Allied-telesis AT-S63 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computerhardware Allied-telesis AT-S63 herunter. Allied Telesis AT-S63 User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 514
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
613-000801 Rev. A
Management
Software
AT-S63
Features Guide
AT-S63 Version 2.2.0 for the AT-9400 Layer 2+ Switches
AT-S63 Version 3.0.0 for the AT-9400 Basic Layer 3 Switches
Seitenansicht 0
1 2 3 4 5 6 ... 513 514

Inhaltsverzeichnis

Seite 1 - Features Guide

613-000801 Rev. AManagement SoftwareAT-S63◆Features GuideAT-S63 Version 2.2.0 for the AT-9400 Layer 2+ SwitchesAT-S63 Version 3.0.0 for the AT-9400 Ba

Seite 2

Contents10Chapter 34: PKI Certificates and SSL ...

Seite 3

Chapter 8: File System100 Section II: Advanced OperationsOverviewThe AT-9400 Switch has a file system in flash memory for storing system files. You ca

Seite 4

AT-S63 Management Software Features GuideSection II: Advanced Operations 101Boot Configuration FilesA boot configuration file contains the series of c

Seite 5

Chapter 8: File System102 Section II: Advanced OperationsFile Naming ConventionsThe flash memory file system is a flat file system—directories are not

Seite 6

AT-S63 Management Software Features GuideSection II: Advanced Operations 103Using Wildcards to Specify Groups of FilesYou can use the asterisk charact

Seite 7

Chapter 8: File System104 Section II: Advanced Operations

Seite 8

Section II: Advanced Operations 105Chapter 9Event Logs and the Syslog ClientThis chapter describes how to monitor the activity of a switch by viewing

Seite 9

Chapter 9: Event Logs and the Syslog Client106 Section II: Advanced OperationsSupported PlatformsThis feature is supported on all AT-9400 Switches: L

Seite 10 - Contents

AT-S63 Management Software Features GuideSection II: Advanced Operations 107OverviewA managed switch is a complex piece of computer equipment that inc

Seite 11

Chapter 9: Event Logs and the Syslog Client108 Section II: Advanced OperationsSyslog ClientThe management software features a syslog client for sendin

Seite 12

Section II: Advanced Operations 109Chapter 10ClassifiersThis chapter explains classifiers for access control lists and Quality of Service policies. Th

Seite 13

AT-S63 Management Software Features Guide11IGMP Snooping ...

Seite 14

Chapter 10: Classifiers110 Section II: Advanced OperationsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+ Mo

Seite 15

AT-S63 Management Software Features GuideSection II: Advanced Operations 111OverviewA classifier defines a traffic flow. A traffic flow consists of pa

Seite 16

Chapter 10: Classifiers112 Section II: Advanced Operationsis dictated by the QoS policy, as explained in Chapter 13, “Quality of Service” on page 139.

Seite 17

AT-S63 Management Software Features GuideSection II: Advanced Operations 113Classifier CriteriaThe components of a classifier are defined in the follo

Seite 18 - How This Guide is Organized

Chapter 10: Classifiers114 Section II: Advanced OperationsFigure 4. User Priority and VLAN Fields within an Ethernet FrameYou can identify a traffic f

Seite 19

AT-S63 Management Software Features GuideSection II: Advanced Operations 115Observe the following guidelines when using this variable: When selecting

Seite 20 - Product Documentation

Chapter 10: Classifiers116 Section II: Advanced OperationsObserve these guidelines when using this criterion: The Protocol variable must be left blan

Seite 21 - Where to Go First

AT-S63 Management Software Features GuideSection II: Advanced Operations 117Observe this guideline when using these criteria: The Protocol variable m

Seite 22 - Starting a Management Session

Chapter 10: Classifiers118 Section II: Advanced OperationsGuidelinesFollow these guidelines when creating a classifier: Each classifier represents a

Seite 23 - Document Conventions

Section II: Advanced Operations 119Chapter 11Access Control ListsThis chapter describes access control lists (ACL) and how they can improve network se

Seite 24

Contents12Appendix D: MIB Objects ...

Seite 25 - Contacting Allied Telesis

Chapter 11: Access Control Lists120 Section II: Advanced OperationsSupported PlatformsThis feature is supported on the following AT-9400 Switches: La

Seite 26

AT-S63 Management Software Features GuideSection II: Advanced Operations 121OverviewAn access control list is a filter that controls the ingress traff

Seite 27 - Basic Operations

Chapter 11: Access Control Lists122 Section II: Advanced Operations4. Finally, if a packet does not meet the criteria of any ACLs on a port, it is acc

Seite 28

AT-S63 Management Software Features GuideSection II: Advanced Operations 123Parts of an ACLAn ACL must have the following information: Name - An ACL

Seite 29

Chapter 11: Access Control Lists124 Section II: Advanced OperationsGuidelinesHere are the rules to creating ACLs: A port can have multiple permit and

Seite 30

AT-S63 Management Software Features GuideSection II: Advanced Operations 125ExamplesThis section contains several examples of ACLs. In this example, p

Seite 31

Chapter 11: Access Control Lists126 Section II: Advanced OperationsTo deny traffic from several subnets on the same port, you can create multiple clas

Seite 32 - Chapter 1: Overview

AT-S63 Management Software Features GuideSection II: Advanced Operations 127The same result can be achieved by assigning the classifiers to different

Seite 33

Chapter 11: Access Control Lists128 Section II: Advanced OperationsIn this example, the traffic on ports 14 and 15 is restricted to packets from the s

Seite 34

AT-S63 Management Software Features GuideSection II: Advanced Operations 129The next example limits the ingress traffic on port 17 to IP packets from

Seite 35 - AT-S63 Management Software

13Figure 1: Static Port Trunk Example...

Seite 36 -  Web browser interface

Chapter 11: Access Control Lists130 Section II: Advanced Operations

Seite 37

Section II: Advanced Operations 131Chapter 12Class of ServiceThis chapter describes the Class of Service (CoS) feature. Sections in the chapter includ

Seite 38

Chapter 12: Class of Service132 Section II: Advanced OperationsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer

Seite 39

AT-S63 Management Software Features GuideSection II: Advanced Operations 133OverviewWhen a port on an Ethernet switch becomes oversubscribed—its egres

Seite 40

Chapter 12: Class of Service134 Section II: Advanced OperationsFor example, when a tagged packet with a priority level of 3 enters a port on the switc

Seite 41 - Management Access Methods

AT-S63 Management Software Features GuideSection II: Advanced Operations 135Note that because all ports must use the same priority-to-egress queue map

Seite 42 - Management

Chapter 12: Class of Service136 Section II: Advanced OperationsSchedulingA switch port needs a mechanism for knowing the order in which it should hand

Seite 43 - Manager Access Levels

AT-S63 Management Software Features GuideSection II: Advanced Operations 137Table 12 shows an example.In this example, the port transmits a maximum nu

Seite 44 - Stacking

Chapter 12: Class of Service138 Section II: Advanced OperationsQ6 15Q7 0Table 13. Example of a Weight of Zero for Priority Queue 7 (Continued)Port Egr

Seite 45

Section II: Advanced Operations 139Chapter 13Quality of ServiceThis chapter describes Quality of Service (QoS). Sections in the chapter include: “Sup

Seite 47 - Redundant Twisted Pair Ports

Chapter 13: Quality of Service140 Section II: Advanced OperationsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Laye

Seite 48 - AT-9448Ts/XP switches

AT-S63 Management Software Features GuideSection II: Advanced Operations 141OverviewQuality of Service allows you to prioritize traffic and/or limit t

Seite 49 - History of New Features

Chapter 13: Quality of Service142 Section II: Advanced OperationsThe QoS functionality described in this chapter sorts packets into various flows, acc

Seite 50

AT-S63 Management Software Features GuideSection II: Advanced Operations 143ClassifiersClassifiers identify a particular traffic flow, and range from

Seite 51 -  MAC address-based

Chapter 13: Quality of Service144 Section II: Advanced OperationsFlow GroupsFlow groups group similar traffic flows together, and allow more specific

Seite 52

AT-S63 Management Software Features GuideSection II: Advanced Operations 145Traffic ClassesTraffic classes are the central component of the QoS soluti

Seite 53 -  Supplicant Mode for

Chapter 13: Quality of Service146 Section II: Advanced OperationsPoliciesQoS policies consist of a collection of user defined traffic classes. A polic

Seite 54

AT-S63 Management Software Features GuideSection II: Advanced Operations 147QoS Policy GuidelinesFollowing is a list of QoS policy guidelines: A clas

Seite 55

Chapter 13: Quality of Service148 Section II: Advanced OperationsPacket ProcessingYou can use the switch’s QoS tools to perform any combination of the

Seite 56

AT-S63 Management Software Features GuideSection II: Advanced Operations 149Both the VLAN tag User Priority and the traffic class / flow group priorit

Seite 57

15Table 1: AT-9400 Switch Features ...

Seite 58 - Master and Slave Switches

Chapter 13: Quality of Service150 Section II: Advanced OperationsReplacing PrioritiesThe traffic class or flow group priority (if set) determines the

Seite 59 - Common VLAN

AT-S63 Management Software Features GuideSection II: Advanced Operations 151DiffServ DomainsDifferentiated Services (DiffServ) is a method of dividing

Seite 60 - Chapter 2: Enhanced Stacking

Chapter 13: Quality of Service152 Section II: Advanced OperationsTo use the QoS tool set to configure a DiffServ domain:1. As packets come into the do

Seite 61 - Slave Switches

AT-S63 Management Software Features GuideSection II: Advanced Operations 153ExamplesThe following examples demonstrate how to implement QoS in three s

Seite 62

Chapter 13: Quality of Service154 Section II: Advanced OperationsFigure 13. QoS Voice Application ExampleThe parts of the policies are: Classifier -

Seite 63 - Enhanced Stacking Guidelines

AT-S63 Management Software Features GuideSection II: Advanced Operations 155 Traffic Class - No action is taken by the traffic class, other than to s

Seite 64

Chapter 13: Quality of Service156 Section II: Advanced OperationsFigure 14. QoS Video Application ExampleThe parts of the policies are: Classifier -

Seite 65 - SNMPv1 and SNMPv2c

AT-S63 Management Software Features GuideSection II: Advanced Operations 157packets so they leave containing the new level, you would change option 5,

Seite 66

Chapter 13: Quality of Service158 Section II: Advanced OperationsPolicyComponentHierarchyThe purpose of this example is to illustrate the hierarchy of

Seite 67

AT-S63 Management Software Features GuideSection II: Advanced Operations 159Figure 16. Policy Component Hierarchy ExampleCreate Classifier01 - Classif

Seite 68 - Community String Attributes

Tables16Table 50: Port Configuration and Status (AtiStackSwitch MIB) ...

