Allied-telesis AT-S94 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computerhardware Allied-telesis AT-S94 herunter. Allied Telesis AT-S94 User Manual [en] Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 250
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - WEB User’s Guide

613-001104 Rev. BManagementSoftwareAT-S94WEB User’s GuideAT-8000S Series Stackable Gigabit Ethernet SwitchesVersion 2.0.0

Seite 2

Getting StartedStarting the ApplicationPage 10Section 1. Getting StartedThis section provides an introduction to the Web Browser Interface, and includ

Seite 3 - Table of Contents

Configuring PortsSetting Ports ConfigurationsPage 100Section 7. Configuring PortsPort Configuration includes the following procedures for configuring

Seite 4

Configuring PortsSetting Ports ConfigurationsPage 101The Port Settings Page contains the Zoom View of the device ports. The possible port settings are

Seite 5

Configuring PortsSetting Ports ConfigurationsPage 102The Port Setting Configuration Page contains the following fields:• Port— Lists the names of conf

Seite 6

Configuring PortsSetting Ports ConfigurationsPage 103• Admin Advertisement — Defines the auto negotiation setting the port advertises. The possible fi

Seite 7 - • Intended Audience

Configuring PortsSetting Ports ConfigurationsPage 104Configuring Port MirroringPort mirroring monitors and mirrors network traffic by forwarding copie

Seite 8 - Intended Audience

Configuring PortsSetting Ports ConfigurationsPage 105• Status — Indicates if the port is currently monitored. The possible field values are:– Active —

Seite 9 - Contacting Allied Telesis

Configuring PortsSetting Ports ConfigurationsPage 1063. Define the Type field.4. Click Apply. The Port mirroring is modified, and the device is update

Seite 10 - Section 1. Getting Started

Configuring PortsAggregating PortsPage 107Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a singl

Seite 11 - Getting Started

Configuring PortsAggregating PortsPage 108Defining Trunk SettingsThe Trunk Settings Page contains parameters for defining Trunks. To define a port tru

Seite 12 - Figure 2: System General Page

Configuring PortsAggregating PortsPage 109• Flow Control — Displays the flow control status of the trunk.• LACP — Indicates if LACP is enabled on the

Seite 13

Getting StartedStarting the ApplicationPage 11Figure 1: Embedded Web System Login Page3. Enter manager in the User Name field. 4. Enter friend in the

Seite 14 - User Interface Components

Configuring PortsAggregating PortsPage 110• Current Status — Indicates whether the trunk is currently operational or non-operational. The possible fie

Seite 15 - Using the Management Buttons

Configuring PortsAggregating PortsPage 111Defining Port TrunkingThe Port Trunking Page displays information about the defined trunks.To modify Port Tr

Seite 16

Configuring PortsAggregating PortsPage 1123. Click Modify. The Port Trunking Configuration Page opens:Figure 67: Port Trunking Configuration PageIn ad

Seite 17 - Figure 5: Add Community Page

Configuring PortsAggregating PortsPage 113Configuring LACPTrunk ports can contain different media types if the ports are operating at the same speed.

Seite 18 - Saving Configurations

Configuring PortsAggregating PortsPage 1142. Click Modify. the LACP Configuration Page opens:Figure 69: LACP Configuration Page3. Define the fields.4.

Seite 19 - Logging Out

Configuring InterfacesPage 115Section 8. Configuring InterfacesThis section contains information on configuring the interfaces of the device.This sect

Seite 20 - Resetting the Device

Configuring InterfacesPage 116The MAC Address Page contains the following fields:• View Static — Displays the static addresses assigned to the ports o

Seite 21

Configuring InterfacesPage 1174. Click Apply. The new MAC address is added to the addresses table and the device information is updated.To delete all

Seite 22

Configuring InterfacesConfiguring VLANsPage 118Configuring VLANs This section describes how to create and configure Virtual LANs (VLANs).VLANs are log

Seite 23 - Defining IPv6 Interfaces

Configuring InterfacesConfiguring VLANsPage 119Defining VLAN PropertiesThe VLAN Page provides information and global parameters for configuring and wo

Seite 24

Getting StartedStarting the ApplicationPage 12Figure 2: System General Page

Seite 25

Configuring InterfacesConfiguring VLANsPage 120The second section contains a table that maps VLAN parameters to ports. • Select the interfaces display

Seite 26

Configuring InterfacesConfiguring VLANsPage 1213. Click Modify. The VLAN Configuration opens.Figure 75: VLAN Configuration4. Change the Interface Stat

Seite 27

Configuring InterfacesConfiguring VLANsPage 122Defining VLAN Interface SettingsThe VLAN Interface Page contains fields for managing ports that are par

Seite 28

Configuring InterfacesConfiguring VLANsPage 123• Frame Type — Specifies the packet type accepted on the port. The possible field values are:– Admit Ta

Seite 29 - Configuring Tunnels

Configuring InterfacesConfiguring VLANsPage 124Defining GVRPThe GVRP Page enables users to configure GARP VLAN Registration Protocol (GVRP) on the dev

Seite 30 - Defining IPv6 Neighbors

Configuring InterfacesConfiguring VLANsPage 125• Interface — Displays the port or trunk name on which GVRP is enabled.• GVRP State — Indicates if GVRP

Seite 31

Configuring InterfacesDefining MAC Based GroupsPage 126Defining MAC Based GroupsThe MAC Based Groups Page allows network managers to group VLANs based

