Denial of Service DefenseSection II: Advanced Operations 218Enabling or Disabling Denial of Service PreventionTo configure DoS defense, pe

Strona 134

AT-S62 User’s GuideSection II: Advanced Operations 219The LAN IP Subnet menu is shown in Figure 66.Figure 66 LAN IP Subnet Menub. Type 1 to select IP

Strona 135 - Deleting a Port Trunk

List of Figures22Chapter 39File Downloads and Uploads ...

Strona 136 - Port Mirroring

Chapter 16: Denial of Service DefenseSection II: Advanced Operations 220A menu is displayed containing either one or two options, depending on the DoS

Strona 137 - Port Mirroring Overview

221Section IIISNMPv3 OperationsThis section contains the following chapter:❑ Chapter 17: SNMPv3 Configuration on page 222

Strona 138 - Creating a Port Mirror

222Chapter 17SNMPv3 ConfigurationThis chapter provides a description of the AT-S62 implementation of the SNMPv3 protocol. In addition, it provides pro

Strona 139

AT-S62 User’s GuideSection III: SNMPv3 Operations 223SNMPv3 OverviewThe SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c protocol implementat

Strona 140 - Deleting a Port Mirror

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 224With the SNMPv3 protocol, you create users, determine the protocol used for message

Strona 141 - Ethernet Statistics

AT-S62 User’s GuideSection III: SNMPv3 Operations 225SNMPv3 PrivacyProtocolAfter you have configured an authentication protocol, you have the option o

Strona 142 - Displaying Port Statistics

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 226The AT-S62 software supports the MIB tree, starting with the Internet MIBs, as defin

Strona 143

AT-S62 User’s GuideSection III: SNMPv3 Operations 227To determine the destination of the message, you configure the IP address of the host. This confi

Strona 144 - Clearing Port Counters

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 228First, you create a user in the Configure SNMPv3 User Table. Then you define the MIB

Strona 145 - Advanced Operations

AT-S62 User’s GuideSection III: SNMPv3 Operations 229See Figure 70 for an illustration of how the message notification tables are linked.Figure 70 SN

Strona 146 - File System

AT-S62 User’s Guide23Figure 259: Monitoring, SNMPv3 Access Table Page ...

Strona 147 - File System Overview

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 230SNMPv3 User TableThe Configure SNMPv3 User Table menu allows you to create an SNMPv3

Strona 148 - Conventions

AT-S62 User’s GuideSection III: SNMPv3 Operations 231SNMPv3 SecurityToGroup TableThe Configure SNMPv3 SecurityToGroup Table Menu allows you to associa

Strona 149 - Configuration

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 232SNMPv3 Community TableThe Configure SNMPv3 Community Table Menu allows you to config

Strona 150 - Chapter 11: File System

AT-S62 User’s GuideSection III: SNMPv3 Operations 233Configuring the SNMPv3 ProtocolThis section describes how to configure the SNMPv3 protocol using

Strona 151 - Enter the file name:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 234Configuring the SNMPv3 User TableThis section contains a description of the SNMPv3 U

Strona 152 - Active Boot

AT-S62 User’s GuideSection III: SNMPv3 Operations 235The Configure SNMPv3 Table Menu is shown in Figure 71.Figure 71 Configure SNMPv3 Table MenuNoteT

Strona 153 - Viewing a Boot

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2365. To create a new user table, type 1 to select Create SNMPv3 Table Entry.The follow

Strona 154 - Editing a Boot

AT-S62 User’s GuideSection III: SNMPv3 Operations 237NoteIf you have the non encrypted version of the AT-S62 software, then the Privacy Protocol field

Strona 155 - Troubleshoot

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 238NoteThe Row Status parameter is a read-only field in the Telnet and Local interfaces

Strona 156 - Press any key

AT-S62 User’s GuideSection III: SNMPv3 Operations 239Modifying the Authentication Protocol and PasswordTo modify the Authentication Protocol and Passw

Strona 157

List of Figures24Chapter 52RADIUS and TACACS+ Authentication Protocols ...

Strona 158 - Displaying System Files

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2406. Enter one of the following:M-MD5This value represents the MD5 authentication prot

Strona 159

AT-S62 User’s GuideSection III: SNMPv3 Operations 241Modifying the Privacy Protocol and PasswordTo modify the Privacy Protocol and Password in an SNMP

Strona 160 - File Downloads and Uploads

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2427. Enter a privacy password of up to 32-alphanumeric characters.The following prompt

Strona 161

AT-S62 User’s GuideSection III: SNMPv3 Operations 243N-NonVolatileSelect this storage type if you want the ability to save an entry in the SNMPv3 User

Strona 162 - Return to Previous Menu

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 244Configuring the SNMPv3 View TableThis section contains a description of the SNMPv3 V

Strona 163

AT-S62 User’s GuideSection III: SNMPv3 Operations 245The Configure SNMPv3 View Table Menu is shown in Figure 74.Figure 74 Configure SNMPv3 View Table

Strona 164

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 246The following prompt is displayed:Enter Subtree Mask (Hex format):6. Enter a subtree

Strona 165

AT-S62 User’s GuideSection III: SNMPv3 Operations 2479. After making changes, type R until you return to the Main Menu. Then type S to select Save Con

Strona 166

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 248Modifying anSNMPv3 ViewTable EntryThis section describes how to modify parameters in

Strona 167

AT-S62 User’s GuideSection III: SNMPv3 Operations 249The Modify SNMPv3 View Table Menu is shown in Figure 75.Figure 75 Modify SNMPv3 View Table Menu4

Strona 168 - [Yes/No]

25PrefaceThis guide contains instructions on how to configure an AT-8524M Layer 2+ Fast Ethernet Switch using the menu and web browser interfaces of t

Strona 169

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 250The View Subtree parameter defines a MIB View and the Subtree Mask further restricts

Strona 170

AT-S62 User’s GuideSection III: SNMPv3 Operations 251The following prompt is displayed:Enter View Type [I-Included, E-Excluded]:7. Choose one of the f

Strona 171 - Downloading a System File

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2527. Select one of the following storage types for this table entry:V - VolatileSelect

Strona 172 - Management

AT-S62 User’s GuideSection III: SNMPv3 Operations 253Configuring the SNMPv3 Access TableThis section contains a description of the SNMPv3 Access Table

Strona 173

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 254The Configure SNMPv3 Access Table Menu is shown in Figure 76.Figure 76 Configure SN

Strona 174

AT-S62 User’s GuideSection III: SNMPv3 Operations 255NoteThe Context Prefix and the Context Match fields are a read only fields. The Context Prefix fi

Strona 175

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 256greatest level of security. You can select this value if you configured the Security

Strona 176

AT-S62 User’s GuideSection III: SNMPv3 Operations 257NoteThe Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active

Strona 177 - Uploading a System File

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2582-v2cSelect this value to associate the Group Name with the SNMPv2c protocol.3-v3Sel

Strona 178 - Uploading a

AT-S62 User’s GuideSection III: SNMPv3 Operations 259Modifying anSNMPv3 AccessTable EntryThis section describes how to modify parameters in an SNMPv3

Strona 179

Preface26Section III: SNMPv3 OperationsThe chapter in this section explains how to configure the switch for SNMPv3. (The instructions for SNMPv1 and S

Strona 180

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 260The Modify SNMPv3 Access Table is shown in Figure 77.Figure 77 Modify SNMPv3 Access

Strona 181

AT-S62 User’s GuideSection III: SNMPv3 Operations 261The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv, P-AuthPriv]

Strona 182 - Event Log

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 262Modifying the Write View Name To modify the Write View Name parameter in an SNMPv3 A

Strona 183 - Event Log Overview

AT-S62 User’s GuideSection III: SNMPv3 Operations 2637. Enter the Security Level configured for this Group Name. You cannot change the value of the Se

Strona 184 - Chapter 13: Event Log

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 264Modifying the Notify View NameTo modify the Notify View Name parameter in an SNMPv3

Strona 185 - Displaying Events

AT-S62 User’s GuideSection III: SNMPv3 Operations 2657. Enter the Security Level configured for this Group Name. You cannot change the value of the Se

Strona 186

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 266Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Access T

Strona 187

AT-S62 User’s GuideSection III: SNMPv3 Operations 2677. Enter the Security Level configured for this Group Name. You cannot change the value of the Se

Strona 188

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 268Configuring the SNMPv3 SecurityToGroup TableThis section contains a description of t

Strona 189 - Saving the Event Log

AT-S62 User’s GuideSection III: SNMPv3 Operations 269The Configure SNMPv3 SecurityToGroup Table Menu is shown in Figure 78.Figure 78 Configure SNMPv3

Strona 190 - Clearing the Event Log

AT-S62 User’s Guide27Document ConventionsThis document uses the following conventions:NoteNotes provide additional information.CautionCautions inform

Strona 191 - Quality of Service

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 270The following prompt is displayed:Enter Group Name:6. Enter a Group Name that you co

Strona 192 - Quality of Service Overview

AT-S62 User’s GuideSection III: SNMPv3 Operations 271Deleting anSNMPv3SecurityToGroupTable EntryYou may want to delete an entry from the SNMPv3 Securi

Strona 193

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 272The following prompt is displayed:Do you want to delete this table entry? (Y/N): [Ye

Strona 194

AT-S62 User’s GuideSection III: SNMPv3 Operations 273The Modify SecurityToGroup Table is displayed as shown Figure 78.Figure 79 Modify SNMPv3 Securit

Strona 195

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2743-v3Select this value to associate the User Name with the SNMPv3 protocol. The follo

Strona 196 - Configuring CoS

AT-S62 User’s GuideSection III: SNMPv3 Operations 275Select one of the following SNMP protocols:1-v1Select this value if this User Name is configured

Strona 197

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 276Configuring the SNMPv3 Notify TableThis section contains a description of the SNMPv3

Strona 198

AT-S62 User’s GuideSection III: SNMPv3 Operations 277The Configure SNMPv3 Notify Table Menu is shown in Figure 80.Figure 80 Configure SNMPv3 Notify T

Strona 199

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 278I-InformIndicates this notify table is used to send inform messages. With this messa

Strona 200

AT-S62 User’s GuideSection III: SNMPv3 Operations 279NoteTo display a Group Name and its associated parameters from the Configure SNMPv3 SecurityToGro

Strona 201 - Configuring Egress Scheduling

Preface28Where to Find Web-based GuidesThe installation and user guides for all Allied Telesyn products are available in Portable Document Format (PDF

Strona 202

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 280The Modify SNMPv3 Notify Table Menu is displayed as shown in Figure 81.Figure 81 Mo

Strona 203 - IGMP Snooping

AT-S62 User’s GuideSection III: SNMPv3 Operations 281Modifying a Notify TypeTo modify the Notify Type parameter in an SNMPv3 Notify Table entry, perfo

Strona 204 - IGMP Snooping Overview

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 282Modifying a Storage TypeTo modify the Storage Type parameter in an SNMPv3 Notify Tab

Strona 205

AT-S62 User’s GuideSection III: SNMPv3 Operations 283Configuring the SNMPv3 Target Address TableThis section contains a description of the SNMPv3 Targ

Strona 206 - Activating IGMP Snooping

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 284Creating anSNMPv3 TargetAddress TableEntryTo create an entry in the Configure SNMPv3

Strona 207

AT-S62 User’s GuideSection III: SNMPv3 Operations 285Use the following format for an IP address:XXX.XXX.XXX.XXXThe following prompt is displayed:Enter

Strona 208 - Chapter 15: IGMP Snooping

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 286This name can consist of up to 32-alphanumeric characters. The value configured here

Strona 209

AT-S62 User’s GuideSection III: SNMPv3 Operations 287The Configure SNMPv3 Target Address Table Menu is shown in Figure 84 on page 297.NoteTo display

Strona 210

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 288Modifying a Target IP AddressTo modify the target IP address in an SNMPv3 Target Add

Strona 211

AT-S62 User’s GuideSection III: SNMPv3 Operations 2894. To change the Target IP Address, type 1 to select Set Target IP Address.The following prompt i

Strona 212 - Denial of Service Defense

AT-S62 User’s Guide29Contacting Allied TelesynThis section provides Allied Telesyn contact information for technical support as well as sales or corpo

Strona 213 - SYN Flood

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 290This is the name of the SNMP manager, or host, that manages the SNMP activity on you

Strona 214

AT-S62 User’s GuideSection III: SNMPv3 Operations 2916. Enter a timeout value in milliseconds.When an Inform message is generated, it requires a respo

Strona 215

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2926. Enter the number of times the switch will retry, or resend, the Inform message.Th

Strona 216 - Ping of Death

AT-S62 User’s GuideSection III: SNMPv3 Operations 293Modifying the Target Parameters FieldTo modify the Target Parameters field in an SNMPv3 Target Ad

Strona 217 - Guidelines

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 294Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Target A

Strona 218

AT-S62 User’s GuideSection III: SNMPv3 Operations 2957. After making changes, type R until you return to the Main Menu. Then type S to select Save Con

Strona 219

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 296Configuring the SNMPv3 Target Parameters TableThis section contains a description of

Strona 220

AT-S62 User’s GuideSection III: SNMPv3 Operations 297There are three functions you can perform with the Configure SNMPv3 Target Parameters Table Menu.

Strona 221 - SNMPv3 Operations

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 2983. To create an SNMPv3 Target Parameters Table, type 1 to select Create SNMPv3 Table

Strona 222 - SNMPv3 Configuration

AT-S62 User’s GuideSection III: SNMPv3 Operations 2997. Select one of the following Security Levels:NoteThe value you configure for the Security Level

Strona 223 - SNMPv3 Overview

3Table of ContentsList of Figures ...

