613-001104 Rev. BManagementSoftwareAT-S94WEB User’s GuideAT-8000S Series Stackable Gigabit Ethernet SwitchesVersion 2.0.0
Getting StartedStarting the ApplicationPage 10Section 1. Getting StartedThis section provides an introduction to the Web Browser Interface, and includ
Configuring PortsSetting Ports ConfigurationsPage 100Section 7. Configuring PortsPort Configuration includes the following procedures for configuring
Configuring PortsSetting Ports ConfigurationsPage 101The Port Settings Page contains the Zoom View of the device ports. The possible port settings are
Configuring PortsSetting Ports ConfigurationsPage 102The Port Setting Configuration Page contains the following fields:• Port— Lists the names of conf
Configuring PortsSetting Ports ConfigurationsPage 103• Admin Advertisement — Defines the auto negotiation setting the port advertises. The possible fi
Configuring PortsSetting Ports ConfigurationsPage 104Configuring Port MirroringPort mirroring monitors and mirrors network traffic by forwarding copie
Configuring PortsSetting Ports ConfigurationsPage 105• Status — Indicates if the port is currently monitored. The possible field values are:– Active —
Configuring PortsSetting Ports ConfigurationsPage 1063. Define the Type field.4. Click Apply. The Port mirroring is modified, and the device is update
Configuring PortsAggregating PortsPage 107Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a singl
Configuring PortsAggregating PortsPage 108Defining Trunk SettingsThe Trunk Settings Page contains parameters for defining Trunks. To define a port tru
Configuring PortsAggregating PortsPage 109• Flow Control — Displays the flow control status of the trunk.• LACP — Indicates if LACP is enabled on the
Getting StartedStarting the ApplicationPage 11Figure 1: Embedded Web System Login Page3. Enter manager in the User Name field. 4. Enter friend in the
Configuring PortsAggregating PortsPage 110• Current Status — Indicates whether the trunk is currently operational or non-operational. The possible fie
Configuring PortsAggregating PortsPage 111Defining Port TrunkingThe Port Trunking Page displays information about the defined trunks.To modify Port Tr
Configuring PortsAggregating PortsPage 1123. Click Modify. The Port Trunking Configuration Page opens:Figure 67: Port Trunking Configuration PageIn ad
Configuring PortsAggregating PortsPage 113Configuring LACPTrunk ports can contain different media types if the ports are operating at the same speed.
Configuring PortsAggregating PortsPage 1142. Click Modify. the LACP Configuration Page opens:Figure 69: LACP Configuration Page3. Define the fields.4.
Configuring InterfacesPage 115Section 8. Configuring InterfacesThis section contains information on configuring the interfaces of the device.This sect
Configuring InterfacesPage 116The MAC Address Page contains the following fields:• View Static — Displays the static addresses assigned to the ports o
Configuring InterfacesPage 1174. Click Apply. The new MAC address is added to the addresses table and the device information is updated.To delete all
Configuring InterfacesConfiguring VLANsPage 118Configuring VLANs This section describes how to create and configure Virtual LANs (VLANs).VLANs are log
Configuring InterfacesConfiguring VLANsPage 119Defining VLAN PropertiesThe VLAN Page provides information and global parameters for configuring and wo
Getting StartedStarting the ApplicationPage 12Figure 2: System General Page
Configuring InterfacesConfiguring VLANsPage 120The second section contains a table that maps VLAN parameters to ports. • Select the interfaces display
Configuring InterfacesConfiguring VLANsPage 1213. Click Modify. The VLAN Configuration opens.Figure 75: VLAN Configuration4. Change the Interface Stat
Configuring InterfacesConfiguring VLANsPage 122Defining VLAN Interface SettingsThe VLAN Interface Page contains fields for managing ports that are par
Configuring InterfacesConfiguring VLANsPage 123• Frame Type — Specifies the packet type accepted on the port. The possible field values are:– Admit Ta
Configuring InterfacesConfiguring VLANsPage 124Defining GVRPThe GVRP Page enables users to configure GARP VLAN Registration Protocol (GVRP) on the dev
Configuring InterfacesConfiguring VLANsPage 125• Interface — Displays the port or trunk name on which GVRP is enabled.• GVRP State — Indicates if GVRP
Configuring InterfacesDefining MAC Based GroupsPage 126Defining MAC Based GroupsThe MAC Based Groups Page allows network managers to group VLANs based
Configuring InterfacesDefining MAC Based GroupsPage 127• VLAN ID — Attaches the interface to a user-defined VLAN ID. VLAN group ports can be attached