Seite 32

Configuring InterfacesDefining MAC Based GroupsPage 127• VLAN ID — Attaches the interface to a user-defined VLAN ID. VLAN group ports can be attached

Seite 33

Configuring InterfacesDefining MAC Based GroupsPage 128To add a mapped group:1. Click Layer 2 > MAC Based Groups. The MAC Based Groups Page opens:2

Seite 34 - Setting the System Clock

Configuring System LogsPage 129Section 9. Configuring System LogsThis section provides information for managing system logs. System logs enable viewin

Seite 35 - Configuring SNTP

Getting StartedUsing the Web Browser InterfacePage 13Using the Web Browser InterfaceThis section provides general information about the interface, and

Seite 36

Configuring System LogsPage 130The Event Log Page contains the following fields:The Configure Log Outputs table displays the following log information

Seite 37

Configuring System LogsPage 131The Add Syslog Page contains the following fields:• Description — Provides any additional information about the syslog

Seite 38

Configuring System LogsPage 132Modifying Log Servers Clicking Modify opens the Event Log Configuration Page, in which administrators can modify Server

Seite 39

Configuring System LogsPage 1333. Click View. The selected log page opens:Figure 88: View Flash Log PageThe View Flash Log Page and View Temporary Log

Seite 40 - • Defining Access Control

Configuring Spanning TreeConfiguring Classic Spanning TreePage 134Section 10. Configuring Spanning TreeSpanning Tree Protocol (STP) provides tree topo

Seite 41 - Defining Access Profiles

Configuring Spanning TreeConfiguring Classic Spanning TreePage 135Defining STP PropertiesThe Spanning Tree Page contains parameters for enabling and c

Seite 42

Configuring Spanning TreeConfiguring Classic Spanning TreePage 136• Path Cost Default Values — Specifies the method used to assign default path cost t

Seite 43

Configuring Spanning TreeConfiguring Classic Spanning TreePage 137Defining STP InterfacesNetwork administrators can assign STP settings to a specific

Seite 44

Configuring Spanning TreeConfiguring Classic Spanning TreePage 138• Port Fast — Indicates if Fast Link is enabled on the port. If Fast Link mode is en

Seite 45 - Defining Profile Rules

Configuring Spanning TreeConfiguring Classic Spanning TreePage 139• Designated Cost — Indicates the cost of the port participating in the STP topology

Seite 46

Getting StartedUsing the Web Browser InterfacePage 14User Interface ComponentsThe System General Page example shows the interface components.Figure 4:

Seite 47

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 140Configuring Rapid Spanning TreeWhile Classic STP prevents Layer 2 forwarding loops in

Seite 48

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 141• Mode — Displays the current STP mode. The STP mode is selected in the Spanning Tree

Seite 49

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 142– Learning — Indicates the port is currently in the learning mode. The interface canno

Seite 50

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 143Configuring Multiple Spanning TreeMultiple Spanning Tree Protocol (MSTP) provides d

Seite 51

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 144• IST Master — Identifies the Spanning Tree Master instance. The IST Master is the

Seite 52

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 145The MSTP Interface Settings Page contains the following fields: • Instance ID — Lis

Seite 53

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1463. Define the fields.4. Click Apply. MSTP is defined for the selected interface.5.

Seite 54

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 147Defining MSTP Instance MappingsNetwork administrators can assign MSTP mapping to a

Seite 55 - Configuring TACACS+

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 148Defining MSTP Instance SettingsMSTP maps VLANs into STP instances. Packets assigned

Seite 56

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1493. Define the fields.4. Click Apply. MSTP is defined for the selected instance, and

Seite 57 - Figure 28: Add TACACS+ Page

Getting StartedUsing the Web Browser InterfacePage 15Using the Management Buttons Management buttons provide an easy method of configuring device info

Seite 58

Configuring Multicast ForwardingPage 150Section 11. Configuring Multicast ForwardingMulticast forwarding allows a single packet to be forwarded to mul

Seite 59 - Configuring RADIUS

Configuring Multicast ForwardingPage 151Configuring IGMP SnoopingWhen IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. Th

Seite 60

Configuring Multicast ForwardingPage 152• IGMP Querier Status — Indicates if the specific VLAN can operate as an IGMP Querier. The possible field valu

Seite 61 - Figure 31: Add RADIUS Page

Configuring Multicast ForwardingPage 153To modify the IGMP Snooping configuration: 1. Click Multicast > IGMP. The IGMP Page opens.2. Click Modify.

Seite 62

Configuring Multicast ForwardingPage 154To define Multicast Groups:1. Click Multicast > Multicast Group. The Multicast Group Page opens:Figure 101:

Seite 63 - Configuring Local Users

Configuring Multicast ForwardingPage 1553. Click Add. The Add Multicast Group Page opens:Figure 102:Add Multicast Group Page 4. Select the VLAN ID.5.