Seite 69

Chapter 13: Quality of Service160 Section II: Advanced Operations

Seite 70 - Chapter 3: SNMPv1 and SNMPv2c

Section II: Advanced Operations 161Chapter 14Denial of Service DefensesThis chapter explains the defense mechanisms in the management software that ca

Seite 71

Chapter 14: Denial of Service Defenses162 Section II: Advanced OperationsSupported PlatformsThis feature is supported on the following AT-9400 Switche

Seite 72

AT-S63 Management Software Features GuideSection II: Advanced Operations 163OverviewThe AT-S63 Management Software can help protect your network again

Seite 73

Chapter 14: Denial of Service Defenses164 Section II: Advanced OperationsSYN Flood AttackIn this type of attack, an attacker sends a large number of T

Seite 74 - Chapter 4: MAC Address Table

AT-S63 Management Software Features GuideSection II: Advanced Operations 165Smurf AttackThis DoS attack is instigated by an attacker sending a ICMP Ec

Seite 75 - Static Port Trunks

Chapter 14: Denial of Service Defenses166 Section II: Advanced OperationsLand AttackIn this attack, an attacker sends a bogus IP packet where the sour

Seite 76

AT-S63 Management Software Features GuideSection II: Advanced Operations 1672. If the source IP address is not local to the network, it discards the p

Seite 77

Chapter 14: Denial of Service Defenses168 Section II: Advanced OperationsTeardrop AttackAn attacker sends an IP packet in several fragments with a bog

Seite 78 - Load Distribution Methods

AT-S63 Management Software Features GuideSection II: Advanced Operations 169Ping of Death AttackThe attacker sends an oversized, fragmented ICMP Echo

Seite 79

17PrefaceThis guide describes the features of the AT-9400 Layer 2+ and Basic Layer 3 Gigabit Ethernet Switches and the AT-S63 Management Software.This

Seite 80

Chapter 14: Denial of Service Defenses170 Section II: Advanced OperationsIP Options AttackIn the basic scenario of an IP attack, an attacker sends pac

Seite 81 - LACP Port Trunks

AT-S63 Management Software Features GuideSection II: Advanced Operations 171Mirroring TrafficThe Land, Teardrop, Ping of Death, and IP Options defense

Seite 82

Chapter 14: Denial of Service Defenses172 Section II: Advanced OperationsDenial of Service Defense GuidelinesBelow are guidelines to observe when usin

Seite 83

Section III: Snooping Protocols 173Section IIISnooping ProtocolsThe chapters in this section contain overview information on the snooping protocols. T

Seite 84 - Chapter 6: LACP Port Trunks

174 Section III: Snooping Protocols

Seite 85

Section III: Snooping Protocols 175Chapter 15IGMP SnoopingThis chapter explains Internet Group Management Protocol (IGMP) snooping feature in the foll

Seite 86

Chapter 15: IGMP Snooping176 Section III: Snooping ProtocolsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+

Seite 87 - LACP System Priority

AT-S63 Management Software Features GuideSection III: Snooping Protocols 177OverviewIPv4 routers use IGMP to create lists of nodes that are members of

Seite 88 - LACP Port Priority Value

Chapter 15: IGMP Snooping178 Section III: Snooping ProtocolsWithout IGMP snooping a switch would have to flood multicast packets out all of its ports,

Seite 89

Section III: Snooping Protocols 179Chapter 16MLD SnoopingThis chapter explains Multicast Listener Discovery (MLD) snooping: “Supported Platforms” on

Seite 90

Preface18How This Guide is OrganizedThis guide has the following sections and chapters: Section I: Basic OperationsChapter 1, “Overview” on page 29Ch

Seite 91

Chapter 16: MLD Snooping180 Section III: Snooping ProtocolsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+ M

Seite 92

AT-S63 Management Software Features GuideSection III: Snooping Protocols 181OverviewMLD snooping performs the same function as IGMP snooping. The swit

Seite 93 - Port Mirror

Chapter 16: MLD Snooping182 Section III: Snooping Protocols

Seite 94

Section III: Snooping Protocols 183Chapter 17 RRP SnoopingThis chapter explains RRP snooping and contains the following sections:  “Supported Platfor

Seite 95

Chapter 17: RRP Snooping184 Section III: Snooping ProtocolsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+ M

Seite 96 - Chapter 7: Port Mirror

AT-S63 Management Software Features GuideSection III: Snooping Protocols 185OverviewThe Router Redundancy Protocol (RRP) allows multiple routers to sh

Seite 97 - Advanced Operations

Chapter 17: RRP Snooping186 Section III: Snooping ProtocolsGuidelinesThe following guidelines apply to the RRP snooping feature: The default setting

Seite 98

Section III: Snooping Protocols 187Chapter 18Ethernet Protection Switching Ring SnoopingThis chapter has the following sections: “Supported Platforms

Seite 99

Chapter 18: Ethernet Protection Switching Ring Snooping188 Section III: Snooping ProtocolsSupported PlatformsThis feature is supported on the followin

Seite 100 - Overview

AT-S63 Management Software Features GuideSection III: Snooping Protocols 189OverviewEthernet Protection Switching Ring is a feature found on selected

Seite 101 - Boot Configuration Files

AT-S63 Management Software Features Guide19 Section V: Spanning Tree ProtocolsChapter 20, “Spanning Tree and Rapid Spanning Tree Protocols” on page 2

Seite 102 - File Naming Conventions

Chapter 18: Ethernet Protection Switching Ring Snooping190 Section III: Snooping ProtocolsAfter creating the VLANs, you activate EPSR snooping by spec

Seite 103

AT-S63 Management Software Features GuideSection III: Snooping Protocols 191RestrictionsEPSR snooping has three important restrictions. All the restri

Seite 104 - Chapter 8: File System

Chapter 18: Ethernet Protection Switching Ring Snooping192 Section III: Snooping ProtocolsFigure 17. Double Fault Condition in EPSR SnoopingNow assume

Seite 105 - Chapter 9

AT-S63 Management Software Features GuideSection III: Snooping Protocols 193GuidelinesThe guidelines to EPSR snooping are: The AT-9400 Switch can sup

Seite 106 - Supported Platforms

Chapter 18: Ethernet Protection Switching Ring Snooping194 Section III: Snooping Protocols

Seite 107 - Event Messages

Section IV: SNMPv3 195Section IVSNMPv3The chapter in this section contains overview information on SNMPv3. The chapter is: Chapter 19, ”SNMPv3” on pa

Seite 108 - Syslog Client

196 Section IV: SNMPv3

Seite 109 - Classifiers

Section IV: SNMPv3 197Chapter 19SNMPv3This chapter provides a description of the AT-S63 implementation of the SNMPv3 protocol. The following sections

Seite 110

Chapter 19: SNMPv3198 Section IV: SNMPv3Supported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+ Models– AT-9408LC/S

Seite 111

AT-S63 Management Software Features GuideSection IV: SNMPv3 199OverviewThe SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c protocol implemen

Seite 112 - Service” on page 139

Copyright © 2007 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied

Seite 113 - Classifier Criteria

Preface20Product DocumentationFor overview information on the features of the AT-9400 Switch and the AT-S63 Management Software, refer to: AT-S63 Man

Seite 114 - Protocol (Layer 2)

Chapter 19: SNMPv3200 Section IV: SNMPv3SNMPv3 Authentication ProtocolsThe SNMPv3 protocol supports two authentication protocols—HMAC-MD5-96 (MD5) and

Seite 115

AT-S63 Management Software Features GuideSection IV: SNMPv3 201SNMPv3 Privacy ProtocolAfter you have configured an authentication protocol, you have t

Seite 116 - Destination IP Mask (Layer 3)

Chapter 19: SNMPv3202 Section IV: SNMPv3SNMPv3 MIB ViewsThe SNMPv3 protocol allows you to configure MIB views for users and groups. The MIB tree is de

Seite 117 - TCP Flags

AT-S63 Management Software Features GuideSection IV: SNMPv3 203After you specify a MIB subtree view you have the option of further restricting a view

Seite 118 - Guidelines

Chapter 19: SNMPv3204 Section IV: SNMPv3SNMPv3 Storage TypesEach SNMPv3 table entry has its own storage type. You can choose between nonvolatile stora

Seite 119 - Access Control Lists

AT-S63 Management Software Features GuideSection IV: SNMPv3 205SNMPv3 Message NotificationWhen you generate an SNMPv3 message from the switch, there a

Seite 120

Chapter 19: SNMPv3206 Section IV: SNMPv3SNMPv3 Tables The SNMPv3 configuration is neatly divided into configuring SNMPv3 user information and configur

Seite 121

AT-S63 Management Software Features GuideSection IV: SNMPv3 207 Configure SNMPv3 Notify Table Configure SNMPv3 Target Address Table Configure SNMPv

Seite 122

Chapter 19: SNMPv3208 Section IV: SNMPv3 “SNMPv3 Target Parameters Table” on page 209 “SNMPv3 Community Table” on page 209SNMPv3 UserTableThe Config

Seite 123 - Parts of an ACL

AT-S63 Management Software Features GuideSection IV: SNMPv3 209SNMPv3 NotifyTableThe Configure SNMPv3 Notify Table menu allows you to define the type

Seite 124

AT-S63 Management Software Features Guide21Where to Go FirstAllied Telesis recommends that you read Chapter 1, “Overview” on page 29 in this guide bef

Seite 125 - Examples

Chapter 19: SNMPv3210 Section IV: SNMPv3SNMPv3 Configuration ExampleYou may want to have two classes of SNMPv3 users—Managers and Operators. In this s

Seite 126 - Figure 7. ACL Example 2

Section V: Spanning Tree Protocols 211Section VSpanning Tree ProtocolsThe section has the following chapters: Chapter 20, “Spanning Tree and Rapid Sp

Seite 127 - Figure 8. ACL Example 3

212 Section V: Spanning Tree Protocols

Seite 128

Section V: Spanning Tree Protocols 213Chapter 20Spanning Tree and Rapid Spanning Tree ProtocolsThis chapter provides background information on the Spa

Seite 129 - Figure 11. ACL Example 6

Chapter 20: Spanning Tree and Rapid Spanning Tree Protocols214 Section V: Spanning Tree ProtocolsSupported PlatformsThis feature is supported on the f

Seite 130

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 215OverviewThe performance of a Ethernet network can be negatively impacte

Seite 131 - Class of Service

Chapter 20: Spanning Tree and Rapid Spanning Tree Protocols216 Section V: Spanning Tree ProtocolsBridge Priority and the Root BridgeThe first task tha

Seite 132

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 217Path Costs andPort CostsAfter the root bridge has been selected, the br