Configuring InterfacesDefining MAC Based GroupsPage 128To add a mapped group:1. Click Layer 2 > MAC Based Groups. The MAC Based Groups Page opens:2
Configuring System LogsPage 129Section 9. Configuring System LogsThis section provides information for managing system logs. System logs enable viewin
Getting StartedUsing the Web Browser InterfacePage 13Using the Web Browser InterfaceThis section provides general information about the interface, and
Configuring System LogsPage 130The Event Log Page contains the following fields:The Configure Log Outputs table displays the following log information
Configuring System LogsPage 131The Add Syslog Page contains the following fields:• Description — Provides any additional information about the syslog
Configuring System LogsPage 132Modifying Log Servers Clicking Modify opens the Event Log Configuration Page, in which administrators can modify Server
Configuring System LogsPage 1333. Click View. The selected log page opens:Figure 88: View Flash Log PageThe View Flash Log Page and View Temporary Log
Configuring Spanning TreeConfiguring Classic Spanning TreePage 134Section 10. Configuring Spanning TreeSpanning Tree Protocol (STP) provides tree topo
Configuring Spanning TreeConfiguring Classic Spanning TreePage 135Defining STP PropertiesThe Spanning Tree Page contains parameters for enabling and c
Configuring Spanning TreeConfiguring Classic Spanning TreePage 136• Path Cost Default Values — Specifies the method used to assign default path cost t
Configuring Spanning TreeConfiguring Classic Spanning TreePage 137Defining STP InterfacesNetwork administrators can assign STP settings to a specific
Configuring Spanning TreeConfiguring Classic Spanning TreePage 138• Port Fast — Indicates if Fast Link is enabled on the port. If Fast Link mode is en
Configuring Spanning TreeConfiguring Classic Spanning TreePage 139• Designated Cost — Indicates the cost of the port participating in the STP topology
Getting StartedUsing the Web Browser InterfacePage 14User Interface ComponentsThe System General Page example shows the interface components.Figure 4:
Configuring Spanning TreeConfiguring Rapid Spanning TreePage 140Configuring Rapid Spanning TreeWhile Classic STP prevents Layer 2 forwarding loops in
Configuring Spanning TreeConfiguring Rapid Spanning TreePage 141• Mode — Displays the current STP mode. The STP mode is selected in the Spanning Tree
Configuring Spanning TreeConfiguring Rapid Spanning TreePage 142– Learning — Indicates the port is currently in the learning mode. The interface canno
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 143Configuring Multiple Spanning TreeMultiple Spanning Tree Protocol (MSTP) provides d
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 144• IST Master — Identifies the Spanning Tree Master instance. The IST Master is the
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 145The MSTP Interface Settings Page contains the following fields: • Instance ID — Lis
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1463. Define the fields.4. Click Apply. MSTP is defined for the selected interface.5.
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 147Defining MSTP Instance MappingsNetwork administrators can assign MSTP mapping to a
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 148Defining MSTP Instance SettingsMSTP maps VLANs into STP instances. Packets assigned
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1493. Define the fields.4. Click Apply. MSTP is defined for the selected instance, and
Getting StartedUsing the Web Browser InterfacePage 15Using the Management Buttons Management buttons provide an easy method of configuring device info
Configuring Multicast ForwardingPage 150Section 11. Configuring Multicast ForwardingMulticast forwarding allows a single packet to be forwarded to mul
Configuring Multicast ForwardingPage 151Configuring IGMP SnoopingWhen IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. Th
Configuring Multicast ForwardingPage 152• IGMP Querier Status — Indicates if the specific VLAN can operate as an IGMP Querier. The possible field valu
Configuring Multicast ForwardingPage 153To modify the IGMP Snooping configuration: 1. Click Multicast > IGMP. The IGMP Page opens.2. Click Modify.
Configuring Multicast ForwardingPage 154To define Multicast Groups:1. Click Multicast > Multicast Group. The Multicast Group Page opens:Figure 101:
Configuring Multicast ForwardingPage 1553. Click Add. The Add Multicast Group Page opens:Figure 102:Add Multicast Group Page 4. Select the VLAN ID.5.