Seite 64

Configuring Multicast ForwardingPage 156Defining Multicast Forward All SettingsMulticast forwarding enables transmitting packets from either a specifi

Seite 65

Configuring Multicast ForwardingPage 1573. Click Modify. The Multicast Forward All Configuration Page opens:Figure 105:Multicast Forward All Configura

Seite 66 - Defining Line Passwords

Configuring Multicast ForwardingPage 158Defining Unregistered Multicast SettingsMulticast frames are generally forwarded to all ports in the VLAN. If

Seite 67 - Configuring Network Security

Configuring Multicast ForwardingPage 1592. Click Modify. The Unregistered Multicast Configuration Page opens:Figure 107:Unregistered Multicast Configu

Seite 68 - Figure 37: Port Security Page

Getting StartedUsing the Web Browser InterfacePage 16Test Performs a diagnostic test.Clear All Counters Removes all counters.The application menu incl

Seite 69

Configuring SNMPPage 160Section 12. Configuring SNMPSimple Network Management Protocol (SNMP) provides a method for managing network devices. Equipmen

Seite 70 - Defining 802.1x Port Access

Configuring SNMPPage 161Enabling SNMPThe SNMP Global Page provides fields for globally enabling and configuring SNMP on the device.To enable SNMP: 1.

Seite 71

Configuring SNMPPage 162Defining SNMP CommunitiesAccess rights are managed by defining communities in the SNMP Community Page. When the community name

Seite 72

Configuring SNMPPage 163• Access Mode — Defines the access rights of the community. The possible field values are:– Read Only — Management access is r

Seite 73

Configuring SNMPPage 164The Add SNMP Community Page contains the following fields:• Supported IP Format — Indicates the type of IP addressing protocol

Seite 74

Configuring SNMPPage 165To modify SNMP community settings: 1. Select an SNMP community entry in the Basic table or in the Advanced Table.2. Click Modi

Seite 75 - Enabling Storm Control

Configuring SNMPPage 166Defining SNMP GroupsThe SNMP Group Page provides information for creating SNMP groups, and assigning SNMP access control privi

Seite 76

Configuring SNMPPage 167• Security Level — Defines the security level attached to the group. Security levels apply to SNMPv3 only. The possible field

Seite 77 - Defining Access Control

Configuring SNMPPage 168To modify an SNMP group:1. Click SNMP > Groups. The SNMP Group Page opens.2. Click Modify. The Group Configuration Page ope

Seite 78

Configuring SNMPPage 169Defining SNMP UsersThe SNMP Users Page enables assigning system users to SNMP groups, as well as defining the user authenticat

Seite 79

Getting StartedUsing the Web Browser InterfacePage 17Adding, Modifying and Deleting InformationThe WBI contains and tables for configuring devices. Us

Seite 80 - Defining IPv4 Based ACL

Configuring SNMPPage 170• Authentication — Displays the method used to authenticate users. The possible field values are:– MD5 Key — Users are authent

Seite 81

Configuring SNMPPage 171• Authentication Key — Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are en

Seite 82

Configuring SNMPPage 172Defining SNMP ViewsThe SNMP views provide or block access to device features or portions of features. Feature access is grante

Seite 83

Configuring SNMPPage 1732. Click Add. The Add SNMP VIew Page opens:Figure 119: Add SNMP VIew Page3. Define the View Name field.4. Select the Object ID

Seite 84

Configuring SNMPPage 174Defining Notification RecipientsThe SNMP Notify Page contains fields for defining SNMP notification recipients. The page conta

Seite 85 - Adding ACE Rules

Configuring SNMPPage 175SNMPv1,2c Notification RecipientThe SNMP v1, v2c Recipient table contains the following fields:• Recipients IP Address — Displ

Seite 86 - Defining IPv6 Based ACL

Configuring SNMPPage 1762. Click Add. The Add Notify Page opens:Figure 121:Add Notify Page In addition to the SNMP Notify Page, the Add Notify Page co

Seite 87

Configuring SNMPPage 1774. Click Apply. The notification recipient settings are saved and the device is updated.5. Click Save Config on the menu to sa

Seite 88

Configuring SNMPPage 178Defining Notification FiltersThe SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a

Seite 89

Configuring SNMPPage 179To add an SNMP notification filter:1. Click the Add button. The Add SNMP Notification Filter Page opens:Figure 124:Add SNMP No

Seite 90 - Defining ACL Binding

Getting StartedUsing the Web Browser InterfacePage 18Figure 6: Local User Settings Page4. Define the fields. 5. Click Apply. The fields are modified,

Seite 91

Configuring LLDPPage 180Section 13. Configuring LLDPLink Layer Discovery Protocol (LLDP) is a Layer 2 protocol that allows a network device supporting

Seite 92 - • Defining Trusted Interfaces

Configuring LLDPPage 181Defining Global LLDP PropertiesThe LLDP Properties Page allows network managers to assign global LLDP parameters. To enable an

Seite 93

Configuring LLDPPage 182• Transmit Delay (1 - 8192) — Indicates the amount of time that passes between successive LLDP frame transmissions due to chan

Seite 94

Configuring LLDPPage 183• State — Indicates the LLDP state on the port. The possible field values are: – Tx Only — Enables transmitting LLDP packets o

Seite 95 - Defining Trusted Interfaces

Configuring LLDPPage 184Defining LLDP Media Endpoint Discovery Network PolicyLLDP Media Endpoint Discovery (LLDP MED) is an enhancement to the 802.1ab

Seite 96

Configuring LLDPPage 185– Guest VLAN Signaling — Indicates that the network policy is defined for a Guest VLAN Signalling application. – Softphone Voi

Seite 97

Configuring LLDPPage 186To modify a network policy setting:1. Click LLDP > Profile Rules: The LLDP MED Network Policy Page opens.2. Click Modify. T

Seite 98

Configuring LLDPPage 187Defining LLDP MED Port SettingsThe LLDP MED Port Settings Page contains parameters for assigning LLDP network policies to spec