Seite 133

Chapter 20: Spanning Tree and Rapid Spanning Tree Protocols218 Section V: Spanning Tree ProtocolsTable 16 lists the STP port costs with Auto-Detect wh

Seite 134 - Chapter 12: Class of Service

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 219Table 19. Port Priority Value IncrementsIncrementBridge Priority Increm

Seite 135

Preface22Starting a Management SessionFor instructions on how to start a local or remote management session on the AT-9400 Switch, refer to the Starti

Seite 136 - Scheduling

Chapter 20: Spanning Tree and Rapid Spanning Tree Protocols220 Section V: Spanning Tree ProtocolsForwarding Delay and Topology ChangesIf there is a ch

Seite 137

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 221seconds and the default is two seconds. Consequently, if the AT-9400 Sw

Seite 138

Chapter 20: Spanning Tree and Rapid Spanning Tree Protocols222 Section V: Spanning Tree ProtocolsFigure 22. Edge PortA port can be both a point-to-poi

Seite 139 - Quality of Service

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 223Mixed STP and RSTP NetworksRSTP IEEE 802.1w is fully compliant with STP

Seite 140

Chapter 20: Spanning Tree and Rapid Spanning Tree Protocols224 Section V: Spanning Tree ProtocolsSpanning Tree and VLANsThe spanning tree implementati

Seite 141

Section V: Spanning Tree Protocols 225Chapter 21Multiple Spanning Tree ProtocolThis chapter provides background information on the Multiple Spanning T

Seite 142

Chapter 21: Multiple Spanning Tree Protocol226 Section V: Spanning Tree ProtocolsSupported PlatformsThis feature is supported on the following AT-9400

Seite 143

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 227OverviewAs mentioned in Chapter 20, ”Spanning Tree and Rapid Spanning T

Seite 144 - Flow Groups

Chapter 21: Multiple Spanning Tree Protocol228 Section V: Spanning Tree ProtocolsMultiple Spanning Tree Instance (MSTI)The individual spanning trees i

Seite 145 - Traffic Classes

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 229Figure 25. VLAN Fragmentation with STP or RSTPBlocked PortFAULTRPSMASTE

Seite 146 - Policies

AT-S63 Management Software Features Guide23Document ConventionsThis document uses the following conventions:NoteNotes provide additional information.C

Seite 147 - QoS Policy Guidelines

Chapter 21: Multiple Spanning Tree Protocol230 Section V: Spanning Tree ProtocolsFigure 26 illustrates the same two AT-9400 Switches and the same two

Seite 148 - Packet Prioritization

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 231A MSTI can contain more than one VLAN. This is illustrated in Figure 27

Seite 149

Chapter 21: Multiple Spanning Tree Protocol232 Section V: Spanning Tree ProtocolsMSTI GuidelinesFollowing are several guidelines to keep in mind about

Seite 150 - DSCP Values

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 233VLAN and MSTI AssociationsPart of the task to configuring MSTP involves

Seite 151 - DiffServ Domains

Chapter 21: Multiple Spanning Tree Protocol234 Section V: Spanning Tree ProtocolsPorts in Multiple MSTIsA port can be a member of more than one MSTI a

Seite 152

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 235Multiple Spanning Tree RegionsAnother important concept of MSTP is regi

Seite 153

Chapter 21: Multiple Spanning Tree Protocol236 Section V: Spanning Tree ProtocolsFigure 28 illustrates the concept of regions. It shows one MSTP regio

Seite 154

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 237The same is true for any ports connected to bridges running the single-

Seite 155 - Applications

Chapter 21: Multiple Spanning Tree Protocol238 Section V: Spanning Tree ProtocolsCommon andInternalSpanning Tree(CIST)MSTP has a default spanning tree

Seite 156

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 239Summary of GuidelinesCareful planning is essential for the successful i

Seite 157

Preface24Where to Find Web-based GuidesThe installation and user guides for all Allied Telesis products are available in portable document format (PDF

Seite 158 - Hierarchy

Chapter 21: Multiple Spanning Tree Protocol240 Section V: Spanning Tree ProtocolsNoteThe AT-S63 MSTP implementation complies fully with the new IEEE 8

Seite 159

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 241Associating VLANs to MSTIsAllied Telesis recommends that you assign all

Seite 160

Chapter 21: Multiple Spanning Tree Protocol242 Section V: Spanning Tree ProtocolsFigure 30. CIST and VLAN Guideline - Example 2When port 4 on switch B

Seite 161 - Denial of Service Defenses

AT-S63 Management Software Features GuideSection V: Spanning Tree Protocols 243Connecting VLANs Across Different RegionsSpecial consideration needs to

Seite 162

Chapter 21: Multiple Spanning Tree Protocol244 Section V: Spanning Tree ProtocolsAnother approach is to group those VLANs that need to span regions in

Seite 163

Section VI: Virtual LANs 245Section VIVirtual LANsThe chapters in this section discuss the various types of virtual LANs supported by the AT-9400 Swit

Seite 164 - SYN Flood Attack

246 Section VI: Virtual LANs

Seite 165 - Smurf Attack

Section VI: Virtual LANs 247Chapter 22 Port-based and Tagged VLANsThis chapter contains overview information about port-based and tagged virtual LANs

Seite 166 - Land Attack

Chapter 22: Port-based and Tagged VLANs248 Section VI: Virtual LANsSupported PlatformsThis feature is supported on the following AT-9400 Switches: La

Seite 167

AT-S63 Management Software Features GuideSection VI: Virtual LANs 249OverviewA VLAN is a group of ports on an Ethernet switch that form a logical Ethe

Seite 168 - Teardrop Attack

AT-S63 Management Software Features Guide25Contacting Allied TelesisThis section provides Allied Telesis contact information for technical support as

Seite 169 - Ping of Death Attack

Chapter 22: Port-based and Tagged VLANs250 Section VI: Virtual LANsManagement Software. You can change the VLAN memberships through the management sof

Seite 170 - IP Options Attack

AT-S63 Management Software Features GuideSection VI: Virtual LANs 251Port-based VLAN OverviewAs explained in “Overview” on page 249, a VLAN consists o

Seite 171 - Mirroring Traffic

Chapter 22: Port-based and Tagged VLANs252 Section VI: Virtual LANsthree AT-9400 Switches, you would assign the Marketing VLAN on each switch the same

Seite 172

AT-S63 Management Software Features GuideSection VI: Virtual LANs 253Guidelines toCreating a Port-based VLANBelow are the guidelines to creating a por

Seite 173 - Snooping Protocols

Chapter 22: Port-based and Tagged VLANs254 Section VI: Virtual LANsPort-basedExample 1Figure 32 illustrates an example of one AT-9424T/SP Gigabit Ethe

Seite 174

AT-S63 Management Software Features GuideSection VI: Virtual LANs 255In the example, each VLAN has one port connected to the router. The router interc

Seite 175 - IGMP Snooping

Chapter 22: Port-based and Tagged VLANs256 Section VI: Virtual LANsThe table below lists the port assignments for the Sales, Engineering, and Producti

Seite 176

AT-S63 Management Software Features GuideSection VI: Virtual LANs 257Tagged VLAN OverviewThe second type of VLAN supported by the AT-S63 Management So

Seite 177

Chapter 22: Port-based and Tagged VLANs258 Section VI: Virtual LANs Port VLAN IdentifierNoteFor explanations of VLAN name and VLAN identifier, refer

Seite 178 - Chapter 15: IGMP Snooping

AT-S63 Management Software Features GuideSection VI: Virtual LANs 259Tagged VLANExampleFigure 34 illustrates how tagged ports can be used to interconn

Seite 180

Chapter 22: Port-based and Tagged VLANs260 Section VI: Virtual LANsThe port assignments for the VLANs are as follows:This example is nearly identical

Seite 181

Section VI: Virtual LANs 261Chapter 23GARP VLAN Registration ProtocolThis chapter describes the GARP VLAN Registration Protocol (GVRP) and contains th

Seite 182 - Chapter 16: MLD Snooping

Chapter 23: GARP VLAN Registration Protocol262 Section VI: Virtual LANsSupported PlatformsThis feature is supported on the following AT-9400 Switches:

Seite 183 - RRP Snooping

AT-S63 Management Software Features GuideSection VI: Virtual LANs 263OverviewThe GARP VLAN Registration Protocol (GVRP) allows network devices to shar

Seite 184

Chapter 23: GARP VLAN Registration Protocol264 Section VI: Virtual LANsFigure 35 provides an example of how GVRP works.Figure 35. GVRP Example Switche

Seite 185

AT-S63 Management Software Features GuideSection VI: Virtual LANs 265as an tagged dynamic GVRP port. If the port is already a member of the VLAN, then

Seite 186

Chapter 23: GARP VLAN Registration Protocol266 Section VI: Virtual LANsGuidelinesFollowing are guidelines to observe when using this feature: GVRP is

Seite 187 - Snooping

AT-S63 Management Software Features GuideSection VI: Virtual LANs 267GVRP and Network SecurityGVRP should be used with caution because it can expose y

Seite 188

Chapter 23: GARP VLAN Registration Protocol268 Section VI: Virtual LANsGVRP-inactive Intermediate SwitchesIf two GVRP-active devices are separated by

Seite 189

AT-S63 Management Software Features GuideSection VI: Virtual LANs 269Generic Attribute Registration Protocol (GARP) OverviewThe following is a technic

Seite 190

Section I: Basic Operations 27Section IBasic OperationsThe chapters in this section contain background information on basic switch features. The chapt

Seite 191 - Restrictions

Chapter 23: GARP VLAN Registration Protocol270 Section VI: Virtual LANsGARP architecture is shown in Figure 36. Figure 36. GARP Architecture The GARP

Seite 192

AT-S63 Management Software Features GuideSection VI: Virtual LANs 271Figure 37. GID Architecture GARP registers and deregisters attribute values throu

Seite 193

Chapter 23: GARP VLAN Registration Protocol272 Section VI: Virtual LANsTo control the applicant state machine, an applicant administrative control par

Seite 194

Section VI: Virtual LANs 273Chapter 24Multiple VLAN ModesThis chapter describes the multiple VLAN modes. This chapter contains the following sections:

Seite 195 - Section IV

Chapter 24: Multiple VLAN Modes274 Section VI: Virtual LANsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+ M

Seite 196 - 196 Section IV: SNMPv3

AT-S63 Management Software Features GuideSection VI: Virtual LANs 275OverviewThe multiple VLAN modes are designed to simplify the task of configuring

Seite 197 - Chapter 19

Chapter 24: Multiple VLAN Modes276 Section VI: Virtual LANs802.1Q- Compliant Multiple VLAN ModeIn this mode, each port is placed into a separate VLAN

Seite 198

AT-S63 Management Software Features GuideSection VI: Virtual LANs 277This highly segmented configuration is useful in situations where traffic generat

