background image

Configuring Ports

Setting Ports Configurations

Page 77

Admin Status

 

— 

Displays the link operational status. The possible field values are: 

Up

 

— 

Indicates that the port is currently operating. 

Down

 

— 

Indicates that the port is currently not operating. 

Current Port Status —

 Indicates whether the port is currently operational or non-operational. The possible 

field values are:

Up —

 Indicates the port is currently operating.

Down —

 Indicates the port is currently not operating.

Reactivate Suspended Port

 — Reactivates suspended ports. The possible field values are: 

Checked

 

— 

Reactivates the selected suspended port. 

Unchecked

 

— 

Maintains the port status. This is the default value. 

Operational Status — 

Indicates the port operational status. Possible field values are:

Suspended

 — The port is currently active, and is not receiving or transmitting traffic.

Active

 — Indicates the port is currently active and is receiving and transmitting traffic.

Disable

 — Indicates the port is currently disabled, and is not receiving or transmitting traffic.

Unknown

 — Indicates the port status is currently unknown. 

Admin Speed —

 Indicates the configured rate for the port. The port type determines what speed setting 

options are available. Admin speed can only be designated when auto-negotiation is disabled. The possible 
field values are:

10M —

 Indicates the port is currently operating at 10 Mbps.

100M —

 Indicates the port is currently operating at 100 Mbps.

1000M

 

 Indicates the Giga port is currently operating at 1000 Mbps.

Current Port Speed

 — Displays the configured rate for the port. The port type determines the speed settings 

available. Port speeds can only be configured when auto-negotiation is disabled.

Admin Duplex —

 Indicates the port duplex mode. This field is configurable only when auto negotiation is 

disabled, and the port speed is set to 10M or 100M. This field cannot be configured on trunks. The possible 
field values are:

Full —

 The interface supports transmission between the device and its link partner in both directions 

simultaneously.

Half —

 The interface supports transmission between the device and the client in only one direction at a 

time.

Current Duplex Mode —

 Displays the current duplex mode. 

Auto Negotiation —

 Defines the auto negotiation status on the port. Auto negotiation is a protocol between 

two link partners that enables a port to advertise its transmission rate, duplex mode, and flow control abilities 
to its partner.

Current Auto Negotiation — 

Displays the

 

current Auto Negotiation setting.

Summary of Contents for AT-S94

Page 1: ...Layer 2 Ethernet Switch AT S94 V1 1 0 Web Browser Interface User s Guide...

Page 2: ...ntioned herein are trademarks or registered trademarks of their respective owners Allied Telesis Inc reserves the right to make changes in specifications and other information contained in this docume...

Page 3: ...nformation 17 Configuring System Time 19 Setting the System Clock 19 Configuring SNTP 20 Configuring Daylight Saving Time 21 Configuring Device Security 25 Configuring Management Security 26 Defining...

Page 4: ...ettings 96 Defining GVRP 98 Defining MAC Based Groups 100 Configuring System Logs 103 Defining Log Settings 103 Viewing Temporary and Flash Logs 106 Configuring Spanning Tree 108 Configuring Classic S...

Page 5: ...ntegrated Cable Tests 165 Viewing Optical Transceivers 167 Resetting the Device 168 Viewing Statistics 169 Viewing Device Statistics 169 Viewing Interface Statistics 169 Viewing Etherlike Statistics 1...

Page 6: ...194 System Defaults 196 RS 232 Port Settings 197 Port Defaults 197 Configuration Defaults 198 Security Defaults 198 Jumbo Frame Defaults 198 System Time Defaults 198 Spanning Tree Defaults 199 Address...

Page 7: ...oth system and network security including traffic control and switch access methods Section 5 Configuring DHCP Snooping Provides information for enabling and defining DHCP Snooping configurations and...

Page 8: ...lesis Knowledge Base from the following web site www alliedtelesis com support You can use the Knowledge Base to submit questions to our technical support staff and review answers to previously asked...

Page 9: ...on for starting the application The login information is configured with a default user name and password The default password is friend the default user name is manager Passwords are both case sensit...

Page 10: ...Getting Started Starting the Application Page 10 Figure 2 System General Page...

Page 11: ...m Views provide a graphical representation of the device ports The Port Settings Page displays an example of the Zoom View with a detailed graphical representation of the device ports To open a zoom v...

Page 12: ...components with their corresponding numbers Table 1 Interface Components Component Description 1 Menu The Menu provides easy navigation through the main management software features In addition the Me...

Page 13: ...guration entries View Displays detailed information for the current page configuration Refresh Refreshes information displayed on the current page Reset Device reset Resets the device information for...

Page 14: ...on to tables or WBI pages 1 Open a WBI page 2 Click Add An Add page opens for example the Add Local User Page Figure 5 Add Local User Page 3 Define the fields 4 Click Apply The configuration informati...

Page 15: ...information can be saved for permanent use or until next update not just for the current session A configuration is saved as permanent by copying the current Running Configuration file to the Startup...

Page 16: ...ce 1 In the System General Page click Reset You are prompted to confirm 2 Click OK The device is reset Resetting the device ends the web browser management session You must restart the session to cont...

