Allied Telesis AT-8000S Podręcznik Użytkownika

Przeglądaj online lub pobierz Podręcznik Użytkownika dla Oprogramowanie Allied Telesis AT-8000S. Allied Telesis AT-8000S User`s guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 204
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Ethernet Switch

Layer 2Ethernet SwitchAT-8000S SeriesWeb Browser Interface User's Guide

Strona 2

Getting StartedStarting the ApplicationPage 11Figure 2: System General Page

Strona 3 - Table of Contents

Configuring InterfacesConfiguring VLANsPage 101• Select the interfaces displayed in the table.– Ports of Unit — Specifies the port and stacking member

Strona 4

Configuring InterfacesDefining MAC Based GroupsPage 102Defining MAC Based GroupsThe MAC Based Groups Page allows network managers to group VLANs based

Strona 5

Configuring InterfacesDefining MAC Based GroupsPage 103• Group ID — Defines the protocol group ID to which the interface is added.• VLAN ID — Attaches

Strona 6

Configuring InterfacesDefining MAC Based GroupsPage 104To add a mapped group:1. Click Layer 2 > MAC Based Groups. The MAC Based Groups Page opens:2

Strona 7

Configuring System LogsPage 105Section 8. Configuring System LogsThis section provides information for managing system logs. System logs enable viewin

Strona 8 - Contacting Allied Telesis

Configuring System LogsPage 106The Event Log Page page contains fields for defining which events are recorded to which logs. It contains fields for en

Strona 9 - Section 1. Getting Started

Configuring System LogsPage 107• IP Address — Displays the defined IP address of the syslog server.• Minimum Severity — Indicates the defined minimum

Strona 10 - Figure 2: System General Page

Configuring System LogsPage 108• Facility — Defines an application from which system logs are sent to the remote server. Only one facility can be assi

Strona 11

Configuring System LogsPage 109Figure 80: View Flash Log PageThe View Flash Log Page and View Temporary Log Page list the following information:• Log

Strona 12 - User Interface Components

Configuring Spanning TreeConfiguring Classic Spanning TreePage 110Section 9. Configuring Spanning TreeSpanning Tree Protocol (STP) provides tree topog

Strona 13 - Using the Management Buttons

Getting StartedUsing the Web Browser InterfacePage 12Using the Web Browser InterfaceThis section provides general information about the interface, and

Strona 14 - Figure 5: Add Local User Page

Configuring Spanning TreeConfiguring Classic Spanning TreePage 111Defining STP PropertiesThe Spanning Tree Page contains parameters for enabling and c

Strona 15 - Logging Out

Configuring Spanning TreeConfiguring Classic Spanning TreePage 112• Path Cost Default Values — Specifies the method used to assign default path cost t

Strona 16 - Resetting the Device

Configuring Spanning TreeConfiguring Classic Spanning TreePage 113Defining STP InterfacesNetwork administrators can assign STP settings to a specific

Strona 17

Configuring Spanning TreeConfiguring Classic Spanning TreePage 114• Port Fast — Indicates if Fast Link is enabled on the port. If Fast Link mode is en

Strona 18

Configuring Spanning TreeConfiguring Classic Spanning TreePage 115Figure 83: Spanning Tree Configuration PageIn addition to the STP Interface Configur

Strona 19 - Setting the System Clock

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 116Configuring Rapid Spanning TreeWhile Classic STP prevents Layer 2 forwarding loops in

Strona 20 - Configuring SNTP

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 117• Mode — Displays the current STP mode. The STP mode is selected in the Spanning Tree

Strona 21 - Broadcast Time Information

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 118Configuring Multiple Spanning TreeMultiple Spanning Tree Protocol (MSTP) provides d

Strona 22

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 119The MSTP Page contains the following fields: • Region Name — User-defined STP regio

Strona 23

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 120The MSTP Interface Settings Page contains the following fields: • Instance ID — Lis

Strona 24

Getting StartedUsing the Web Browser InterfacePage 13User Interface ComponentsThe System General Page example shows the interface components.Figure 4:

Strona 25 - • Defining Access Control

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1213. Define the fields.4. Click Apply. MSTP is defined for the selected interface.5.