Seite 199

Chapter 24: Multiple VLAN Modes278 Section VI: Virtual LANsNon-802.1Q Compliant Multiple VLAN ModeUnlike the 802.1Q-compliant VLAN mode, which isolate

Seite 200 - 200 Section IV: SNMPv3

Section VI: Virtual LANs 279Chapter 25 Protected Ports VLANsThis chapter explains protected ports VLANs. It contains the following sections: “Support

Seite 201 - SNMPv3 Privacy Protocol

28 Section I: Basic Operations

Seite 202 - SNMPv3 MIB Views

Chapter 25: Protected Ports VLANs280 Section VI: Virtual LANsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+

Seite 203 - Section IV: SNMPv3 203

AT-S63 Management Software Features GuideSection VI: Virtual LANs 281OverviewThe purpose of a protected ports VLAN is to allow multiple ports on the s

Seite 204 - SNMPv3 Storage Types

Chapter 25: Protected Ports VLANs282 Section VI: Virtual LANsTo create a protected ports VLAN, you perform many of the same steps that you do when you

Seite 205 - SNMPv3 Message Notification

AT-S63 Management Software Features GuideSection VI: Virtual LANs 283GuidelinesFollowing are the guidelines for implementing protected ports VLANS: A

Seite 206 - SNMPv3 Tables

Chapter 25: Protected Ports VLANs284 Section VI: Virtual LANs

Seite 207

Section VI: Virtual LANs 285Chapter 26MAC Address-based VLANsThis chapter contains overview information about MAC address-based VLANs. Sections in the

Seite 208 - 208 Section IV: SNMPv3

Chapter 26: MAC Address-based VLANs286 Section VI: Virtual LANsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer

Seite 209 - Section IV: SNMPv3 209

AT-S63 Management Software Features GuideSection VI: Virtual LANs 287OverviewAs explained in “Overview” on page 249, VLANs are a means for creating in

Seite 210 - SNMPv3 Configuration Example

Chapter 26: MAC Address-based VLANs288 Section VI: Virtual LANsEgress PortsImplementing a MAC address-based VLAN involves more than entering the MAC a

Seite 211 - Spanning Tree Protocols

AT-S63 Management Software Features GuideSection VI: Virtual LANs 289The community characteristic of egress ports relieves you from having to map each

Seite 212

29Chapter 1OverviewThis chapter has the following sections: “Layer 2+ and Basic Layer 3 Switches” on page 30 “AT-S63 Management Software” on page 35

Seite 213 - Protocols

Chapter 26: MAC Address-based VLANs290 Section VI: Virtual LANsIf security is a major concern for your network, you might not want to assign a port as

Seite 214

AT-S63 Management Software Features GuideSection VI: Virtual LANs 291VLANs That Span SwitchesTo create a MAC address-based VLAN that spans switches, y

Seite 215

Chapter 26: MAC Address-based VLANs292 Section VI: Virtual LANsTable 23. Example of a MAC Address-based VLAN Spanning SwitchesSwitch A Switch BVLAN Na

Seite 216

AT-S63 Management Software Features GuideSection VI: Virtual LANs 293VLAN HierarchyThe switch’s management software employs a VLAN hierarchy when hand

Seite 217 - Port Costs

Chapter 26: MAC Address-based VLANs294 Section VI: Virtual LANsSteps to Creating a MAC Address-based VLANHere are the three main steps to creating a M

Seite 218

AT-S63 Management Software Features GuideSection VI: Virtual LANs 295GuidelinesFollow these guidelines when implementing a MAC address-based VLAN: MA

Seite 219

Chapter 26: MAC Address-based VLANs296 Section VI: Virtual LANs Egress ports cannot be part of a static or LACP trunk. Since this type of VLAN does

Seite 220 - Data Units

Section VII: Internet Protocol Routing 297Section VIIRoutingThis section has the following chapters: Chapter 27, “Internet Protocol Version 4 Packet

Seite 221 - Point-to-Point

298 Section VII: Internet Protocol Routing

Seite 222 - (Full-duplex Mode)

299Chapter 27Internet Protocol Version 4 Packet RoutingThis chapter describes Internet Protocol version 4 (IPv4) packet routing on the AT-9400 Basic L

Seite 224 - Spanning Tree and VLANs

Chapter 1: Overview30Layer 2+ and Basic Layer 3 SwitchesThe switches in the AT-9400 Gigabit Ethernet Series are divided into two groups: Layer 2+ Swi

Seite 225 - Chapter 21

Chapter 27: Internet Protocol Version 4 Packet Routing300 Section VII: RoutingSupported PlatformsThis feature is supported on the following switches:

Seite 226

AT-S63 Management Software Features GuideSection VII: Routing 301OverviewThis section contains an overview of the IPv4 routing feature on the AT-9400

Seite 227

Chapter 27: Internet Protocol Version 4 Packet Routing302 Section VII: RoutingAt the end of this overview are two examples that illustrate the sequenc

Seite 228

AT-S63 Management Software Features GuideSection VII: Routing 303Routing InterfacesThe IPv4 packet routing feature on the switch is built on the found

Seite 229 - AT-9424T/GB

Chapter 27: Internet Protocol Version 4 Packet Routing304 Section VII: RoutingNoteRouting interfaces can be configured from either the command line in

Seite 230

AT-S63 Management Software Features GuideSection VII: Routing 305the other interfaces in the same VLAN must be assigned manually. For example, if ther

Seite 231

Chapter 27: Internet Protocol Version 4 Packet Routing306 Section VII: RoutingInterface NamesMany of the IPv4 routing commands have a parameter for an

Seite 232 - MSTI Guidelines

AT-S63 Management Software Features GuideSection VII: Routing 307Static RoutesIn order for the switch to route an IPv4 packet to a remote network or s

Seite 233 - VLAN and MSTI Associations

Chapter 27: Internet Protocol Version 4 Packet Routing308 Section VII: Routingdestination. The range for the preference parameter is 0 to 65535. The l

Seite 234 - Ports in Multiple MSTIs

AT-S63 Management Software Features GuideSection VII: Routing 309Routing Information Protocol (RIP)A switch can automatically learn routes to remote d

Seite 235

AT-S63 Management Software Features Guide31Table 1. AT-9400 Switch FeaturesLayer 2+ Switches(Version 2.2.0)Basic Layer 3 Switches(Version 3.0.0)Stack1

Seite 236

Chapter 27: Internet Protocol Version 4 Packet Routing310 Section VII: Routingtheir tables.NoteA RIP version 2 password is sent in plaintext. The AT-S

Seite 237

AT-S63 Management Software Features GuideSection VII: Routing 311Default RoutesA default route is used when the switch cannot find a route in its rout

Seite 238

Chapter 27: Internet Protocol Version 4 Packet Routing312 Section VII: RoutingEqual-cost Multi-path (ECMP) RoutingThe routing table uses ECMP to store

Seite 239 - Summary of Guidelines

AT-S63 Management Software Features GuideSection VII: Routing 313ECMP also applies to default routes. This enables the switch to store up to 32 defaul

Seite 240

Chapter 27: Internet Protocol Version 4 Packet Routing314 Section VII: RoutingRouting TableThe switch maintains its routing information in a table of

Seite 241 - Associating VLANs to MSTIs

AT-S63 Management Software Features GuideSection VII: Routing 315Address Resolution Protocol (ARP) TableThe switch maintains an ARP table of IP addres

Seite 242

Chapter 27: Internet Protocol Version 4 Packet Routing316 Section VII: RoutingInternet Control Message Protocol (ICMP)ICMP allows routers to send erro

Seite 243

AT-S63 Management Software Features GuideSection VII: Routing 317Time to Live Exceeded (11) If the TTL field in a packet falls to zero the switch will

Seite 244

Chapter 27: Internet Protocol Version 4 Packet Routing318 Section VII: RoutingRouting Interfaces and Management FeaturesRouting interfaces are primary

Seite 245 - Virtual LANs

AT-S63 Management Software Features GuideSection VII: Routing 319As an example, assume you decided not to implement the IPv4 routing feature on a swit

Seite 246 - 246 Section VI: Virtual LANs

Chapter 1: Overview32Quality of Service YYYYYYYYDenial of service defensesYYYYYYYYSnooping ProtocolsInternet Group Management Protocol (IGMP) snooping

Seite 247 - Port-based and Tagged VLANs

Chapter 27: Internet Protocol Version 4 Packet Routing320 Section VII: RoutingPinging a RemoteDeviceThis function is used to validate the existence of

Seite 248

AT-S63 Management Software Features GuideSection VII: Routing 321Local InterfaceThe local interface is used with the enhanced stacking feature. It is

Seite 249

Chapter 27: Internet Protocol Version 4 Packet Routing322 Section VII: RoutingAT-9408LC/SP AT-9424T/GB, and AT-9424T/SP SwitchesThe AT-9408LC/SP, AT-9

Seite 250 -  Tagged VLANs

AT-S63 Management Software Features GuideSection VII: Routing 323NoteThe AT-9408LC/SP, AT-9424T/GB, and AT-9424T/SP Switches do not use the ARP table

Seite 251 - Port-based VLAN Overview

Chapter 27: Internet Protocol Version 4 Packet Routing324 Section VII: RoutingRouting Command ExampleThis section contains an example of the IPv4 rout

Seite 252 - Identifier

AT-S63 Management Software Features GuideSection VII: Routing 325Creating theVLANsThe first step is to create the VLANs for the local subnets on the s

Seite 253

Chapter 27: Internet Protocol Version 4 Packet Routing326 Section VII: Routingcommand.Adding a StaticRoute andDefault RouteBuilding on our example, as

Seite 254 - Example 1

AT-S63 Management Software Features GuideSection VII: Routing 327Adding RIP Rather than adding the static routes to remote destinations, or perhaps to

Seite 255 - Example 2

Chapter 27: Internet Protocol Version 4 Packet Routing328 Section VII: RoutingNon-routing Command ExampleThis example illustrates how to assign an IP

Seite 256 - 256 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VII: Routing 329The following command creates a default route for the example and specifies the next

Seite 257 - Tagged VLAN Overview

AT-S63 Management Software Features Guide33802.1Q-compliant and non-802.1Q-compliant multiple VLAN modesYYYYYYYYGARP VLAN Registration ProtocolYYYYYYY

Seite 258

Chapter 27: Internet Protocol Version 4 Packet Routing330 Section VII: RoutingUpgrading from AT-S63 Version 1.3.0 or EarlierWhen the AT-9400 Switch ru

Seite 259 - Tagged VLAN

331Chapter 28BOOTP Relay AgentThis chapter has the following sections: “Supported Platforms” on page 332 “Overview” on page 333 “Guidelines” on pag