Page 17: ...comprises two sections Administration and DHCP Configuration The Administration section of the contains the following fields System Name Indicates the user defined name of the device This is a require...

Page 18: ...vice following reset checks if the IP address is already defined in the Startup Configuration If not the device tries to receive an IP address from a BootIP server until either an IP address is receiv...

Page 19: ...Clock The System Time Page contains fields for defining system time parameters for both the local hardware clock and the external SNTP clock If the system time is kept using an external SNTP clock an...

Page 20: ...s an SNTP client and cannot provide time services to other systems The device can poll the following server types for the server time Unicast Anycast Broadcast Time sources are established by stratums...

Page 21: ...Time The System Time Page opens The Additional Time Parameters section of the System Time Page contains the following fields Daylight Saving Enables automatic Daylight Saving Time DST on the device b...

Page 22: ...The week within the month at which DST ends every year The possible field range is 1 5 Month The month of the year in which DST ends every year The possible field range is Jan Dec Time The time at whi...

Page 23: ...ber Lebanon From the last weekend of March until the last weekend of October Lithuania From the last weekend of March until the last weekend of October Luxembourg From the last weekend of March until...

Page 24: ...he last weekend of March until the last weekend of October United Kingdom From the last weekend of March until the last weekend of October United States of America From the second Sunday in March at 0...

Page 25: ...This section describes setting security parameters for ports device management methods users and servers This section contains the following topics Configuring Management Security Configuring Server...

Page 26: ...or IP subnets Access profiles contain management methods for accessing and managing the device The device management methods include All Telnet Secure Telnet SSH HTTP Secure HTTP HTTPS Management acc...

Page 27: ...status Access Profile Name The name of the profile The access profile name can contain up to 32 characters Current Active Access Profile Indicates if the profile is currently active The possible field...

Page 28: ...vice using Telnet meeting access profile criteria are permitted or denied access to the device HTTP Assigns HTTP access to the rule If selected users accessing the device using HTTP meeting access pro...

Page 29: ...tached to the access rule The possible field values are Permit Permits access to the device Deny Denies access to the device This is the default 3 Define the fields 4 Click Apply The access profile is...

Page 30: ...ty Profile Rules The Profile Rules Page opens Figure 12 Profile Rules Page Access Profile Name Displays the access profile to which the rule is attached Priority Defines the rule priority When the pac...

Page 31: ...denied access to the device Secure HTTP HTTPS Assigns HTTPS access to the rule If selected users accessing the device using HTTPS meeting access profile criteria are permitted or denied access to the...

Page 32: ...dify an access rule 1 Click Mgmt Security Profile Rules The Profile Rules Page opens 2 Click Modify The Profiles Rules Configuration Page opens Figure 14 Profiles Rules Configuration Page 3 Define the...

Page 33: ...Authentication Profiles Page contains two tables which display the currently defined profiles Login Authentication Profiles Provides the method by which system users logon to the device Enable Authent...

Page 34: ...cation cannot be verified at the RADIUS server the session is authenticated locally If the session cannot be authenticated locally the session is permitted Local TACACS Indicates that Authentication f...

Page 35: ...and the device is updated To modify the authentication profile settings 1 Click Mgmt Security Authentication Profiles The Authentication Profiles Page opens 2 Click Modify The Authentication Profile...

Page 36: ...ods are used To map authentication methods 1 Click Mgmt Security Authentication Mapping The Authentication Mapping Page opens Figure 18 Authentication Mapping Page The Authentication Mapping Page comp...

Page 37: ...for access HTTP Indicates that authentication methods are used for HTTP access Possible methods are Local Authentication occurs locally RADIUS Authenticates the user at the RADIUS server TACACS Authen...

Page 38: ...Terminal Access Controller Access Control System TACACS provides centralized security user access validation The system supports up to 8 TACACS servers TACACS provides a centralized user management sy...

Page 39: ...authentication port Timeout for Reply Defines the time interval in seconds that passes before the connection between the device and the TACACS server times out The field range is 1 60 seconds and the...

Page 40: ...To modify TACACS server settings 1 Click Mgmt Protocols TACACS The TACACS Page opens 2 Click Modify The TACACS Configuration Page opens Figure 21 TACACS Configuration Page 3 Define the relevant field...

Page 41: ...between the device and the TACACS server times out The field range is 1 60 seconds and the default is 10 seconds Default Dead Time Defines the default amount of time in minutes that a RADIUS server i...

Page 42: ...String Indicates the key string used for authenticating and encrypting all RADIUS communications between the device and the RADIUS server This key must match the RADIUS encryption Source IP Address Di...

Page 43: ...g Device Security Configuring Server Based Authentication Page 43 Figure 24 RADIUS Configuration Page 3 Define the relevant fields 4 Click Apply The RADIUS server settings are modified and the device...

Page 44: ...Users Page displays the list of currently defined local users and contains the following fields User Name Displays the user s name Access Level Displays the user access level The lowest user access le...

Page 45: ...o 159 characters Confirm Password Verifies the password 3 Define the fields 4 Click Apply The user is added to the Local Users table and the device is updated To modify local users 1 Click Mgmt Securi...