Configuring Multicast ForwardingPage 156Defining Multicast Forward All SettingsMulticast forwarding enables transmitting packets from either a specifi
Configuring Multicast ForwardingPage 1573. Click Modify. The Multicast Forward All Configuration Page opens:Figure 105:Multicast Forward All Configura
Configuring Multicast ForwardingPage 158Defining Unregistered Multicast SettingsMulticast frames are generally forwarded to all ports in the VLAN. If
Configuring Multicast ForwardingPage 1592. Click Modify. The Unregistered Multicast Configuration Page opens:Figure 107:Unregistered Multicast Configu
Getting StartedUsing the Web Browser InterfacePage 16Test Performs a diagnostic test.Clear All Counters Removes all counters.The application menu incl
Configuring SNMPPage 160Section 12. Configuring SNMPSimple Network Management Protocol (SNMP) provides a method for managing network devices. Equipmen
Configuring SNMPPage 161Enabling SNMPThe SNMP Global Page provides fields for globally enabling and configuring SNMP on the device.To enable SNMP: 1.
Configuring SNMPPage 162Defining SNMP CommunitiesAccess rights are managed by defining communities in the SNMP Community Page. When the community name
Configuring SNMPPage 163• Access Mode — Defines the access rights of the community. The possible field values are:– Read Only — Management access is r
Configuring SNMPPage 164The Add SNMP Community Page contains the following fields:• Supported IP Format — Indicates the type of IP addressing protocol
Configuring SNMPPage 165To modify SNMP community settings: 1. Select an SNMP community entry in the Basic table or in the Advanced Table.2. Click Modi
Configuring SNMPPage 166Defining SNMP GroupsThe SNMP Group Page provides information for creating SNMP groups, and assigning SNMP access control privi
Configuring SNMPPage 167• Security Level — Defines the security level attached to the group. Security levels apply to SNMPv3 only. The possible field
Configuring SNMPPage 168To modify an SNMP group:1. Click SNMP > Groups. The SNMP Group Page opens.2. Click Modify. The Group Configuration Page ope
Configuring SNMPPage 169Defining SNMP UsersThe SNMP Users Page enables assigning system users to SNMP groups, as well as defining the user authenticat
Getting StartedUsing the Web Browser InterfacePage 17Adding, Modifying and Deleting InformationThe WBI contains and tables for configuring devices. Us
Configuring SNMPPage 170• Authentication — Displays the method used to authenticate users. The possible field values are:– MD5 Key — Users are authent
Configuring SNMPPage 171• Authentication Key — Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are en
Configuring SNMPPage 172Defining SNMP ViewsThe SNMP views provide or block access to device features or portions of features. Feature access is grante
Configuring SNMPPage 1732. Click Add. The Add SNMP VIew Page opens:Figure 119: Add SNMP VIew Page3. Define the View Name field.4. Select the Object ID
Configuring SNMPPage 174Defining Notification RecipientsThe SNMP Notify Page contains fields for defining SNMP notification recipients. The page conta
Configuring SNMPPage 175SNMPv1,2c Notification RecipientThe SNMP v1, v2c Recipient table contains the following fields:• Recipients IP Address — Displ
Configuring SNMPPage 1762. Click Add. The Add Notify Page opens:Figure 121:Add Notify Page In addition to the SNMP Notify Page, the Add Notify Page co
Configuring SNMPPage 1774. Click Apply. The notification recipient settings are saved and the device is updated.5. Click Save Config on the menu to sa
Configuring SNMPPage 178Defining Notification FiltersThe SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a
Configuring SNMPPage 179To add an SNMP notification filter:1. Click the Add button. The Add SNMP Notification Filter Page opens:Figure 124:Add SNMP No
Getting StartedUsing the Web Browser InterfacePage 18Figure 6: Local User Settings Page4. Define the fields. 5. Click Apply. The fields are modified,