Seite 99

Configuring LLDPPage 1882. Click Modify. The Modify LLDP MED Port Settings Page opens: Figure 132:Modify LLDP MED Port Settings PageThis page contains

Seite 100 - Section 7. Configuring Ports

Configuring LLDPPage 1896. Define the port location in the Location Coordinate (16 Bytes in Hex), Location Civic Address (6-160 Bytes in Hex), Locatio

Seite 101 - Configuring Ports

Getting StartedLogging OutPage 19Logging OutThe Logout option enables the user to log out of the device thereby terminating the running session.To log

Seite 102 - Page 102

Configuring LLDPPage 1902. Click Details to view the Neighbors Information Details Page for ports. Figure 134:Neighbors Information Details PageThe Ne

Seite 103 - Page 103

Configuring LLDPPage 191LLDP MED Power over EthernetThe port PoE information.• Power Type — Indicates the power type advertised on the port.• Power So

Seite 104 - Configuring Port Mirroring

Configuring Power Over EthernetPage 192Section 14. Configuring Power Over EthernetThis section describes configuring Power over Ethernet (PoE) for an

Seite 105 - Page 105

Configuring Power Over EthernetPage 193To enable PoE for the device: 1. Click System > Power Over Ethernet. The Power Over Ethernet Page opens:Figu

Seite 106

Configuring Power Over EthernetPage 1944. Click Modify. PoE is enabled on the device and global settings are saved. The new threshold is immediately a

Seite 107 - Aggregating Ports

Configuring Power Over EthernetPage 195Defining Power Over Ethernet ConfigurationTo modify PoE port settings: 1. In the Power Over Ethernet Page Zoom

Seite 108 - Defining Trunk Settings

Configuring Power Over EthernetPage 196– Searching — Indicates that the device is currently searching for a powered device. Searching is the default P

Seite 109 - Page 109

Configuring ServicesPage 197Section 15. Configuring ServicesThis section describes Quality of Service related configurations. QoS supports activating

Seite 110 - Page 110

Configuring ServicesPage 198Enabling Class of Service (CoS)The CoS Page enables configuring the CoS ports or trunks on the device.To configure CoS por

Seite 111 - Defining Port Trunking

Configuring ServicesPage 199• Interface — Displays the interface number.• Default CoS— Determines the default CoS value for incoming packets for which

Seite 112 - Page 112

Copyright © 2008 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied

Seite 113 - Configuring LACP

Getting StartedResetting the DevicePage 20Resetting the DeviceThe Reset option enables resetting the device from a remote location. NoteSave all chang

Seite 114

Configuring ServicesPage 200Configuring CoS Queueing and SchedulingThe CoS Queuing & Scheduling Page provides fields for configuring CoS Priority

Seite 115 - Defining MAC Addresses

Configuring ServicesPage 201Mapping CoS Values to QueuesThe Configure CoS Page contains fields for classifying CoS settings to traffic queues. When co

Seite 116 - Page 116

Configuring ServicesPage 202Mapping DSCP Values to QueuesThe Configure DSCP Page contains fields for classifying DSCP settings to traffic queues. For

Seite 117 - Configuring Interfaces

Configuring ServicesPage 203Configuring QoS BandwidthThe Bandwidth Page allows network managers to define the bandwidth settings for a specified egres

Seite 118 - Configuring VLANs

Configuring ServicesPage 204As a default the Bandwidth Page opens displaying the port options. The fields are identical when displaying the trunk CoS.

Seite 119 - Defining VLAN Properties

Configuring ServicesPage 2054. Click Modify. The Bandwidth Configuration Page opens:Figure 143:Bandwidth Configuration Page5. Define the fields.6. Cli

Seite 120 - Page 120

System UtilitiesPage 206Section 16. System UtilitiesThe configuration file structure involves the following configuration files:• Startup Configuratio

Seite 121 - Figure 75: VLAN Configuration

System UtilitiesPage 207Restoring the Default ConfigurationThe Reset to Factory Defaults function restores the Configuration file to factory defaults

Seite 122 - Page 122

System UtilitiesPage 208To reset the configuration file to defaults with reboot: 1. Check the Reboot Switch After Resetting to Defaults option.2. Sele

Seite 123 - Page 123

System UtilitiesPage 209• Link Local Interface — If Link Local is selected as the supported IPv6 Address Type, indicates the supported interface. The

Seite 124 - Defining GVRP

Defining System InformationPage 21Section 2. Defining System InformationThe System General Page contains general device information, including system

Seite 125 - Page 125

System UtilitiesPage 210The Configuration Copy section of the File System Page contains the following fields:• Copy Configuration— Allows the copy con

Seite 126 - Defining MAC Based Groups

System UtilitiesPage 211Viewing Integrated Cable TestsThe Cable Test Page contains fields for performing tests on copper cables. Cable testing provide

Seite 127

System UtilitiesPage 2123. Click Test. The cable test is performed.4. Click Advanced. The Cable Test Configuration Page opens, and the copper cable te

Seite 128

System UtilitiesPage 213Viewing Optical TransceiversThe Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Opti

Seite 129 - Defining Log Settings

System UtilitiesPage 214Resetting the DeviceThe Reset Page enables the user to reset the system. Save all changes to the Running Configuration file be

Seite 130 - Adding Log Servers

Viewing StatisticsViewing Device StatisticsPage 215Not approved by Document Control. For review only.Section 17. Viewing StatisticsThis section provi