Strona 224 - Protocols

Preface30Management Software UpdatesYou can download new releases of management software for our managed products from either of the following Interne

Strona 225 - SNMPv3 MIB

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 300entry with a NonVolatile storage type, the S - Save Configuration Changes option app

Strona 226 - Notification

AT-S62 User’s GuideSection III: SNMPv3 Operations 3015. Enter Y to delete the SNMPv3 Target Address Table entry or N to save it.6. After making change

Strona 227

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 302NoteYou cannot modify an entry in the SNMPv3 Target Parameter Table that contains a

Strona 228 - SNMPv3 Access Table

AT-S62 User’s GuideSection III: SNMPv3 Operations 303The Modify SNMPv3 Target Parameters Table Menu is shown in Figure 85.Figure 85 Modify SNMPv3 Tar

Strona 229

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 304Modifying the Security ModelFor the Security or User Name you have selected, the val

Strona 230

AT-S62 User’s GuideSection III: SNMPv3 Operations 3052-v2cSelect this value if this User Name is associated with the SNMPv2c protocol. 3-v3Select this

Strona 231

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 306Select one of the following Security Levels:NoteThe value you configure for the Secu

Strona 232

AT-S62 User’s GuideSection III: SNMPv3 Operations 307The Configure SNMPv3 Table Menu is shown in Figure 71 on page 235.2. From the Configure SNMPv3 T

Strona 233

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 3082. From the Configure SNMPv3 Table Menu, type 8 to select Configure SNMPv3 Target Ad

Strona 234 - Table Entry

AT-S62 User’s GuideSection III: SNMPv3 Operations 309Configuring the SNMPv3 Community TableThis section contains a description of the SNMPv3 Community

Strona 235

31Chapter 1OverviewThis chapter reviews the functions of the AT-S62 management software, the types of sessions you can use to access the software, and

Strona 236 - N-None]:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 310For each SNMPv3 Community Table entry, you can configure the following parameters:❑

Strona 237 - Enter Privacy Password:

AT-S62 User’s GuideSection III: SNMPv3 Operations 311The Configure SNMPv3 Community Table Menu is shown in Figure 86.Figure 86 Configure SNMPv3 Commu

Strona 238 - [Yes/No]->

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 312The following prompt is displayed:Enter Security Name:6. Enter the name of an SNMPv1

Strona 239

AT-S62 User’s GuideSection III: SNMPv3 Operations 3139. After making changes, type R until you return to the Main Menu. Then type S to select Save Con

Strona 240

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 314Modifying anSNMPv3CommunityTable EntryFor each entry in the SNMPv3 Community Table,

Strona 241

AT-S62 User’s GuideSection III: SNMPv3 Operations 315The Modify SNMPv3 Community Table Menu is shown in Figure 87.Figure 87 Modify SNMPv3 Community T

Strona 242

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 316Modifying the Security NameTo modify the Security Name parameter in an SNMPv3 Commun

Strona 243

AT-S62 User’s GuideSection III: SNMPv3 Operations 3172. From the Configure SNMPv3 Table Menu, type 9 to select Configure SNMPv3 Community Table.The Co

Strona 244 - SNMPv3 View

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 318The following prompt is displayed:Enter Community Index:5. Enter the Community Index

Strona 245

AT-S62 User’s GuideSection III: SNMPv3 Operations 319Displaying SNMPv3 Table MenusThe procedures in this section describe how to display the SNMPv3 Ta

Strona 246

Chapter 1: Overview32Management OverviewThe AT-S62 management software is intended for the AT-8524M switch. You use the software to monitor and adjust

Strona 247 - Deleting an

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 320The Display SNMPv3 Table Menu is shown in Figure 88.Figure 88 Display SNMPv3 Table

Strona 248 - Modifying an

AT-S62 User’s GuideSection III: SNMPv3 Operations 321Displaying theDisplay SNMPv3View TableMenuThis section describes how to display the Display SNMPv

Strona 249

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 322Displaying theDisplay SNMPv3Access TableMenuThis section describes how to display th

Strona 250 - 1.3.6.1.2.1.6

AT-S62 User’s GuideSection III: SNMPv3 Operations 323Displaying theDisplay SNMPv3SecurityToGroupTable MenuThis section describes how to display the Di

Strona 251

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 324Displaying theDisplay SNMPv3Notify TableMenuThis section describes how to display th

Strona 252

AT-S62 User’s GuideSection III: SNMPv3 Operations 325Displaying theDisplay SNMPv3Target AddressTable MenuThis section describes how to display the Dis

Strona 253 - SNMPv3 Access

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Operations 326Displaying theDisplay SNMPv3TargetParametersTable MenuThis section describes how to

Strona 254

AT-S62 User’s GuideSection III: SNMPv3 Operations 327Displaying theDisplay SNMPv3CommunityTable MenuThis section describes how to display the Display

Strona 255 - P-AuthPriv]:

328Section IVSpanning Tree ProtocolsThe chapters in this section explain the spanning tree protocols. The chapters include:❑ Chapter 18: Spanning Tree

Strona 256 - Enter Notify View Name:

329Chapter 18Spanning Tree and Rapid Spanning Tree ProtocolsThis chapter provides background information on the Spanning Tree Protocol (STP) and Rapid

Strona 257

AT-S62 User’s Guide33There are four different ways to access the management software on an AT-8524M switch. These methods are referred to in this guid

Strona 258 - A-AuthNoPriv, P-AuthPriv]:

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 330STP and RSTP OverviewThe performance of a Ethernet network can be severely impaired by

Strona 259

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 331Bridge Priorityand the RootBridgeThe first task that bridges running spanning tree perform i

Strona 260

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 332Path Costs and Port CostsAfter the root bridge has been selected, the bridges must dete

Strona 261

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 333Table 14 lists the STP port costs with Auto-Detect when a port is part of a port trunk.Table

Strona 262 - Enter Group Name:

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 334Port PriorityIf two paths have the same cost, the bridges must choose between them to s

Strona 263

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 335To forestall the formation of temporary data loops during topology changes, a port designate

Strona 264

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 336Point-to-Point Ports and Edge PortsNoteThis section applies only to RSTP and MSTP.Part

Strona 265

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 337If a port is operating in half-duplex mode and is not connected to any further bridges parti

Strona 266

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 338Mixed STP andRSTP NetworkRSTP IEEE 802.1w is fully compliant with STP IEEE 802.1d. Your

Strona 267

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 339You can avoid this problem by not activating spanning tree or by connecting VLANs using tagg

Strona 268 - SecurityToGroup

Chapter 1: Overview34Local Management SessionYou establish a local management session with an AT-8524M switch by connecting a terminal or a PC with a

Strona 269

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 340Enabling or Disabling a Spanning Tree ProtocolThe AT-S62 software supports STP, RSTP, a

Strona 270

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3414. If you selected STP as the active spanning tree protocol, go to Configuring STP on page 3

Strona 271

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 342Configuring STPThis section contains the following procedures:❑ Configuring STP Bridge

Strona 272 - Table Entr

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3432. Adjust the bridge STP settings as needed. The parameters are described below.1 - Bridge P

Strona 273

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 3443. After making changes, type R until you return to the Main Menu. Then type S to selec

Strona 274

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 345The Configure STP Port Settings menu is shown in Figure 104.Figure 104 Configure STP Port S

Strona 275

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 346Displaying STPPort SettingsTo display STP port settings, perform the following procedur

Strona 276 - SNMPv3 Notify

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 347Configuring RSTPThis section contains the following procedures:❑ Configuring RSTP Bridge Set

Strona 277

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 3482. Adjust the parameters as needed. The parameters are defined below.1 - Force VersionT

Strona 278

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3496 - Bridge IdentifierThe MAC address of the bridge. The bridge identifier is used as a tie b

Strona 279

AT-S62 User’s Guide35Telnet Management SessionYou can use any management workstation on your network that has the Telnet application protocol to manag

Strona 280

Chapter 18: STP and RSTPSection IV: Spanning Tree Protocols 350The Configure RSTP Port Settings menu is shown in Figure 108.Figure 108 Configure RSTP

Strona 281 - Enter Notify Name:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 351Displaying PortRSTP StatusThe RSTP Port Parameters menu has two selections for displaying a

Strona 282

352Chapter 19Multiple Spanning Tree ProtocolThis chapter provides background information on the Multiple Spanning Tree Protocol (MSTP). The chapter al

Strona 283

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 353MSTP OverviewAs explained in the previous chapter, STP and RSTP are single-instance spanning

Strona 284 - Address Table

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 354MultipleSpanning TreeInstance (MSTI)The individual spanning trees in

Strona 285

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 355If the switches were running STP or RSTP, one of the links would be blocked because the link

Strona 286

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 356Figure 110 illustrates the same two AT-8524M switches and the same t

Strona 287

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 357A MSTI can contain more than one VLAN. This is illustrated in Figure 111 where there are two

Strona 288

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 358MSTI GuidelinesHere are several guidelines to keep in mind about MST

Strona 289 - Enter IP Address:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 359The revision level is an arbitrary number you assign to a region. You can use the number to

Strona 290

Chapter 1: Overview36Web Browser Management SessionYou can also use a web browser from a management workstation on your network to manage a switch. Th

Strona 291

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 360Figure 112 illustrates the concept of regions. It shows one MSTP reg

Strona 292 - Enter Tag List:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 361The AT-8524M switch determines regional boundaries by examining the MSTP BPDUs received on t

Strona 293 - Enter Target Parameters:

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 362❑ The regional root of a MSTI must be in the same region as the MSTI

Strona 294

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 363MSTP with STP and RSTPMSTP is fully compatible with STP and RSTP. If a port on an AT-8524M r

Strona 295

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 364❑ An MSTI cannot span multiple regions.❑ Each MSTI must have a regio

Strona 296

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 365This is illustrated in Figure 113. Port 8 in Switch A is a member of a VLAN assigned to MSTI

Strona 297 - Parameters

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 366A problem can arise if you assign some VLANs to MSTIs while leaving

Strona 298 - Enter Target Parameters Name:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 367This is illustrated in Figure 115. The example show two switches, each residing in a differe

Strona 299

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 368Here is an example. Let’s assume that you have two regions that cont

Strona 300

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 369Configuring MSTP Bridge SettingsThis section contains the procedure for configuring a bridge

Strona 301

AT-S62 User’s Guide37SNMP Management SessionAnother way to remotely manage the switch is with an SNMP management program. AT-S62 software supports SNM

Strona 302

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3703. Adjust the MSTP settings as needed. Changes are immediately activ

Strona 303

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3715 - Max HopsMSTP regions use this parameter to discard BPDUs. The Max Hop counter in a BPDU

Strona 304

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 372Configuring the CIST PriorityThis procedure explains how to adjust t

Strona 305

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3732. To change the CIST priority, type 1.The following prompt is displayed:Enter new priority

Strona 306

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 374Creating, Deleting, and Modifying MSTI IDsThe following procedures e

Strona 307

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 375Regional Root IDIdentifies the regional root for the MSTI by its MAC address.Path CostSpecif

Strona 308

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3763. After making changes, type R until you return to the Main Menu. T

Strona 309

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 377Associating VLANs to MSTI IDsWhen you create a new MSTI ID, you are given the opportunity of

Strona 310 - Community

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 378The VLAN-MSTI Association Menu is shown in Figure 119.Figure 119 VL

Strona 311

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 379The MSTI ID retains any VLANs already associated with it when new VLANs are added.4. After m

Strona 312 - Enter Transport Tag:

Chapter 1: Overview38Management Access LevelsThere are two levels of management access in the AT-S62 management software: Manager and Operator. Manage

Strona 313

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 380Configuring MSTP Port SettingsTo configure a port’s MSTP parameters,

Strona 314

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 3814. Adjust the port settings as needed. The selections are described below:1 - Port PriorityT

Strona 315

Chapter 19: Multiple Spanning Tree ProtocolSection IV: Spanning Tree Protocols 3825 - Edge PortThis parameter defines whether the port is functioning

Strona 316 - Enter Community Index:

AT-S62 User’s GuideSection IV: Spanning Tree Protocols 383Displaying MSTP Port Settings and StatusThe MSTP Port Parameters menu, shown in Figure 120 o

Strona 317

384Section VVirtual LANsThe chapters in this section explain virtual LANs (VLANs). The chapters include:❑ Chapter 20: Tagged and Port-based Virtual LA

Strona 318

385 Chapter 20Tagged and Port-based Virtual LANsThis chapter contains background information on tagged and port-based virtual LANs (VLANs). It also co

Strona 319 - Displaying SNMPv3 Table Menus

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 386VLAN OverviewA VLAN is a group of ports on an Ethernet switch that form a log

Strona 320

AT-S62 User’s GuideSection V: Virtual LANs 387But with VLANS, you can change the LAN segment assignment of an end node connected to the switch through

Strona 321 - View Table

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 388Port-based VLAN OverviewAs explained in the VLAN Overview on page 386, a VLAN

Strona 322 - Access Table

AT-S62 User’s GuideSection V: Virtual LANs 389If a VLAN spans multiple switches, then the VID for the VLAN on the different switches should be the sam

Strona 323

39Section IBasic OperationsThe chapters in this section cover a variety of basic switch features and functions. The chapters include:❑ Chapter 2: Star

Strona 324 - Notify Table

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 390For example, if you were creating a port-based VLAN on a switch and you had a

Strona 325 - Table Menu

AT-S62 User’s GuideSection V: Virtual LANs 391VLANs that span switches, many ports could end up being used ineffectively just to interconnect the vari

Strona 326

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 392Each VLAN has been assigned a unique VID. You assign this number when you cre

Strona 327

AT-S62 User’s GuideSection V: Virtual LANs 393Port-basedExample 2Figure 123 illustrates more port-based VLANs. In this example, two VLANs, Sales and E

Strona 328 - Spanning Tree Protocols

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 394The table below lists the port assignments for the Sales, Engineering, and Pr

Strona 329 - Spanning Tree and Rapid

AT-S62 User’s GuideSection V: Virtual LANs 395Tagged VLAN OverviewThe second type of user-configured VLAN is the tagged VLAN. VLAN membership in a tag

Strona 330 - STP and RSTP Overview

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 396❑ Tagged and Untagged Ports❑ Port VLAN IdentifierNoteFor an explanation of VL

Strona 331 - Bridge Priority

AT-S62 User’s GuideSection V: Virtual LANs 397General Rulesfor Creating aTagged VLANBelow is a summary of the rules to observe when creating a tagged

Strona 332 - Chapter 18: STP and RSTP

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 398Tagged VLANExampleFigure 124 illustrates how tagged ports can be used to inte

Strona 333

AT-S62 User’s GuideSection V: Virtual LANs 399The port assignments for the VLANs are as follows:This example is nearly identical to the Port-based Exa

Strona 334

Table of Contents4Chapter 3Enhanced Stacking ...