Strona 26 - Defining Access Profiles

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 122Defining MSTP Instance MappingsNetwork administrators can assign MSTP mapping to a

Strona 27

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 123Defining MSTP Instance SettingsMSTP maps VLANs into STP instances. Packets assigned

Strona 28

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1243. Define the fields.4. Click Apply. MSTP is defined for the selected instance, and

Strona 29

Configuring Multicast ForwardingPage 125Section 10.Configuring Multicast ForwardingMulticast forwarding allows a single packet to be forwarded to mult

Strona 30 - Defining Profile Rules

Configuring Multicast ForwardingPage 126Configuring IGMP SnoopingWhen IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. Th

Strona 31

Configuring Multicast ForwardingPage 127• IGMP Snooping Status — Indicates if IGMP snooping is enabled on the VLAN. The possible field values are: – E

Strona 32

Configuring Multicast ForwardingPage 128Figure 92: IGMP Configuration PageIn addition to the IGMP Page, the IGMP Configuration Page contains the follo

Strona 33

Configuring Multicast ForwardingPage 129Figure 93: Multicast Group PageThe Multicast Group Page contains the following fields:• Enable Bridge Multicas

Strona 34

Configuring Multicast ForwardingPage 130Figure 94: Add Multicast Group Page 4. Select the VLAN ID.5. Enter the Bridge Multicast MAC Address and the Br

Strona 35

Getting StartedUsing the Web Browser InterfacePage 14Using the Management Buttons Management buttons provide an easy method of configuring device info

Strona 36

Configuring Multicast ForwardingPage 131Defining Multicast Forward All SettingsMulticast forwarding enables transmitting packets from either a specifi

Strona 37

Configuring Multicast ForwardingPage 1322. Select interfaces to modify.3. Click Modify. The Multicast Forward All Configuration Page opens:Figure 97:

Strona 38 - Configuring TACACS+

Configuring SNMPPage 133Section 11. Configuring SNMPSimple Network Management Protocol (SNMP) provides a method for managing network devices. Equipmen

Strona 39

Configuring SNMPPage 134Enabling SNMPThe SNMP Global Page provides fields for globally enabling and configuring SNMP on the device.To enable SNMP: 1.

Strona 40

Configuring SNMPPage 135Defining SNMP CommunitiesAccess rights are managed by defining communities in the SNMP Community Page. When the community name

Strona 41 - Configuring RADIUS

Configuring SNMPPage 136• Access Mode — Defines the access rights of the community. The possible field values are:– Read Only — Management access is r

Strona 42

Configuring SNMPPage 137Figure 101:Community Configuration Page3. Define the Basic or Advanced configuration of the community.4. Click Apply. The SNMP

Strona 43

Configuring SNMPPage 138Defining SNMP GroupsThe SNMP Group Page provides information for creating SNMP groups, and assigning SNMP access control privi

Strona 44 - Configuring Local Users

Configuring SNMPPage 1392. Click Add. The Add Group Page opens:Figure 103:Add Group Page3. Define the Group Name, Security Level, Security Model, and

Strona 45

Configuring SNMPPage 140Defining SNMP UsersThe SNMP Users Page enables assigning system users to SNMP groups, as well as defining the user authenticat

Strona 46 - Defining Line Passwords

Getting StartedUsing the Web Browser InterfacePage 15Adding, Modifying and Deleting InformationThe WBI contains and tables for configuring devices. Us

Strona 47 - Configuring Network Security

Configuring SNMPPage 141• Authentication — Displays the method used to authenticate users. The possible field values are:– MD5 Key — Users are authent

Strona 48 - Figure 29: Port Security Page

Configuring SNMPPage 142• Authentication Key — Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are en

Strona 49

Configuring SNMPPage 143Defining SNMP ViewsThe SNMP views provide or block access to device features or portions of features. Feature access is grante

Strona 50 - Defining 802.1x Port Access

Configuring SNMPPage 144Figure 109:Add SNMP VIew Page3. Define the View Name field.4. Select the Subtree ID Tree using one of the following options:–

Strona 51

Configuring SNMPPage 145Defining Notification RecipientsThe SNMP Notify Page contains fields for defining SNMP notification recipients. the page conta

Strona 52

Configuring SNMPPage 146SNMPv1,2c Notification RecipientThe SNMP v1, v2c Recipient table contains the following fields:• Recipients IP — Displays the

Strona 53

Configuring SNMPPage 147Figure 111: Add Notify Page 3. Define the relevant fields.4. Click Apply. The notification recipient settings are saved and th

