Index
534
source MAC addresses 129
TCP flags 133
TCP source and destination ports 133
UDP source and destination ports 133
VLAN ID 130
Common and Internal Spanning Tree (CIST)
defined 260
priority 260
common VLAN 81
community names
SNMPv1 and SNMPv2c 90
configuration file
described 71
configuration name 257
control messages, Ethernet Protection Switching Ring
(EPSR) snooping 211
213
CoS.
See
Class of Service (CoS)
CRL.
See
certificate revocation list (CRL)
D
default route
described 334
examples 350, 353
default settings, AT-S63 Management Software 463
denial of service defenses
default settings 469
described 179
guidelines 188
IP options attack 186
land attack 182
mirror port 113
mirroring traffic 187
ping of death attack 185
smurf attack 181
supported platforms 178, 190
SYN flood attack 180
teardrop attack 184
deny access control lists 137
DES privacy protocol 223
destination MAC addresses
in classifiers 129
destination port in a port mirror 113
Diffie-Hellman algorithm 420
discovery process
described 68
distinguished names 425
document conventions 25
DoS.
See
denial of service defenses
dynamic GVRP port 285
dynamic GVRP VLAN 285
dynamic MAC addresses 94
dynamic module ID numbers
described 70
E
edge ports 243
egress ports 310
egress queues 149
encryption (SSL) 429
encryption keys
described 413, 431
guidelines 415
Secure Shell (SSH) 440
supported platforms 412
technical overview 416
End Entity 433
Engine ID, defined 222
enhanced stacking 65
and Secure Sockets Layer (SSL) 427
and SSH 443
common VLAN 81
described 79
guidelines 85
local interface 82
master switches 80
slave switches 80
supported platforms 60, 78
entities, defined 221
EPSR snooping.
See
Ethernet Protection Switching Ring
(EPSR) snooping
Equal Cost Multi-path routing 335
Ethernet 802.2 in classifiers 129
Ethernet II frame types in classifiers 129
Ethernet Protection Switching Ring (EPSR) snooping
default setting 473
described 211
guidelines 215
restrictions 213
supported platforms 210
event logs
default settings 474
described 123
supported platforms 122
event messages 123
F
file system 118
flow groups 160
forwarding delay 242
G
GARP VLAN Registration Protocol (GVRP)
default settings 475
described
guidelines 288
intermediate switches 290
network security 289
GARP.
See
Generic Attribute Registration Protocol (GARP)
Generic Attribute Registration Protocol (GARP) 291
GVRP.
See
GARP VLAN Registration Protocol (GVRP)
H
hello time 242
history of new features 51
HMAC authentication algorithm 419
HMAC-MD5-96 (MD5) authentication protocol 222
HMAC-SHA-96 (SHA) authentication protocol 222
Summary of Contents for AT-S63
Page 14: ...Figures 14 ...
Page 18: ...Tables 18 ...
Page 28: ...28 Section I Basic Operations ...
Page 58: ...Chapter 1 Overview 58 ...
Page 76: ...Chapter 2 AT 9400Ts Stacks 76 Section I Basic Operations ...
Page 96: ...Chapter 5 MAC Address Table 96 Section I Basic Operations ...
Page 114: ...Chapter 8 Port Mirror 114 Section I Basic Operations ...
Page 116: ...116 Section II Advanced Operations ...
Page 146: ...Chapter 12 Access Control Lists 146 Section II Advanced Operations ...
Page 176: ...Chapter 14 Quality of Service 176 Section II Advanced Operations ...
Page 196: ...196 Section III Snooping Protocols ...
Page 204: ...Chapter 18 Multicast Listener Discovery Snooping 204 Section III Snooping Protocols ...
Page 216: ...Chapter 20 Ethernet Protection Switching Ring Snooping 216 Section III Snooping Protocols ...
Page 218: ...218 Section IV SNMPv3 ...
Page 234: ...234 Section V Spanning Tree Protocols ...
Page 268: ...268 Section VI Virtual LANs ...
Page 306: ...Chapter 27 Protected Ports VLANs 306 Section VI Virtual LANs ...
Page 320: ...320 Section VII Internet Protocol Routing ...
Page 360: ...Chapter 30 BOOTP Relay Agent 360 Section VII Routing ...
Page 370: ...Chapter 31 Virtual Router Redundancy Protocol 370 Section VII Routing ...
Page 372: ...372 Section VIII Port Security ...
Page 402: ...Chapter 33 802 1x Port based Network Access Control 402 Section VIII Port Security ...
Page 404: ...404 Section IX Management Security ...
Page 436: ...Chapter 36 PKI Certificates and SSL 436 Section IX Management Security ...
Page 454: ...Chapter 38 TACACS and RADIUS Protocols 454 Section IX Management Security ...
Page 462: ...Chapter 39 Management Access Control List 462 Section IX Management Security ...
Page 532: ...Appendix D MIB Objects 532 ...