Strona 335

40Chapter 2Starting a Local or Telnet Management SessionThis chapter contains the procedure for starting a local or Telnet management session on an AT

Strona 336

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 400Creating a Port-based or Tagged VLANTo create a new port-based or tagged VLAN

Strona 337 - Edge Port

AT-S62 User’s GuideSection V: Virtual LANs 401The Configure VLANs menu is shown in Figure 126.Figure 126 Configure VLANs Menu3. From the Configure VL

Strona 338 - Spanning Tree

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 402NoteA VLAN must be assigned a name.5. Type 2 to select VLAN ID (VID) and ente

Strona 339

AT-S62 User’s GuideSection V: Virtual LANs 4039. Press any key.The VLAN Configuration menu in Figure 125 on page 400 is redisplayed.10. To verify that

Strona 340

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 404Example of Creating a Port-based VLANThe following procedure creates the Sale

Strona 341

AT-S62 User’s GuideSection V: Virtual LANs 405Example of Creating a Tagged VLANThe following procedure creates the Engineering VLAN in the top switch

Strona 342 - Configuring STP

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 406Modifying a VLANYou can use this procedure to add or remove ports from a port

Strona 343

AT-S62 User’s GuideSection V: Virtual LANs 407The following prompt is displayed:Enter new value -> [1 to 4096] ->5. Enter the VID of the VLAN yo

Strona 344 - Port Settings

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 4083 - Tagged PortsUse this selection to add or remove tagged ports from the VLA

Strona 345

AT-S62 User’s GuideSection V: Virtual LANs 409If you added or removed from the VLAN a port with one or more static MAC addresses assigned to it, you m

Strona 346 - Displaying STP

AT-S62 User’s GuideSection I: Basic Operations 41Local Management SessionTo establish a local management session, you connect a terminal or PC with a

Strona 347 - Configuring RSTP

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 410Displaying VLANsTo view the name, VID number, and member ports of all the VLA

Strona 348

AT-S62 User’s GuideSection V: Virtual LANs 411Deleting a VLANThis procedure deletes port-based and tagged VLANs from the switch. All untagged ports in

Strona 349 - Settings

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 412NoteYou cannot delete the Default_VLAN, which has a VID of 1.The Delete VLAN

Strona 350

AT-S62 User’s GuideSection V: Virtual LANs 4139. Repeat this procedure starting with Step 4 to delete other VLANs.10. After making changes, type R unt

Strona 351 - RSTP Status

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 414Deleting All VLANsThis section contains the procedure for deleting all port-b

Strona 352 - Chapter 19

AT-S62 User’s GuideSection V: Virtual LANs 415Displaying PVIDs and Port PrioritiesThe following procedure displays a menu that lists the PVIDs for all

Strona 353 - MSTP Overview

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 416Enabling or Disabling Ingress FilteringThere are rules a switch follows when

Strona 354 - Instance (MSTI)

AT-S62 User’s GuideSection V: Virtual LANs 417Activating or deactivating ingress filtering has no effect on the switch’s handling of priority tags. A

Strona 355 - AT- 8524M

Chapter 20: Tagged and Port-based Virtual LANsSection V: Virtual LANs 418Specifying a Management VLANThe management VLAN is the VLAN on which an AT-85

Strona 356

AT-S62 User’s GuideSection V: Virtual LANs 419Now assume that you decide to create a VLAN called NMS with a VID of 24 for the sole purpose of remote n

Strona 357

Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 42Starting a LocalManagementSessionTo start a local management ses

Strona 358 - Associations

420Chapter 21GARP VLAN Registration ProtocolThis chapter describes the GARP VLAN Registration Protocol (GVRP). It contains the following sections:❑ Ba

Strona 359

AT-S62 User’s GuideSection V: Virtual LANs 421Basic Overview of GARP VLAN Registration Protocol (GVRP)The GARP VLAN Registration Protocol (GVRP) allow

Strona 360 - AT-8524M

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 422Figure 134 provides an example of how GVRP works.Figure 134 GVRP Example Switch

Strona 361

AT-S62 User’s GuideSection V: Virtual LANs 4233. Switch #2 sends a PDU out port 15 containing all of the VIDs of the VLANs on the switch, including th

Strona 362

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 424❑ Resetting a switch erases all dynamic GVRP VLANs and dynamic GVRP port assignm

Strona 363 - Summary of

AT-S62 User’s GuideSection V: Virtual LANs 425GVRP-inactiveIntermediateSwitchesThe presence of a GVRP-inactive switch between GVRP-active devices may

Strona 364

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 426Technical Overview of Generic Attribute Registration Protocol (GARP)The purpose

Strona 365

AT-S62 User’s GuideSection V: Virtual LANs 427The architecture of GARP is shown in Figure 135. Figure 135 GARP Architecture The GARP Application comp

Strona 366

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 428An instance of GID consists of the set of state machines that define the current

Strona 367 - AT-8524M AT-8524M

AT-S62 User’s GuideSection V: Virtual LANs 429The Applicant is therefore looking after the interests of all would-be Participants. This allows the Reg

Strona 368

AT-S62 User’s GuideSection I: Basic Operations 434. When prompted, enter a username and password.To configure the switch settings, enter “manager” as

Strona 369

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 430Configuring GVRPThis section contains the procedure for configuring GVRP. The ti

Strona 370

AT-S62 User’s GuideSection V: Virtual LANs 4316. Choose one of the following:E to enable GIP.D to disable GIP.NoteDo not disable GIP if you intend to

Strona 371

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 432Enabling or Disabling GVRP on a PortThis procedure enables and disables GVRP on

Strona 372 - Configuring the CIST Priority

AT-S62 User’s GuideSection V: Virtual LANs 4335. Enter a port. You can configure more than one port at a time.The Configure GVRP Port Settings Menu is

Strona 373 - 4096]: [0 to 15] ->

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 4349. After making changes, type R until you return to the Main Menu. Then type S t

Strona 374

AT-S62 User’s GuideSection V: Virtual LANs 435Converting a Dynamic GVRP VLANThis procedure converts a dynamic GVRP VLAN into a static VLAN. You can pe

Strona 375

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 436Displaying GVRP Parameters and StatisticsTo display GVRP counters, database, sta

Strona 376

AT-S62 User’s GuideSection V: Virtual LANs 437GVRP Counters Option 1 - Display GVRP Counters in the Other GARP Port Parameters displays the GVRP Count

Strona 377 - Associating VLANs to MSTI IDs

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 438Figure 143 GVRP Counters Menu (page 2)The GVRP counters in the menus are define

Strona 378 - VLAN to an

AT-S62 User’s GuideSection V: Virtual LANs 439Receive Discarded: Port Not ListeningNumber of GARP PDUs discarded because the port that received the PD

Strona 379 - Enter the list of VLANs:

Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 44To select a menu item, type the corresponding letter or number.P

Strona 380

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 440Transmit GARP Messages: JoinInTotal number of GARP JoinIn messages transmitted f

Strona 381

AT-S62 User’s GuideSection V: Virtual LANs 441GVRP Database Option 2 - Display GVRP Database in the Other GARP Port Parameters displays the GVRP Datab

Strona 382

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 442GIP ConnectedPorts RingOption 3 - Display GIP Connected Ports Ring in the Other

Strona 383

AT-S62 User’s GuideSection V: Virtual LANs 443GVRP StateMachineOption 4 - Display GVRP State Machine in the Other GARP Port Parameters displays the GV

Strona 384 - Virtual LANs

Chapter 21: GARP VLAN Registration ProtocolSection V: Virtual LANs 444App Applicant state machine for the GID index on that particular port. One of:No

Strona 385 - Chapter 20

AT-S62 User’s GuideSection V: Virtual LANs 445App (Continued) Non-Participant Management state:“Von” Very Anxious Observer“Aon” Anxious Observer“Qon”

Strona 386 - VLAN Overview

446 Chapter 22Multiple VLAN ModesThis chapter describes the multiple VLAN modes and how to select a mode.This chapter contains the following sections:

Strona 387 - Section V: Virtual LANs 387

AT-S62 User’s GuideSection V: Virtual LANs 447Multiple VLAN Mode OverviewThe Multiple VLAN modes can simplify the task of configuring the switch in ne

Strona 388 - Port-based VLAN Overview

Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 448A user designated port on the switch functions as an uplink port, which can be connected to

Strona 389 - Section V: Virtual LANs 389

AT-S62 User’s GuideSection V: Virtual LANs 449This highly segmented configuration is useful in situations where traffic generated by each end node or

Strona 390 - Section V: Virtual LANs 390

AT-S62 User’s GuideSection I: Basic Operations 45Telnet Management SessionYou can use the Telnet application protocol from a workstation on your netwo

Strona 391 - Example 1

Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 450Another difference with this mode is that the uplink port is untagged. Consequently, you wou

Strona 392 - Section V: Virtual LANs 392

AT-S62 User’s GuideSection V: Virtual LANs 451Selecting a VLAN ModeThe following procedure explains how to select a VLAN mode. Available modes are:❑ U

Strona 393 - Example 2

Chapter 22: Multiple VLAN ModesSection V: Virtual LANs 452Displaying VLAN InformationTo view the VLANs on the switch while the unit is operating in Mu

Strona 394 - Section V: Virtual LANs 394

453Section VIPort SecurityThe chapters in this section explain the port security features of the AT-8524M switch The chapters include:❑ Chapter 23: MA

Strona 395 - Tagged VLAN Overview

454Chapter 23MAC Address SecurityThis chapter explains how you can use the dynamic or static MAC addresses learned or assigned on the ports of the swi

Strona 396 - Section V: Virtual LANs 396

AT-S62 User’s GuideSection VI: Port Security 455MAC Address Security OverviewThis feature can enhance the security of your network. You can use it to

Strona 397 - Tagged VLAN

Chapter 23: MAC Address SecuritySection VI: Port Security 456Secured The Secured security level instructs a port to forward frames using only static

Strona 398

AT-S62 User’s GuideSection VI: Port Security 457Intrusion action defines what a port will do when it receives an invalid frame. For a port operating u

Strona 399 - Section V: Virtual LANs 399

Chapter 23: MAC Address SecuritySection VI: Port Security 458Configuring MAC Address Port SecurityTo set the port security level, perform the followi

Strona 400 - Section V: Virtual LANs 400

AT-S62 User’s GuideSection VI: Port Security 4595. Press 1 to change the port security on your specified port list. The following prompt appears:Enter

Strona 401 - Section V: Virtual LANs 401

Chapter 2: Starting a Local or Telnet Management SessionSection I: Basic Operations 46NoteYou can run only one Telnet management session on a switch a

Strona 402 - Section V: Virtual LANs 402

Chapter 23: MAC Address SecuritySection VI: Port Security 4608. To set the intrusion action for a port in the limited security mode, do the following

Strona 403 - Section V: Virtual LANs 403

AT-S62 User’s GuideSection VI: Port Security 461Displaying Port Security LevelsTo view the current security levels for the ports on the switch, do the

Strona 404 - Section V: Virtual LANs 404

Chapter 23: MAC Address SecuritySection VI: Port Security 462Intruder ActionThe column specifies the action taken by a port if it receives an invalid

Strona 405 - Section V: Virtual LANs 405

463Chapter 24802.1x Port-based Access ControlThis chapter explains 802.1x Port-based Access Control and how you can use this feature to restrict acces

Strona 406 - Modifying a VLAN

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 464802.1x Port-based Access Control OverviewThe AT-S62 management software prov

Strona 407 - Section V: Virtual LANs 407

AT-S62 User’s GuideSection VI: Port Security 465❑ Authentication server - The authentication server is the network device that has the RADIUS server s

Strona 408 - Press any key to continue

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 466Port Roles Part of the task to implementing this feature is specifying the r

Strona 409 - Section V: Virtual LANs 409

AT-S62 User’s GuideSection VI: Port Security 467Figure 153 Example of the Authenticator RoleAs mentioned earlier, the switch itself does not authenti

Strona 410 - Displaying VLANs

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 468Figure 154 Example of the Supplicant RoleNoteThe use of this port role shou

Strona 411 - Deleting a VLAN

AT-S62 User’s GuideSection VI: Port Security 469The information sent by the switch to the RADIUS server for an event includes:❑ The port number where

Strona 412 - Section V: Virtual LANs 412

AT-S62 User’s GuideSection I: Basic Operations 47Saving Your Parameter ChangesWhen you make a change to a switch parameter, the change is, in most cas

Strona 413 - Section V: Virtual LANs 413

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4703. You must configure the RADIUS client software in the AT-S62 management so

Strona 414 - Deleting All VLANs

AT-S62 User’s GuideSection VI: Port Security 471NoteConnecting multiple supplicants to a port set to the authenticator role does not conform to the IE

Strona 415 - Section V: Virtual LANs 415

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 472❑ Ports used to interconnect switches should typically be set to the none ro

Strona 416 - Section V: Virtual LANs 416

AT-S62 User’s GuideSection VI: Port Security 473Enabling and Disabling Port-based Access ControlThis procedure explains how to enable and disable port

Strona 417 - Disable) ->

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 474Setting Port RolesThis procedure sets port roles. For an explanation of port

Strona 418 - Specifying a Management VLAN

AT-S62 User’s GuideSection VI: Port Security 4758. Once you have set port roles, you can go to the next procedure to configure port security parameter