Seite 131 - Configuring System Logs

Viewing StatisticsViewing Device StatisticsPage 216Not approved by Document Control. For review only.The Interface Statistics Page contains the follo

Seite 132 - Modifying Log Servers

Viewing StatisticsViewing Device StatisticsPage 217Not approved by Document Control. For review only.Viewing Etherlike Statistics The Etherlike Stati

Seite 133 - Page 133

Viewing StatisticsViewing Device StatisticsPage 218Not approved by Document Control. For review only.• Internal MAC Receive Errors — Displays the num

Seite 134 - Page 134

Viewing StatisticsManaging RMON StatisticsPage 219Not approved by Document Control. For review only.Managing RMON StatisticsThis section contains the

Seite 135 - Defining STP Properties

Defining System InformationPage 22• Default Gateway — The IP address of a router for remote management of the device. The address must be entered in t

Seite 136 - Page 136

Viewing StatisticsManaging RMON StatisticsPage 220Not approved by Document Control. For review only.– 15 Sec — Indicates that the RMON statistics are

Seite 137 - Defining STP Interfaces

Viewing StatisticsManaging RMON StatisticsPage 221Not approved by Document Control. For review only.Configuring RMON HistoryThe RMON History Page con

Seite 138 - Page 138

Viewing StatisticsManaging RMON StatisticsPage 222Not approved by Document Control. For review only.Figure 154:Add RMON History Page3. Define the Sou

Seite 139 - Page 139

Viewing StatisticsManaging RMON StatisticsPage 223Not approved by Document Control. For review only.Viewing the RMON History TableThe RMON History Ta

Seite 140 - Page 140

Viewing StatisticsManaging RMON StatisticsPage 224Not approved by Document Control. For review only.• Undersize Packets — Displays the number of unde

Seite 141 - Page 141

Viewing StatisticsManaging RMON StatisticsPage 225Not approved by Document Control. For review only.Configuring RMON EventsThe RMON Events Page conta

Seite 142 - Configuring Spanning Tree

Viewing StatisticsManaging RMON StatisticsPage 226Not approved by Document Control. For review only.Figure 158:Add RMON Events Page3. Define the Comm

Seite 143 - Defining MSTP Properties

Viewing StatisticsManaging RMON StatisticsPage 227Not approved by Document Control. For review only.Figure 159:RMON Events Logs PageThe RMON Events L

Seite 144 - Defining MSTP Interfaces

Viewing StatisticsManaging RMON StatisticsPage 228Not approved by Document Control. For review only.Defining RMON Alarms The RMON Alarm Page contains

Seite 145 - Page 145

Viewing StatisticsManaging RMON StatisticsPage 229Not approved by Document Control. For review only.• Falling Event — Displays the event that trigger

Seite 146

Configuring Internet Protocol Version 6Page 23Section 3. Configuring Internet Protocol Version 6The device functions as an IPv6 compliant Host, as wel

Seite 147

Viewing StatisticsManaging RMON StatisticsPage 230Not approved by Document Control. For review only.Figure 162:Alarm Configuration Page3. Define the

Seite 148 - Page 148

Managing StackingStacking OverviewPage 231Section 18. Managing StackingThis section describes the stacking control management and includes the followi

Seite 149

Managing StackingStacking OverviewPage 232After the stacking issues are resolved, the device can be reconnected to the stack without interruption, and

Seite 150 - • Configuring IGMP Snooping

Managing StackingStacking OverviewPage 233During the Warm Standby, the Master and the Secondary Master are synchronized with the static configuration

Seite 151 - Configuring IGMP Snooping

Managing StackingStacking OverviewPage 234Exchanging Stacking MembersIn normal operation of the stack, the running configuration file in the master is

Seite 152 - Page 152

Managing StackingConfiguring Stacking ManagementPage 235Configuring Stacking ManagementThe Stacking Page allows network managers to either reset the e

Seite 153 - Page 153

Downloading Software with CLIConnecting a TerminalPage 236Appendix A. Downloading Software with CLIThis section describes how to download system files

Seite 154 - Page 154

Downloading Software with CLIInitial ConfigurationPage 237Initial ConfigurationBefore a device can download system software, the device must have an i

Seite 155 - Page 155

Downloading Software with CLIDownloading SoftwarePage 238To check the configuration, enter the command “show ip interface” as illustrated in the follo

Seite 156 - Page 156

Downloading Software with CLIDownloading SoftwarePage 2392. Enter the copy command to download the boot file.3. Enter the “bootvar” command to determi

Seite 157 - Page 157

Configuring Internet Protocol Version 6Page 24In addition to the dynamically configured IPv6 interfaces, there are two types of static IP addresses th

Seite 158 - Page 158

Downloading Software with CLIDownloading SoftwarePage 2405. Enter the “copy” command to download the system file.6. Reboot the device. The device boot

Seite 159 - Page 159

Downloading Software with CLIDownloading SoftwarePage 241Stacking Member Software DownloadEnsure the stack has been correctly connected as described i

Seite 160 - Section 12. Configuring SNMP

Downloading Software with CLIDownloading SoftwarePage 2425. Enter the “copy” command to download the system file.6. Reboot the devices being updated.