Configuring LLDPPage 180Section 13. Configuring LLDPLink Layer Discovery Protocol (LLDP) is a Layer 2 protocol that allows a network device supporting
Configuring LLDPPage 181Defining Global LLDP PropertiesThe LLDP Properties Page allows network managers to assign global LLDP parameters. To enable an
Configuring LLDPPage 182• Transmit Delay (1 - 8192) — Indicates the amount of time that passes between successive LLDP frame transmissions due to chan
Configuring LLDPPage 183• State — Indicates the LLDP state on the port. The possible field values are: – Tx Only — Enables transmitting LLDP packets o
Configuring LLDPPage 184Defining LLDP Media Endpoint Discovery Network PolicyLLDP Media Endpoint Discovery (LLDP MED) is an enhancement to the 802.1ab
Configuring LLDPPage 185– Guest VLAN Signaling — Indicates that the network policy is defined for a Guest VLAN Signalling application. – Softphone Voi
Configuring LLDPPage 186To modify a network policy setting:1. Click LLDP > Profile Rules: The LLDP MED Network Policy Page opens.2. Click Modify. T
Configuring LLDPPage 187Defining LLDP MED Port SettingsThe LLDP MED Port Settings Page contains parameters for assigning LLDP network policies to spec
Configuring LLDPPage 1882. Click Modify. The Modify LLDP MED Port Settings Page opens: Figure 132:Modify LLDP MED Port Settings PageThis page contains
Configuring LLDPPage 1896. Define the port location in the Location Coordinate (16 Bytes in Hex), Location Civic Address (6-160 Bytes in Hex), Locatio
Getting StartedLogging OutPage 19Logging OutThe Logout option enables the user to log out of the device thereby terminating the running session.To log
Configuring LLDPPage 1902. Click Details to view the Neighbors Information Details Page for ports. Figure 134:Neighbors Information Details PageThe Ne
Configuring LLDPPage 191LLDP MED Power over EthernetThe port PoE information.• Power Type — Indicates the power type advertised on the port.• Power So
Configuring Power Over EthernetPage 192Section 14. Configuring Power Over EthernetThis section describes configuring Power over Ethernet (PoE) for an
Configuring Power Over EthernetPage 193To enable PoE for the device: 1. Click System > Power Over Ethernet. The Power Over Ethernet Page opens:Figu
Configuring Power Over EthernetPage 1944. Click Modify. PoE is enabled on the device and global settings are saved. The new threshold is immediately a
Configuring Power Over EthernetPage 195Defining Power Over Ethernet ConfigurationTo modify PoE port settings: 1. In the Power Over Ethernet Page Zoom
Configuring Power Over EthernetPage 196– Searching — Indicates that the device is currently searching for a powered device. Searching is the default P
Configuring ServicesPage 197Section 15. Configuring ServicesThis section describes Quality of Service related configurations. QoS supports activating
Configuring ServicesPage 198Enabling Class of Service (CoS)The CoS Page enables configuring the CoS ports or trunks on the device.To configure CoS por
Configuring ServicesPage 199• Interface — Displays the interface number.• Default CoS— Determines the default CoS value for incoming packets for which
Copyright © 2008 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied
Getting StartedResetting the DevicePage 20Resetting the DeviceThe Reset option enables resetting the device from a remote location. NoteSave all chang
Configuring ServicesPage 200Configuring CoS Queueing and SchedulingThe CoS Queuing & Scheduling Page provides fields for configuring CoS Priority
Configuring ServicesPage 201Mapping CoS Values to QueuesThe Configure CoS Page contains fields for classifying CoS settings to traffic queues. When co
Configuring ServicesPage 202Mapping DSCP Values to QueuesThe Configure DSCP Page contains fields for classifying DSCP settings to traffic queues. For
Configuring ServicesPage 203Configuring QoS BandwidthThe Bandwidth Page allows network managers to define the bandwidth settings for a specified egres
Configuring ServicesPage 204As a default the Bandwidth Page opens displaying the port options. The fields are identical when displaying the trunk CoS.