Strona 54 - Enabling Storm Control

Configuring SNMPPage 148Figure 112:SNMP Notify Configuration Page3. Define the fields.4. Click Apply. The SNMP Notification configuration is modified,

Strona 55

Configuring SNMPPage 149Defining Notification FiltersThe SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a

Strona 56 - Defining Access Control

Configuring SNMPPage 150To add an SNMP notification filter:1. Click the Add button. The Add SNMP Notification Filter Page opens:Figure 114:Add SNMP No

Strona 57

Getting StartedLogging OutPage 164. Define the fields. 5. Click Apply. The fields are modified, and the information is saved to the device. To delete

Strona 58 - Adding ACE Rules

Configuring Power Over EthernetPage 151Section 12.Configuring Power Over EthernetThis section describes configuring Power over Ethernet (PoE) for an A

Strona 59

Configuring Power Over EthernetPage 152Figure 115:Power Over Ethernet Page The Power Over Ethernet Page contains the following fields:Global PoE Confi

Strona 60

Configuring Power Over EthernetPage 153Defining Power Over Ethernet ConfigurationTo modify PoE port settings: 1. In the Power Over Ethernet Page Zoom

Strona 61 - Defining IP Based ACL

Configuring Power Over EthernetPage 154– Fault — Indicates one of the following:– The powered device test has failed. For example, a port could not be

Strona 62

Configuring ServicesPage 155Section 13.Configuring ServicesThis section describes Quality of Service related configurations. QoS supports activating o

Strona 63

Configuring ServicesPage 156Enabling Class of Service (CoS)The CoS Page enables configuring the CoS ports or trunks on the device.To configure CoS por

Strona 64

Configuring ServicesPage 157• Select the interfaces displayed in the table.– Ports of Unit — Specifies the port and stacking member for which the CoS

Strona 65

Configuring ServicesPage 158Configuring CoS Queueing and SchedulingThe CoS Queuing & Scheduling Page provides fields for configuring CoS Priority

Strona 66

Configuring ServicesPage 159Mapping CoS Values to QueuesThe Configure CoS Page contains fields for classifying CoS settings to traffic queues.To set C

Strona 67 - Defining ACL Binding

Configuring ServicesPage 160Mapping DSCP Values to QueuesThe Configure DSCP Page contains fields for classifying DSCP settings to traffic queues. For

Strona 68

Getting StartedResetting the DevicePage 17Resetting the DeviceThe Reset option enables resetting the device from a remote location. NoteSave all chang

Strona 69 - • Defining Trusted Interfaces

Configuring ServicesPage 161The Configure DSCP Page contains the following fields:• Restore Defaults — Restores the device factory defaults for mappin

Strona 70

Configuring ServicesPage 162As a default the Bandwidth Page opens displaying the port options. The fields are identical when displaying the trunk CoS.

Strona 71

System UtilitiesPage 163Section 14.System UtilitiesThe configuration file structure involves the following configuration files:• Startup Configuration

Strona 72 - Defining Trusted Interfaces

System UtilitiesPage 164Restoring the Default Configurationin the System Utilities Page, the Reset to Factory Defaults function restores the Configura

Strona 73

System UtilitiesPage 165To reset the configuration file to defaults with reboot: 1. Check the Reboot Switch After Resetting to Defaults option.2. Sele

Strona 74

System UtilitiesPage 166• Destination File — Defines the type of file that the device creates. If the TFTP Operation is Firmware, the possible values

Strona 75

System UtilitiesPage 167Viewing Integrated Cable TestsThe Cable Test Page contains fields for performing tests on copper cables. Cable testing provide

Strona 76 - Section 6. Configuring Ports

System UtilitiesPage 168• Cable Length — Indicates the approximate cable length. This test can only be performed when the port is up and operating at

Strona 77 - Configuring Ports

System UtilitiesPage 169Viewing Optical TransceiversThe Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Opti

Strona 78

System UtilitiesPage 170Resetting the DeviceThe Reset page enables the user to reset the system. Save all changes to the Running Configuration file be

Strona 79

Defining System InformationPage 18Section 2. Defining System InformationThe System General Page contains general device information, including system

Strona 80 - Configuring Port Mirroring

Viewing StatisticsViewing Device StatisticsPage 171Section 15.Viewing StatisticsThe device provides statistics for RMON, interfaces, and Etherlike. Th