Page 46: ...Password The Line Password Page opens Figure 28 Line Password Page The Line Password Page contains the following fields Console Line Password Defines the line password for accessing the device via a...

Page 47: ...ity monitors both received and learned packets that are received on specific ports Access to the locked port is limited to users with specific MAC addresses These addresses are either manually defined...

Page 48: ...Port Security Page displays the Zoom View of the selected stacking member s defined in the Unit No field ports 2 In the Unit No field select the stacking member to display 3 Select the ports to lock...

Page 49: ...sic lock mechanism The port is immediately locked regardless of the number of addresses that have already been learned Limited Dynamic Lock Locks the port by deleting the current dynamic MAC addresses...

Page 50: ...d Displays the method by which the last session was authenticated The possible field values are None Indicates that no authentication method is used to authenticate the port RADIUS Provides port authe...

Page 51: ...ify port based authentication settings 1 Click Modify The Port Authentication Settings Page opens Figure 32 Port Authentication Settings Page The Port Authentication Settings Page contains the followi...

Page 52: ...e In case of MAC 802 1x 802 1x takes precedence Enable Periodic Reauthentication Permits port reauthentication The possible field values are Enable Enables port reauthentication This is the default va...

Page 53: ...network resources or causing the network to time out Storm control is enabled for all ports by defining the packet type and the rate the packets are transmitted The system measures the incoming Broad...

Page 54: ...Specifies the Broadcast mode currently enabled on the device The possible field values are Multicast Broadcast Counts both Broadcast and Multicast traffic together Broadcast Only Counts only the Broad...

Page 55: ...trol entries ACEs that are made of the filters that determine traffic classifications The total number of ACEs that can be defined in all ACLs together is 256 This section contains the following topic...

Page 56: ...E Destination MAC Mask Indicates the destination MAC Address wild card mask Wildcards are used to mask all or part of a destination MAC Address Wild card masks specify which octets are used and which...

Page 57: ...ble Rule Priority and define the ACL s relevant fields 5 Click Apply The MAC Based ACL configuration is defined and the device is updated 6 Click Save Config on the menu to save the changes permanentl...

Page 58: ...MAC Based ACE rule is defined and the device is updated 5 Click Save Config on the menu to save the changes permanently To modify the MAC Based ACL configuration 1 Click Network Security MAC Based ACL...

Page 59: ...evice Security Defining Access Control Page 59 3 Define the fields 4 Click Apply The MAC Based ACL configuration is defined and the device is updated 5 Click Save Config on the menu to save the change...

Page 60: ...ecked Maintains the ACL ACE Priority Indicates the rule priority which determines which rule is matched to a packet on a first match basis Protocol Creates an ACE based on a specific protocol The avai...

Page 61: ...ocol IGP for network routing Layer Two 2 Tunneling Protocol an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks VPNs IPIP IP over IP IPIP Encapsulates IP packets to...

Page 62: ...ICMP Code Indicates and ICMP message code for filtering ICMP packets ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code IGMP Type Filters packets by IGMP...

Page 63: ...s based on QoS values such as DSCP or IP Precedence The possible field values are Checked Enables identification of flows based on QoS values Selecting this option makes the Match DSCP and Match IP Pr...

Page 64: ...Based ACE Page page opens Figure 41 Add IP Based ACE Page 3 Define the fields 4 Click Apply The IP Based ACE rule is defined and the device is updated 5 Click Save Config on the menu to save the chan...

Page 65: ...ng Access Control Page 65 Figure 42 IP Based ACL Configuration Page 3 Define the fields 4 Click Apply The IP Based ACL configuration is defined and the device is updated 5 Click Save Config on the men...

Page 66: ...atched packets 1 Click Network Security ACL Binding The ACL Binding Page opens Figure 43 ACL Binding Page The ACL Binding Page contains the following fields Interface Indicates the interface to which...

Page 67: ...ose the interface to which the ACL is bound The possible values are Port Port associated with the ACL Trunk Trunk associated with the ACL Select IP Based ACL or MAC Based ACL Choose the ACL which is b...

Page 68: ...only from within the network or the network firewall DHCP with Option 82 attaches authentication messages to the packets sent from the host DHCP passes the configuration information to hosts on a TCP...

Page 69: ...rt number from which the client s packet was received Disable Disables DHCP Option 82 with data insertion on the device This is the default value Verify MAC Address Indicates if MAC addresses are veri...

Page 70: ...d and the device is updated 4 Click Save Config on the menu to save the changes permanently Defining DHCP Snooping on VLANs The VLAN Settings Page allows network managers to enable DHCP snooping on VL...

Page 71: ...terfaces can be configured to receive traffic from outside the network or the firewall To define trusted interfaces 1 Click DHCP Snooping Trusted Interfaces The Trusted Interfaces Page opens Figure 47...

Page 72: ...ion page opens Figure 48 Trusted Configuration Page 4 Edit the following field Trusted Status Indicates whether the interface is a Trusted Interface Enable Interface is in trusted mode Disable Interfa...