Seite 260 - 260 Section VI: Virtual LANs

Chapter 28: BOOTP Relay Agent332 Section VII: RoutingSupported PlatformsThis feature is supported on the following switches: Layer 2+ Models– Not su

Seite 261 - Chapter 23

AT-S63 Management Software Features GuideSection VII: Routing 333OverviewThe AT-S63 Management Software comes with a BOOTP relay agent for relaying BO

Seite 262

Chapter 28: BOOTP Relay Agent334 Section VII: RoutingA routing interface that receives a BOOTP reply from a server inspects the broadcast flag field i

Seite 263

AT-S63 Management Software Features GuideSection VII: Routing 335GuidelinesThese guidelines apply to the BOOTP relay agent: A routing interface funct

Seite 264 - 264 Section VI: Virtual LANs

Chapter 28: BOOTP Relay Agent336 Section VII: Routing

Seite 265 - Section VI: Virtual LANs 265

337Chapter 29Virtual Router Redundancy ProtocolThe chapter has the following sections: “Supported Platforms” on page 338 “Overview” on page 339 “Ma

Seite 266

Chapter 29: Virtual Router Redundancy Protocol338 Section VII: RoutingSupported PlatformsThis feature is supported on the following switches: Layer 2

Seite 267 - GVRP and Network Security

AT-S63 Management Software Features GuideSection VII: Routing 339OverviewThis chapter describes the Virtual Router Redundancy Protocol (VRRP) support

Seite 268 - 268 Section VI: Virtual LANs

Chapter 1: Overview34Remote Secure Shell managementYYYYYYYYTACACS+ and RADIUS authenticationYYYYYYYYManagement access control listYYYYYYYY1. Basic Lay

Seite 269 - Section VI: Virtual LANs 269

Chapter 29: Virtual Router Redundancy Protocol340 Section VII: RoutingMaster SwitchThe virtual router has a virtual MAC address known by all the switc

Seite 270 - 270 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VII: Routing 341Backup SwitchesAll the other switches participating in the virtual router are designa

Seite 271 - Section VI: Virtual LANs 271

Chapter 29: Virtual Router Redundancy Protocol342 Section VII: RoutingInterface MonitoringThe virtual router can monitor certain interfaces to change

Seite 272 - 272 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VII: Routing 343Port MonitoringPort monitoring is the process of detecting the failure of ports that

Seite 273 - Multiple VLAN Modes

Chapter 29: Virtual Router Redundancy Protocol344 Section VII: RoutingVRRP on the SwitchVRRP is disabled by default. When a virtual router is created

Seite 274

AT-S63 Management Software Features GuideSection VII: Routing 345prevents a switch from inadvertently backing up another switch. The authentication ty

Seite 275

Chapter 29: Virtual Router Redundancy Protocol346 Section VII: Routing

Seite 276 - 276 Section VI: Virtual LANs

Section VIII: Port Security 347Section VIIIPort SecurityThe chapters in this section contain overview information on the port security features of the

Seite 277 - Section VI: Virtual LANs 277

348 Section VIII: Port Security

Seite 278 - 278 Section VI: Virtual LANs

Section VIII: Port Security 349Chapter 30MAC Address-based Port SecurityThe sections in this chapter include: “Supported Platforms” on page 350 “Ove

Seite 279 - Protected Ports VLANs

AT-S63 Management Software Features Guide35AT-S63 Management SoftwareThe AT-9400 Switch is managed with the AT-S63 Management Software. The software c

Seite 280

Chapter 30: MAC Address-based Port Security350 Section VIII: Port SecuritySupported PlatformsThis feature is supported on the following AT-9400 Switch

Seite 281

AT-S63 Management Software Features GuideSection VIII: Port Security 351OverviewYou can use this feature to enhance the security of your network by co

Seite 282 - 282 Section VI: Virtual LANs

Chapter 30: MAC Address-based Port Security352 Section VIII: Port SecuritySecured This security level uses only static MAC addresses assigned to a por

Seite 283

AT-S63 Management Software Features GuideSection VIII: Port Security 353Invalid Frames and Intrusion ActionsWhen a port receives an invalid frame, it

Seite 284 - 284 Section VI: Virtual LANs

Chapter 30: MAC Address-based Port Security354 Section VIII: Port SecurityGuidelinesThe following guidelines apply to MAC address-based port security:

Seite 285 - MAC Address-based VLANs

Section VIII: Port Security 355Chapter 31802.1x Port-based Network Access ControlThe sections in this chapter are: “Supported Platforms” on page 356

Seite 286

Chapter 31: 802.1x Port-based Network Access Control356 Section VIII: Port SecuritySupported PlatformsThis feature is supported on the following AT-94

Seite 287

AT-S63 Management Software Features GuideSection VIII: Port Security 357OverviewThe AT-S63 Management Software has several different methods for prote

Seite 288 - Egress Ports

Chapter 31: 802.1x Port-based Network Access Control358 Section VIII: Port Security Authentication server - The authentication server is the network

Seite 289 - Section VI: Virtual LANs 289

AT-S63 Management Software Features GuideSection VIII: Port Security 359Authentication ProcessBelow is a brief overview of the authentication process

Seite 290 - 290 Section VI: Virtual LANs

Chapter 1: Overview36Management Interfaces and FeaturesThe AT-S63 Management Software has three management interfaces:  Menus interface Command line

Seite 291 - VLANs That Span Switches

Chapter 31: 802.1x Port-based Network Access Control360 Section VIII: Port SecurityPort RolesPart of the task of implementing this feature is specifyi

Seite 292 - 292 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VIII: Port Security 361Assigning unique username and password combinations to your network users and

Seite 293 - VLAN Hierarchy

Chapter 31: 802.1x Port-based Network Access Control362 Section VIII: Port SecurityNoteA supplicant connected to an authenticator port set to force-au

Seite 294 - 294 Section VI: Virtual LANs

AT-S63 Management Software Features GuideSection VIII: Port Security 363Authenticator Ports with Single and Multiple SupplicantsAn authenticator port

Seite 295

Chapter 31: 802.1x Port-based Network Access Control364 Section VIII: Port SecurityFigure 40. Authenticator Port in Single Operating Mode with a Singl

Seite 296

AT-S63 Management Software Features GuideSection VIII: Port Security 365Figure 41. Single Operating Mode with Multiple Clients Using the Piggy-back Fe

Seite 297 - Section VII

Chapter 31: 802.1x Port-based Network Access Control366 Section VIII: Port SecurityIf the clients are connected to an 802.1x-compliant device, such as

Seite 298

AT-S63 Management Software Features GuideSection VIII: Port Security 367Figure 43. Single Operating Mode with Multiple Clients Using the Piggy-back Fe

Seite 299 - Chapter 27

Chapter 31: 802.1x Port-based Network Access Control368 Section VIII: Port SecurityAn example of this authenticator operating mode is illustrated in F

Seite 300

AT-S63 Management Software Features GuideSection VIII: Port Security 369none, port 6 on switch A will discard the packets because switch B would not b

Seite 301

AT-S63 Management Software Features Guide37Enhanced stacking Y Y YSNMPv1 and SNMPv2community stringsYYYPort parameters Y Y YPort statistics Y Y YMAC a

Seite 302 - 302 Section VII: Routing

Chapter 31: 802.1x Port-based Network Access Control370 Section VIII: Port SecuritySupplicant and VLAN AssociationsOne of the challenges to managing a

Seite 303 - Routing Interfaces

AT-S63 Management Software Features GuideSection VIII: Port Security 371Single OperatingModeHere are the operating characteristics for the switch when

Seite 304 - Subnet Mask

Chapter 31: 802.1x Port-based Network Access Control372 Section VIII: Port SecurityGuest VLANAn authenticator port in the unauthorized state typically

Seite 305 - Section VII: Routing 305

AT-S63 Management Software Features GuideSection VIII: Port Security 373RADIUS AccountingThe AT-S63 Management Software supports RADIUS accounting for

Seite 306 - Interface Names

Chapter 31: 802.1x Port-based Network Access Control374 Section VIII: Port SecurityGeneral StepsHere are the general steps to implementing 802.1x Port

Seite 307 - Static Routes

AT-S63 Management Software Features GuideSection VIII: Port Security 375GuidelinesThe following are general guidelines to using this feature: Ports o

Seite 308 - 308 Section VII: Routing

Chapter 31: 802.1x Port-based Network Access Control376 Section VIII: Port Security An authenticator port cannot be part of a static port trunk, LACP

Seite 309 - Section VII: Routing 309

AT-S63 Management Software Features GuideSection VIII: Port Security 377Here are guidelines for adding VLAN assignments to supplicant accounts on a RA

Seite 310

Chapter 31: 802.1x Port-based Network Access Control378 Section VIII: Port Security

Seite 311 - Default Routes

Section IX: Management Security 379Section IXManagement SecurityThe chapters in this section describe the management security features of the AT-9400

Seite 312 - 312 Section VII: Routing

Chapter 1: Overview38Snooping ProtocolsInternet Group Management Protocol (IGMP) snoopingYYYMulticast Listener Discovery (MLD) snoopingYYRouter Redund

Seite 313 - Section VII: Routing 313

380 Section IX: Management Security

Seite 314 - Routing Table

Section IX: Management Security 381Chapter 32Web ServerThe sections in this chapter are: “Supported Platforms” on page 382 “Overview” on page 383 “

Seite 315 -  1024 dynamic entries

Chapter 32: Web Server382 Section IX: Management SecuritySupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+ Mod

Seite 316 - 316 Section VII: Routing

AT-S63 Management Software Features GuideSection IX: Management Security 383OverviewThe AT-S63 Management Software has a web server and a special web

Seite 317 - Section VII: Routing 317

Chapter 32: Web Server384 Section IX: Management SecurityConfiguring the Web Server for HTTPThe following steps configure the web server for non-secur

Seite 318

AT-S63 Management Software Features GuideSection IX: Management Security 385Configuring the Web Server for HTTPSThe following sections outline the ste

Seite 319 - Section VII: Routing 319

Chapter 32: Web Server386 Section IX: Management Security6. After receiving the certificates from the CA, download them into the switch’s file system

Seite 320 - BOOTP Server

Section IX: Management Security 387Chapter 33Encryption KeysThe sections in this chapter are: “Supported Platforms” on page 388 “Overview” on page 3

Seite 321 - Local Interface

Chapter 33: Encryption Keys388 Section IX: Management SecuritySupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2

Seite 322 - 322 Section VII: Routing

AT-S63 Management Software Features GuideSection IX: Management Security 389OverviewProtecting your managed switches from unauthorized management acce

Seite 323 - Section VII: Routing 323

AT-S63 Management Software Features Guide39Internet Protocol RoutingRouting interfaces Y YStatic routes YRouting Information Protocol (RIP) YAddress R

Seite 324 - Routing Command Example

Chapter 33: Encryption Keys390 Section IX: Management SecurityEncryption Key LengthWhen you create a key pair, you have to specify its length in bits.