Strona 81

Viewing StatisticsViewing Device StatisticsPage 172The Interface Statistics Page contains the following fields:• Select the interfaces displayed in th

Strona 82

Viewing StatisticsViewing Device StatisticsPage 173Viewing Etherlike Statistics The Etherlike Statistics Page displays interface statistics. To view E

Strona 83 - Aggregating Ports

Viewing StatisticsViewing Device StatisticsPage 174• Excessive Collisions — Displays the number of excessive collisions received on the selected inter

Strona 84

Viewing StatisticsManaging RMON StatisticsPage 175Managing RMON StatisticsThis section contains the following topics: • Viewing RMON Statistics• Confi

Strona 85

Viewing StatisticsManaging RMON StatisticsPage 176• Refresh Rate — Defines the frequency of the RMON statistics updates. The possible field values are

Strona 86

Viewing StatisticsManaging RMON StatisticsPage 177Configuring RMON HistoryThe RMON History Page contains information about samples of data taken from

Strona 87 - Defining Port Trunking

Viewing StatisticsManaging RMON StatisticsPage 1782. Click Add. The Add RMON History Page opens:Figure 134:Add RMON History PageIn addition to the RMO

Strona 88

Viewing StatisticsManaging RMON StatisticsPage 179Viewing the RMON History TableThe RMON History Table Page contains interface specific statistical ne

Strona 89 - Configuring LACP

Viewing StatisticsManaging RMON StatisticsPage 180• CRC Align Errors — Displays the number of CRC and Align errors that have occurred on the interface

Strona 90

Defining System InformationPage 19• Default Gateway — The IP address of a router for remote management of the device. The address must be entered in t

Strona 91 - Defining MAC Addresses

Viewing StatisticsManaging RMON StatisticsPage 181Configuring RMON EventsThe RMON Events Page contains fields for defining, modifying and viewing RMON

Strona 92

Viewing StatisticsManaging RMON StatisticsPage 182Figure 138:Add RMON Events Page3. Define the Community, Description, Type and Owner fields.4. Click

Strona 93

Viewing StatisticsManaging RMON StatisticsPage 183Viewing the RMON Events LogsThe RMON Events Logs Page contains interface specific statistical networ

Strona 94 - Configuring VLANs

Viewing StatisticsManaging RMON StatisticsPage 184Defining RMON Alarms The RMON Alarm Page contains fields for setting network alarms. Network alarms

Strona 95 - Defining VLAN Properties

Viewing StatisticsManaging RMON StatisticsPage 185• Rising Event — Displays the event that triggers the specific alarm. The possible field values are

Strona 96

Viewing StatisticsManaging RMON StatisticsPage 186Figure 143:Alarm Configuration Page3. Define the fields.4. Click Apply. The RMON alarm is saved, and

Strona 97

Managing StackingStacking OverviewPage 187Section 16.Managing StackingThis section describes the stacking control management and includes the followin

Strona 98

Managing StackingStacking OverviewPage 188Stacking Chain TopologyIn a chain topology, there are two units that have only one neighbor. Every unit has

Strona 99 - Defining GVRP

Managing StackingStacking OverviewPage 189Each port in the stack has a specific Unit ID, port type, and port number, which are part of both the config

Strona 100 - Page 101

Managing StackingConfiguring Stacking ManagementPage 190Configuring Stacking ManagementThe Stacking Page allows network managers to either reset the e

Strona 101 - Defining MAC Based Groups

Configuring System TimePage 20Section 3. Configuring System TimeThe System Time Page provides information for configuring system time parameters, incl

Strona 102 - Page 103

Downloading Software with CLIConnecting a TerminalPage 191Appendix A. Downloading Software with CLIThis section describes how to download system files

Strona 103 - Configuring Interfaces

Downloading Software with CLIInitial ConfigurationPage 192Initial ConfigurationBefore a device can download system software, the device must have an i

Strona 104 - Defining Log Settings

Downloading Software with CLIDownloading SoftwarePage 193To check the configuration, enter the command “show ip interface” as illustrated in the follo

Strona 105 - Page 106

Downloading Software with CLIDownloading SoftwarePage 1942. Enter the copy command to download the boot file.3. Enter the “bootvar” command to determi

Strona 106 - Adding Log Servers

Downloading Software with CLIDownloading SoftwarePage 1955. Enter the “copy” command to download the system file.6. Reboot the device. The device boot

Strona 107 - Modifying Log Servers

Downloading Software with CLIDownloading SoftwarePage 196Stacking Member Software DownloadEnsure the stack has been correctly connected as described i

Strona 108 - Page 109

Downloading Software with CLIDownloading SoftwarePage 1975. Enter the “copy” command to download the system file.6. Reboot the devices being updated.