Seite 161 - Enabling SNMP

System DefaultsPage 243Appendix B. System DefaultsThis section contains the system defaults, and includes the following topics:• RS-232 Port Settings•

Seite 162 - Defining SNMP Communities

System DefaultsRS-232 Port SettingsPage 244RS-232 Port SettingsThe following table contains the RS-232 port setting defaults: Port DefaultsThe followi

Seite 163 - Page 163

System DefaultsConfiguration DefaultsPage 245Configuration DefaultsThe following are the initial device configuration defaults: Security DefaultsThe f

Seite 164 - Page 164

System DefaultsSpanning Tree DefaultsPage 246Spanning Tree DefaultsThe following are the spanning tree defaults:Address Table DefaultsThe following th

Seite 165 - Configuring SNMP

System DefaultsTrunking DefaultsPage 247Trunking DefaultsThe following are the trunking defaults:Multicast DefaultsThe following are the Multicast def

Seite 166 - Defining SNMP Groups

IndexPage 248IndexSymbols802.1x port access 70AAbsolute 228Access level 63Access profiles 41access profilesrules 45ACE 77ACL 77, 90ACL Binding 90Alarm

Seite 167 - Page 167

IndexPage 249GVRP configuration 124, 125HHost 127HTTP 43, 54IIGMP 151interface configurationaccess profiles 41Internet Group Management Protocol (IGMP

Seite 168

Configuring Internet Protocol Version 6Page 25The IPv6 Interface Table on the IPv6 Interface Page displays the IPv6 interfaces defined on the selected

Seite 169 - Defining SNMP Users

IndexPage 250RRADIUS 50RADIUS authentication 59RADIUS serverauthentication methods 50Rate limiting 204Remote Authorization Dial-In User Service (RADIU

Seite 170 - Page 170

Configuring Internet Protocol Version 6Page 26Adding Multiple IPv6 AddressesThe Add IPv6 Address Page allows the user to add multiple IPv6 addresses t

Seite 171

Configuring Internet Protocol Version 6Page 27Defining the IPv6 Default GatewayThe IPv6 Default Gateway Page enables you to configure the IPv6 address

Seite 172 - Defining SNMP Views

Configuring Internet Protocol Version 6Page 28– Tunnel• Type — Specifies the means by which the default gateway was configured. The possible field val

Seite 173

Configuring Internet Protocol Version 6Page 29Configuring TunnelsThe Tunneling Page defines the tunneling process on the device, which encapsulates IP

Seite 174 - Page 174

Table of ContentsPage 3 Table of ContentsPreface...

Seite 175 - SNMPv3 Notification Recipient

Configuring Internet Protocol Version 6Page 30• Domain Name Query Interval (10-3600) — Specifies the interval between DNS Queries (before the IP addre

Seite 176 - Page 176

Configuring Internet Protocol Version 6Page 31The IPv6 Neighbors Page contains the following fields:View IPV6 Neighbors•View Static — Displays the sta

Seite 177

Configuring Internet Protocol Version 6Page 323. Click Add. The Add IPv6 Neighbor Page opens.Figure 15: Add IPv6 Neighbor Page4. Define the static IPv

Seite 178 - Defining Notification Filters

Configuring Internet Protocol Version 6Page 33To view IPv6 Neighbor entries:1. Click System > IPv6 Neighbors. The IPv6 Neighbors Page opens.2. Sele

Seite 179 - Page 179

Configuring System TimePage 34Section 4. Configuring System TimeThe System Time Page provides information for configuring system time parameters, incl

Seite 180 - Section 13. Configuring LLDP

Configuring System TimePage 35• System Date — Sets the system date. The field format is Day/Month/Year. For example: 04/May/2050 (May 4, 2050).• Time

Seite 181 - Page 181

Configuring System TimePage 36To define SNTP global parameters: 1. Click System > System Time. The System Time Page opens.The Simple Network Time P

Seite 182 - Defining LLDP Port Settings

Configuring System TimePage 37• Time Set Offset — Used for non-USA and European countries to set the amount of time for DST (in minutes). The default

Seite 183 - Page 183

Configuring System TimePage 38• Bahamas — From April to October, in conjunction with Daylight Savings Time in the United States. • Belarus — From the

Seite 184 - Page 184

Configuring System TimePage 39• Slovak Republic - From the last weekend of March until the last weekend of October.• South Africa — South Africa does

Seite 185 - Page 185

Table of ContentsPage 4 Configuring Network Security ...

Seite 186 - Configuring LLDP

Configuring Device SecurityPage 40Section 5. Configuring Device SecurityThis section describes setting security parameters for ports, device managemen

Seite 187 - Page 187

Configuring Device SecurityConfiguring Management SecurityPage 41Configuring Management SecurityThis section provides information for configuring devi

Seite 188 - Page 188

Configuring Device SecurityConfiguring Management SecurityPage 42To define access profiles:1. Click Mgmt. Security > Access Profile. The Access Pro

Seite 189 - Page 189

Configuring Device SecurityConfiguring Management SecurityPage 432. Click Add. The Add Access Profile Page opens:Figure 19: Add Access Profile PageIn

Seite 190 - Page 190

Configuring Device SecurityConfiguring Management SecurityPage 44• Supported IP Format — Defines the supported Internet Protocol on which the access p

Seite 191 - Page 191

Configuring Device SecurityConfiguring Management SecurityPage 45Defining Profile RulesAccess profiles can contain up to 128 rules that determine whic

Seite 192 - Page 192

Configuring Device SecurityConfiguring Management SecurityPage 46• Management Method — Defines the management method for which the rule is defined. Us