Strona 419 - Press any key to continue

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 476Configuring Authenticator Port ParametersNoteA port must be set to the authe

Strona 420 - Chapter 21

AT-S62 User’s GuideSection VI: Port Security 477The Configure Authenticator Port Access Parameters menu is shown in Figure 159.Figure 159 Configure A

Strona 421 - Section V: Virtual LANs 421

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4782 - Quiet PeriodSets the number of seconds that the port remains in the quie

Strona 422

AT-S62 User’s GuideSection VI: Port Security 479The two selections are:❑ Ingress - An authenticator port, when in the unauthorized state, will discard

Strona 423 - Section V: Virtual LANs 423

Section I: Basic Operations 48Chapter 3Enhanced StackingThis chapter explains the enhanced stacking feature. The sections in this chapter include:❑ En

Strona 424 - Security

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 480Configuring Supplicant Port ParametersNoteA port must be set to the supplica

Strona 425 - Switches

AT-S62 User’s GuideSection VI: Port Security 481The Configure Supplicant Port Access Parameters menu is shown in Figure 159.Figure 161 Configure Supp

Strona 426 - Protocol (GARP)

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 482network. The username can be from 1 to 64 alphanumeric characters (A to Z, a

Strona 427 - Section V: Virtual LANs 427

AT-S62 User’s GuideSection VI: Port Security 483Configuring RADIUS AccountingThe AT-S62 management software supports RADIUS accounting for ports opera

Strona 428 - Section V: Virtual LANs 428

Chapter 24: 802.1x Port-based Access ControlSection VI: Port Security 4844. Configure the parameters as needed. Changes take affect immediately on th

Strona 429 - Section V: Virtual LANs 429

485Section VIIManagement SecurityThe chapters in this section explain the management security features of the AT-S62 software. The chapters include:❑

Strona 430 - Configuring GVRP

486Chapter 25Web ServerThe chapter provides an overview of the web server feature and the procedure for configuring the server. It contains the follow

Strona 431 - > 1000

AT-S62 User’s GuideSection VII: Management Security 487Web Server OverviewThe AT-S62 management software comes with web server software so you can rem

Strona 432 - Section V: Virtual LANs 432

Chapter 25: Web ServerSection VII: Management Security 488General Steps toConfiguring theWeb Server forEncryptionThere are several procedures you need

Strona 433 - Section V: Virtual LANs 433

AT-S62 User’s GuideSection VII: Management Security 4896. Once you have received the appropriate certificates from the CA, download them into the AT-S

Strona 434 - Your changes are saved

AT-S62 User’s GuideSection I: Basic Operations 49Enhanced Stacking OverviewThe enhanced stacking feature can make it easier for you to manage the AT-8

Strona 435 - Section V: Virtual LANs 435

Chapter 25: Web ServerSection VII: Management Security 490Configuring the Web ServerThis procedure explains how to enable and disable the web server a

Strona 436 - Section V: Virtual LANs 436

AT-S62 User’s GuideSection VII: Management Security 491Menu option 4 is displayed only for HTTPS operation. The option is hidden for HTTP.3. Type 1 to

Strona 437 - Section V: Virtual LANs 437

492Chapter 26Encryption KeysThis chapter describes how to improve the security of your switches with encryption keys. Because of the complexity of the

Strona 438 - Section V: Virtual LANs 438

AT-S62 User’s GuideSection VII: Management Security 493Basic OverviewProtecting your managed switches from unauthorized management access is an import

Strona 439 - Section V: Virtual LANs 439

Chapter 26: Encryption KeysSection VII: Management Security 494SSH encryption requires two key pairs on the switch— a server key pair and a host key p

Strona 440 - Section V: Virtual LANs 440

AT-S62 User’s GuideSection VII: Management Security 495Technical OverviewThe encryption feature provides the following data security services:❑ data e

Strona 441 - Section V: Virtual LANs 441

Chapter 26: Encryption KeysSection VII: Management Security 496❑ Electronic Code Book (ECB) is the fundamental DES function. Plaintext is divided into

Strona 442 - Ports Ring

AT-S62 User’s GuideSection VII: Management Security 497Asymmetrical (Public Key) EncryptionAsymmetrical encryption algorithms use two keys—one for enc

Strona 443 - GVRP State

Chapter 26: Encryption KeysSection VII: Management Security 498Typically a MAC is calculated using a keyed one-way hash algorithm. A keyed one-way has

Strona 444 - Section V: Virtual LANs 444

AT-S62 User’s GuideSection VII: Management Security 499The Diffie-Hellman algorithm, which is used by the AT-S62 management software, is one of the mo

Strona 445 - Section V: Virtual LANs 445

AT-S62 User’s Guide5Load Distribution Methods ...

Strona 446 - Multiple VLAN Modes

Chapter 3: Enhanced StackingSection I: Basic Operations 50There are three basic steps to implementing this feature on your network:1. You must select

Strona 447 - Multiple VLAN Mode Overview

Chapter 26: Encryption KeysSection VII: Management Security 500Creating an Encryption KeyThis section contains the procedure for creating an encryptio

Strona 448 - Section V: Virtual LANs 448

AT-S62 User’s GuideSection VII: Management Security 501The Key Management menu is shown in Figure 165.Figure 165 Key Management MenuThis menu lists t

Strona 449 - Multiple VLAN

Chapter 26: Encryption KeysSection VII: Management Security 502The Create Key menu is shown in Figure 166.Figure 166 Create Key Menu5. Type 1 to sele

Strona 450 - Section V: Virtual LANs 450

AT-S62 User’s GuideSection VII: Management Security 5039. Type 4 to create a key description.The following prompt is displayed:Enter new Description -

Strona 451 - Selecting a VLAN Mode

Chapter 26: Encryption KeysSection VII: Management Security 504Deleting an Encryption KeyThis section contains the procedure for deleting an encryptio

Strona 452 - Displaying VLAN Information

AT-S62 User’s GuideSection VII: Management Security 505Modifying an Encryption KeyThe Key Management menu has a selection for modifying the descriptio

Strona 453 - Port Security

Chapter 26: Encryption KeysSection VII: Management Security 506Exporting an Encryption KeyThe following procedure exports the public key of a key pair

Strona 454 - MAC Address Security

AT-S62 User’s GuideSection VII: Management Security 507NoteKey Type is a read-only field. You cannot change this value.3. Type 3 to toggle Key File Fo

Strona 455 - MAC Address Security Overview

Chapter 26: Encryption KeysSection VII: Management Security 508Importing an Encryption KeyUse the following procedure to import a public key from the

Strona 456 - Section VI: Port Security 456

AT-S62 User’s GuideSection VII: Management Security 5093. Type 3 to select Key File Format to choose the format of the key. Selections are:HEX - Indic

Strona 457 - Section VI: Port Security 457

AT-S62 User’s GuideSection I: Basic Operations 51Figure 4 is an example of the enhanced stacking feature.Figure 4 Enhanced Stacking ExampleThe exampl

Strona 458 - Section VI: Port Security 458

510Chapter 27Public Key Infrastructure CertificatesThis chapter contains the procedures for creating Public Key Infrastructure (PKI) certificates for

Strona 459 - Section VI: Port Security 459

AT-S62 User’s GuideSection VII: Management Security 511Basic OverviewThis chapter explains how to implement encryption for your web browser management

Strona 460 - Disable):

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 512Public CAs issue certificates typically intended for use by the

Strona 461 - Section VI: Port Security 461

AT-S62 User’s GuideSection VII: Management Security 513A certificate name does not have to contain all of these parts. You can use as many or as few a

Strona 462 - Section VI: Port Security 462

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 514SSL andEnhancedStackingSecure Sockets Layer (SSL) is supported i

Strona 463 - Chapter 24

AT-S62 User’s GuideSection VII: Management Security 515Guidelines Here are guidelines for creating certificates:❑ A certificate can have only one publ

Strona 464 - Section VI: Port Security 464

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 516Technical OverviewThe Secure Sockets Layer (SSL) feature is a se

Strona 465

AT-S62 User’s GuideSection VII: Management Security 517All application data messages are authenticated by SSL with a message authentication code (MAC)

Strona 466 - Section VI: Port Security 466

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 518The Application data message encapsulates the encrypted applicat

Strona 467 - Fast Ethernet Switch

AT-S62 User’s GuideSection VII: Management Security 519DigitalSignaturesThe second main service provided by public key encryption is digital signing.

Strona 468 - Accounting

Chapter 3: Enhanced StackingSection I: Basic Operations 52Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the switch can be

Strona 469 - Section VI: Port Security 469

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 520❑ The owner’s identity details, such as name, company and addres

Strona 470 - Access Control

AT-S62 User’s GuideSection VII: Management Security 521An organization may own a Certification Authority and issue certificates for use within its own

Strona 471 - Section VI: Port Security 471

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 522Out-of-band verification involves both the owner of a certificat

Strona 472 - Section VI: Port Security 472

AT-S62 User’s GuideSection VII: Management Security 523Before the switch can use a certificate, it must be retrieved and manually added to the switch’

Strona 473 - Section VI: Port Security 473

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 524Creating a Self-signed CertificateThis section contains the proc

Strona 474 - Setting Port Roles

AT-S62 User’s GuideSection VII: Management Security 5253. From the Keys/Certificate menu, select 3 to select Public Key Infrastructure (PKI) Configura

Strona 475 - Section VI: Port Security 475

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 526The Certificate Database portion of the window lists the certifi

Strona 476 - Section VI: Port Security 476

AT-S62 User’s GuideSection VII: Management Security 5279. Enter the ID number of the encryption key you want to use to create the certificate. The enc

Strona 477 - Section VI: Port Security 477

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 528Adding a Certificate to the DatabaseOnce you have created a cert

Strona 478 - Section VI: Port Security 478

AT-S62 User’s GuideSection VII: Management Security 5296. Type 1 to select Certificate Name and enter a name for the certificate.This is the name for

Strona 479 - Section VI: Port Security 479

AT-S62 User’s GuideSection I: Basic Operations 53The Enhanced Stacking menu is shown in Figure 5.Figure 5 Enhanced Stacking MenuThe menu displays the

Strona 480 - Section VI: Port Security 480

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 53010. Type 5 to select Add Certificate to add the certificate to t

Strona 481 - Section VI: Port Security 481

AT-S62 User’s GuideSection VII: Management Security 531Modifying a CertificateThe procedure in this section modifies a certificate. (The certificate t

Strona 482 - Section VI: Port Security 482

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 5323. Type 2 to select State and specify if a certificate is truste

Strona 483 - Configuring RADIUS Accounting

AT-S62 User’s GuideSection VII: Management Security 533Deleting a CertificateThe procedure in this section deletes a certificate from the certificate

Strona 484 - Section VI: Port Security 484

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 534Viewing a CertificateThis procedure displays information about a

Strona 485 - Management Security

AT-S62 User’s GuideSection VII: Management Security 5353. Type N to see the second page of certificate details.The View Certificate Details menu (page

Strona 486 - Web Server

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 536MD5 Fingerprint - Indicates the MD5 algorithm. This value provid

Strona 487 - Web Server Overview

AT-S62 User’s GuideSection VII: Management Security 537Generating an Enrollment RequestTo request a certificate from a public or private CA, you need

Strona 488 - Encryption

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 5385. From the Public Key Infrastructure (PKI) Configuration Menu,

Strona 489

AT-S62 User’s GuideSection VII: Management Security 539PEM - Creates the certificate in the Privacy Enhanced Mail (PEM) format, which is an ASCII form

Strona 490 - Configuring the Web Server

Chapter 3: Enhanced StackingSection I: Basic Operations 54Selecting a Switch in an Enhanced StackBefore you perform a procedure on a switch in an enha

Strona 491 - Enter SSL Key ID ->

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 540Installing CA Certificates onto a SwitchThis section lists the p

Strona 492 - Encryption Keys

AT-S62 User’s GuideSection VII: Management Security 541Configuring PKIOption 1 - Maximum Number of Certificates in the Public Key Infrastructure (PKI)

Strona 493 - Basic Overview

Chapter 27: Public Key Infrastructure CertificatesSection VII: Management Security 542Configuring SSLTo configure the SSL protocol, perform the follow

Strona 494 - Encryption Key

543Chapter 28Secure Shell (SSH) ProtocolThe chapter contains overview information about the Secure Shell (SSH) protocol and the procedure for configur

Strona 495 - Technical Overview

Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 544SSH OverviewSecure management is increasingly important in modern networks,

Strona 496 - Chapter 26: Encryption Keys

AT-S62 User’s GuideSection VII: Management Security 545❑ Tunnelling of TCP/IP traffic NoteNon-encrypted Secure Shell sessions serve no purpose.SSH Ser

Strona 497

Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 546SSH andEnhancedStackingThe AT-S62 management software allows for encrypted

Strona 498 - Algorithms

AT-S62 User’s GuideSection VII: Management Security 547Guidelines Below are the guidelines to observe when configuring SSH:❑ SSH requires two encrypti

Strona 499

Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 548Configuring the SSH ServerThis section describes how to configure the SSH s

Strona 500 - Creating an Encryption Key

AT-S62 User’s GuideSection VII: Management Security 5493. Select 1 - SSH Server Status to enable or disable the SSH server.4. Choose from one of the f

Strona 501

AT-S62 User’s GuideSection I: Basic Operations 553. Type 1 to select Get/Refresh List of Switches.The Master switch polls the subnet for all slave and

Strona 502

Chapter 28: Secure Shell (SSH) ProtocolSection VII: Management Security 550Displaying SSH InformationTo display SSH server information, perform the fo

Strona 503 - Enter new Description ->

AT-S62 User’s GuideSection VII: Management Security 551❑ Host Key ID: Indicates the host key ID defined for SSH.❑ Host Key Bits: Indicates the number

Strona 504 - Deleting an Encryption Key

552Chapter 29RADIUS and TACACS+ Authentication ProtocolsThis chapter explains how to create new manager accounts on a switch using the two authenticat