Seite 325 - Interfaces

AT-S63 Management Software Features GuideSection IX: Management Security 391Encryption Key GuidelinesObserve the following guidelines when creating an

Seite 326 - Default Route

Chapter 33: Encryption Keys392 Section IX: Management SecurityTechnical OverviewThe encryption feature provides the following data security services:

Seite 327 - Selecting the

AT-S63 Management Software Features GuideSection IX: Management Security 393algorithm and key. For a given input block of plaintext ECB always produce

Seite 328 - Non-routing Command Example

Chapter 33: Encryption Keys394 Section IX: Management Securitysecret. Only the decryption, or private key, needs to be kept secret. The other name for

Seite 329 - Section VII: Routing 329

AT-S63 Management Software Features GuideSection IX: Management Security 395 It is very hard to find another message and key which give the same hash

Seite 330 - 330 Section VII: Routing

Chapter 33: Encryption Keys396 Section IX: Management SecurityA Diffie-Hellman algorithm requires more processing overhead than RSA-based key exchange

Seite 331 - BOOTP Relay Agent

Section IX: Management Security 397Chapter 34PKI Certificates and SSLThe sections in this chapter are: “Supported Platforms” on page 398 “Overview”

Seite 332

Chapter 34: PKI Certificates and SSL398 Section IX: Management SecuritySupported PlatformsThis feature is supported on the following AT-9400 Switches:

Seite 333

AT-S63 Management Software Features GuideSection IX: Management Security 399OverviewThis chapter describes the second part of the encryption feature o

Seite 334 - 334 Section VII: Routing

Contents4Chapter 2: Enhanced Stacking ...

Seite 335

Chapter 1: Overview402. You cannot upload or download files to a compact flash card with the web browser interface. Also, the inter-face does not supp

Seite 336 - 336 Section VII: Routing

Chapter 34: PKI Certificates and SSL400 Section IX: Management Securitynetwork equipment. With private CAs, companies can keep track of the certificat

Seite 337 - Chapter 29

AT-S63 Management Software Features GuideSection IX: Management Security 401Distinguished NamesPart of the task to creating a self-signed certificate

Seite 338

Chapter 34: PKI Certificates and SSL402 Section IX: Management SecurityIf your network has a Domain Name System and you mapped a name to the IP addres

Seite 339

AT-S63 Management Software Features GuideSection IX: Management Security 403SSL and Enhanced StackingSecure Sockets Layer (SSL) is supported in an enh

Seite 340 - Master Switch

Chapter 34: PKI Certificates and SSL404 Section IX: Management SecurityGuidelinesThe guidelines for creating certificates are: A certificate can have

Seite 341 - Backup Switches

AT-S63 Management Software Features GuideSection IX: Management Security 405Technical OverviewThis section describes the Secure Sockets Layer (SSL) fe

Seite 342 - Interface Monitoring

Chapter 34: PKI Certificates and SSL406 Section IX: Management SecuritySSL uses asymmetrical (Public Key) encryption to establish a connection between

Seite 343 - Port Monitoring

AT-S63 Management Software Features GuideSection IX: Management Security 407To verify the authenticity of a server, the server has a public and privat

Seite 344 - VRRP on the Switch

Chapter 34: PKI Certificates and SSL408 Section IX: Management Securitythis, and other attacks, PKI provides a means for secure transfer of public key

Seite 345

AT-S63 Management Software Features GuideSection IX: Management Security 409Elements of aPublic KeyInfrastructureA public key infrastructure is a set

Seite 346 - 346 Section VII: Routing

AT-S63 Management Software Features Guide41Management Access MethodsYou can access the AT-S63 Management Software on the switch several ways: Local s

Seite 347 - Port Security

Chapter 34: PKI Certificates and SSL410 Section IX: Management SecurityCertificateValidationTo validate a certificate, the end entity verifies the sig

Seite 348

AT-S63 Management Software Features GuideSection IX: Management Security 411PKIImplementationThe following sections discuss the implementation of PKI

Seite 349 - Chapter 30

Chapter 34: PKI Certificates and SSL412 Section IX: Management Security

Seite 350

Section IX: Management Security 413Chapter 35Secure Shell (SSH)The sections in this chapter are: “Supported Platforms” on page 414 “Overview” on pag

Seite 351

Chapter 35: Secure Shell (SSH)414 Section IX: Management SecuritySupported PlatformsThis feature is supported on the following AT-9400 Switches: Laye

Seite 352

AT-S63 Management Software Features GuideSection IX: Management Security 415OverviewSecure management is increasingly important in modern networks, as

Seite 353

Chapter 35: Secure Shell (SSH)416 Section IX: Management SecuritySupport for SSHThe AT-S63 implementation of the SSH protocol is compliant with the SS

Seite 354

AT-S63 Management Software Features GuideSection IX: Management Security 417SSH ServerWhen the SSH server is enabled, connections from SSH clients are

Seite 355 - Chapter 31

Chapter 35: Secure Shell (SSH)418 Section IX: Management SecuritySSH ClientsThe SSH protocol provides a secure connection between the switch and SSH c

Seite 356

AT-S63 Management Software Features GuideSection IX: Management Security 419SSH and Enhanced StackingThe AT-S63 Management Software allows for encrypt

Seite 357

Chapter 1: Overview42Remote SNMPManagementYou can also remotely configure the switch using a Simple Network Management Protocol (SNMP) application, su

Seite 358

Chapter 35: Secure Shell (SSH)420 Section IX: Management SecurityBecause enhanced stacking does not allow for SSH encrypted management sessions betwee

Seite 359 - Authentication Process

AT-S63 Management Software Features GuideSection IX: Management Security 421SSH Configuration GuidelinesHere are the guidelines to configuring SSH: S

Seite 360 - Port Roles

Chapter 35: Secure Shell (SSH)422 Section IX: Management SecurityGeneral Steps to Configuring SSHConfiguring the SSH server involves the following pro

Seite 361 - Operational Settings

Section IX: Management Security 423Chapter 36TACACS+ and RADIUS ProtocolsThis chapter describes the two authentication protocols TACACS+ and RADIUS. S

Seite 362

Chapter 36: TACACS+ and RADIUS Protocols424 Section IX: Management SecuritySupported PlatformsThis feature is supported on the following AT-9400 Switc

Seite 363 - Single Operating

AT-S63 Management Software Features GuideSection IX: Management Security 425OverviewTACACS+ and RADIUS are authentication protocols that can enhance t

Seite 364

Chapter 36: TACACS+ and RADIUS Protocols426 Section IX: Management SecurityWhen a network manager logs in to a switch to manage the device, the switch

Seite 365

AT-S63 Management Software Features GuideSection IX: Management Security 427GuidelinesHere are the main steps to using the TACACS+ or RADIUS client on

Seite 366

Chapter 36: TACACS+ and RADIUS Protocols428 Section IX: Management Securitymaximum length for a password is 16 alphanumeric characters and spaces.– T

Seite 367 - Operating Mode

AT-S63 Management Software Features GuideSection IX: Management Security 429NoteIf no authentication server responds or if no servers have been define

Seite 368

AT-S63 Management Software Features Guide43Manager Access LevelsThe AT-S63 Management Software has two manager access levels of manager and operator.

Seite 369

Chapter 36: TACACS+ and RADIUS Protocols430 Section IX: Management Security

Seite 370

Section IX: Management Security 431Chapter 37Management Access Control ListThis chapter explains how to restrict Telnet and web browser management acc

Seite 371

Chapter 37: Management Access Control List432 Section IX: Management SecuritySupported PlatformsThis feature is supported on the following AT-9400 Swi

Seite 372 - Guest VLAN

AT-S63 Management Software Features GuideSection IX: Management Security 433OverviewThis chapter explains how to restrict remote management access of

Seite 373 - RADIUS Accounting

Chapter 37: Management Access Control List434 Section IX: Management SecurityParts of a Management ACEAn ACE has the following three parts:  IP addre

Seite 374 - General Steps

AT-S63 Management Software Features GuideSection IX: Management Security 435GuidelinesBelow are guidelines for the management ACL: The default settin

Seite 375

Chapter 37: Management Access Control List436 Section IX: Management SecurityExamplesFollowing are several examples of ACEs.This ACE allows the manage

Seite 376

AT-S63 Management Software Features GuideSection IX: Management Security 437The two ACEs in this management ACL permit remote management from the mana

Seite 377

Chapter 37: Management Access Control List438 Section IX: Management Security

Seite 378

439Appendix AAT-S63 Management Software Default SettingsThis appendix lists the factory default settings for the AT-S63 Management Software. It contai

Seite 379 - Management Security

Chapter 1: Overview44Installation and Management ConfigurationsThe AT-9400 Switches can be installed in three configurations.Stand-aloneSwitchAll the

Seite 380

Appendix A: AT-S63 Management Software Default Settings440 “Telnet Server” on page 471 “Virtual Router Redundancy Protocol” on page 472 “VLANs” on

Seite 381 - Web Server

AT-S63 Management Software Features Guide441Address Resolution Protocol CacheThe following table lists the ARP cache default setting.ARP Cache Setting

Seite 382

Appendix A: AT-S63 Management Software Default Settings442Boot Configuration FileThe following table lists the names of the default configuration file

Seite 383

AT-S63 Management Software Features Guide443BOOTP Relay AgentThe following table lists the default setting for the BOOTP relay agent.BOOTP Relay Agent

Seite 384 - Chapter 32: Web Server

Appendix A: AT-S63 Management Software Default Settings444Class of ServiceThe following table lists the default mappings of IEEE 802.1p priority level

Seite 385

AT-S63 Management Software Features Guide445Denial of Service DefensesThe following table lists the default settings for the Denial of Service prevent

Seite 386

Appendix A: AT-S63 Management Software Default Settings446802.1x Port-Based Network Access ControlThe following table describes the 802.1x Port-based

Seite 387 - Encryption Keys

AT-S63 Management Software Features Guide447The following table lists the default settings for a supplicant port.VLAN Assignment EnabledSecure VLAN On

Seite 388

Appendix A: AT-S63 Management Software Default Settings448Enhanced StackingThe following table lists the enhanced stacking default setting.Enhanced St

Seite 389

AT-S63 Management Software Features Guide449Ethernet Protection Switching Ring (EPSR) SnoopingThe following table lists the EPSR default setting.EPSR

Seite 390 - Encryption Key Length

AT-S63 Management Software Features Guide45Here are the main points of stacking: The AT-9400 Gigabit Ethernet Switches operate as a single, logical u