Configuring ServicesPage 2054. Click Modify. The Bandwidth Configuration Page opens:Figure 143:Bandwidth Configuration Page5. Define the fields.6. Cli
System UtilitiesPage 206Section 16. System UtilitiesThe configuration file structure involves the following configuration files:• Startup Configuratio
System UtilitiesPage 207Restoring the Default ConfigurationThe Reset to Factory Defaults function restores the Configuration file to factory defaults
System UtilitiesPage 208To reset the configuration file to defaults with reboot: 1. Check the Reboot Switch After Resetting to Defaults option.2. Sele
System UtilitiesPage 209• Link Local Interface — If Link Local is selected as the supported IPv6 Address Type, indicates the supported interface. The
Defining System InformationPage 21Section 2. Defining System InformationThe System General Page contains general device information, including system
System UtilitiesPage 210The Configuration Copy section of the File System Page contains the following fields:• Copy Configuration— Allows the copy con
System UtilitiesPage 211Viewing Integrated Cable TestsThe Cable Test Page contains fields for performing tests on copper cables. Cable testing provide
System UtilitiesPage 2123. Click Test. The cable test is performed.4. Click Advanced. The Cable Test Configuration Page opens, and the copper cable te
System UtilitiesPage 213Viewing Optical TransceiversThe Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Opti
System UtilitiesPage 214Resetting the DeviceThe Reset Page enables the user to reset the system. Save all changes to the Running Configuration file be
Viewing StatisticsViewing Device StatisticsPage 215Not approved by Document Control. For review only.Section 17. Viewing StatisticsThis section provi
Viewing StatisticsViewing Device StatisticsPage 216Not approved by Document Control. For review only.The Interface Statistics Page contains the follo
Viewing StatisticsViewing Device StatisticsPage 217Not approved by Document Control. For review only.Viewing Etherlike Statistics The Etherlike Stati
Viewing StatisticsViewing Device StatisticsPage 218Not approved by Document Control. For review only.• Internal MAC Receive Errors — Displays the num
Viewing StatisticsManaging RMON StatisticsPage 219Not approved by Document Control. For review only.Managing RMON StatisticsThis section contains the
Defining System InformationPage 22• Default Gateway — The IP address of a router for remote management of the device. The address must be entered in t
Viewing StatisticsManaging RMON StatisticsPage 220Not approved by Document Control. For review only.– 15 Sec — Indicates that the RMON statistics are
Viewing StatisticsManaging RMON StatisticsPage 221Not approved by Document Control. For review only.Configuring RMON HistoryThe RMON History Page con
Viewing StatisticsManaging RMON StatisticsPage 222Not approved by Document Control. For review only.Figure 154:Add RMON History Page3. Define the Sou
Viewing StatisticsManaging RMON StatisticsPage 223Not approved by Document Control. For review only.Viewing the RMON History TableThe RMON History Ta
Viewing StatisticsManaging RMON StatisticsPage 224Not approved by Document Control. For review only.• Undersize Packets — Displays the number of unde
Viewing StatisticsManaging RMON StatisticsPage 225Not approved by Document Control. For review only.Configuring RMON EventsThe RMON Events Page conta
Viewing StatisticsManaging RMON StatisticsPage 226Not approved by Document Control. For review only.Figure 158:Add RMON Events Page3. Define the Comm
Viewing StatisticsManaging RMON StatisticsPage 227Not approved by Document Control. For review only.Figure 159:RMON Events Logs PageThe RMON Events L
Viewing StatisticsManaging RMON StatisticsPage 228Not approved by Document Control. For review only.Defining RMON Alarms The RMON Alarm Page contains
Viewing StatisticsManaging RMON StatisticsPage 229Not approved by Document Control. For review only.• Falling Event — Displays the event that trigger
Configuring Internet Protocol Version 6Page 23Section 3. Configuring Internet Protocol Version 6The device functions as an IPv6 compliant Host, as wel
Viewing StatisticsManaging RMON StatisticsPage 230Not approved by Document Control. For review only.Figure 162:Alarm Configuration Page3. Define the
Managing StackingStacking OverviewPage 231Section 18. Managing StackingThis section describes the stacking control management and includes the followi
Managing StackingStacking OverviewPage 232After the stacking issues are resolved, the device can be reconnected to the stack without interruption, and
Managing StackingStacking OverviewPage 233During the Warm Standby, the Master and the Secondary Master are synchronized with the static configuration
Managing StackingStacking OverviewPage 234Exchanging Stacking MembersIn normal operation of the stack, the running configuration file in the master is
Managing StackingConfiguring Stacking ManagementPage 235Configuring Stacking ManagementThe Stacking Page allows network managers to either reset the e
Downloading Software with CLIConnecting a TerminalPage 236Appendix A. Downloading Software with CLIThis section describes how to download system files
Downloading Software with CLIInitial ConfigurationPage 237Initial ConfigurationBefore a device can download system software, the device must have an i
Downloading Software with CLIDownloading SoftwarePage 238To check the configuration, enter the command “show ip interface” as illustrated in the follo
Downloading Software with CLIDownloading SoftwarePage 2392. Enter the copy command to download the boot file.3. Enter the “bootvar” command to determi
Configuring Internet Protocol Version 6Page 24In addition to the dynamically configured IPv6 interfaces, there are two types of static IP addresses th
Downloading Software with CLIDownloading SoftwarePage 2405. Enter the “copy” command to download the system file.6. Reboot the device. The device boot
Downloading Software with CLIDownloading SoftwarePage 241Stacking Member Software DownloadEnsure the stack has been correctly connected as described i
Downloading Software with CLIDownloading SoftwarePage 2425. Enter the “copy” command to download the system file.6. Reboot the devices being updated.
