Contents
12
Appendix B: SNMPv3 Configuration Examples
........................................................................................499
SNMPv3 Configuration Examples...................................................................................................................500
SNMPv3 Manager Configuration..............................................................................................................500
SNMPv3 Operator Configuration..............................................................................................................501
SNMPv3 Worksheet .................................................................................................................................502
Appendix C: Features and Standards
........................................................................................................505
10/100/1000Base-T Twisted Pair Ports ..........................................................................................................506
Denial of Service Defenses.............................................................................................................................506
Ethernet Protection Switching Ring Snooping ................................................................................................506
Fiber Optic Ports (AT-9408LC/SP Switch) ......................................................................................................507
File System .....................................................................................................................................................507
DHCP and BOOTP Clients .............................................................................................................................507
Internet Protocol Multicasting..........................................................................................................................507
Internet Protocol Version 4 Routing ................................................................................................................507
MAC Address Table........................................................................................................................................508
Management Access and Security .................................................................................................................508
Management Access Methods........................................................................................................................509
Management Interfaces ..................................................................................................................................509
Management MIBs..........................................................................................................................................509
Port Security ...................................................................................................................................................510
Port Trunking and Mirroring ............................................................................................................................510
Spanning Tree Protocols ................................................................................................................................510
System Monitoring ..........................................................................................................................................510
Traffic Control .................................................................................................................................................511
Virtual LANs ....................................................................................................................................................511
Virtual Router Redundancy Protocol...............................................................................................................512
Appendix D: MIB Objects
............................................................................................................................513
Access Control Lists .......................................................................................................................................514
Class of Service ..............................................................................................................................................515
Date, Time, and SNTP Client..........................................................................................................................516
Denial of Service Defenses.............................................................................................................................517
Enhanced Stacking .........................................................................................................................................518
GVRP..............................................................................................................................................................519
MAC Address Table........................................................................................................................................521
Management Access Control List ...................................................................................................................522
Miscellaneous .................................................................................................................................................523
Port Mirroring ..................................................................................................................................................524
Quality of Service............................................................................................................................................525
Port Configuration and Status.........................................................................................................................527
Spanning Tree ................................................................................................................................................528
Static Port Trunk .............................................................................................................................................529
VLANs.............................................................................................................................................................530
Index
..............................................................................................................................................................533
Summary of Contents for AT-S63
Page 14: ...Figures 14 ...
Page 18: ...Tables 18 ...
Page 28: ...28 Section I Basic Operations ...
Page 58: ...Chapter 1 Overview 58 ...
Page 76: ...Chapter 2 AT 9400Ts Stacks 76 Section I Basic Operations ...
Page 96: ...Chapter 5 MAC Address Table 96 Section I Basic Operations ...
Page 114: ...Chapter 8 Port Mirror 114 Section I Basic Operations ...
Page 116: ...116 Section II Advanced Operations ...
Page 146: ...Chapter 12 Access Control Lists 146 Section II Advanced Operations ...
Page 176: ...Chapter 14 Quality of Service 176 Section II Advanced Operations ...
Page 196: ...196 Section III Snooping Protocols ...
Page 204: ...Chapter 18 Multicast Listener Discovery Snooping 204 Section III Snooping Protocols ...
Page 216: ...Chapter 20 Ethernet Protection Switching Ring Snooping 216 Section III Snooping Protocols ...
Page 218: ...218 Section IV SNMPv3 ...
Page 234: ...234 Section V Spanning Tree Protocols ...
Page 268: ...268 Section VI Virtual LANs ...
Page 306: ...Chapter 27 Protected Ports VLANs 306 Section VI Virtual LANs ...
Page 320: ...320 Section VII Internet Protocol Routing ...
Page 360: ...Chapter 30 BOOTP Relay Agent 360 Section VII Routing ...
Page 370: ...Chapter 31 Virtual Router Redundancy Protocol 370 Section VII Routing ...
Page 372: ...372 Section VIII Port Security ...
Page 402: ...Chapter 33 802 1x Port based Network Access Control 402 Section VIII Port Security ...
Page 404: ...404 Section IX Management Security ...
Page 436: ...Chapter 36 PKI Certificates and SSL 436 Section IX Management Security ...
Page 454: ...Chapter 38 TACACS and RADIUS Protocols 454 Section IX Management Security ...
Page 462: ...Chapter 39 Management Access Control List 462 Section IX Management Security ...
Page 532: ...Appendix D MIB Objects 532 ...