Seite 391 - Encryption Key Guidelines

Appendix A: AT-S63 Management Software Default Settings450Event LogsThe following table lists the default settings for both the permanent and temporar

Seite 392 - Technical Overview

AT-S63 Management Software Features Guide451GVRPThis section provides the default settings for GVRP.GVRP Setting DefaultStatus DisabledGIP Status Enab

Seite 393

Appendix A: AT-S63 Management Software Default Settings452IGMP SnoopingThe following table lists the IGMP Snooping default settings.IGMP Snooping Sett

Seite 394 - Authentication

AT-S63 Management Software Features Guide453Internet Protocol Version 4 Packet RoutingThe following table lists the IPv4 packet routing default settin

Seite 395 - Algorithms

Appendix A: AT-S63 Management Software Default Settings454MAC Address-based Port SecurityThe following table lists the MAC address-based port security

Seite 396 - Chapter 33: Encryption Keys

AT-S63 Management Software Features Guide455MAC Address TableThe following table lists the default setting for the MAC address table.MAC Address Table

Seite 397 - PKI Certificates and SSL

Appendix A: AT-S63 Management Software Default Settings456Management Access Control ListThe following table lists the default setting for the manageme

Seite 398

AT-S63 Management Software Features Guide457Manager and Operator AccountThe following table lists the manager and operator account default settings.No

Seite 399 - Types of Certificates

Appendix A: AT-S63 Management Software Default Settings458Multicast Listener Discovery SnoopingThe following table lists the MLD Snooping default sett

Seite 400

AT-S63 Management Software Features Guide459Public Key InfrastructureThe following table lists the PKI default settings, including the generate enroll

Seite 401 - Distinguished Names

Chapter 1: Overview46IP ConfigurationDo you intend to remotely manage the switch with a Telnet or Secure Shell client, or a web browser? Or, will the

Seite 402

Appendix A: AT-S63 Management Software Default Settings460Port SettingsThe following table lists the port configuration default settings.Port Configur

Seite 403 - SSL and Enhanced Stacking

AT-S63 Management Software Features Guide461RJ-45 Serial Terminal PortThe following table lists the RJ-45 serial terminal port default settings.The ba

Seite 404

Appendix A: AT-S63 Management Software Default Settings462Router Redundancy Protocol SnoopingThe following table lists the RRP Snooping default settin

Seite 405

AT-S63 Management Software Features Guide463Server-based Authentication (RADIUS and TACACS+)This section describes the server-based authentication, RA

Seite 406

Appendix A: AT-S63 Management Software Default Settings464Simple Network Management ProtocolThe following table describes the SNMP default settings.SN

Seite 407

AT-S63 Management Software Features Guide465Simple Network Time ProtocolThe following table lists the SNTP default settings.SNTP Setting DefaultSystem

Seite 408 - X.509 Certificates

Appendix A: AT-S63 Management Software Default Settings466Spanning Tree Protocols (STP, RSTP, and MSTP)This section provides the spanning tree, STP RS

Seite 409 - Infrastructure

AT-S63 Management Software Features Guide467MultipleSpanning TreeProtocolThe following table lists the MSTP default settings.MSTP Setting DefaultStatu

Seite 410 - Revocation Lists

Appendix A: AT-S63 Management Software Default Settings468Secure Shell ServerThe following table lists the SSH default settings.The SSH port number is

Seite 411 - Implementation

AT-S63 Management Software Features Guide469Secure Sockets LayerThe following table lists the SSL default settings.SSL Setting DefaultMaximum Number o

Seite 412

AT-S63 Management Software Features Guide47Redundant Twisted Pair PortsSeveral AT-9400 Switches have twisted pair ports and GBIC or SFP slots that are

Seite 413 - Secure Shell (SSH)

Appendix A: AT-S63 Management Software Default Settings470System Name, Administrator, and Comments SettingsThe following table describes the IP defaul

Seite 414

AT-S63 Management Software Features Guide471Telnet ServerThe following table lists the Telnet server default settings.The Telnet port number is not ad

Seite 415

Appendix A: AT-S63 Management Software Default Settings472Virtual Router Redundancy ProtocolThe following table lists the VRRP default setting.VRRP Se

Seite 416 - Support for SSH

AT-S63 Management Software Features Guide473VLANsThis section provides the VLAN default settings.VLAN Setting DefaultDefault VLAN Name Default_VLAN (a

Seite 417 - SSH Server

Appendix A: AT-S63 Management Software Default Settings474Web ServerThe following table lists the web server default settings.Web Server Configuration

Seite 418 - SSH Clients

475Appendix BSNMPv3 Configuration ExamplesThis appendix provides two examples of SNMPv3 configuration using the SNMPv3 Table menus and a worksheet to

Seite 419 - SSH and Enhanced Stacking

Appendix B: SNMPv3 Configuration Examples476SNMPv3 Configuration Examples This appendix provides SNMPv3 configuration examples for the following type

Seite 420

AT-S63 Management Software Features Guide477Configure SNMPv3 SecurityToGroup TableUser Name:systemadmin24Security Model:v3Group Name: ManagersStorage

Seite 421 - SSH Configuration Guidelines

Appendix B: SNMPv3 Configuration Examples478Configure SNMPv3 View Table Menu View Name: internetView Subtree OID: 1.3.6.1 (or internet)Subtree Mask: V

Seite 422

AT-S63 Management Software Features Guide479Security ModelSecurity LevelRead View NameWrite View NameNotify View NameStorage TypeSNMPv3 SecurityToGrou

Seite 423 - TACACS+ and RADIUS Protocols

Chapter 1: Overview48NoteThese guidelines do not apply to the SFP slots on the AT-9408LC/SP switch and the XFP slots on the AT-9424Ts/XP and AT-9448Ts

Seite 424

Appendix B: SNMPv3 Configuration Examples480Security ModelSecurity LevelStorage TypeSNMPv3 Parameters (Continued)

Seite 425

481Appendix CFeatures and StandardsThis appendix lists the features and standards of the AT-9400 Switch. Section include: ”10/100/1000Base-T Twisted

Seite 426

Appendix C: Features and Standards48210/100/1000Base-T Twisted Pair PortsIEEE 802.1d BridgingIEEE 802.3 10Base-TIEEE 802.3u 100Base-TXIEEE 802.3ab 100

Seite 427

AT-S63 Management Software Features Guide483Fiber Optic Ports (AT-9408LC/SP Switch)IEEE 802.1d BridgingIEEE 802.3z 1000Base-SX— Head of Line Blocking—

Seite 428

Appendix C: Features and Standards484RFC 826 Address Resolution Protocol— Equal Cost Multi-path— Split Horizon and Split Horizon with Poison Reverse—

Seite 429

AT-S63 Management Software Features Guide485Management Access MethodsEnhanced Stacking™Out-of-band management (serial port) In-band management (over t

Seite 430

Appendix C: Features and Standards486Port SecurityIEEE 802.1x Port-based Network Access Control: Supports multiple supplicants per port and the follo

Seite 431 - Chapter 37

AT-S63 Management Software Features Guide487RFC 1757 RMON Groups 1, 2, 3, and 9Traffic ControlRFC 2386 Quality of Service featuring:— Layer 2, 3, and

Seite 432

Appendix C: Features and Standards488— MAC Address-based VLANs (Not supported on the AT-9408LC/SP, AT-9424T/GB, and AT-9424T/SP switches.)IEEE 802.3ac

Seite 433

489Appendix DMIB ObjectsThis appendix lists the SNMP MIB objects in the private Allied Telesis MIBs that apply to the AT-S63 Management Software and t

Seite 434 - Parts of a Management ACE

AT-S63 Management Software Features Guide49History of New FeaturesThe following sections contain the history of new features in the AT-S63 Management

Seite 435

Appendix D: MIB Objects490Access Control ListsTable 31. Access Control Lists (AtiStackSwitch MIB)Object Name OIDatiStkSwACLConfigTable 1.3.6.1.4.1.207

Seite 436

AT-S63 Management Software Features Guide491Class of ServiceTable 32. CoS Scheduling (AtiStackSwitch MIB)Object Name OIDatiSwQoSGroup 1.3.6.1.4.1.207.

Seite 437

Appendix D: MIB Objects492Date, Time, and SNTP ClientTable 36. Date, Time, and SNTP Client (AtiStackSwitch MIB)Object Name OIDatiStkSysSystemTimeConfi

Seite 438

AT-S63 Management Software Features Guide493Denial of Service DefensesTable 37. LAN Address and Subnet Mask (AtiStackSwitch MIB)Object Name OIDatiStkD

Seite 439 - Settings

Appendix D: MIB Objects494Enhanced StackingTable 39. Switch Mode and Discovery (AtiStackInfo MIB)Object Name OIDatiswitchEnhancedStackingInfo 1.3.6.1.

Seite 440 - “Web Server” on page 474

AT-S63 Management Software Features Guide495GVRPTable 41. GVFP Switch Configuration (AtiStackSwitch MIB)Object Name OIDatiStkSwGVRPConfig 1.3.6.1.4.1.

Seite 441 - ARP Cache Timeout 150 seconds

Appendix D: MIB Objects496atiStkSwGVRPCountersPortNotListening 1.3.6.1.4.1.207.8.17.3.8.1.8atiStkSwGVRPCountersInvalidPort 1.3.6.1.4.1.207.8.17.3.8.1.

Seite 442 - Boot Configuration File

AT-S63 Management Software Features Guide497MAC Address TableTable 44. MAC Address Table (AtiStackSwitch MIB)Object Name OIDatiStkSwMacAddr2VlanTable

Seite 443

Appendix D: MIB Objects498Management Access Control ListTable 46. Management Access Control List Status (AtiStackSwitch MIB)Object Name OIDatiStkSwSys

Seite 444

AT-S63 Management Software Features Guide499MiscellaneousTable 48. System Reset (AtiStackSwitch MIB)Object Name OIDatiStkSwSysGroup 1.3.6.1.4.1.207.8.

Seite 445

AT-S63 Management Software Features Guide5Chapter 10: Classifiers ...

Seite 446

Chapter 1: Overview50Version 2.1.0 Table 5 lists the new features in version 2.1.0.Version 2.0.0 Table 6 lists the new feature in version 2.0.0 of the

Seite 447

Appendix D: MIB Objects500Port MirroringTable 51. Port Mirroring (AtiStackSwitch MIB)Object Name OIDatiStkSwPortMirroringConfig 1.3.6.1.4.1.207.8.17.2

Seite 448 - Enhanced Stacking

AT-S63 Management Software Features Guide501Quality of ServiceTable 52. Flow Groups (AtiStackSwitch MIB)Object Name OIDatiStkSwQosFlowGrpTable 1.3.6.1

Seite 449 - EPSR State Disabled

Appendix D: MIB Objects502atiStkSwQosTrafficClassClassPriority 1.3.6.1.4.1.207.8.17.7.6.1.9atiStkSwQosTrafficClassRemarkPriority 1.3.6.1.4.1.207.8.17.