Seite 193 - Page 193

Configuring Device SecurityConfiguring Management SecurityPage 47– IPv6 — Indicates that IPv6 is supported.• IPv6 Address Type — If IPv6 is selected a

Seite 194 - Page 194

Configuring Device SecurityConfiguring Management SecurityPage 48To modify an access rule:1. Click Mgmt. Security > Profile Rules: The Profile Rule

Seite 195 - Page 195

Configuring Device SecurityConfiguring Management SecurityPage 49Defining Authentication ProfilesAuthentication profiles allow network administrators

Seite 196 - Page 196

Table of ContentsPage 5 Configuring Multicast Forwarding ... 150Co

Seite 197 - Page 197

Configuring Device SecurityConfiguring Management SecurityPage 50– RADIUS — Authenticates the user at the RADIUS server. For more information, see Def

Seite 198 - Page 198

Configuring Device SecurityConfiguring Management SecurityPage 51Figure 24: Add Authentication Profile Page3. Select the type of function to configure

Seite 199 - Page 199

Configuring Device SecurityConfiguring Management SecurityPage 52Figure 25: Authentication Profile Configuration Page3. Select the Profile Name from t

Seite 200 - Page 200

Configuring Device SecurityConfiguring Management SecurityPage 53Mapping Authentication ProfilesAfter authentication profiles are defined, they can be

Seite 201 - Mapping CoS Values to Queues

Configuring Device SecurityConfiguring Management SecurityPage 54• Secure HTTP — Indicates that authentication methods are used for secure HTTP access

Seite 202 - Mapping DSCP Values to Queues

Configuring Device SecurityConfiguring Server Based AuthenticationPage 55Configuring Server Based AuthenticationNetwork administrators assign authenti

Seite 203 - Configuring QoS Bandwidth

Configuring Device SecurityConfiguring Server Based AuthenticationPage 56Figure 27: TACACS+ PageThe TACACS+ Page contains the following fields:• Suppo

Seite 204 - Page 204

Configuring Device SecurityConfiguring Server Based AuthenticationPage 57Figure 28: Add TACACS+ Page3. Define the fields.4. Click Apply. The TACACS+ p

Seite 205 - Configuring Services

Configuring Device SecurityConfiguring Server Based AuthenticationPage 58To modify TACACS+ server settings:1. Click Mgmt. Protocols > TACACS+. The

Seite 206 - Section 16. System Utilities

Configuring Device SecurityConfiguring Server Based AuthenticationPage 59Configuring RADIUSRemote Authorization Dial-In User Service (RADIUS) servers

Seite 207 - Page 207

Table of ContentsPage 6 Managing Stacking ...

Seite 208 - Page 208

Configuring Device SecurityConfiguring Server Based AuthenticationPage 60• Default Dead Time — Defines the default amount of time (in minutes) that a

Seite 209 - Page 209

Configuring Device SecurityConfiguring Server Based AuthenticationPage 612. Click Add. The Add RADIUS Page opens.Figure 31: Add RADIUS Page3. Define t

Seite 210 - Page 210

Configuring Device SecurityConfiguring Server Based AuthenticationPage 62To modify RADIUS server settings:1. Click Mgmt. Protocols > RADIUS. The RA

Seite 211 - Page 211

Configuring Device SecurityConfiguring Server Based AuthenticationPage 63Configuring Local UsersNetwork administrators can define users, passwords, an

Seite 212 - System Utilities

Configuring Device SecurityConfiguring Server Based AuthenticationPage 642. Click Create. The Add Local User Page opens: Figure 34: Add Local User Pag

Seite 213 - Viewing Optical Transceivers

Configuring Device SecurityConfiguring Server Based AuthenticationPage 65To modify local users:1. Click Mgmt. Security > Local Users. The Local Use

Seite 214

Configuring Device SecurityConfiguring Server Based AuthenticationPage 66Defining Line PasswordsNetwork administrators can define line passwords in th

Seite 215 - Viewing Device Statistics

Configuring Device SecurityConfiguring Network SecurityPage 67Configuring Network SecurityNetwork security manages locked ports.Port-based authenticat

Seite 216 - Page 216

Configuring Device SecurityConfiguring Network SecurityPage 68To configure secure ports: 1. Click Network Security > Port Security. The Port Securi

Seite 217 - Viewing Etherlike Statistics

Configuring Device SecurityConfiguring Network SecurityPage 694. Click Modify. The Port Security Configuration Page opens:Figure 38: Port Security Con

Seite 218 - Viewing Statistics

PrefacePage 7 Page 7PrefaceThis guide contains instructions on how to configure an AT-8000S Series Layer 2+ Fast Ethernet Switch using the interface

Seite 219 - Managing RMON Statistics

Configuring Device SecurityConfiguring Network SecurityPage 706. Click Apply. The port security settings are saved and the device is updated.7. Click

Seite 220 - Page 220

Configuring Device SecurityConfiguring Network SecurityPage 71For example, a network administrator can use Guest VLANs to deny network access via port

Seite 221 - Configuring RMON History

Configuring Device SecurityConfiguring Network SecurityPage 72To modify port based authentication settings:1. Click Modify. The Port Authentication Se

Seite 222

Configuring Device SecurityConfiguring Network SecurityPage 73The Port Authentication Settings Page contains the following port authentication paramet