Page 73: ...C Address Indicates the MAC addresses recorded in the DHCP Database The Database can be queried by MAC address IP Address Indicates the IP addresses recorded in the DHCP Database The Database can be q...

Page 74: ...er Lease Time Displays the lease time The Lease Time defines the amount of time the DHCP Snooping entry is active Addresses whose lease times are expired are ignored by the switch The possible values...

Page 75: ...ing Ports Setting Ports Configurations This section contains the following topics Defining Port Settings Configuring Port Mirroring Defining Port Settings The Port Settings Page contains fields for de...

Page 76: ...ort Setting Configuration Page opens Figure 52 Port Setting Configuration Page The Port Setting Configuration Page contains the following fields Port Lists the names of configured ports Description Pr...

Page 77: ...ype determines what speed setting options are available Admin speed can only be designated when auto negotiation is disabled The possible field values are 10M Indicates the port is currently operating...

Page 78: ...mode Enable Indicates that flow control is currently enabled for the selected port Disable Indicates that flow control is currently disabled for the selected port This is the default value Current Flo...

Page 79: ...ng 1 Click Layer 1 Port Mirroring The Port Mirroring Page opens Figure 53 Port Mirroring Page The Port Mirroring Page contains information about all port mirrors currently defined on the device The fo...

Page 80: ...s the port from which traffic is to be analyzed Type Indicates the port mode configuration for port mirroring The possible field values are Rx Only Defines the port mirroring on receiving ports Tx Onl...

Page 81: ...uring Ports Setting Ports Configurations Page 81 3 Define the Type field 4 Click Apply The Port mirroring is modified and the device is updated 5 Click Save Config on the menu to permanently save the...

Page 82: ...on the port The port is in full duplex mode All ports in the trunk have the same ingress filtering and tagged modes All ports in the trunk have the same back pressure and flow control modes All ports...

Page 83: ...ffic Down Indicates the trunk is not currently linked and is not forwarding or receiving traffic Speed Displays the configured aggregated rate for the trunk The possible field values are 10 Indicates...

Page 84: ...to all interfaces 2 Click Modify The Trunk Setting Configuration Page opens Figure 57 Trunk Setting Configuration Page The Trunk Setting Configuration Page contains the following fields Trunk Lists th...

Page 85: ...hat the trunk advertises for a 10 Mbps speed trunk and full duplex mode setting 100 Half Indicates that the trunk advertises for a 100 Mbps speed trunk and half duplex mode setting 100 Full Indicates...

Page 86: ...efined trunks To modify Port Trunking settings 1 Click Layer 1 Port Trunking The Port Trunking Page opens Figure 58 Port Trunking Page The Port Trunking Page contains information about all port trunks...

Page 87: ...ed LACP Indicates if LACP is enabled on the trunk The possible field values are Checked Enables LACP on the trunk Unchecked Disables LACP on the trunk This is the default value 4 Modify the Trunk LACP...

Page 88: ...ins fields for configuring LACP trunks To configure LACP for trunks 1 Click Layer 1 LACP The LACP Page opens Figure 60 LACP Page The LACP Page contains the following fields LACP System Priority Specif...

Page 89: ...Configuring Ports Aggregating Ports Page 89 Figure 61 LACP Configuration Page 3 Define the fields 4 Click Apply The LACP settings are saved and the device is updated...

Page 90: ...C Addresses The MAC Address Page contains parameters for querying information in the Static MAC Address Table and the Dynamic MAC Address Table in addition to viewing and configuring Unicast addresses...

Page 91: ...te All Dynamic MAC Addresses Clicking Delete removes all dynamic addresses from the MAC Address Table 2 Define the fields for the Unicast or Multicast MAC addresses to add 3 Click Add The Add MAC Addr...

Page 92: ...AC Address Page opens 2 Click View Depending on whether View Static or View Dynamic is chosen the View Static MAC Address Table Page or View Dynamic MAC Address Table Page opens Figure 64 View Static...

Page 93: ...nd Multicast domains Broadcast and Multicast traffic is transmitted only in the VLAN in which the traffic is generated VLAN tagging provides a method of transferring VLAN information between VLAN awar...

Page 94: ...N VLAN Name Displays the user defined VLAN name VLAN Type Displays the VLAN type The possible field values are Dynamic Indicates the VLAN was dynamically created through GARP Static Indicates the VLAN...

Page 95: ...value for all interfaces Excluded Indicates that the port is excluded from the VLAN Forbidden Indicates that the port cannot be included in the VLAN 2 Click the Add button The Add VLAN Page opens Fig...

Page 96: ...e VLAN mapping is displayed Trunk Specifies the trunk for which the VLAN mapping is displayed Interface Displays the port or trunk number Interface VLAN Mode Indicates the interface membership status...

Page 97: ...es ingress filtering on the device Ingress filtering discards packets that are defined to VLANs of which the specific port is not a member Disable Disables ingress filtering on the device Reserved VLA...

Page 98: ...embership In the GVRP Page users can do the following tasks Configuring GVRP Enabling Disabling GVRP on a Port Caution The settings for the three GVRP timers must be the same on all GVRP active device...