Strona 505 - Modifying an Encryption Key

AT-S62 User’s GuideSection VII: Management Security 553TACACS+ and RADIUS OverviewTACACS+ and RADIUS are authentication protocols for enhancing the se

Strona 506 - Exporting an Encryption Key

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 554When a network manager logs in to a switch to manage the de

Strona 507

AT-S62 User’s GuideSection VII: Management Security 555the Administration Menu so that the switch and server can communicate with each other.❑ You nee

Strona 508 - Importing an Encryption Key

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 556When a switch receives a username and password combination

Strona 509

AT-S62 User’s GuideSection VII: Management Security 557Configuring Authentication Protocol SettingsTo configure the RADIUS or TACACS+ settings on the

Strona 510 - Certificates

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 5585. To disable the server-based authentication feature on th

Strona 511

AT-S62 User’s GuideSection VII: Management Security 559Use per-server secret [Y/N] ->If you will be specifying more than one TACACS+ server and if

Strona 512 - Distinguished

Section I: Basic Operations 56Chapter 4Basic Switch ParametersThis chapter contains a variety of information and procedures. There is a discussion on

Strona 513

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 560f. After making changes, type R until you return to the Mai

Strona 514

AT-S62 User’s GuideSection VII: Management Security 5613 - RADIUS Server 1 Configuration4 - RADIUS Server 1 Configuration5 - RADIUS Server 1 Configura

Strona 515

Chapter 29: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 562d. From the Authentication Menu, type 1 to select Server-ba

Strona 516

563Chapter 30Management Access Control ListThis chapter explains how to create an access control list (ACL) to restrict Telnet and web browser managem

Strona 517 - Verification

Chapter 30: Management Access Control ListSection VII: Management Security 564Management Access Control List OverviewThe Management Access Control Lis

Strona 518

AT-S62 User’s GuideSection VII: Management Security 565MaskYou need to enter a mask that indicates the parts of the IP address the switch should filte

Strona 519 - Signatures

Chapter 30: Management Access Control ListSection VII: Management Security 566enter them.❑ The protocol is always TCP.❑ The Management ACL does not co

Strona 520 - Infrastructure

AT-S62 User’s GuideSection VII: Management Security 567Protocol TCPInterface WebA Management ACL can contain multiple ACEs. The two ACEs in this ACL a

Strona 521 - Validation

Chapter 30: Management Access Control ListSection VII: Management Security 568Creating the Management ACLTo create a Management ACL, perform the follo

Strona 522 - Implementation

AT-S62 User’s GuideSection VII: Management Security 569on the address. For example, to allow all management workstations in the subnet 149.11.11.0 to

Strona 523

AT-S62 User’s GuideSection I: Basic Operations 57When Does a Switch Need an IP Address?One of the tasks to building or expanding a network is deciding

Strona 524

Chapter 30: Management Access Control ListSection VII: Management Security 570Adding, Deleting, and Viewing ACEsYou can add or delete an ACE from the

Strona 525

571Section VIIIWeb Browser ManagementThe chapters in this section explain how to manage an AT-8524M switch using a web browser. The chapters include:❑

Strona 526

Section III: Web Browser Management572❑ Chapter 47, GARP VLAN Registration Protocol on page 775❑ Chapter 48, MAC Address Security on page 782❑ Chapter

Strona 527

573Chapter 31Starting a Web Browser Management SessionThis chapter contains the procedure for starting a web browser management session on an AT-8524M

Strona 528

Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 574Starting a Web Browser Management SessionTo establish a w

Strona 529 - Switch 12 - sw12.cer

AT-S62 User’s GuideSection VIII: Web Browser Management 575The AT-S62 software displays the login page, as shown in Figure 188.Figure 188 AT-S62 Logi

Strona 530

Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 576The main menu is on the left side of the Home page. It co

Strona 531 - Modifying a Certificate

AT-S62 User’s GuideSection VIII: Web Browser Management 577Saving Your Parameter ChangesWhen you make a change to a switch parameter, the change is, i

Strona 532

Chapter 31: Starting a Web Browser Management SessionSection VIII: Web Browser Management 578Quitting a Web Browser Management SessionTo exit a web br

Strona 533 - Deleting a Certificate

579Chapter 32Enhanced StackingThis chapter contains the following procedures:❑ Setting a Switch’s Enhanced Stacking Status on page 580❑ Selecting a Sw

Strona 534 - Viewing a Certificate

Chapter 4: Basic Switch ParametersSection I: Basic Operations 58How Do YouAssign an IPAddress?After you have decided which, if any, switches on your n

Strona 535

Chapter 32: Enhanced StackingSection VIII: Web Browser Management 580Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the sw

Strona 536

AT-S62 User’s GuideSection VIII: Web Browser Management 581NoteIf the window does not have an Enhanced Stacking tab, you are attempting to change the

Strona 537

Chapter 32: Enhanced StackingSection VIII: Web Browser Management 582Selecting a Switch in an Enhanced StackThe first thing that you should do before

Strona 538

AT-S62 User’s GuideSection VIII: Web Browser Management 583NoteThe master switch on which you started the management session is not included in the li

Strona 539 - 12.csr]

Chapter 32: Enhanced StackingSection VIII: Web Browser Management 584Displaying the Enhanced Stacking StatusTo display the enhanced stacking status of

Strona 540

585Chapter 33Basic Switch ParametersThis chapter contains the following sections:❑ Configuring an IP Address and Switch Name on page 586❑ Activating t

Strona 541 - Configuring PKI

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 586Configuring an IP Address and Switch NameNoteFor guidelines on when to assi

Strona 542 - Configuring SSL

AT-S62 User’s GuideSection VIII: Web Browser Management 587NoteThis procedure describes the parameters in the Administration section of the tab. The P

Strona 543 - Secure Shell (SSH) Protocol

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 588CommentsThis parameter specifies the location of the switch, (for example,

Strona 544 - SSH Overview

AT-S62 User’s GuideSection VIII: Web Browser Management 589Activating the BOOTP and DHCP Client SoftwareFor background information on BOOTP and DHCP,

Strona 545

AT-S62 User’s GuideSection I: Basic Operations 59Configuring an IP Address and Switch NameThe procedure in this section explains how to manually assig

Strona 546

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 590Displaying System InformationTo view basic information about the switch, pe

Strona 547

AT-S62 User’s GuideSection VIII: Web Browser Management 591CommentsThe location of the switch, (for example, 4th Floor - rm 402B). DHCP/BOOTPThe statu

Strona 548 - Configuring the SSH Server

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 592Configuring the Manager and Operator PasswordsThere are two levels of manag

Strona 549

AT-S62 User’s GuideSection VIII: Web Browser Management 593CautionYou should not use spaces or special characters, such as asterisks (*) and exclamati

Strona 550 - Displaying SSH Information

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 594Rebooting a SwitchNoteAny parameters changes that have not been saved will

Strona 551

AT-S62 User’s GuideSection VIII: Web Browser Management 595Pinging a Remote SystemYou can instruct the switch to ping a node on your network. This pro

Strona 552 - Authentication Protocols

Chapter 33: Basic Switch ParametersSection VIII: Web Browser Management 596Returning the AT-S62 Software to the Factory Default ValuesThe procedure in

Strona 553 - TACACS+ and RADIUS Overview

AT-S62 User’s GuideSection VIII: Web Browser Management 597The System Utilities tab is shown in Figure 197.Figure 197 System Utilities Tab3. Click th

Strona 554

598Chapter 34SNMPv1 and SNMPv2c Community StringsThis chapter explains how to activate SNMP management on the switch and how to create, modify, and de

Strona 555

AT-S62 User’s GuideSection VIII: Web Browser Management 599Enabling or Disabling SNMP ManagementTo enable or disable SNMP management on the switch, pe

Strona 556

Table of Contents6Chapter 14Quality of Service ...

Strona 557

Chapter 4: Basic Switch ParametersSection I: Basic Operations 602. From the System Administration menu, type 2 to select System Configuration.The Syst

Strona 558

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 6004. If you want the switch to send authentication failure traps,

Strona 559 - Disabled) ->

AT-S62 User’s GuideSection VIII: Web Browser Management 601Creating a New SNMPv1 or SNMPv2c Community StringTo create a new SNMPv1 or SNMPv2c communit

Strona 560

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 602Open AccessDisplays the opened or closed access status of the s

Strona 561

AT-S62 User’s GuideSection VIII: Web Browser Management 6035. In the Community Name field, enter the new community string. The name can be from one to

Strona 562 - RADIUS Status

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 604Modifying a Community StringTo modify a community string, perfo

Strona 563 - Chapter 30

AT-S62 User’s GuideSection VIII: Web Browser Management 605NoteYou cannot change the name of a community string.6. Use the Status option to either ena

Strona 564 - Parts of a

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 606Deleting a Community StringTo delete a community string, do the

Strona 565 - ACL Guidelines

AT-S62 User’s GuideSection VIII: Web Browser Management 607Displaying the SNMP Status and Community StringsTo display the SNMPv1 and SNMPv2c community

Strona 566 - ACL Examples

Chapter 34: SNMPv1 and SNMPv2 Community StringsSection VIII: Web Browser Management 608Trap ReceiversIP addresses of management stations to receive SN

Strona 567

609Chapter 35Port ParametersThis chapter explains how to view and change the parameter settings for the individual ports on a switch. Examples of the

Strona 568 - Creating the Management ACL

AT-S62 User’s GuideSection I: Basic Operations 613 - Subnet MaskThis parameter specifies the subnet mask for the switch. You must specify a subnet mas

Strona 569

Chapter 35: Port ParametersSection VIII: Web Browser Management 610Configuring Port ParametersTo configure the parameter settings of a port on the swi

Strona 570

AT-S62 User’s GuideSection VIII: Web Browser Management 611The Port Configuration page is shown Figure 204.Figure 204 Port Configuration PageNoteThe

Strona 571

Chapter 35: Port ParametersSection VIII: Web Browser Management 612You should note the following concerning the operation of Auto-Negotiation on the s

Strona 572

AT-S62 User’s GuideSection VIII: Web Browser Management 613You might also want to disable a port that is not being used to secure it from unauthorized

Strona 573 - Starting a Web Browser

Chapter 35: Port ParametersSection VIII: Web Browser Management 614Back PressureSets backpressure on a port. This option only applies to ports operati

Strona 574 - Switch’s IP Address

AT-S62 User’s GuideSection VIII: Web Browser Management 615MDI/MDIX CrossoverUse this selection to set the wiring configuration of the port. The confi

Strona 575

Chapter 35: Port ParametersSection VIII: Web Browser Management 616Displaying Port Status and StatisticsThe procedure in this section displays the ope

Strona 576

AT-S62 User’s GuideSection VIII: Web Browser Management 617If you select port status, the Port Status page in Figure 206 is displayed.Figure 206 Port

Strona 577

Chapter 35: Port ParametersSection VIII: Web Browser Management 618SpeedThe operating speed of the port. Possible values are:0010 - 10 Mbps0100 - 100

Strona 578

AT-S62 User’s GuideSection VIII: Web Browser Management 619The information in this page is for viewing purposes only. The statistics are defined below

Strona 579

Chapter 4: Basic Switch ParametersSection I: Basic Operations 62Activating the BOOTP and DHCP Client SoftwareThe BOOTP and DHCP application protocols

Strona 580 - Chapter 32: Enhanced Stacking

Chapter 35: Port ParametersSection VIII: Web Browser Management 620Oversize Frames Number of frames exceeding the maximum specified by IEEE 802.3 (151

Strona 581

621Chapter 36MAC Address TableThis chapter contains instructions on how to view the dynamic and static addresses in the MAC address table of the switc

Strona 582

Chapter 36:MAC Address TableSection VIII: Web Browser Management 622Displaying the MAC Address TableTo view the MAC address table, perform the followi

Strona 583

AT-S62 User’s GuideSection VIII: Web Browser Management 623View AllThis selection displays all dynamic addresses learned on the ports of the switch an

Strona 584

Chapter 36:MAC Address TableSection VIII: Web Browser Management 624Adding Static Unicast and Multicast MAC AddressesThis section contains the procedu

Strona 585

AT-S62 User’s GuideSection VIII: Web Browser Management 625the failure of the multicast packets to be properly forwarded to the host nodes. You can sp

Strona 586

Chapter 36:MAC Address TableSection VIII: Web Browser Management 626Deleting Unicast and Multicast MAC AddressesTo delete a static or dynamic unicast

Strona 587

AT-S62 User’s GuideSection VIII: Web Browser Management 627Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addres

Strona 588

628Chapter 37Port TrunkingThis chapter contains the procedure for creating, modifying, or deleting a port trunk from a web browser management session.