System DefaultsPage 243Appendix B. System DefaultsThis section contains the system defaults, and includes the following topics:• RS-232 Port Settings•
System DefaultsRS-232 Port SettingsPage 244RS-232 Port SettingsThe following table contains the RS-232 port setting defaults: Port DefaultsThe followi
System DefaultsConfiguration DefaultsPage 245Configuration DefaultsThe following are the initial device configuration defaults: Security DefaultsThe f
System DefaultsSpanning Tree DefaultsPage 246Spanning Tree DefaultsThe following are the spanning tree defaults:Address Table DefaultsThe following th
System DefaultsTrunking DefaultsPage 247Trunking DefaultsThe following are the trunking defaults:Multicast DefaultsThe following are the Multicast def
IndexPage 248IndexSymbols802.1x port access 70AAbsolute 228Access level 63Access profiles 41access profilesrules 45ACE 77ACL 77, 90ACL Binding 90Alarm
IndexPage 249GVRP configuration 124, 125HHost 127HTTP 43, 54IIGMP 151interface configurationaccess profiles 41Internet Group Management Protocol (IGMP
Configuring Internet Protocol Version 6Page 25The IPv6 Interface Table on the IPv6 Interface Page displays the IPv6 interfaces defined on the selected
IndexPage 250RRADIUS 50RADIUS authentication 59RADIUS serverauthentication methods 50Rate limiting 204Remote Authorization Dial-In User Service (RADIU
Configuring Internet Protocol Version 6Page 26Adding Multiple IPv6 AddressesThe Add IPv6 Address Page allows the user to add multiple IPv6 addresses t
Configuring Internet Protocol Version 6Page 27Defining the IPv6 Default GatewayThe IPv6 Default Gateway Page enables you to configure the IPv6 address
Configuring Internet Protocol Version 6Page 28– Tunnel• Type — Specifies the means by which the default gateway was configured. The possible field val
Configuring Internet Protocol Version 6Page 29Configuring TunnelsThe Tunneling Page defines the tunneling process on the device, which encapsulates IP
Table of ContentsPage 3 Table of ContentsPreface...
Configuring Internet Protocol Version 6Page 30• Domain Name Query Interval (10-3600) — Specifies the interval between DNS Queries (before the IP addre
Configuring Internet Protocol Version 6Page 31The IPv6 Neighbors Page contains the following fields:View IPV6 Neighbors•View Static — Displays the sta
Configuring Internet Protocol Version 6Page 323. Click Add. The Add IPv6 Neighbor Page opens.Figure 15: Add IPv6 Neighbor Page4. Define the static IPv
Configuring Internet Protocol Version 6Page 33To view IPv6 Neighbor entries:1. Click System > IPv6 Neighbors. The IPv6 Neighbors Page opens.2. Sele
Configuring System TimePage 34Section 4. Configuring System TimeThe System Time Page provides information for configuring system time parameters, incl
Configuring System TimePage 35• System Date — Sets the system date. The field format is Day/Month/Year. For example: 04/May/2050 (May 4, 2050).• Time
Configuring System TimePage 36To define SNTP global parameters: 1. Click System > System Time. The System Time Page opens.The Simple Network Time P
Configuring System TimePage 37• Time Set Offset — Used for non-USA and European countries to set the amount of time for DST (in minutes). The default
Configuring System TimePage 38• Bahamas — From April to October, in conjunction with Daylight Savings Time in the United States. • Belarus — From the
Configuring System TimePage 39• Slovak Republic - From the last weekend of March until the last weekend of October.• South Africa — South Africa does
Table of ContentsPage 4 Configuring Network Security ...