Page 99: ...N creation on the interface Disable Disables Dynamic VLAN creation on the interface GVRP Registration Indicates if VLAN registration through GVRP is enabled on the interface The possible field values...

Page 100: ...e The MAC Based Groups Page contains the following fields MAC Based Group In the MAC Based Group table network managers group VLANs based on the VLAN MAC address MAC Address Displays the MAC address a...

Page 101: ...o the fields in the MAC Based Groups Page the Add MAC Address Group Page contains the following additional fields Host Defines the specified MAC address as the only address associated with the VLAN gr...

Page 102: ...l fields Group Type Indicates the VLAN Group to which interfaces are mapped The possible field value is MAC based Indicates that interfaces are mapped to MAC based VLAN groups 3 Select a VLAN to map w...

Page 103: ...erver which are Error The following table lists the available system log severity levels and the corresponding messages Table 3 System Log Severity Levels Severity Level Description Message Emergency...

Page 104: ...mation Type Indicates the log type included in the output The possible values are Console Indicates that the output is of a console log Temporary Indicates that the output is of the temporary memory l...

Page 105: ...a Log Type in the Configure Log Outputs table 3 Click Add The Add Syslog Page opens Figure 78 Add Syslog Page The Add Syslog Page contains the following fields Log Server IP Address Defines the IP ad...

Page 106: ...elect the entry in the Log Table and click Modify The Event Log Configuration Page opens Figure 79 Event Log Configuration Page 2 Define the relevant fields 3 Click Apply The Server Log configuration...

Page 107: ...following information Log Index The log index number Log Time The date and time that the log was entered Severity The severity of the event for which the log entry was created Description The event de...

Page 108: ...on configuring Classic STP see Configuring Classic Spanning Tree Rapid STP Detects and uses network topologies that provide faster convergence of the spanning tree without creating forwarding loops F...

Page 109: ...nables STP on the device Disable Disables STP on the device STP Operation Mode Specifies the STP mode that is enabled on the device The possible field values are Classic STP Enables Classic STP on the...

Page 110: ...is 6 40 seconds the default value is 20 seconds Forward Delay Specifies the device Forward Delay Time in seconds The Forward Delay Time is the time interval during which a bridge remains in the liste...

Page 111: ...erface Configuration Page The STP Interface Configuration Page contains the following sections STP Port Parameters table Global System Trunk table The parameters listed in both tables are identical Th...

Page 112: ...d The port or trunk through which the designated switch is attached to the LAN Alternate Provides an alternate path to the root switch from the root interface Backup Provides a backup path to the desi...

Page 113: ...ng Tree Configuration Page contains the following fields Default Path Cost Select if the default path cost of the port is automatically set by the port speed and the default path cost method 5 Select...

Page 114: ...port and stacking member for which the RSTP settings are displayed Trunk Specifies the trunk for which the RSTP settings are displayed Interface Displays the port or trunk on which Rapid STP is enabl...

Page 115: ...to Point Operational Status Displays the point to point operating state Activate Protocol Migration Test Select to run a Protocol Migration Test The test identifies the STP mode of the interface conne...

Page 116: ...port can be placed in the Forwarding state in another STP instance This section contains the following topics Defining MSTP Properties Defining MSTP Interfaces Defining MSTP Instance Mappings Definin...

Page 117: ...ee Master instance The IST Master is the specified instance root Configure Interface Settings Click Configure to assign MSTP settings to a specific interface Configure Instance Mapping Click Configure...

Page 118: ...the root device Designated Indicates the port or trunk through which the designated device is attached to the LAN Alternate Provides an alternate path to the root device from the root interface Backu...

Page 119: ...elected interface 5 Click Save Config on the menu to save changes permanently 6 To view the MSTP configurations of all interfaces click Interface Table The MSTP Interface Table is displayed In the MST...

Page 120: ...ayer 2 MSTP The MSTP Page opens 2 Click Configure next to the Configure Instance Mapping option The MSTP Instance Mapping Page opens Figure 89 MSTP Instance Mapping Page The MSTP Instance Mapping Page...

Page 121: ...Layer 2 MSTP The MSTP Page opens 2 Click Configure next to the Configure Instance Settings option The MSTP Instance Settings Page opens Figure 90 MSTP Instance Settings Page The MSTP Instance Setting...

Page 122: ...figuring Multiple Spanning Tree Page 122 3 Define the fields 4 Click Apply MSTP is defined for the selected instance and the device is updated The MSTP Page is displayed 5 Click Save Config on the men...

Page 123: ...its the packets to the relevant ports The Internet Group Management Protocol IGMP allows hosts to notify their local switch or router that they want to receive transmissions assigned to a specific mul...

Page 124: ...he creation of the Multicast filtering database To configure IGMP Snooping 1 Click Multicast IGMP The IGMP Page opens Figure 91 IGMP Page The IGMP Page contains the following fields Enable IGMP Snoopi...

Page 125: ...to Learn Indicates if Auto Learn is enabled on the device If Auto Learn is enabled the devices automatically learns where other Multicast groups are located Enables or disables Auto Learn on the Ether...