Seite 450 - Event Logs

AT-S63 Management Software Features Guide503Port Configuration and StatusTable 55. Port Configuration and Status (AtiStackSwitch MIB)Object Name OIDa

Seite 451

Appendix D: MIB Objects504Spanning TreeTable 56. Spanning Tree (AtiStackSwitch MIB)Object Name OIDatiStkSwSysConfig 1.3.6.1.4.1.207.8.17.1.1atiStkSwSy

Seite 452

AT-S63 Management Software Features Guide505Static Port TrunkTable 57. Static Port Trunks (AtiStackSwitch MIB)Object Name OIDatiStkSwStaticTrunkTable

Seite 453

Appendix D: MIB Objects506VLANsThe objects in Table 58 display the specifications of the Default_VLAN.The objects in Table 59 display the names and VI

Seite 454

AT-S63 Management Software Features Guide507Table 61. PVID Table (AtiStackSwitch MIB)Object Name OIDatiStkSwPort2VlanTable 1.3.6.1.4.1.207.8.17.3.2ati

Seite 455 - MAC Address Table

Appendix D: MIB Objects508

Seite 456 - Status Disabled

509IndexNumerics802.1p priority level in classifiers 113802.1Q-compliant VLAN mode 276802.1x Port-based Network Access Controlauthentication process 3

Seite 457 - Manager and Operator Account

AT-S63 Management Software Features Guide51Version 1.3.0 Table 7 lists the new features in version 1.3.0 of the AT-S63 Management Software.Table 7. Ne

Seite 458

Index510TCP source and destination ports 117UDP source and destination ports 117VLAN ID 114Common and Internal Spanning Tree (CIST)defined 238priority

Seite 459 - Public Key Infrastructure

AT-S63 Management Software Features Guide511interface monitoring 342Internet Group Management Protocol (IGMP) snoopingdefault settings 452described 17

Seite 460 - Port Settings

Index512Ooperator accounts, default settings 457Ppassword, default 43path cost 217permit access control lists 121ping of death attack 169PKI. See Publ

Seite 461 - RJ-45 Serial Terminal Port

AT-S63 Management Software Features Guide513encryption keys 416management sessions 41server 41, 417supported platforms 414Secure Sockets Layer (SSL)Se

Seite 462 - RRP Snooping Status Disabled

Index514Triple DES (3DES) encryption algorithms 393UUDP destination ports 117UDP destination ports in classifiers 117UDP source ports 117UDP source po

Seite 463 - Server-based

Chapter 1: Overview52Version 1.2.0 Table 8 lists the new features in version 1.2.0.Table 8. New Features in AT-S63 Version 1.2.0Feature ChangeMAC Addr

Seite 464

AT-S63 Management Software Features Guide53802.1x Port-based Network Access ControlAdded a new parameter to authenticator ports: Supplicant Mode for

Seite 466

Section I: Basic Operations 55Chapter 2Enhanced StackingThis chapter contains the following sections: “Supported Platforms” on page 56 “Overview” on

Seite 467 - Protocol

Chapter 2: Enhanced Stacking56 Section I: Basic OperationsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+ Mo

Seite 468 - Secure Shell Server

AT-S63 Management Software Features GuideSection I: Basic Operations 57OverviewHaving to manage a large number of network devices typically involves s

Seite 469 - Secure Sockets Layer

Chapter 2: Enhanced Stacking58 Section I: Basic OperationsMaster and Slave SwitchesAn enhanced stack must have at least one master switch. This switch

Seite 470 - Comments None

AT-S63 Management Software Features GuideSection I: Basic Operations 59Common VLANA master switch searches for the other switches in an enhanced stack

Seite 471 - Telnet Server

Contents6Section III: Snooping Protocols ...173Chapter 15: IGMP Snooping .

Seite 472 - VRRP Setting Default

Chapter 2: Enhanced Stacking60 Section I: Basic OperationsMaster Switch and the Local InterfaceBefore a switch can function as the master switch of an

Seite 473

AT-S63 Management Software Features GuideSection I: Basic Operations 61Slave SwitchesThe slave switches of an enhanced stack must be connected to the

Seite 474

Chapter 2: Enhanced Stacking62 Section I: Basic OperationsEnhanced Stacking CompatibilityThis version of enhanced stacking is compatible with earlier

Seite 475 - SNMPv3 Configuration Examples

AT-S63 Management Software Features GuideSection I: Basic Operations 63Enhanced Stacking GuidelinesHere are the guidelines to using the enhanced stack

Seite 476

Chapter 2: Enhanced Stacking64 Section I: Basic OperationsGeneral StepsHere are the basic steps to implementing the enhanced stacking feature on the A

Seite 477 - Configuration

Section I: Basic Operations 65Chapter 3SNMPv1 and SNMPv2cThis chapter describes SNMPv1 and SNMPv2c community strings for SNMP management of the switch

Seite 478 - Worksheet

Chapter 3: SNMPv1 and SNMPv2c66 Section I: Basic OperationsSupported PlatformsThis feature is supported on all AT-9400 Switches: Layer 2+ Models– AT

Seite 479

AT-S63 Management Software Features GuideSection I: Basic Operations 67OverviewYou can manage a switch by viewing and changing the management informat

Seite 480 - SNMPv3 Parameters (Continued)

Chapter 3: SNMPv1 and SNMPv2c68 Section I: Basic OperationsCommunity String AttributesA community string has attributes for controlling who can use th

Seite 481 - Features and Standards

AT-S63 Management Software Features GuideSection I: Basic Operations 69the community strings.Each community string can have up to eight trap IP addres

Seite 482

AT-S63 Management Software Features Guide7Chapter 21: Multiple Spanning Tree Protocol ...

Seite 483 - DHCP and BOOTP Clients

Chapter 3: SNMPv1 and SNMPv2c70 Section I: Basic OperationsDefault SNMP Community StringsThe AT-S63 Management Software provides two default community

Seite 484

Section I: Basic Operations 71Chapter 4MAC Address TableThis chapter contains background information about the MAC address table.This chapter contains

Seite 485 - Management MIBs

Chapter 4: MAC Address Table72 Section I: Basic OperationsOverviewThe AT-9400 Switch has a MAC address table with a storage capacity of 16,000 entries

Seite 486 - System Monitoring

AT-S63 Management Software Features GuideSection I: Basic Operations 73MAC address table from becoming filled with addresses of nodes that are no long

Seite 487 - Traffic Control

Chapter 4: MAC Address Table74 Section I: Basic Operations

Seite 488

Section I: Basic Operations 75Chapter 5Static Port TrunksThis chapter describes static port trunks. Sections in the chapter include: “Supported Platf

Seite 489 - MIB Objects

Chapter 5: Static Port Trunks76 Section I: Basic OperationsSupported PlatformsThis feature is supported on all AT-9400 Switches: Layer 2+ Models– AT

Seite 490

AT-S63 Management Software Features GuideSection I: Basic Operations 77OverviewA static port trunk is a group of two to eight ports that function as a

Seite 491

Chapter 5: Static Port Trunks78 Section I: Basic OperationsLoad Distribution MethodsThis section discusses load distribution methods and applies to bo

Seite 492 - Date, Time, and SNTP Client

AT-S63 Management Software Features GuideSection I: Basic Operations 79A similar method is used for the two load distribution methods that employ both

Seite 493

Contents8Chapter 26: MAC Address-based VLANs ...285Sup

Seite 494

Chapter 5: Static Port Trunks80 Section I: Basic OperationsGuidelinesThe following guidelines apply to static trunks: Allied Telesis recommends limit

Seite 495

Section I: Basic Operations 81Chapter 6LACP Port TrunksThis chapter explains Link Aggregation Control Protocol (LACP) port trunks. Sections in the cha

Seite 496 - Appendix D: MIB Objects

Chapter 6: LACP Port Trunks82 Section I: Basic OperationsSupported PlatformsThis feature is supported on the following AT-9400 Switches: Layer 2+ Mod

Seite 497

AT-S63 Management Software Features GuideSection I: Basic Operations 83OverviewLACP (Link Aggregation Control Protocol) port trunks perform the same f

Seite 498

Chapter 6: LACP Port Trunks84 Section I: Basic OperationsIf there will be more than one aggregate trunk on a switch, each trunk might require a separa

Seite 499 - Miscellaneous

AT-S63 Management Software Features GuideSection I: Basic Operations 85Here is how the example looks in a table format.CautionThe example cited here i

Seite 500 - Port Mirroring

Chapter 6: LACP Port Trunks86 Section I: Basic OperationsHere is how this example looks in table format.You could, if you wanted, create separate aggr

Seite 501

AT-S63 Management Software Features GuideSection I: Basic Operations 87LACP System PriorityIt is possible for two devices interconnected by an aggrega

Seite 502

Chapter 6: LACP Port Trunks88 Section I: Basic OperationsAdminkey ParameterThe adminkey is a hexadecimal value from 1 to FFFF that identifies an aggre

Seite 503 - Port Configuration and Status

AT-S63 Management Software Features GuideSection I: Basic Operations 89Load Distribution MethodsThe load distribution method determines the manner in

Seite 504

AT-S63 Management Software Features Guide9Interface Monitoring...

Seite 505 - Static Port Trunk

Chapter 6: LACP Port Trunks90 Section I: Basic OperationsGuidelinesThe following guidelines apply to creating aggregators: LACP must be activated on

Seite 506

AT-S63 Management Software Features GuideSection I: Basic Operations 91 When creating a new aggregator, you can specify either a name for the aggrega

Seite 507

Chapter 6: LACP Port Trunks92 Section I: Basic Operations

Seite 508

Section I: Basic Operations 93Chapter 7Port MirrorThis chapter explains the port mirror feature. Sections in the chapter include: “Supported Platform

Seite 509 - Numerics

Chapter 7: Port Mirror94 Section I: Basic OperationsSupported PlatformsThis feature is supported on all AT-9400 Switches: Layer 2+ Models– AT-9408LC

Seite 510

AT-S63 Management Software Features GuideSection I: Basic Operations 95OverviewThe port mirror feature allows for the unobtrusive monitoring of ingres

Seite 511

Chapter 7: Port Mirror96 Section I: Basic Operations

Seite 512

Section II: Advanced Operations 97Section IIAdvanced OperationsThis section contains the following chapters: Chapter 8, ”File System” on page 99 Cha

Seite 513

98 Section II: Advanced Operations

Seite 514

Section II: Advanced Operations 99Chapter 8File SystemThe chapter explains the switch’s file system and contains the following sections: “Overview” o

Kommentare zu diesen Handbüchern

Keine Kommentare