Strona 589

AT-S62 User’s GuideSection VIII: Web Browser Management 629Creating a Port TrunkThis section contains the procedure for creating a port trunk on the s

Strona 590 - Displaying System Information

AT-S62 User’s GuideSection I: Basic Operations 63The following prompt is displayed:BOOTP/DHCP (E-Enabled, D-Disabled):4. Type E to enable BOOTP and DH

Strona 591

Chapter 37: Port TrunkingSection VIII: Web Browser Management 630The Port Trunking tab is shown in Figure 210.Figure 210 Port Trunking TabThis tab li

Strona 592

AT-S62 User’s GuideSection VIII: Web Browser Management 631The Add New Trunk page is shown in Figure 211.Figure 211 Add New Trunk Page5. In the Trunk

Strona 593

Chapter 37: Port TrunkingSection VIII: Web Browser Management 632Modifying a Port TrunkThis section contains the procedure for modifying a port trunk

Strona 594 - Rebooting a Switch

AT-S62 User’s GuideSection VIII: Web Browser Management 633An example of the Modify Trunk page is shown in Figure 212.Figure 212 Modify Trunk PageNot

Strona 595 - Pinging a Remote System

Chapter 37: Port TrunkingSection VIII: Web Browser Management 634Deleting a Port TrunkCautionDisconnect the cables from the port trunk on the switch b

Strona 596

AT-S62 User’s GuideSection VIII: Web Browser Management 635Displaying the Port TrunksTo display the port trunks, do the following:1. From the Home pag

Strona 597

Chapter 37: Port TrunkingSection VIII: Web Browser Management 636❑ DI - Destination IP address (Layer 3)❑ SI/DI - Source/destination IP address (Layer

Strona 598 - Community Strings

637Chapter 38Port MirroringThis chapter contains the procedure for creating or deleting a port mirror. Sections in the chapter include:❑ Creating a Po

Strona 599

Chapter 38: Port MirroringSection VIII: Web Browser Management 638Creating a Port MirrorTo create or delete a port mirror, perform the following proce

Strona 600

AT-S62 User’s GuideSection VIII: Web Browser Management 639Egress Port(s)This column lists the source ports whose egress traffic is mirrored to the de

Strona 601

Chapter 4: Basic Switch ParametersSection I: Basic Operations 64Rebooting a SwitchThis procedure reboots the switch.NoteAny configuration changes not

Strona 602

Chapter 38: Port MirroringSection VIII: Web Browser Management 640Figure 216 shows an example of the Modify Mirror page configured for a port mirror.

Strona 603

AT-S62 User’s GuideSection VIII: Web Browser Management 641Modifying or Disabling a Port MirrorTo modify a port mirror, you perform the same procedure

Strona 604 - Modifying a Community String

Chapter 38: Port MirroringSection VIII: Web Browser Management 642Deleting a Port MirrorTo delete a port mirror so that you can use the destination po

Strona 605

AT-S62 User’s GuideSection VIII: Web Browser Management 643Displaying the Port MirrorTo display the port mirror, do the following:1. From the Home pag

Strona 606 - Deleting a Community String

644Chapter 39File Downloads and UploadsThis chapter contains the procedure for downloading a new AT-S62 image file onto the switch from a web browser

Strona 607

AT-S62 User’s GuideSection VIII: Web Browser Management 645Downloading a FileThis procedure explains how to download a file from a TFTP server on your

Strona 608

Chapter 39: File Downloads and UploadsSection VIII: Web Browser Management 646switch typically does not have an IP address. Rather, you would need to

Strona 609 - Port Parameters

AT-S62 User’s GuideSection VIII: Web Browser Management 6475. In the TFTP Remote Filename field, enter the filename of the file on the TFTP server to

Strona 610 - Configuring Port Parameters

Chapter 39: File Downloads and UploadsSection VIII: Web Browser Management 648Uploading a FileThis procedure explains how to upload a file from the sw

Strona 611

AT-S62 User’s GuideSection VIII: Web Browser Management 649NoteThe top portion of the tab is used to return the switch to its factory default settings

Strona 612 - Chapter 35: Port Parameters

AT-S62 User’s GuideSection I: Basic Operations 65Configuring the Manager and Operator PasswordsThere are two levels of management access on an AT-8524

Strona 613

650Chapter 40Event LogThis chapter describes the event log. Sections in the chapter include:❑ Enabling or Disabling the Event Log on page 651❑ Display

Strona 614

AT-S62 User’s GuideSection VIII: Web Browser Management 651Enabling or Disabling the Event LogAllied Telesyn recommends setting the switch’s date and

Strona 615

Chapter 40: Event LogSection VIII: Web Browser Management 6523. For Status in Log Settings, click either Disable or Enable. If you enable the log, the

Strona 616

AT-S62 User’s GuideSection VIII: Web Browser Management 653Displaying EventsTo view the event log, do the following:1. From the Home Page, click eithe

Strona 617

Chapter 40: Event LogSection VIII: Web Browser Management 654Figure 220 shows an example of the event log in the Full display mode. The Normal display

Strona 618

AT-S62 User’s GuideSection VIII: Web Browser Management 655Saving the Event LogYou can save the event log as a file in the file system, from where you

Strona 619

Chapter 40: Event LogSection VIII: Web Browser Management 656Clearing the Event LogTo clear all events from the log, perform the following procedure:1

Strona 620

657Chapter 41Quality of ServiceThis chapter contains instructions on how to configure Quality of Service (QoS). This chapter contains the following pr

Strona 621

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 658Configuring CoSThis procedure explains how to change the egress queue used to ha

Strona 622 - Chapter 36:MAC Address Table

AT-S62 User’s GuideSection VIII: Web Browser Management 659The CoS Setting for Port page is shown in Figure 222.Figure 222 CoS Setting for Port Page5

Strona 623

Chapter 4: Basic Switch ParametersSection I: Basic Operations 66NoteA password can be from 0 to 16 alphanumeric characters. Passwords are case-sensiti

Strona 624

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 660NoteThe tagged information in a frame is not changed as the frame traverses the

Strona 625

AT-S62 User’s GuideSection VIII: Web Browser Management 661Mapping CoS Priorities to Egress QueuesThis procedure explains how to change the default ma

Strona 626

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 662NoteThe Configure Egress Weights section in the tab is explained in the next pro

Strona 627

AT-S62 User’s GuideSection VIII: Web Browser Management 663Configuring Egress SchedulingThis procedure explains how to select and configure a scheduli

Strona 628

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 664Displaying the CoS SettingsTo display the CoS settings, do the following:1. From

Strona 629

AT-S62 User’s GuideSection VIII: Web Browser Management 665The page displays the following information:PortThe port number.VLAN IdThe VLAN of which th

Strona 630 - Chapter 37: Port Trunking

Chapter 41: Quality of ServiceSection VIII: Web Browser Management 666Displaying QoS SchedulingTo display QoS scheduling, do the following:1. From the

Strona 631

667Chapter 42IGMP SnoopingThis chapter describes how to configure the IGMP snooping feature on the switch.Sections in the chapter include:❑ Configurin

Strona 632

Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 668Configuring IGMP SnoopingTo configure IGMP snooping from a web browser management ses

Strona 633

AT-S62 User’s GuideSection VIII: Web Browser Management 669host node stops sending reports and times-out. The switch forwards the leave request to the

Strona 634

AT-S62 User’s GuideSection I: Basic Operations 67Setting the System TimeThis procedure explains how to set the switch’s date and time. Setting the sys

Strona 635 - Displaying the Port Trunks

Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 670This parameter is useful with networks that contain a large number of multicast group

Strona 636 - The ports of the trunk

AT-S62 User’s GuideSection VIII: Web Browser Management 671Displaying a List of Host Nodes and Multicast RoutersYou can use the AT-S62 software to dis

Strona 637

Chapter 42: IGMP SnoopingSection VIII: Web Browser Management 672VLAN IDThe VID of the VLAN in which the port is an untagged member.Member PortThe por

Strona 638

673Chapter 43Denial of Service DefenseThis chapter contains instructions on how to configure the Denial of Service defense feature on the switch. The

Strona 639

Chapter 43: Denial of Service DefenseSection VIII: Web Browser Management 674Configuring Denial of Service Attack DefenseTo configure the ports on the

Strona 640 - Chapter 38: Port Mirroring

AT-S62 User’s GuideSection VIII: Web Browser Management 675b. In the DoS Subnet Mask field, enter the LAN’s mask. A binary “1” indicates the switch sh

Strona 641

Chapter 43: Denial of Service DefenseSection VIII: Web Browser Management 6768. Adjust the settings as needed. The parameters are described below.Stat

Strona 642

AT-S62 User’s GuideSection VIII: Web Browser Management 677Displaying the DoS SettingsTo display the DoS settings, do the following:1. From the Home p

Strona 643 - Displaying the Port Mirror

678Chapter 44SNMPv3 ProtocolThis chapter provides the following procedures for configuring basic switch parameters using a web browser management sess

Strona 644

AT-S62 User’s GuideSection VIII: Web Browser Management 679Configuring the SNMPv3 ProtocolTo configure the SNMPv3 protocol, you need to configure the

Strona 645 - Downloading a File

Chapter 4: Basic Switch ParametersSection I: Basic Operations 68The Configure System Time menu is shown in Figure 11.Figure 11 Configure System Time

Strona 646

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 680Enabling the SNMP ProtocolIn order to allow an NMS (an SNMP manager) to access the

Strona 647

AT-S62 User’s GuideSection VIII: Web Browser Management 681The SNMP Tab is shown in Figure 232.Figure 232 Configuration System Page, SNMP Tab3. To e

Strona 648 - Uploading a File

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6825. Click Apply to update the User Table.6. To save your changes, return to the Gene

Strona 649

AT-S62 User’s GuideSection VIII: Web Browser Management 683Configuring the SNMPv3 User TableYou can create, delete, and modify an SNMPv3 User Table e

Strona 650

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6844. Click the Add button to add a new SNMPv3 User Table entry.The Add New SNMPv3 Use

Strona 651

AT-S62 User’s GuideSection VIII: Web Browser Management 6858. In the Confirm Authentication Password field, re-enter the authentication password.Note

Strona 652 - Chapter 40: Event Log

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 68613. Click Apply to update the SNMPv3 User Table.14. To save your changes, return to

Strona 653

AT-S62 User’s GuideSection VIII: Web Browser Management 687The Modify SNMPv3 User Page is shown in Figure 235.Figure 235 Modify SNMPv3 User Page5. I

Strona 654

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6886. In the Authentication Password field, enter an authentication password of up to

Strona 655

AT-S62 User’s GuideSection VIII: Web Browser Management 689NoteThe Row Status parameter is a read-only field in the Web interface. The Active value i

Strona 656

AT-S62 User’s GuideSection I: Basic Operations 69NoteIf the switch is obtaining its IP address and subnet mask from a DHCP sever, you can configure th

Strona 657

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 690Configuring the SNMPv3 View TableYou can create, delete, and modify an SNMPv3 View

Strona 658

AT-S62 User’s GuideSection VIII: Web Browser Management 6914. To create a new SNMPv3 View Table entry click Add.The Add New SNMPv3 View Page is shown

Strona 659

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 692The View Subtree parameter defines a MIB View and the Subtree Mask further restrict

Strona 660

AT-S62 User’s GuideSection VIII: Web Browser Management 693Deleting a ViewTable EntryTo delete an entry in the SNMPv3 View Table, perform the followi

Strona 661

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 694Modifying aView TableEntryTo modify an entry in the SNMPv3 View Table, perform the

Strona 662

AT-S62 User’s GuideSection VIII: Web Browser Management 6956. In the View Type field, enter one of the following view types:IncludedEnter this value

Strona 663

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 696Configuring the SNMPv3 Access TableYou can create, delete, and modify an SNMPv3 Acc

Strona 664 - Displaying the CoS Settings

AT-S62 User’s GuideSection VIII: Web Browser Management 697The SNMPv3 Access Table Page is shown in Figure 239.Figure 239 SNMPv3 Access Table Page4.

Strona 665

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 6985. In the Group Name field, enter a descriptive name of the group.The Group Name ca

Strona 666 - Displaying QoS Scheduling

AT-S62 User’s GuideSection VIII: Web Browser Management 699v2cSelect this value to associate the Group Name with the SNMPv2c protocol.v3Select this v

Strona 667

AT-S62 User’s Guide7Configuring the SNMPv3 SecurityToGroup Table ...

Strona 668 - Configuring IGMP Snooping

Chapter 4: Basic Switch ParametersSection I: Basic Operations 70g. Type 6 - Poll Interval to specify the time interval between queries to the SNTP ser

Strona 669

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 700NonVolatileSelect this storage type if you want the ability to save an entry in the

Strona 670 - Chapter 42: IGMP Snooping

AT-S62 User’s GuideSection VIII: Web Browser Management 701Modifying anAccess TableEntryTo modify an entry in the SNMPv3 Access Table, perform the fo

Strona 671

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 702This parameter allows the users assigned to this Group Name to view the information

Strona 672

AT-S62 User’s GuideSection VIII: Web Browser Management 703Configuring the SNMPv3 SecurityToGroup TableYou can create, delete, and modify an SNMPv3 S

Strona 673

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7044. To create an SNMPv3 SecurityToGroup Table entry, click Add.The Add New SNMPv3 Se

Strona 674

AT-S62 User’s GuideSection VIII: Web Browser Management 705There are four default values for this field that are reserved for SNMPv1 and SNMPv2c impl

Strona 675

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 706The SNMPv3 SecurityToGroup Table Page is shown in Figure 242 on page 703.4. Click t

Strona 676

AT-S62 User’s GuideSection VIII: Web Browser Management 7075. In the Group Name field, enter a Group Name that you configured in the SNMPv3 Access Ta

Strona 677 - Displaying the DoS Settings

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 708Configuring the SNMPv3 Notify TableYou can create, delete, and modify an SNMPv3 Not

Strona 678 - SNMPv3 Protocol

AT-S62 User’s GuideSection VIII: Web Browser Management 7094. To create an SNMPv3 Notify Table entry, click Add.The Add New SNMPv3 Notify Page is sho

Strona 679 - AT-S62 User’s Guide

AT-S62 User’s GuideSection I: Basic Operations 71Configuring the Console Startup ModeYou can configure the AT-S62 software to display either the Main

Strona 680 - Enabling the SNMP Protocol

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 710NonVolatileSelect this storage type if you want the ability to save an entry in the

Strona 681

AT-S62 User’s GuideSection VIII: Web Browser Management 711Modifying aNotify TableEntryTo modify an entry in the SNMPv3 Notify Table, perform the fol

Strona 682 - Changes

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7127. In the Storage Type field, select one of the following storage types for this ta

Strona 683 - Creating a User

AT-S62 User’s GuideSection VIII: Web Browser Management 713Configuring the SNMPv3 Target Address TableYou can create, delete, and modify an SNMPv3 Ta

Strona 684 - Chapter 44: SNMPv3 Protocol

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 714The SNMPv3 Target Address Table Page is shown in Figure 248.Figure 248 SNMPv3 Targ

Strona 685

AT-S62 User’s GuideSection VIII: Web Browser Management 7155. In the Target Address Name field, enter the name of the SNMP manager, or host, that man

Strona 686 - User Table

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 716NonVolatileSelect this storage type if you want the ability to save an entry in the

Strona 687

AT-S62 User’s GuideSection VIII: Web Browser Management 717ModifyingTarget AddressTable EntryTo modify an entry in the SNMPv3 Target Address Table, p

Strona 688

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7187. In the UDP Port Number field, enter a UDP port number.You can enter a UDP port i

Strona 689

AT-S62 User’s GuideSection VIII: Web Browser Management 71914. To save your changes, return to the General Tab and click Save Changes.