Page 126: ...GMP Snooping global parameters are modified and the device is updated 5 Click Save Config on the menu to save the changes permanently Defining Multicast Bridging Groups The Multicast Group Page displa...

Page 127: ...n the relevant VLAN Disabled is the default value VLAN ID Displays the VLAN for which Multicast parameters are displayed Bridge Multicast Address Identifies the Multicast group MAC address IP address...

Page 128: ...ess and the Bridge Multicast IP Address 6 Click Apply The new Multicast group is saved and the device is updated To modify a multicast group 1 Click Modify The Multicast Group Configuration Page opens...

Page 129: ...The Multicast Forward All Page contains the following fields VLAN ID Displays the VLAN for which Multicast parameters are displayed Select the interfaces displayed in the table Ports of Unit Specifie...

Page 130: ...rfaces to modify 3 Click Modify The Multicast Forward All Configuration Page opens Figure 97 Multicast Forward All Configuration Page 4 Define the Interface Status field 5 Click Apply The Multicast Fo...

Page 131: ...as of the MIB tree The SNMPv3 security structure consists of security models with each model having its own security levels There are three security models defined SNMPv1 SNMPv2c and SNMPv3 Users are...

Page 132: ...se Default Restores default SNMP settings using the Local Engine ID Enable SNMP Notifications Indicates if SNMP traps are enabled for the device The possible values are Checked Traps are enabled Unche...

Page 133: ...communities 1 Click SNMP Community The SNMP Global Page opens The SNMP Community Page opens Figure 99 SNMP Community Page The SNMP Community Page contains the Basic and the Advanced Table SNMP Communi...

Page 134: ...ties Advanced Table contains the following fields Management Station Displays the management station IP address for which the advanced SNMP community is defined 0 0 0 0 indicates all management statio...

Page 135: ...iguring SNMP Page 135 Figure 101 Community Configuration Page 3 Define the Basic or Advanced configuration of the community 4 Click Apply The SNMP community settings are modified and the device is upd...

Page 136: ...ld values are SNMPv1 SNMPv1 is defined for the group SNMPv2 SNMPv2 is defined for the group SNMPv3 SNMPv3 is defined for the group Security Level Defines the security level attached to the group Secur...

Page 137: ...ty Model and Operation 4 Click Apply The new SNMP group is saved To modify an SNMP group 1 Click SNMP Groups The SNMP Group Page opens 2 Click Modify The Group Configuration Page opens Figure 104 Grou...

Page 138: ...defined user names The field range is up to 30 alphanumeric characters Group Name Contains a list of user defined SNMP groups SNMP groups are defined in the SNMP Group Profile Page Engine ID Displays...

Page 139: ...ser Page In addition to the SNMP Users Page the Add SNMP User Page contains the following fields Authentication Method Defines the SNMP Authentication method The possible field values are MD5 Key User...

Page 140: ...ey Privacy Key Defines the Privacy Key LSB If only authentication is required 20 bytes are defined If both privacy and authentication are required 36 bytes are defined Each byte in hexadecimal charact...

Page 141: ...e opens Figure 108 SNMP Views Page The SNMP Views Page contains the following fields View Name Displays the user defined views The view name can contain a maximum of 30 alphanumeric characters Object...

Page 142: ...owing options Select from List Select the Subtree from the list provided Pressing the Up and Down buttons allows you to change the priority by moving the selected subtree up or down in the list Insert...

Page 143: ...sers and the trap type sent SNMP notification filters provide the following services Identifying Management Trap Targets Trap Filtering Selecting Trap Generation Parameters Providing Access Control Ch...

Page 144: ...times the device resends an inform request The field range is 1 255 The default is 3 SNMPv3 Notification Recipient The SNMPv3 Notification Recipient table contains the following fields Recipients IP D...

Page 145: ...ication recipient settings are saved and the device is updated 5 Click Save Config on the menu to save the changes permanently To modify notification settings 1 Click SNMP Notify The SNMP Notify Page...

Page 146: ...e 146 Figure 112 SNMP Notify Configuration Page 3 Define the fields 4 Click Apply The SNMP Notification configuration is modified and the device is updated 5 Click Save Config on the menu to save the...

Page 147: ...ter notifications To configure SNMP notification filters 1 Click SNMP Notify The SNMP Notify Page opens 2 Click Configure next to Configure Notification Filters The SNMP Notification Filter Configurat...

Page 148: ...ed from either the Select from List or the Object ID field there are two configuration options Select from List Select the OID from the list provided Pressing the Up and Down buttons allows you to cha...

Page 149: ...e IP phones Powered Devices are connected to the device via Ethernet ports This section includes the following topic Enabling PoE and Setting the Power Threshold Enabling PoE and Setting the Power Thr...

Page 150: ...power threshold is 95 the threshold is exceeded when the PoE devices require more than 356 25 W Maximum Power Available Indicates the maximum power allocated to the device Unit Number Indicates the s...

Page 151: ...he port Priority Level Indicates the PoE ports priority The possible values are High Medium and Low The default is Low Class Indicates the power class the IEEE 802 3af class of the device Output Volta...