Configuring Device SecurityPage 40Section 5. Configuring Device SecurityThis section describes setting security parameters for ports, device managemen
Configuring Device SecurityConfiguring Management SecurityPage 41Configuring Management SecurityThis section provides information for configuring devi
Configuring Device SecurityConfiguring Management SecurityPage 42To define access profiles:1. Click Mgmt. Security > Access Profile. The Access Pro
Configuring Device SecurityConfiguring Management SecurityPage 432. Click Add. The Add Access Profile Page opens:Figure 19: Add Access Profile PageIn
Configuring Device SecurityConfiguring Management SecurityPage 44• Supported IP Format — Defines the supported Internet Protocol on which the access p
Configuring Device SecurityConfiguring Management SecurityPage 45Defining Profile RulesAccess profiles can contain up to 128 rules that determine whic
Configuring Device SecurityConfiguring Management SecurityPage 46• Management Method — Defines the management method for which the rule is defined. Us
Configuring Device SecurityConfiguring Management SecurityPage 47– IPv6 — Indicates that IPv6 is supported.• IPv6 Address Type — If IPv6 is selected a
Configuring Device SecurityConfiguring Management SecurityPage 48To modify an access rule:1. Click Mgmt. Security > Profile Rules: The Profile Rule
Configuring Device SecurityConfiguring Management SecurityPage 49Defining Authentication ProfilesAuthentication profiles allow network administrators
Table of ContentsPage 5 Configuring Multicast Forwarding ... 150Co
Configuring Device SecurityConfiguring Management SecurityPage 50– RADIUS — Authenticates the user at the RADIUS server. For more information, see Def
Configuring Device SecurityConfiguring Management SecurityPage 51Figure 24: Add Authentication Profile Page3. Select the type of function to configure
Configuring Device SecurityConfiguring Management SecurityPage 52Figure 25: Authentication Profile Configuration Page3. Select the Profile Name from t
Configuring Device SecurityConfiguring Management SecurityPage 53Mapping Authentication ProfilesAfter authentication profiles are defined, they can be
Configuring Device SecurityConfiguring Management SecurityPage 54• Secure HTTP — Indicates that authentication methods are used for secure HTTP access
Configuring Device SecurityConfiguring Server Based AuthenticationPage 55Configuring Server Based AuthenticationNetwork administrators assign authenti
Configuring Device SecurityConfiguring Server Based AuthenticationPage 56Figure 27: TACACS+ PageThe TACACS+ Page contains the following fields:• Suppo
Configuring Device SecurityConfiguring Server Based AuthenticationPage 57Figure 28: Add TACACS+ Page3. Define the fields.4. Click Apply. The TACACS+ p
Configuring Device SecurityConfiguring Server Based AuthenticationPage 58To modify TACACS+ server settings:1. Click Mgmt. Protocols > TACACS+. The
Configuring Device SecurityConfiguring Server Based AuthenticationPage 59Configuring RADIUSRemote Authorization Dial-In User Service (RADIUS) servers
Table of ContentsPage 6 Managing Stacking ...
Configuring Device SecurityConfiguring Server Based AuthenticationPage 60• Default Dead Time — Defines the default amount of time (in minutes) that a
Configuring Device SecurityConfiguring Server Based AuthenticationPage 612. Click Add. The Add RADIUS Page opens.Figure 31: Add RADIUS Page3. Define t
Configuring Device SecurityConfiguring Server Based AuthenticationPage 62To modify RADIUS server settings:1. Click Mgmt. Protocols > RADIUS. The RA
Configuring Device SecurityConfiguring Server Based AuthenticationPage 63Configuring Local UsersNetwork administrators can define users, passwords, an
Configuring Device SecurityConfiguring Server Based AuthenticationPage 642. Click Create. The Add Local User Page opens: Figure 34: Add Local User Pag
Configuring Device SecurityConfiguring Server Based AuthenticationPage 65To modify local users:1. Click Mgmt. Security > Local Users. The Local Use
Configuring Device SecurityConfiguring Server Based AuthenticationPage 66Defining Line PasswordsNetwork administrators can define line passwords in th
Configuring Device SecurityConfiguring Network SecurityPage 67Configuring Network SecurityNetwork security manages locked ports.Port-based authenticat
Configuring Device SecurityConfiguring Network SecurityPage 68To configure secure ports: 1. Click Network Security > Port Security. The Port Securi
Configuring Device SecurityConfiguring Network SecurityPage 694. Click Modify. The Port Security Configuration Page opens:Figure 38: Port Security Con
PrefacePage 7 Page 7PrefaceThis guide contains instructions on how to configure an AT-8000S Series Layer 2+ Fast Ethernet Switch using the interface
Configuring Device SecurityConfiguring Network SecurityPage 706. Click Apply. The port security settings are saved and the device is updated.7. Click
Configuring Device SecurityConfiguring Network SecurityPage 71For example, a network administrator can use Guest VLANs to deny network access via port
Configuring Device SecurityConfiguring Network SecurityPage 72To modify port based authentication settings:1. Click Modify. The Port Authentication Se
Configuring Device SecurityConfiguring Network SecurityPage 73The Port Authentication Settings Page contains the following port authentication paramet
Configuring Device SecurityConfiguring Network SecurityPage 74• Enable Periodic Reauthentication — Permits port reauthentication. The possible field v
Configuring Device SecurityConfiguring Network SecurityPage 75Enabling Storm ControlStorm control limits the amount Multicast and Broadcast frames acc
Configuring Device SecurityConfiguring Network SecurityPage 76The Storm Control Page displays the Zoom View of the selected stacking member’s (defined
Configuring Device SecurityDefining Access ControlPage 77Defining Access ControlAccess Control Lists (ACL) allow network managers to define classifica
Configuring Device SecurityDefining Access ControlPage 78The MAC Based ACL Page contains the following fields:• ACL Name — Displays the specific MAC b
Configuring Device SecurityDefining Access ControlPage 792. Click the Add ACL button. The Add MAC Based ACL Page opens:Figure 44: Add MAC Based ACL Pa
PrefaceWeb Browser Interface User’s Guide OverviewPage 8 Page 8Web Browser Interface User’s Guide OverviewThe Web Browser Interface User’s Guide provi
Configuring Device SecurityDefining Access ControlPage 80Adding ACE Rules1. Click Network Security > MAC Based ACL. The MAC Based ACL Page opens.2.