Strona 109 - Page 110

System DefaultsPage 197Appendix B. System DefaultsThis section contains the system defaults, and includes the following topics:• RS-232 Port Settings•

Strona 110 - Defining STP Properties

System DefaultsRS-232 Port SettingsPage 198RS-232 Port SettingsThe following table contains the RS-232 port setting defaults: Port DefaultsThe followi

Strona 111 - Page 112

System DefaultsConfiguration DefaultsPage 199Configuration DefaultsThe following are the initial device configuration defaults: Security DefaultsThe f

Strona 112 - Defining STP Interfaces

Allied Telesis AT-8000S Web Browser Interface User’s Guide

Strona 113 - Page 114

Configuring System TimePage 21The Clock Source and System Time sections of the System Time Page contain the following fields:• Clock Source — The sour

Strona 114 - Configuring Spanning Tree

System DefaultsSpanning Tree DefaultsPage 200Spanning Tree DefaultsThe following are the spanning tree defaults:Address Table DefaultsThe following th

Strona 115 - Page 116

System DefaultsTrunking DefaultsPage 201Trunking DefaultsThe following are the trunking defaults:Multicast DefaultsThe following are the Multicast def

Strona 116 - Page 117

IndexPage 202IndexSymbols802.1x port access 51AAbsolute 186Access level 45access profiles 27rules 31ACE 57ACL 57, 68ACL Binding 68Alarms 186Alert 107A

Strona 117 - Defining MSTP Properties

IndexPage 203GGARP VLAN Registration Protocol (GVRP) 102Guest VLAN 51GVRP 103configuration 102HHost 105HTTP 29, 38IIGMPv1 and 2 128IGMPv3 128Informati

Strona 118 - Defining MSTP Interfaces

IndexPage 204SSamples 179Scheduling 160Secure HTTP 29, 38Secure Telnet 29, 37security802.1x port access 51server based authentication methods 39server

Strona 119 - Page 120

Configuring System TimePage 22Broadcast Time InformationBroadcast information is used when the server IP address is unknown. When a broadcast message

Strona 120

Configuring System TimePage 23• From — Indicates the time that DST begins in countries other than the USA and Europe, in the format Day/Month/Year in

Strona 121

Configuring System TimePage 24• Belgium — From the last weekend of March until the last weekend of October.• Brazil — From the third Sunday in October

Strona 122 - Page 123

Configuring System TimePage 25• Spain — From the last weekend of March until the last weekend of October. • Sweden — From the last weekend of March un

Strona 123

Configuring Device SecurityPage 26Section 4. Configuring Device SecurityThis section describes setting security parameters for ports, device managemen

Strona 124 - • Configuring IGMP Snooping

Configuring Device SecurityConfiguring Management SecurityPage 27Configuring Management SecurityThis section provides information for configuring devi

Strona 125 - Configuring IGMP Snooping

Configuring Device SecurityConfiguring Management SecurityPage 28Figure 10: Access Profile PageThe Access Profile Page contains a table listing the cu

Strona 126 - Page 127

Configuring Device SecurityConfiguring Management SecurityPage 29Figure 11: Add Access Profile PageThe Add Access Profile Page contains the following

Strona 127 - Page 128

Configuring Device SecurityConfiguring Management SecurityPage 30• Action — Defines the action attached to the access rule. The possible field values

Strona 128 - Page 129

Table of ContentsPage 3 Table of ContentsPreface...