Page 152: ...as detected a fault on the powered device For example the powered device memory could not be read Test Indicates the powered device is being tested For example a powered device is tested to confirm it...

Page 153: ...ority Ensures that time sensitive applications are always forwarded Strict Priority SP allows the prioritization of mission critical time sensitive traffic over less time sensitive applications For ex...

Page 154: ...Enable QoS Mode Indicates if QoS is enabled on the device The possible values are Checked Enables QoS on the device Unchecked Disables QoS on the device Trust Mode Defines which packet fields to use...

Page 155: ...interface Unchecked Maintains the current CoS settings This is the default value 2 Select the interfaces 3 Check the Restore Defaults option where needed 4 Click Modify The CoS Configuration Page open...

Page 156: ...ttings for the defined CoS and DSCP and contains the following fields Select Schedule Defines the priority method in queuing Strict Priority Indicates that traffic scheduling for the selected queue is...

Page 157: ...oS Page contains the following fields Restore Defaults Restores the device factory defaults for mapping CoS tags to a forwarding queue Class of Service Specifies the CoS priority tag values where zero...

Page 158: ...ffic queues For example a packet with a DSCP tag value of 3 can be assigned to queue 2 To set DSCP to queues 1 Click Services Queuing Scheduling The CoS Queuing Scheduling Page opens 2 In the Configur...

Page 159: ...our traffic priority queues are supported 4 Modify the Queue values 5 Click Apply The DSCP to Queue mapping is updated 6 Click Save Config on the menu to save the changes permanently Configuring QoS B...

Page 160: ...ss ports Defines the amount of bandwidth assigned to the interface The available values are3 5 Mbps 1 Gbps for FE ports the maximum value equals the maximum port speed Egress Shaping Rates Indicates t...

Page 161: ...a backup copy of the device configuration Up to five backup configuration files can be saved on the device with user configured names These files are generated when the user copies the Running Config...

Page 162: ...The possible field values are Checked System restarts after the Configuration File is restored to the factory defaults Unchecked After the Configuration File is restored to the factory defaults the s...

Page 163: ...wing fields TFTP Operation Defines the type of TFTP operation and the type of file The possible values are Download Downloads a firmware or configuration file depending on the selection below Upload U...

Page 164: ...e Copies the Firmware or the Boot file from the Stacking Master Software Image Downloads the Image file Destination Unit Downloads firmware or the Boot file to the designated unit The values are All C...

Page 165: ...le Length test To perform a copper cable test 1 Click Utilities Cable Test The Cable Test Page opens Figure 126 Cable Test Page The Cable Test Page displays the following information Unit Number Indic...

Page 166: ...an only be performed when the port is up and operating at 1 Gbps 2 Select the Unit Number and the Port 3 Click Test The cable test is performed 4 Click Advanced The Cable Test Configuration Page opens...

Page 167: ...ace configuration information is displayed Port Displays the IP address of the port on which the cable is tested Temperature Celsius Displays the temperature oC at which the cable is operating Voltage...

Page 168: ...he current device configuration from being lost To reset the device 1 Click Utilities Reset The Reset Page opens Figure 129 Reset Page 2 Select the Reset Unit No The possible values are 1 Reset the Ma...

Page 169: ...istics Managing RMON Statistics Viewing Device Statistics This section contains the following topics Viewing Interface Statistics Viewing Etherlike Statistics Viewing Interface Statistics The Interfac...

Page 170: ...Total Bytes Octets Displays the number of octets received on the selected interface Unicast Packets Displays the number of Unicast packets received on the selected interface Multicast Packets Displays...

Page 171: ...ific trunk for which the Etherlike statistics are displayed Refresh Rate Defines the frequency of the interface statistics updates The possible field values are No Refresh Indicates that the Etherlike...

Page 172: ...isplays the number of received paused frames on the selected interface Transmitted Paused Frames Displays the number of paused frames transmitted from the selected interface 2 Select the Interface and...

Page 173: ...d on the device The RMON Statistics Page contains statistics for both received and transmitted packets To view RMON statistics 1 Click Statistics RMON Statistics The RMON Statistics Page opens Figure...

Page 174: ...occurred on the interface since the device was last refreshed Undersize Packets Displays the number of undersized packets less than 64 octets received on the interface since the device was last refre...

Page 175: ...ion was taken Trunk Specifies the trunk from which the RMON information was taken Sampling Interval Indicates in seconds the time period that samplings are taken from the ports The field range is 1 36...

Page 176: ...ield range is 1 65535 The default value is 50 3 Define the Source Interface Owner Max No of Samples to Keep and Sampling Interval fields 4 Click Apply The new entry is added to the history table and t...

Page 177: ...nge is 0 20 characters Each table entry represents all counter values compiled during a single sample Sample No Displays the entry number for the History Control Table page Received Bytes Octets Displ...

Page 178: ...ncluding FCS octets received on the interface since the device was last refreshed Jabbers Displays the total number of received packets that were longer than 1518 octets This number excludes frame bit...

Page 179: ...ent Entry Displays the event Community Displays the community to which the event belongs Description Displays the user defined event description Type Describes the event type Possible values are Log I...