Configuring Device SecurityDefining Access ControlPage 81Figure 46: IPv4 Based ACL PageThe IPv4 Based ACL Page contains the following fields:• ACL Nam
Configuring Device SecurityDefining Access ControlPage 82– HMP — Host Mapping Protocol (HMP). Collects network information from various networks hosts
Configuring Device SecurityDefining Access ControlPage 83• Destination– IPv4 Address — Matches the destination port IPv4 address to which packets are
Configuring Device SecurityDefining Access ControlPage 842. Click the Add ACL Button. The Add IPv4 Based ACL Page opens:Figure 47: Add IPv4 Based ACL
Configuring Device SecurityDefining Access ControlPage 85Adding ACE Rules1. Click Network Security > IPv4 Based ACL. The IPv4 Based ACL Page opens.
Configuring Device SecurityDefining Access ControlPage 86Defining IPv6 Based ACLThe IPv6 Based ACL Page contains information for defining IPv6-based A
Configuring Device SecurityDefining Access ControlPage 87• Destination Port — Defines the TCP/UDP destination port. This field is active only if 800/6
Configuring Device SecurityDefining Access ControlPage 882. Click the Add ACL Button. The Add IPv6 Based ACL Page opens:Figure 50: Add IPv6 Based ACL
Configuring Device SecurityDefining Access ControlPage 89Adding ACE Rules1. Click Network Security > IPv6 Based ACL. The IPv6 Based ACL Page opens.
PrefaceDocument ConventionsPage 9 Page 9Document ConventionsThis document uses the following conventions:Contacting Allied TelesisThis section provide
Configuring Device SecurityDefining Access ControlPage 90Defining ACL BindingWhen an ACL is bound to an interface, all the ACE rules that have been de
Configuring Device SecurityDefining Access ControlPage 912. Click the Modify button. The ACL Binding Configuration opens:Figure 52: ACL Binding Config
Configuring DHCP SnoopingPage 92Section 6. Configuring DHCP SnoopingDHCP Snooping expands network security by providing an extra layer of security bet
Configuring DHCP SnoopingPage 93Defining DHCP Snooping General PropertiesThe DHCP Snooping General Page contains parameters for enabling DHCP Snooping
Configuring DHCP SnoopingPage 94• Backup Database — Indicates if the DHCP Snooping Database is enabled. The possible field values are: – Enable — Enab
Configuring DHCP SnoopingPage 95To define DHCP Snooping on VLANs: 1. Click DHCP Snooping > VLAN Settings. The VLAN Settings Page opens:Figure 54: V
Configuring DHCP SnoopingPage 96To define trusted interfaces: 1. Click DHCP Snooping > Trusted Interfaces. The Trusted Interfaces Page opens:Figure
Configuring DHCP SnoopingPage 973. In the table, select an interface and click Modify. The Trusted Configuration Page opens.Figure 56: Trusted Configu
Configuring DHCP SnoopingPage 98Binding Addresses to the DHCP Snooping DatabaseThe Binding Database Page contains parameters for querying and adding I
Configuring DHCP SnoopingPage 99Query ResultsThe Query Results table contains the following fields:• MAC Address — Indicates the MAC address found dur
Kommentare zu diesen Handbüchern