Strona 129 - Page 130

Configuring Device SecurityConfiguring Management SecurityPage 31Defining Profile RulesAccess profiles can contain up to 128 rules that determine whic

Strona 130 - Page 131

Configuring Device SecurityConfiguring Management SecurityPage 32• Management Method — Defines the management method for which the rule is defined. Us

Strona 131 - Page 132

Configuring Device SecurityConfiguring Management SecurityPage 33To modify an access rule:1. Click Mgmt. Security > Profile Rules: The Profile Rule

Strona 132 - Section 11. Configuring SNMP

Configuring Device SecurityConfiguring Management SecurityPage 34Defining Authentication ProfilesAuthentication profiles allow network administrators

Strona 133 - Enabling SNMP

Configuring Device SecurityConfiguring Management SecurityPage 35– RADIUS — Authenticates the user at the RADIUS server. For more information, see Def

Strona 134 - Defining SNMP Communities

Configuring Device SecurityConfiguring Management SecurityPage 364. Enter the Profile Name.5. Using the arrows, move the method(s) from the Optional M

Strona 135 - Page 136

Configuring Device SecurityConfiguring Management SecurityPage 37Mapping Authentication ProfilesAfter authentication profiles are defined, they can be

Strona 136 - Configuring SNMP

Configuring Device SecurityConfiguring Management SecurityPage 38• Secure HTTP — Indicates that authentication methods are used for secure HTTP access

Strona 137 - Defining SNMP Groups

Configuring Device SecurityConfiguring Server Based AuthenticationPage 39Configuring Server Based AuthenticationNetwork administrators assign authenti

Strona 138 - Figure 103:Add Group Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 40The TACACS+ Page contains the following fields:• Timeout for Reply — Defines

Strona 139 - Defining SNMP Users

Table of ContentsPage 4 Configuring DHCP Snooping ... 70D

Strona 140 - Page 141

Configuring Device SecurityConfiguring Server Based AuthenticationPage 41To modify TACACS+ server settings:1. Click Mgmt. Protocols > TACACS+. The

Strona 141

Configuring Device SecurityConfiguring Server Based AuthenticationPage 42Configuring RADIUSRemote Authorization Dial-In User Service (RADIUS) servers

Strona 142 - Defining SNMP Views

Configuring Device SecurityConfiguring Server Based AuthenticationPage 43• Authentication Port — Identifies the authentication port. The authenticatio

Strona 143 - Figure 109:Add SNMP VIew Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 44Figure 24: RADIUS Configuration Page3. Define the relevant fields.4. Click Ap

Strona 144 - Page 145

Configuring Device SecurityConfiguring Server Based AuthenticationPage 45Configuring Local UsersNetwork administrators can define users, passwords, an

Strona 145 - SNMPv3 Notification Recipient

Configuring Device SecurityConfiguring Server Based AuthenticationPage 46Figure 26: Add Local User PageIn addition to the fields in the Local Users Pa

Strona 146 - Figure 111: Add Notify Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 47Defining Line PasswordsNetwork administrators can define line passwords in th

Strona 147

Configuring Device SecurityConfiguring Network SecurityPage 48Configuring Network SecurityNetwork security manages locked ports.Port-based authenticat

Strona 148 - Defining Notification Filters

Configuring Device SecurityConfiguring Network SecurityPage 49Figure 29: Port Security PageThe Port Security Page displays the Zoom View of the select

Strona 149 - Page 150

Configuring Device SecurityConfiguring Network SecurityPage 50Figure 30: Port Security Configuration PageThe Port Security Configuration Page contains

Strona 150 - Page 151

Table of ContentsPage 5 Configuring SNMP ...

Strona 151 - Page 152

Configuring Device SecurityConfiguring Network SecurityPage 51Defining 802.1x Port AccessThe 802.1x Port Access Page allows enabling port access globa

Strona 152 - Page 153

Configuring Device SecurityConfiguring Network SecurityPage 52The 802.1x Port Access Page also displays the Zoom View of the selected stacking member’

Strona 153 - Page 154

Configuring Device SecurityConfiguring Network SecurityPage 53The Port Authentication Settings Page contains the following port authentication paramet

Strona 154 - Page 155

Configuring Device SecurityConfiguring Network SecurityPage 542. Click Apply. The port authentication configuration is saved and the device is updated

Strona 155 - Page 156

Configuring Device SecurityConfiguring Network SecurityPage 55Enabling Storm ControlStorm control limits the amount of unknown Unicast, Multicast and

Strona 156 - Page 157

Configuring Device SecurityConfiguring Network SecurityPage 56The Storm Control Page displays the Zoom View of the selected stacking member’s (defined

Strona 157 - Page 158

Configuring Device SecurityDefining Access ControlPage 57Defining Access ControlAccess Control Lists (ACL) allow network managers to define classifica