Strona 690 - Creating a View

Chapter 4: Basic Switch ParametersSection I: Basic Operations 72Configuring the Console TimerThe AT-S62 management software uses the console timer, al

Strona 691

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 720Configuring the SNMPv3 Target Parameters TableYou can create, delete, and modify an

Strona 692

AT-S62 User’s GuideSection VIII: Web Browser Management 7214. To create an SNMPv3 Target Parameters Table entry, click Add.The Add New SNMPv3 Target

Strona 693 - Deleting a View

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7227. In the Security Model field, select one of the following SNMP protocols as the S

Strona 694

AT-S62 User’s GuideSection VIII: Web Browser Management 723This level provides the greatest level of security. You can select this value if you confi

Strona 695

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 724A warning message is displayed. Click OK to remove the Target Parameters Table entr

Strona 696

AT-S62 User’s GuideSection VIII: Web Browser Management 725NoteEnter a value for the Message Processing Model field only if you select SNMPv1 or SNMP

Strona 697

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 726NoteIf you have selected SNMPv1 or SNMPv2c as the Security Model, you must select N

Strona 698

AT-S62 User’s GuideSection VIII: Web Browser Management 727Configuring the SNMPv3 Community TableYou can create, delete, and modify an SNMPv3 Communi

Strona 699

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 728Figure 254 SNMPv3 Community Table Page4. To create an SNMPv3 Community Table entry

Strona 700

AT-S62 User’s GuideSection VIII: Web Browser Management 7295. In the Community Index field, enter a numerical value for this Community.This parameter

Strona 701

AT-S62 User’s GuideSection I: Basic Operations 73Enabling or Disabling the Telnet ServerThis procedure explains how to enable and disable the Telnet s

Strona 702

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 730making changes to an SNMPv3 Community Table entry with a NonVolatile storage type,

Strona 703 - Creating a

AT-S62 User’s GuideSection VIII: Web Browser Management 731Modifying anSNMPv3CommunityTable EntryTo modify an entry in the SNMPv3 Community Table, pe

Strona 704

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 7326. In the Security Name field, enter a name of an SNMPv1 and SNMPv2c user.This name

Strona 705 - Deleting a

AT-S62 User’s GuideSection VIII: Web Browser Management 733Displaying SNMPv3 TablesThis section contains procedures to display the SNMPv3 Tables. The

Strona 706

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 734Displaying UserTable EntriesTo display entries in the SNMPv3 User Table, perform th

Strona 707

AT-S62 User’s GuideSection VIII: Web Browser Management 735Displaying ViewTable EntriesTo display entries in the SNMPv3 View Table, perform the follo

Strona 708

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 736DisplayingAccess TableEntriesTo display entries in the SNMPv3 Access Table, perform

Strona 709

AT-S62 User’s GuideSection VIII: Web Browser Management 737DisplayingSecurityToGroupTable EntriesTo display entries in the SNMPv3 SecurityToGroup Tab

Strona 710

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 738DisplayingNotify TableEntriesTo display entries in the SNMPv3 Notify Table, perform

Strona 711

AT-S62 User’s GuideSection VIII: Web Browser Management 739DisplayingTarget AddressTable EntriesTo display entries in the SNMPv3 Target Address Table

Strona 712

Chapter 4: Basic Switch ParametersSection I: Basic Operations 74Setting the Baud Rate of the RS-232 Terminal PortThe default baud rate of the RS-232 T

Strona 713

Chapter 44: SNMPv3 ProtocolSection VIII: Web Browser Management 740DisplayingTargetParametersTable EntriesTo display entries in the SNMPv3 Target Para

Strona 714

AT-S62 User’s GuideSection VIII: Web Browser Management 741DisplayingSNMPv3CommunityTable EntriesTo display entries in the SNMPv3 Community Table, pe

Strona 715

742Chapter 45STP, RSTP, and MSTPThis chapter explains how to configure the STP, RSTP and MSTP parameters on an AT-8524M switch from a web browser mana

Strona 716

AT-S62 User’s GuideSection VIII: Web Browser Management 743Enabling or Disabling Spanning TreeTo enable or disable spanning tree on the switch, do the

Strona 717 - Modifying

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7447. Click Apply.8. If you activated STP, go to Configuring STP on page 745. If y

Strona 718

AT-S62 User’s GuideSection VIII: Web Browser Management 745Configuring STPCautionThe bridge provides default STP parameters that are adequate for most

Strona 719

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7462. Adjust the STP bridge settings as needed. The parameters are described below

Strona 720

AT-S62 User’s GuideSection VIII: Web Browser Management 747Bridge IdentifierThe MAC address of the bridge. The bridge identifier is used as a tie brea

Strona 721

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 748Configuring RSTPCautionThe bridge provides default RSTP parameters that are ade

Strona 722

AT-S62 User’s GuideSection VIII: Web Browser Management 7492. Adjust the parameters are desired. The parameters are defined below.1 - Force VersionThi

Strona 723

AT-S62 User’s GuideSection I: Basic Operations 75Pinging a Remote SystemYou can instruct the switch to ping a remote device on your network. This proc

Strona 724

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7506 - Bridge IdentifierThe MAC address of the bridge. The bridge identifier is us

Strona 725

AT-S62 User’s GuideSection VIII: Web Browser Management 7514 - Edge PortThis parameter defines whether the port is functioning as an edge port. For an

Strona 726

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 752Configuring MSTPThis section is divided into the following procedures:❑ Configu

Strona 727

AT-S62 User’s GuideSection VIII: Web Browser Management 753The MSTP Spanning Tree tab is shown in Figure 270.Figure 270 MSTP Spanning Tree TabNoteThi

Strona 728

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7545. Adjust the bridge MSTP settings as needed. The parameters are described belo

Strona 729

AT-S62 User’s GuideSection VIII: Web Browser Management 755❑ MaxAge must be less than (2 x (ForwardingDelay - 1))Bridge Max HopsMSTP regions use this

Strona 730

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 7562. To create or delete an MSTI ID and to associate VLANs to MSTIs, do the follo

Strona 731

AT-S62 User’s GuideSection VIII: Web Browser Management 757The Modify MSTI window is shown in Figure 272.Figure 272 Modify MSTI Windowc. In the Prior

Strona 732

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 758ConfiguringMSTP PortParametersTo configure MSTP port parameters, perform the fo

Strona 733 - Displaying SNMPv3 Tables

AT-S62 User’s GuideSection VIII: Web Browser Management 759Point-to-PointThis parameter defines whether the port is functioning as a point-to-point po

Strona 734 - Table Entries

Chapter 4: Basic Switch ParametersSection I: Basic Operations 76Returning the AT-S62 Software to the Factory Default ValuesThe procedure in this secti

Strona 735 - Displaying View

Chapter 45: STP, RSTP, and MSTPSection VIII: Web Browser Management 760Displaying Spanning Tree SettingsTo display the parameter settings for the acti

Strona 736

761Chapter 46Virtual LANsThis chapter explains how to create, modify, and delete port-based and tagged VLANs from a web browser management session. Th

Strona 737

Chapter 46: Virtual LANsSection VIII: Web Browser Management 762Creating a New Port-Based or Tagged VLANTo create a new port-based or tagged VLAN, per

Strona 738

AT-S62 User’s GuideSection VIII: Web Browser Management 763The VLAN Mode and Uplink Port options are explained in Selecting a VLAN Mode on page 771. T

Strona 739

Chapter 46: Virtual LANsSection VIII: Web Browser Management 764If this VLAN will be unique in your network, then its VID should also be unique. If th

Strona 740

AT-S62 User’s GuideSection VIII: Web Browser Management 7658. Click Apply.NoteAny untagged ports that you assign to the new VLAN are automatically rem

Strona 741

Chapter 46: Virtual LANsSection VIII: Web Browser Management 766Modifying a Port-Based or Tagged VLANThis procedure explains how to add or remove port

Strona 742 - STP, RSTP, and MSTP

AT-S62 User’s GuideSection VIII: Web Browser Management 7677. After making the necessary changes, click Apply. NoteUntagged ports that are added to a

Strona 743

Chapter 46: Virtual LANsSection VIII: Web Browser Management 768Deleting a Port-Based or Tagged VLANTo delete a port-based or tagged VLAN from the swi

Strona 744 - 7. Click Apply

AT-S62 User’s GuideSection VIII: Web Browser Management 769Displaying VLANsTo display the current VLANs on a switch, perform the following procedure:1

Strona 745

AT-S62 User’s GuideSection I: Basic Operations 77The following prompt is displayed:This operation requires a switch reboot. Continue? [Yes/No] ->4.

Strona 746

Chapter 46: Virtual LANsSection VIII: Web Browser Management 770Uplink PortThis column is applicable only when the switch is operating in one of the t

Strona 747

AT-S62 User’s GuideSection VIII: Web Browser Management 771Selecting a VLAN ModeThe AT-S62 management software features three VLAN modes:❑ Port-based

Strona 748

Chapter 46: Virtual LANsSection VIII: Web Browser Management 7726. Click Apply.The new mode is automatically activated on the switch. 7. To permanentl

Strona 749

AT-S62 User’s GuideSection VIII: Web Browser Management 773Specifying a Management VLANThe management VLAN is the VLAN through which an AT-8524M switc

Strona 750

Chapter 46: Virtual LANsSection VIII: Web Browser Management 774Now let’s assume that you decide to create a VLAN called NMS with a VID of 24 for the

Strona 751

775Chapter 47GARP VLAN Registration ProtocolThis chapter about web server security contains the following procedures:❑ Configuring GVRP on page 776❑ E

Strona 752 - Configuring MSTP

Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 776Configuring GVRPTo configure the GVRP parameters, perform the follo

Strona 753

AT-S62 User’s GuideSection VIII: Web Browser Management 777Join TimeSets the duration of the Join Period timer. The range is from 10 to 60 centisecon

Strona 754

Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 778Enabling or Disabling GVRP on a PortThis procedure enables and disa

Strona 755 - VLANs to MSTIs

AT-S62 User’s GuideSection VIII: Web Browser Management 7798. To permanently save the change, use the Save Changes button in the General tab. For dir

Strona 756

Chapter 4: Basic Switch ParametersSection I: Basic Operations 78Viewing System Hardware and Software InformationThe procedure in this section displays

Strona 757

Chapter 47: GARP VLAN Registration ProtocolSection VIII: Web Browser Management 780Displaying the GVRP SettingsUse this procedure to view the GVRP set

Strona 758 - MSTP Port

AT-S62 User’s GuideSection VIII: Web Browser Management 781View GVRP State Machine for VLANRefer to Table 23 on page 443 for descriptions of the stat

Strona 759

782Chapter 48MAC Address SecurityThis chapter explains how to display the MAC address security levels on the ports on the switch. It contains the foll

Strona 760

AT-S62 User’s GuideSection VIII: Web Browser Management 783Displaying MAC Address Security LevelsTo display the MAC address security level of a port,

Strona 761

Chapter 48: MAC Address SecuritySection VIII: Web Browser Management 784This page is for viewing purposes only. The columns in the page are defined be

Strona 762 - Chapter 46: Virtual LANs

785Chapter 49802.1x Port-based Access ControlThis chapter contains instructions on how to configure the 802.1x port-based access control feature on th

Strona 763

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 786Enabling and Disabling Port-based Access ControlThis procedure exp

Strona 764

AT-S62 User’s GuideSection VIII: Web Browser Management 7873. To enable or disable the feature, do the following:a. Click the Enable Port Access check

Strona 765

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 788Setting Port RolesTo set port roles for port-based access control,

Strona 766

AT-S62 User’s GuideSection VIII: Web Browser Management 7897. To configure authenticator port settings, go to Configuring Authenticator Port Parameter

Strona 767

AT-S62 User’s GuideSection I: Basic Operations 79The System Hardware Information menu is shown in Figure 14.Figure 14 System Hardware Information Men

Strona 768

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 790Configuring Authenticator Port ParametersTo configure authenticato

Strona 769

AT-S62 User’s GuideSection VIII: Web Browser Management 791authentication of the client. This is the default setting❑ Force-unauthorized: Causes the p

Strona 770

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 7924. Click Apply.5. To permanently save the changes, use the Save Ch

Strona 771

AT-S62 User’s GuideSection VIII: Web Browser Management 793Configuring Supplicant Port ParametersTo configure supplicant port parameters, perform the

Strona 772 - 6. Click Apply

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 794Held PeriodSpecifies the amount of time in seconds the supplicant

Strona 773

AT-S62 User’s GuideSection VIII: Web Browser Management 795Displaying the Port-based Access Control SettingsTo display the port-based access control s

Strona 774

Chapter 49: 802.1x Port-based Access ControlSection VIII: Web Browser Management 796A port status page is displayed, as shown in Figure 288.Figure 288

Strona 775 - Chapter 47

797Chapter 50Secure Shell ProtocolThis chapter contains the procedure for configuring the SSH protocol settings. Sections in this chapter include:❑ Co

Strona 776

Chapter 50: Secure Shell ProtocolSection VIII: Web Browser Management 798Configuring the SSH ServerThis section describes how to configure the SSH ser

Strona 777

AT-S62 User’s GuideSection VIII: Web Browser Management 7994. Configure the parameters as needed. The parameters are described below: StatusEnables an

Strona 778

Table of Contents8Summary of Guidelines ...

Strona 779

Chapter 4: Basic Switch ParametersSection I: Basic Operations 80Setting the Switch’s Temperature ThresholdYou can set a temperature threshold on the s

Strona 780 - Displaying the GVRP Settings

Chapter 50: Secure Shell ProtocolSection VIII: Web Browser Management 800Displaying SSH InformationTo display SSH information, do the following:1. Fro

Strona 781

AT-S62 User’s GuideSection VIII: Web Browser Management 801❑ Server Key ID: Indicates the server key ID defined for SSH.❑ Server Key Bits: Indicates t

Strona 782

802Chapter 51Encryption Keys, PKI, and SSLThis chapter explains how to view the encryption keys, PKI certificates, and SSL settings and includes the f

Strona 783

AT-S62 User’s GuideSection VIII: Web Browser Management 803Displaying Encryption KeysTo display the SSL and SSH encryption key pairs, do the following

Strona 784

Chapter 51: Encryption Keys, SSL, and PKISection VIII: Web Browser Management 804Displaying PKI Settings and CertificatesTo display the self-signed an

Strona 785 - Chapter 49

AT-S62 User’s GuideSection VIII: Web Browser Management 805MTrust (Manually Trusted)The certificate has been manually verified that it is from a trust

Strona 786

Chapter 51: Encryption Keys, SSL, and PKISection VIII: Web Browser Management 806SubjectThe Subject distinguished name.IssuerThe certificate issuer’s

Strona 787

AT-S62 User’s GuideSection VIII: Web Browser Management 807Displaying the SSL SettingsTo display the SSL settings, perform the following procedure:1.

Strona 788

808Chapter 52RADIUS and TACACS+ Authentication ProtocolsThis chapter contains instructions on how to configure the authentication protocols. This chap

Strona 789

AT-S62 User’s GuideSection VIII: Web Browser Management 809Configuring RADIUS and TACACS+To configure the authentication protocols, perform the follow

Strona 790

81Chapter 5SNMPv1 and SNMPv2c ConfigurationThis chapter explains how to activate SNMP management on the switch and how to create, modify, and delete S

Strona 791

Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 8104. Click Apply.NoteTo configure TACACS+, go to Step 6.

Strona 792 - Changes on page 577

AT-S62 User’s GuideSection VIII: Web Browser Management 811IP Address and Encryption KeyUse these fields to specify the IP addresses and encryption se

Strona 793

Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 812Global Server TimeoutThis parameter specifies the maxim

Strona 794

AT-S62 User’s GuideSection VIII: Web Browser Management 813Displaying the RADIUS or TACSACS+ SettingsTo display the RADIUS or TACACS+ settings on the

Strona 795

Chapter 52: RADIUS and TACACS+ Authentication ProtocolsSection VIII: Web Browser Management 814The TACACS+ (Figure 300) or RADIUS (Figure 301) client

Strona 796

815Chapter 53Management Access Control ListThis chapter explains how to create a Management Access Control List (ACL). You can use the ACL to restrict

Strona 797 - Secure Shell Protocol

Chapter 53: Management Access Control ListSection VIII: Web Browser Management 816Creating a Management ACLTo create a Management ACL, perform the fol

Strona 798

AT-S62 User’s GuideSection VIII: Web Browser Management 817been permitted remote management access to the switch. If you enter a subnet. then any mana

Strona 799

Chapter 53: Management Access Control ListSection VIII: Web Browser Management 818Adding or Deleting an ACEYou can add or delete ACEs from the managem

Strona 800

AT-S62 User’s GuideSection VIII: Web Browser Management 819Displaying the Management ACLTo display the ACEs in the Management ACL, do the following:1.

Strona 801

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 82SNMPv1 and SNMPv2c OverviewThe Simple Network Management Program (SNMP) is

Strona 802 - Encryption Keys, PKI, and SSL

820Appendix AAT-S62 Default SettingsThis appendix lists the AT-S62 factory default settings. It contains the following sections:❑ Basic Switch Default

Strona 803 - Displaying Encryption Keys

AT-S62 User’s Guide821Basic Switch Default SettingsThis section lists the default settings for basic switch parameters. The following topics are cover

Strona 804

Appendix A: AT-S62 Default Settings822NoteLogin names and passwords are case-sensitive.RS-232 PortDefault SettingsThe following table lists the RS-232

Strona 805

AT-S62 User’s Guide823SwitchAdministrationDefault SettingsThe following table describes the switch administration default settings.SystemSoftwareDefau

Strona 806

Appendix A: AT-S62 Default Settings824Enhanced Stacking Default SettingThe following table lists the enhanced stacking default setting.Enhanced Stacki

Strona 807 - Displaying the SSL Settings

AT-S62 User’s Guide825SNMP Default SettingsThe following table describes the SNMPv1 and SNMPv2c default settings.SNMP Communities Setting DefaultSNMP

Strona 808

Appendix A: AT-S62 Default Settings826Port Configuration Default SettingsThe following table lists the port configuration default settings.Port Config

Strona 809

AT-S62 User’s Guide827Event Log Default SettingsThe following table lists the event log default settings.Event Log Setting DefaultStatus EnabledFull L

Strona 810

Appendix A: AT-S62 Default Settings828Quality of ServiceThe following table lists the default mappings of IEEE 802.1p priority levels to egress port p

Strona 811

AT-S62 User’s Guide829IGMP Snooping Default SettingsThe following table lists the IGMP Snooping default settings.IGMP Snooping Setting DefaultIGMP Sno

Strona 812

AT-S62 User’s GuideSection I: Basic Operations 83Community String NameYou must give the community string a name. The name can be from one to eight alp

Strona 813

Appendix A: AT-S62 Default Settings830Denial of Service Prevention Default SettingsThe following table lists the default settings for the Denial of Se

Strona 814

AT-S62 User’s Guide831STP, RSTP, and MSTP Default SettingsThis section provides the spanning tree, STP RSTP, and MSTP, default settings.Spanning TreeS

Strona 815 - Chapter 53

Appendix A: AT-S62 Default Settings832MSTP DefaultSettingsThe following table lists the MSTP default settings.Port Priority 128RSTP Setting DefaultMST

Strona 816 - Creating a Management ACL

AT-S62 User’s Guide833VLAN Default SettingsThis section provides VLAN default settings.VLAN Setting DefaultDefault VLAN Name Default_VLAN (all ports)M

Strona 817

Appendix A: AT-S62 Default Settings834GVRP Default SettingsThis section provides the default settings for GVRP.GVRP Setting DefaultStatus DisabledGIP

Strona 818 - Adding or Deleting an ACE

AT-S62 User’s Guide835MAC Address Security Default SettingsThe following table lists the MAC address security default settings.MAC Address Security Se

Strona 819 - Displaying the Management ACL

Appendix A: AT-S62 Default Settings836802.1x Port-Based Network Access Control Default SettingsThe following table describes the 802.1x Port Access Co

Strona 820 - AT-S62 Default Settings

AT-S62 User’s Guide837Web Server Default SettingsThe following table lists the web server default settings.Web Server Configuration Setting DefaultSta

Strona 821 - Basic Switch Default Settings

Appendix A: AT-S62 Default Settings838SSL Default SettingsThe following table lists the SSL default settings.SSL Setting DefaultMaximum Number of Sess

Strona 822 - SNTP Default

AT-S62 User’s Guide839PKI Default SettingsThe following table lists the PKI default settings, including the generate enrollment request settings.PKI S

Strona 823

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 84Each community string can have up to eight trap IP addresses.It does not m

Strona 824 - Switch State Slave

Appendix A: AT-S62 Default Settings840SSH Default SettingsThe following table lists the SSH default settings.SSH Setting DefaultStatus DisabledHost Ke

Strona 825 - SNMP Default Settings

AT-S62 User’s Guide841Server-Based Authentication Default SettingsThis section describes the server-based authentication, RADIUS, and TACACS+ client d

Strona 826

Appendix A: AT-S62 Default Settings842Management Access Control List Default SettingThe following table lists the default setting for the Management A

Strona 827 - Event Log Default Settings

843Appendix BSNMPv3 Configuration ExamplesThis appendix provides two examples of SNMPv3 configuration using the SNMPv3 Table menus and a worksheet to

Strona 828

Appendix B: SNMPv3 Configuration Examples844SNMPv3 Configuration ExamplesThis appendix provides SNMPv3 configuration examples for the following types

Strona 829

AT-S62 User’s Guide845Configure SNMPv3 SecurityToGroup TableUser Name:systemadmin24Security Model:v3Group Name: ManagersStorage Type: NonVolatileConfi

Strona 830

Appendix B: SNMPv3 Configuration Examples846Configure SNMPv3 View Table Menu View Name: internetView Subtree OID: 1.3.6.1 (or internet)Subtree Mask: V

Strona 831

AT-S62 User’s Guide847SNMPv3 Access Table MenuGroup NameSecurity ModelSecurity LevelRead View NameWrite View NameNotify View NameStorage TypeSNMPv3 Se

Strona 832 - MSTP Default

Appendix B: SNMPv3 Configuration Examples848Storage TypeSNMPv3 Target Parameters TableTarget Parameters NameUser (Security) NameSecurity ModelSecurity

Strona 833 - VLAN Default Settings

849IndexNumerics802.1x port-based network access controlaccess role, configuring 474, 788authentication process 465authenticator portconfiguring 476,

Strona 834 - GVRP Default Settings

AT-S62 User’s GuideSection I: Basic Operations 85Enabling or Disabling SNMP ManagementTo enable or disable SNMP management for the switch, perform the

Strona 835

Index850auto-negotiationconfiguring 100, 611, 612forced 105status 96Bback pressureconfiguring 104, 614default setting 826boot configuration fileconfig

Strona 836

AT-S62 User’s Guide851database storage 522deleting 531, 533described 519displaying 534modifying 531, 533validating 521certificates, SSLauthentication

Strona 837 - Web Server Default Settings

Index852EECB. See Electronic Code Book (ECB)edge portdefault setting 831described 336Multiple Spanning Tree Protocol (MSTP) 382Rapid Spanning Tree Pro

Strona 838 - SSL Default Settings

AT-S62 User’s Guide853Generic Attribute Registration Protocol (GARP)Applicant state machine 428defined 426diagram 427overview 426Registrar state machi

Strona 839 - PKI Default Settings

Index854IP Options attack 217Kkey exchange algorithms 498key pair ID, configuring 538LLand attack 214limited port security mode, described 455link sta

Strona 840 - SSH Default Settings

AT-S62 User’s Guide855MSTI association to a VLANcreating 378removing 379MSTI priority, defined 361MSTI. See Multiple Spanning Tree Instance (MSTI)mul

Strona 841

Index856PEM certificate format 538Ping of Death attack 216pinging 75, 595PKI certificatesadding to database 528certificate database 522chains 521creat

Strona 842 - Status Disabled

AT-S62 User’s Guide857port speedconfiguring 96, 611default setting 826port state, displaying, Rapid Spanning Tree Protocol (RSTP) 351port statistics,

Strona 843 - SNMPv3 Configuration Examples

Index858MCHECK 382parameters, displaying 760point-to-point port, configuring 350, 750port configuration, displaying 351port cost 350, 750port paramete

Strona 844

AT-S62 User’s Guide859SNMPdefault setting for remote management 821default settings 825SNMP communityconfiguring 680enabling 680SNMP community stringa

Strona 845 - Operator

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 86Setting the Authentication Failure TrapAs mentioned in the SNMP Overview s

Strona 846 - Worksheet

Index860modifyingstorage type 294target address retries 291target address tag list 292target address timeout 290target address UDP port 289target IP a

Strona 847

AT-S62 User’s Guide861displaying 112, 622STP ID parameter 442strict priority scheduling 194subnet mask 61, 588configuring 61, 588default setting 823Su

Strona 848

Index862setting 69Vversions supported (SSH) parameter 550, 800VID. See VLAN IDview type, modifying 250virtual LAN (VLAN)creating 400, 404, 762default

Strona 849

AT-S62 User’s GuideSection I: Basic Operations 87Creating an SNMP Community StringTo create a new SNMP community string, perform the following procedu

Strona 850

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 885. Enter the new SNMP community string. The name can be from one to fiftee

Strona 851

AT-S62 User’s GuideSection I: Basic Operations 89Modifying a Community StringTo modify a community string, perform the following procedure:1. From the

Strona 852

AT-S62 User’s Guide9Chapter 22Multiple VLAN Modes ...

Strona 853

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 90The menu options are described below:1 - Add Attributes to CommunityIf a c

Strona 854

AT-S62 User’s GuideSection I: Basic Operations 913. If you want to remove the IP address of a management workstation from the community string, enter

Strona 855

Chapter 5: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 92Do you want to change Community Status? (Y/N): [Yes/No] ->4. Type Y to

Strona 856

AT-S62 User’s GuideSection I: Basic Operations 93Displaying the SNMP Community StringsTo display the attributes of all the SNMP community strings on t

Strona 857

94Chapter 6Port ParametersThe chapter contains the procedures for viewing and adjusting the parameter settings for the individual ports on a switch. T

Strona 858

AT-S62 User’s GuideSection I: Basic Operations 95Displaying Port StatusTo display the current status and settings of the ports on the switch, perform

Strona 859

Chapter 6: Port ParametersSection I: Basic Operations 96NoteThe speed, duplex mode, and flow control settings will be blank for ports that have not es

Strona 860

AT-S62 User’s GuideSection I: Basic Operations 97Flow CtlThe flow control setting for the port. Possible values are:Disabled - No flow control on the

Strona 861

Chapter 6: Port ParametersSection I: Basic Operations 98Configuring Port ParametersTo configure the parameter settings of a port, perform the followin

Strona 862

AT-S62 User’s GuideSection I: Basic Operations 99If you are configuring multiple ports and the ports have different settings, the Port Configuration m

Komentarze do niniejszej Instrukcji

Brak uwag