Seite 223 - Page 223

Configuring Device SecurityConfiguring Network SecurityPage 74• Enable Periodic Reauthentication — Permits port reauthentication. The possible field v

Seite 224 - Page 224

Configuring Device SecurityConfiguring Network SecurityPage 75Enabling Storm ControlStorm control limits the amount Multicast and Broadcast frames acc

Seite 225 - Configuring RMON Events

Configuring Device SecurityConfiguring Network SecurityPage 76The Storm Control Page displays the Zoom View of the selected stacking member’s (defined

Seite 226 - Viewing the RMON Events Logs

Configuring Device SecurityDefining Access ControlPage 77Defining Access ControlAccess Control Lists (ACL) allow network managers to define classifica

Seite 227 - Page 227

Configuring Device SecurityDefining Access ControlPage 78The MAC Based ACL Page contains the following fields:• ACL Name — Displays the specific MAC b

Seite 228 - Defining RMON Alarms

Configuring Device SecurityDefining Access ControlPage 792. Click the Add ACL button. The Add MAC Based ACL Page opens:Figure 44: Add MAC Based ACL Pa

Seite 229 - Page 229

PrefaceWeb Browser Interface User’s Guide OverviewPage 8 Page 8Web Browser Interface User’s Guide OverviewThe Web Browser Interface User’s Guide provi

Seite 230

Configuring Device SecurityDefining Access ControlPage 80Adding ACE Rules1. Click Network Security > MAC Based ACL. The MAC Based ACL Page opens.2.

Seite 231 - Section 18. Managing Stacking

Configuring Device SecurityDefining Access ControlPage 81Figure 46: IPv4 Based ACL PageThe IPv4 Based ACL Page contains the following fields:• ACL Nam

Seite 232 - Stacking Members and Unit ID

Configuring Device SecurityDefining Access ControlPage 82– HMP — Host Mapping Protocol (HMP). Collects network information from various networks hosts

Seite 233 - Page 233

Configuring Device SecurityDefining Access ControlPage 83• Destination– IPv4 Address — Matches the destination port IPv4 address to which packets are

Seite 234 - Exchanging Stacking Members

Configuring Device SecurityDefining Access ControlPage 842. Click the Add ACL Button. The Add IPv4 Based ACL Page opens:Figure 47: Add IPv4 Based ACL

Seite 235 - Figure 163:Stacking Page

Configuring Device SecurityDefining Access ControlPage 85Adding ACE Rules1. Click Network Security > IPv4 Based ACL. The IPv4 Based ACL Page opens.

Seite 236 - Connecting a Terminal

Configuring Device SecurityDefining Access ControlPage 86Defining IPv6 Based ACLThe IPv6 Based ACL Page contains information for defining IPv6-based A

Seite 237 - Initial Configuration

Configuring Device SecurityDefining Access ControlPage 87• Destination Port — Defines the TCP/UDP destination port. This field is active only if 800/6

Seite 238 - Downloading Software

Configuring Device SecurityDefining Access ControlPage 882. Click the Add ACL Button. The Add IPv6 Based ACL Page opens:Figure 50: Add IPv6 Based ACL

Seite 239 - Downloading Software with CLI

Configuring Device SecurityDefining Access ControlPage 89Adding ACE Rules1. Click Network Security > IPv6 Based ACL. The IPv6 Based ACL Page opens.

Seite 240

PrefaceDocument ConventionsPage 9 Page 9Document ConventionsThis document uses the following conventions:Contacting Allied TelesisThis section provide

Seite 241

Configuring Device SecurityDefining Access ControlPage 90Defining ACL BindingWhen an ACL is bound to an interface, all the ACE rules that have been de

Seite 242

Configuring Device SecurityDefining Access ControlPage 912. Click the Modify button. The ACL Binding Configuration opens:Figure 52: ACL Binding Config

Seite 243 - Appendix B. System Defaults

Configuring DHCP SnoopingPage 92Section 6. Configuring DHCP SnoopingDHCP Snooping expands network security by providing an extra layer of security bet

Seite 244 - Port Defaults

Configuring DHCP SnoopingPage 93Defining DHCP Snooping General PropertiesThe DHCP Snooping General Page contains parameters for enabling DHCP Snooping

Seite 245 - System Time Defaults

Configuring DHCP SnoopingPage 94• Backup Database — Indicates if the DHCP Snooping Database is enabled. The possible field values are: – Enable — Enab

Seite 246 - VLAN Defaults

Configuring DHCP SnoopingPage 95To define DHCP Snooping on VLANs: 1. Click DHCP Snooping > VLAN Settings. The VLAN Settings Page opens:Figure 54: V

Seite 247 - QoS Defaults

Configuring DHCP SnoopingPage 96To define trusted interfaces: 1. Click DHCP Snooping > Trusted Interfaces. The Trusted Interfaces Page opens:Figure

Seite 248 - Page 248

Configuring DHCP SnoopingPage 973. In the table, select an interface and click Modify. The Trusted Configuration Page opens.Figure 56: Trusted Configu

Seite 249 - Page 249

Configuring DHCP SnoopingPage 98Binding Addresses to the DHCP Snooping DatabaseThe Binding Database Page contains parameters for querying and adding I

Seite 250 - Page 250

Configuring DHCP SnoopingPage 99Query ResultsThe Query Results table contains the following fields:• MAC Address — Indicates the MAC address found dur

Kommentare zu diesen Handbüchern

Keine Kommentare