Strona 158 - Mapping CoS Values to Queues

Configuring Device SecurityDefining Access ControlPage 58The MAC Based ACL Page contains the following fields:• ACL Name — Displays the specific MAC b

Strona 159 - Mapping DSCP Values to Queues

Configuring Device SecurityDefining Access ControlPage 59Figure 36: Add MAC Based ACL Page3. In the ACL Name field, type a name for the ACL.4. Enable

Strona 160 - Configuring QoS Bandwidth

Configuring Device SecurityDefining Access ControlPage 60Figure 37: Add MAC Based ACE Page3. Define the fields.4. Click Apply. The MAC Based ACE rule

Strona 161 - Page 162

Table of ContentsPage 6 Downloading Software with CLI... 191Con

Strona 162 - Section 14.System Utilities

Configuring Device SecurityDefining Access ControlPage 613. Define the fields.4. Click Apply. The MAC Based ACL configuration is defined, and the devi

Strona 163 - Page 164

Configuring Device SecurityDefining Access ControlPage 62Defining IP Based ACLThe IP Based ACL Page contains information for defining IP Based ACLs, i

Strona 164 - Page 165

Configuring Device SecurityDefining Access ControlPage 63– TCP — Transmission Control Protocol (TCP). Enables two hosts to communicate and exchange da

Strona 165 - Page 166

Configuring Device SecurityDefining Access ControlPage 64• Destination– IP Address — Matches the destination port IP address to which packets are addr

Strona 166 - Page 167

Configuring Device SecurityDefining Access ControlPage 65Figure 40: Add IP Based ACL PageIn addition to the IP Based ACL Page, the Add IP Based ACL Pa

Strona 167 - System Utilities

Configuring Device SecurityDefining Access ControlPage 66Adding ACE Rules1. Click Network Security > IP Based ACL. The IP Based ACL Page opens.2. C

Strona 168 - Viewing Optical Transceivers

Configuring Device SecurityDefining Access ControlPage 67Figure 42: IP Based ACL Configuration Page3. Define the fields.4. Click Apply. The IP Based A

Strona 169

Configuring Device SecurityDefining Access ControlPage 68Defining ACL BindingWhen an ACL is bound to an interface, all the ACE rules that have been de

Strona 170 - Section 15.Viewing Statistics

Configuring Device SecurityDefining Access ControlPage 69Figure 44: ACL Binding ConfigurationThe ACL Binding Configuration contains the following fiel

Strona 171 - Page 172

Configuring DHCP SnoopingPage 70Section 5. Configuring DHCP SnoopingDHCP Snooping expands network security by providing an extra layer of security bet

Strona 172 - Viewing Etherlike Statistics

PrefaceWeb Browser Interface User’s Guide OverviewPage 7PrefaceThis guide contains instructions on how to configure an AT-8000S Series Layer 2+ Gigabi

Strona 173 - Page 174

Configuring DHCP SnoopingPage 71Figure 45: DHCP Snooping General PageThe DHCP Snooping General Page contains the following fields:• Enable DHCP Snoopi

Strona 174 - Managing RMON Statistics

Configuring DHCP SnoopingPage 72• DHCP Option 82 Insertion — DHCP Option 82 attaches authentication messages to the packets sent to DHCP Server via TC

Strona 175 - Page 176

Configuring DHCP SnoopingPage 73Defining Trusted InterfacesThe Trusted Interfaces Page allows network manager to define Trusted interfaces. Trusted in

Strona 176 - Configuring RMON History

Configuring DHCP SnoopingPage 742. From the global Interface field, define the specific port or trunk.3. In the table, select an interface and click M

Strona 177 - Viewing Statistics

Configuring DHCP SnoopingPage 75Binding Addresses to the DHCP Snooping DatabaseThe Binding Database Page contains parameters for querying and adding I

Strona 178 - Page 179

Configuring DHCP SnoopingPage 76Query ResultsThe Query Results table contains the following fields:• MAC Address — Indicates the MAC address found dur

Strona 179 - Page 180

Configuring PortsSetting Ports ConfigurationsPage 77Section 6. Configuring PortsPort Configuration includes the following procedures for configuring p

Strona 180 - Configuring RMON Events

Configuring PortsSetting Ports ConfigurationsPage 78The Port Settings Page contains the Zoom View of the device ports. The possible port settings are:

Strona 181

Configuring PortsSetting Ports ConfigurationsPage 79The Port Setting Configuration Page contains the following fields:• Port— Lists the names of confi

Strona 182 - Viewing the RMON Events Logs

Configuring PortsSetting Ports ConfigurationsPage 80• Admin Advertisement — Defines the auto negotiation setting the port advertises. The possible fie

Strona 183 - Defining RMON Alarms

PrefaceIntended AudiencePage 8• Section 16, “Managing Stacking” — Provides information for stacking, including a stacking overview. • Appendix A, “Dow

Strona 184 - Page 185

Configuring PortsSetting Ports ConfigurationsPage 81Configuring Port MirroringPort mirroring monitors and mirrors network traffic by forwarding copies

Strona 185

Configuring PortsSetting Ports ConfigurationsPage 82• Status — Indicates if the port is currently monitored. The possible field values are:– Active —

Strona 186 - Section 16.Managing Stacking

Configuring PortsSetting Ports ConfigurationsPage 833. Define the Type field.4. Click Apply. The Port mirroring is modified, and the device is updated

Strona 187 - Stacking Members and Unit ID

Configuring PortsAggregating PortsPage 84Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a single

Strona 188 - Exchanging Stacking Members

Configuring PortsAggregating PortsPage 85Figure 56: Trunk Settings PageThe Trunk Settings Page displays information about the currently defined trunks

Strona 189 - Figure 144:Stacking Page

Configuring PortsAggregating PortsPage 86• LACP — Indicates if LACP is enabled on the trunk. The possible values are:– Enable — LACP is enabled on the

Strona 190 - Connecting a Terminal

Configuring PortsAggregating PortsPage 87• Current Status — Indicates whether the trunk is currently operational or non-operational. The possible fiel

Strona 191 - Initial Configuration

Configuring PortsAggregating PortsPage 88• PVE — Enables a port to be a Private VLAN Edge (PVE) port. When a port is defined as PVE, it bypasses the F

Strona 192 - Downloading Software

Configuring PortsAggregating PortsPage 89Figure 59: Port Trunking Configuration PageIn addition to the fields in the The Port Trunking Page, the Port

Strona 193 - Downloading Software with CLI

Configuring PortsAggregating PortsPage 90Configuring LACPTrunk ports can contain different media types if the ports are operating at the same speed. A

Strona 194

Getting StartedStarting the ApplicationPage 10Section 1. Getting StartedThis section provides an introduction to the Web Browser Interface, and includ

Strona 195

Configuring PortsAggregating PortsPage 91Figure 61: LACP Configuration Page3. Define the fields.4. Click Apply. The LACP settings are saved and the de

Strona 196

Configuring InterfacesPage 92Section 7. Configuring InterfacesThis section contains information on configuring the interfaces of the device.This secti

Strona 197 - Appendix B. System Defaults

Configuring InterfacesPage 93The MAC Address Page contains the following fields:• View Static — Displays the static addresses assigned to the ports on

Strona 198 - RS-232 Port Settings

Configuring InterfacesPage 94To delete all MAC addresses: 1. Click Layer 2 > MAC Address. The MAC Address Page opens.2. Click Delete in the Delete

Strona 199 - System Time Defaults

Configuring InterfacesConfiguring VLANsPage 95Configuring VLANs This section describes how to create and configure Virtual LANs (VLANs).VLANs are logi

Strona 200 - VLAN Defaults

Configuring InterfacesConfiguring VLANsPage 96Defining VLAN PropertiesThe VLAN Page provides information and global parameters for configuring and wor

Strona 201 - QoS Defaults

Configuring InterfacesConfiguring VLANsPage 97• Interface Status — Indicates the interface’s membership status in the VLAN. The possible field values

Strona 202 - Page 202

Configuring InterfacesConfiguring VLANsPage 98Defining VLAN Interface SettingsThe VLAN Interface Page contains fields for managing ports that are part

Strona 203 - Page 203

Configuring InterfacesConfiguring VLANsPage 99• PVID — Port Default VLAN ID. Assigns a VLAN ID to untagged packets. The possible values are 1-4094. VL

Strona 204 - Page 204

Configuring InterfacesConfiguring VLANsPage 100Defining GVRPThe GVRP Page enables users to configure GARP VLAN Registration Protocol (GVRP) on the dev

Komentarze do niniejszej Instrukcji

Brak uwag