Page 180: ...y is added and the device is updated To modify the RMON Event entry settings 1 Click Statistics RMON Events The RMON Events Page opens 2 Click Modify The RMON Events Configuration Page opens Figure 13...

Page 181: ...ON Events Table 1 Click Statistics RMON Events The RMON Events Page opens 2 Click View The RMON Events Logs Page opens Figure 140 RMON Events Logs Page The RMON Events Logs Page contains the following...

Page 182: ...ays interface for which RMON statistics are displayed The possible field values are Port Displays the RMON statistics for the selected port Trunk Displays the RMON statistics for the selected trunk Co...

Page 183: ...the alarm generation Rising is defined by crossing the threshold from a low value threshold to a higher value threshold Interval sec Defines the alarm interval time in seconds Owner Displays the devi...

Page 184: ...Viewing Statistics Managing RMON Statistics Page 184 Figure 143 Alarm Configuration Page 3 Define the fields 4 Click Apply The RMON alarm is saved and the device is updated...

Page 185: ...cts and reconfigures the ports with minimal operational impact in the event of Unit Failure Inter unit Stacking Link Failure Unit Insertion Removing a Stacking Unit This section includes the following...

Page 186: ...on Guide Removing and Replacing Stacking Members Stacking member 1 and stacking member 2 are Master enabled units Unit 1 and Unit 2 are either designated as Stacking Master or Secondary Master The Sta...

Page 187: ...ck member is removed from the stack and then replaced with a unit with the same Unit ID the stack member is configured with the original device configuration Only ports which are physically present ar...

Page 188: ...ds Force Master The unit is forced to be master of the stack Note that only Unit 1 or Unit 2 can be the stack master Unit No Indicates the Unit ID assigned to the unit in the current stacking configur...

Page 189: ...erminal or a desktop or portable system with a serial port and running VT100 terminal emulation software The CLI can be accessed through the connected Terminal To connect a terminal to the device Cons...

Page 190: ...onfigurations are required Static IP Address and Subnet Mask User Name Static IP Address and Subnet Mask IP interfaces can be configured on each port of the device After entering the configuration com...

Page 191: ...configured user name is entered as a login name for remote management sessions To configure user name and privilege level enter the command at the system prompt as shown in the configuration example D...

Page 192: ...Copy 3329361 bytes copied in 00 03 00 hh mm ss console show bootvar Unit Image Filename Version Date Status 1 1 image 1 v1 1 0 29 25 Nov 2007 12 46 12 Not active 1 2 image 2 v1 1 0 29 25 Nov 2007 12 4...

Page 193: ...t the device The device boots up with the updated boot and system files Console copy tftp 172 16 101 101 file1 ros image Accessing file file1 on 172 16 101 101 Loading file1 from 172 16 101 101 09 Jul...

Page 194: ...g Member To download software an Stacking Member number 3 perform the following 1 Power up the stack as described in the Allied Telesis AT S95 Installation Guide The CLI command prompt is displayed 2...

Page 195: ...umber 1 instead of number 3 as per the previous example 2 Enter the copy command to copy the software from the Stacking Master to the Stacking Member To copy the software from the Stacking Master to a...

Page 196: ...system defaults and includes the following topics RS 232 Port Settings Port Defaults Configuration Defaults Security Defaults Jumbo Frame Defaults System Time Defaults Spanning Tree Defaults Address T...

Page 197: ...t defaults Data Bits 8 Stop Bits 1 Parity None Flow Control None Baud Rate 115 200 bps Auto Negotiation Enabled Auto Negotiation advertised capabilities Enabled Auto MDI MDIX Enabled Head of Line Bloc...

Page 198: ...lts Jumbo Frame Defaults The following is the Jumbo Frame default System Time Defaults The following is the system time default Default User Name manager Default Password friend System Name None Comme...

Page 199: ...wing are the VLAN defaults STP Enabled STP Port Disabled Rapid STP Enabled Multiple STP Disabled Fast Link Disabled Path Cost Long Number of MAC Entries 8 000 MAC Address Aging Time 300 seconds VLAN A...

Page 200: ...The following are the Multicast defaults QoS Defaults The following are the QoS defaults Possible Trunks 8 Possible Ports per Trunk 8 LACP Ports Trunk 16 IGMP Snooping Disable Maximum Multicast Groups...

Page 201: ...ation Rate 164 Copper cables 169 CRC 182 Critical 107 D Daylight Saving Time DST configuration broadcast time 22 DST per country 23 parameters 22 Debug 108 Default gateway 19 Delta 186 device manageme...

Page 202: ...120 Multicast 128 130 133 Multicast Forwarding 127 Multicast groups 128 Multiple Spanning Tree Protocol MSTP 120 N Notice 107 Notifications 136 148 O Object ID 145 Offset 21 22 Option 82 70 71 P Path...

Page 203: ...89 Stacking Master 190 STP 113 115 119 STP configuration Fast Link 116 Stratum 21 Strict Priority 157 160 Subtree ID 152 Suspended 80 system log configuration 108 modify 110 severity levels 107 System...

Reviews: