Allied-telesis AT-S62 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítačový hardware Allied-telesis AT-S62. Allied Telesis AT-S62 User Manual [en] Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 335
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - User’s Guide

Management SoftwareAT-S62◆Web Browser InterfaceUser’s GuideAT-8516F/SC, AT-8524M, AT-8524POE, AT-8550GB and AT-8550SP LAYER 2+ FAST ETHERNET SWITCHESV

Strany 2

List of Figures10Chapter 7Static Port Trunks ...

Strany 3 - Table of Contents

Chapter 10: File Downloads and UploadsSection II: Advanced Operations 1007. In the TFTP Local Filename field, enter a name for the file. This is the n

Strany 4 - Advanced Operations

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 101Uploading a FileThis procedure explains how to upload a file from the swit

Strany 5

Chapter 10: File Downloads and UploadsSection II: Advanced Operations 102NoteThe top portion of the tab returns the switch to its factory default sett

Strany 6 - Section III

103Chapter 11Event Log and Syslog ServersThis chapter describes the event log and syslog servers. Sections in the chapter include:❑ Managing the Event

Strany 7

Chapter 11: Event Log and Syslog ServersSection II: Advanced Operations 104Managing the Event LogThe event log contains event messages that are genera

Strany 8 - Section VII

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 105The Event Log tab is shown in Figure 29.Figure 29 Event Log Tab4. For Sta

Strany 9

Chapter 11: Event Log and Syslog ServersSection II: Advanced Operations 106Displaying theEvent LogTo view the event log, do the following:1. From the

Strany 10 - List of Figures

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 107all modules. You can display more than one module at a time by holding dow

Strany 11

Chapter 11: Event Log and Syslog ServersSection II: Advanced Operations 1085. Once you have set the log filters, click View.PTRUNK Port trunkingQOS Qu

Strany 12

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 109Figure 30 shows an example of the event log in the Full display mode. The

Strany 13 - How This Guide is Organized

AT-S62 Web Browser Interface User’s Guide11Chapter 16IGMP Snooping ...

Strany 14

Chapter 11: Event Log and Syslog ServersSection II: Advanced Operations 110Modifying theEvent Log FullActionThis procedure explains how to control wha

Strany 15 - Document Conventions

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 111Saving the EventLogYou can save the current events in the log as a file in

Strany 16

Chapter 11: Event Log and Syslog ServersSection II: Advanced Operations 112Managing Syslog Server DefinitionsYou can configure the switch to send its

Strany 17 - Contacting Allied Telesyn

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 113Creating a SyslogServer DefinitionTo create a syslog server definition, pe

Strany 18 - Basic Operations

Chapter 11: Event Log and Syslog ServersSection II: Advanced Operations 114❑ Extended - sends the same as Normal, plus the date, time, and switch’s IP

Strany 19 - Chapter 1

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 115For example, the setting of DEFAULT assigns all port mirroring events a co

Strany 20 - Switch’s IP Address

Chapter 11: Event Log and Syslog ServersSection II: Advanced Operations 116❑ LOCAL3❑ LOCAL4❑ LOCAL5❑ LOCAL6❑ LOCAL7Each setting represents a predefine

Strany 21

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 1177. To permanently save the change, click the Save Config menu selection.Mo

Strany 22

Chapter 11: Event Log and Syslog ServersSection II: Advanced Operations 118Viewing a SyslogServer DefinitionTo view the parameter settings of a syslog

Strany 23 - Saving Your Parameter Changes

119Chapter 12ClassifiersA classifier defines a traffic flow. You use classifiers with access control lists to filter ingress traffic on a port. You ca

Strany 24

List of Figures12Figure 96: MSTP Spanning Tree Tab ...

Strany 25 - Enhanced Stacking

Chapter 12: ClassifiersSection II: Advanced Operations 120Creating a ClassifierTo create a new classifier, perform the following procedure:5. From the

Strany 26 - Chapter 2: Enhanced Stacking

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 121assigned to a switch port, while an inactive ACL or QoS policy is currentl

Strany 27

Chapter 12: ClassifiersSection II: Advanced Operations 122Some of the variables and settings display additional selections. For example, selecting IP

Strany 28

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 123VLAN IDDefines a traffic flow of tagged packets by its VLAN ID number. The

Strany 29 - Master Switch

Chapter 12: ClassifiersSection II: Advanced Operations 124format. If you use the latter, precede the number with “0x”. To set this parameter, the IP P

Strany 30

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 125UDP Source PortDefines a traffic flow by source UDP port. To set this para

Strany 31 - Basic Switch Parameters

Chapter 12: ClassifiersSection II: Advanced Operations 126Modifying a ClassifierThis procedure explains how to modify a classifier. If the classifier

Strany 32

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 127Deleting a ClassifierThis procedure explains how to delete a classifier. I

Strany 33

Chapter 12: ClassifiersSection II: Advanced Operations 128Displaying the ClassifiersTo display the classifiers on a switch, perform the following proc

Strany 34

129Chapter 13Access Control ListsAn access control list (ACL) is used to filter ingress traffic on a port. Traffic is defined by the classifiers assig

Strany 35

13PrefaceThis guide contains instructions on how to configure an AT-8500 Series Layer 2+ Fast Ethernet Switch using the web browser interface in the A

Strany 36

Chapter 13: Access Control ListsSection II: Advanced Operations 130Creating an Access Control ListThis procedure explains how to create an ACL. It is

Strany 37 - Displaying System Information

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 131DescriptionA description of the ACL.ActionThe action of the ACL. An action

Strany 38

Chapter 13: Access Control ListsSection II: Advanced Operations 132selections. To view the classifiers on a switch, refer to Displaying the Classifier

Strany 39

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 133Modifying an Access Control ListTo modify an ACL, perform the following pr

Strany 40 - Rebooting a Switch

Chapter 13: Access Control ListsSection II: Advanced Operations 134DescriptionUse this field to enter a description for the ACL. A description can be

Strany 41 - Setting the System Time

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 135Deleting an Access Control ListTo delete an ACL, perform the following pro

Strany 42

Chapter 13: Access Control ListsSection II: Advanced Operations 136Displaying the Access Control ListsTo display the current ACLs on the switch, perfo

Strany 43

137Chapter 14Quality of ServiceThis chapter contains instructions on how to configure Quality of Service (QoS). This chapter contains the following pr

Strany 44 - Pinging a Remote System

Chapter 14: Quality of ServiceSection II: Advanced Operations 138Managing Flow GroupsFlow groups are groups of classifiers that group together similar

Strany 45

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 139ActiveThe active status of the flow group. A flow group is deemed active i

Strany 46

Preface14Section III: SNMPv3 OperationsThe chapter in this section explains how to configure the switch for SNMPv3. (The instructions for SNMPv1 and S

Strany 47 - SNMPv1 and SNMPv2c Community

Chapter 14: Quality of ServiceSection II: Advanced Operations 140DescriptionSpecifies the flow group description. A description can be up to 15 alphan

Strany 48

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 141The Modify Flow Group page is shown in Figure 42.Figure 42 Modify Flow Gr

Strany 49 - Changes on page 23

Chapter 14: Quality of ServiceSection II: Advanced Operations 142Classifier ListThe classifier to be assigned to the flow group. The specified classif

Strany 50

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 143ActiveThe active status of the flow group. A flow group is deemed active i

Strany 51

Chapter 14: Quality of ServiceSection II: Advanced Operations 144Managing Traffic ClassesTraffic classes consist of a set of QoS parameters and a grou

Strany 52

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 145ActiveWhether or not this traffic class is active on the switch. An active

Strany 53 - Modifying a Community String

Chapter 14: Quality of ServiceSection II: Advanced Operations 146traffic exceeding the bandwidth is discarded. If remark is selected, the packets are

Strany 54

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 147Remark PriorityReplaces the user priority value in the packets with the ne

Strany 55 - Deleting a Community String

Chapter 14: Quality of ServiceSection II: Advanced Operations 148If you specify a new user priority value here and in Flow Group, the value in Flow Gr

Strany 56

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 149The Modify Traffic Class page is shown in Figure 45.Figure 45 Modify Traf

Strany 57 - Port Parameters

AT-S62 Web Browser Interface User’s Guide15Document ConventionsThis document uses the following conventions:NoteNotes provide additional information.C

Strany 58 - Configuring Port Parameters

Chapter 14: Quality of ServiceSection II: Advanced Operations 150Displaying theTraffic ClassesTo display the traffic classes, perform the following pr

Strany 59

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 151Managing PoliciesQoS policies consist of a collection of user-defined traf

Strany 60 - Chapter 5: Port Parameters

Chapter 14: Quality of ServiceSection II: Advanced Operations 152ActiveWhether or not this policy is active on the switch. An active policy is assigne

Strany 61

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 153DSCP ValueSpecifies a replacement value to write into the DSCP (TOS) field

Strany 62

Chapter 14: Quality of ServiceSection II: Advanced Operations 154Modifying aPolicyTo modify a policy, perform the following procedure:1. From the Home

Strany 63

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 155❑ To delete just one policy, select the policy from the list and click Del

Strany 64

156Chapter 15Class of ServiceThis chapter contains instructions on how to configure Class of Service (CoS). This chapter contains the following proced

Strany 65

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 157Configuring CoSThis procedure explains how to change the egress queue used

Strany 66

Chapter 15: Class of ServiceSection II: Advanced Operations 158The CoS Setting for Port page is shown in Figure 50.Figure 50 CoS Setting for Port Pag

Strany 67

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 159Mapping CoS Priorities to Egress QueuesThis procedure explains how to chan

Strany 68 - MAC Address Table

Preface16Where to Find Web-based GuidesThe installation and user guides for all Allied Telesyn products are available in Portable Document Format (PDF

Strany 69

Chapter 15: Class of ServiceSection II: Advanced Operations 160The Scheduling tab is shown in Figure 51.Figure 51 Queuing and Scheduling TabNoteThe C

Strany 70 - Chapter 6:MAC Address Table

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 161Configuring Egress SchedulingThis procedure explains how to select and con

Strany 71

Chapter 15: Class of ServiceSection II: Advanced Operations 162Displaying the CoS SettingsTo display the CoS settings, do the following:1. From the Ho

Strany 72

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 163Displaying QoS Queuing and SchedulingTo display QoS queuing and scheduling

Strany 73

164Chapter 16IGMP SnoopingThis chapter describes how to configure the IGMP snooping feature on the switch.Sections in the chapter include:❑ Configurin

Strany 74

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 165Configuring IGMP SnoopingTo configure IGMP snooping from a web browser man

Strany 75

Chapter 16: IGMP SnoopingSection II: Advanced Operations 166forwards the leave request to the router and simultaneously ceases transmission of any fur

Strany 76 - Changing the Aging Time

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 167This parameter is useful with networks that contain a large number of mult

Strany 77 - Static Port Trunks

Chapter 16: IGMP SnoopingSection II: Advanced Operations 168Displaying a List of Host Nodes and Multicast RoutersYou can use the AT-S62 software to di

Strany 78 - Creating a Static Port Trunk

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 169Router IPThe IP address of the port on the router.

Strany 79

AT-S62 Web Browser Interface User’s Guide17Contacting Allied TelesynThis section provides Allied Telesyn contact information for technical support as

Strany 80 - Chapter 7: Static Port Trunks

170Chapter 17Denial of Service DefenseThis chapter contains instructions on how to configure the Denial of Service defense feature on the switch. The

Strany 81

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 171Configuring Denial of Service Attack DefenseTo configure the ports on the

Strany 82

Chapter 17: Denial of Service DefenseSection II: Advanced Operations 172b. In the DoS Subnet Mask field, enter the LAN’s mask. A binary “1” indicates

Strany 83

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 1738. Adjust the settings as needed. The parameters are described below.Statu

Strany 84

Chapter 17: Denial of Service DefenseSection II: Advanced Operations 174Displaying the DoS SettingsTo display the DoS settings, do the following:1. Fr

Strany 85

175Chapter 18Power Over EthernetThis chapter contains the procedures for configuring Power over Ethernet (PoE) for an AT-8524POE switch. Sections in t

Strany 86 - Creating a Port Mirror

Chapter 18: Power Over EthernetSection II: Advanced Operations 176Setting the PoE ThresholdThe PoE threshold is a percentage of the total maximum PoE

Strany 87

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 177The Maximum Available Power field displays the maximum amount of PoE avail

Strany 88 - Chapter 8: Port Mirroring

Chapter 18: Power Over EthernetSection II: Advanced Operations 178Configuring PoE Port SettingsThis procedure enables and disables PoE on a port. This

Strany 89

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 179The top portion of the page displays the PoE operating status of the selec

Strany 90 - Deleting a Port Mirror

18Section IBasic OperationsThe chapters in this section cover a variety of basic switch features and functions. The chapters include:❑ Chapter 1: Star

Strany 91 - Displaying the Port Mirror

Chapter 18: Power Over EthernetSection II: Advanced Operations 1808. To change the maximum amount of power the port can supply to the device, enter a

Strany 92

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 181Displaying PoE Status and SettingsUse this procedure to display PoE status

Strany 93 - File System

Chapter 18: Power Over EthernetSection II: Advanced Operations 182Power LimitThe maximum amount of power allowed by the port for the device. The defau

Strany 94 - Chapter 9: File System

183Section IIISNMPv3 OperationsThis section contains the following chapter:❑ Chapter 19: SNMPv3 Protocol on page 184

Strany 95

184Chapter 19SNMPv3 ProtocolThis chapter provides the following procedures for configuring basic switch parameters using a web browser management sess

Strany 96

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 185Configuring the SNMPv3 ProtocolTo configure the SNMPv3 protocol, you need

Strany 97

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 186Enabling the SNMP ProtocolIn order to allow an NMS (an SNMP manager) to access the switch

Strany 98 - Downloading a File

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 187NoteIf the check box in the Enable SNMP Access box is empty, the switch ca

Strany 99

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 188Configuring the SNMPv3 User TableYou can create, delete, and modify an SNMPv3 User Table

Strany 100

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 1895. Click the Add button to add a new SNMPv3 User Table entry.The Add New S

Strany 101 - Uploading a File

19Chapter 1Starting a Web Browser Management SessionThis chapter contains the procedure for starting a web browser management session on an AT-8500 Se

Strany 102

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 1909. In the Confirm Authentication Password field, re-enter the authentication password.Not

Strany 103 - Event Log and Syslog Servers

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 19114. Click Apply to update the SNMPv3 User Table.15. To save your changes,

Strany 104 - Managing the Event Log

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 192The Modify SNMPv3 User Page is shown in Figure 61.Figure 61 Modify SNMPv3 User Page6. In

Strany 105

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 1937. In the Authentication Password field, enter an authentication password

Strany 106 - Event Log

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 194NoteThe Row Status parameter is a read-only field in the Web interface. The Active value

Strany 107

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 195Configuring the SNMPv3 View TableYou can create, delete, and modify an SNM

Strany 108

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 1965. To create a new SNMPv3 View Table entry click Add.The Add New SNMPv3 View Page is show

Strany 109

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 197The View Subtree parameter defines a MIB View and the Subtree Mask further

Strany 110 - Modifying the

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 198Deleting a ViewTable EntryTo delete an entry in the SNMPv3 View Table, perform the follow

Strany 111 - Clearing the

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 199Modifying a ViewTable EntryTo modify an entry in the SNMPv3 View Table, pe

Strany 112

Copyright © 2005 Allied Telesyn, Inc. 3200 North First Street, San Jose, CA 95134 USAAll rights reserved. No part of this publication may be reproduce

Strany 113 - Server Definition

Chapter 1: Starting a Web Browser Management SessionSection I: Basic Operations 20Starting a Web Browser Management SessionIn order for you to establi

Strany 114

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 2007. In the View Type field, enter one of the following view types:IncludedEnter this value

Strany 115

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 201Configuring the SNMPv3 Access TableYou can create, delete, and modify an S

Strany 116

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 2025. To create an SNMPv3 Access Table entry, click Add.The Add New SNMPv3 Access Page is sh

Strany 117 - Deleting a Syslog

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 203This parameter allows the users assigned to this Group Name to view the in

Strany 118 - Viewing a Syslog

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 204SNMP users, but you do not want to encrypt messages using a privacy protocol.You can sele

Strany 119 - Classifiers

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 2054. In the SNMPv3 section of the page, click the circle next to Configure A

Strany 120

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 206Modifying anAccess TableEntryTo modify an entry in the SNMPv3 Access Table, perform the f

Strany 121

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 2078. In the Write View Name field, enter a value that you configured with th

Strany 122 - Chapter 12: Classifiers

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 208Configuring the SNMPv3 SecurityToGroup TableYou can create, delete, and modify an SNMPv3

Strany 123

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 2095. To create an SNMPv3 SecurityToGroup Table entry, click Add.The Add New

Strany 124

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 21The AT-S62 software displays the login page, as shown in Figure 2.Figure 2 AT-

Strany 125

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 210There are four default values for this field that are reserved for SNMPv1 and SNMPv2c imp

Strany 126 - Modifying a Classifier

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 2115. Click the circle next to the SecurityToGroup Table entry that you want

Strany 127 - Deleting a Classifier

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 212❑ defaultV1GroupReadOnly❑ defaultV1GroupReadWrite❑ defaultV2cGroupReadOnly❑ defaultV2cGro

Strany 128 - Displaying the Classifiers

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 213Configuring the SNMPv3 Notify TableYou can create, delete, and modify an S

Strany 129 - Access Control Lists

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 2145. To create an SNMPv3 Notify Table entry, click Add.The Add New SNMPv3 Notify Page is sh

Strany 130

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 215NonVolatileSelect this storage type if you want the ability to save an ent

Strany 131

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 216Modifying aNotify TableEntryTo modify an entry in the SNMPv3 Notify Table, perform the fo

Strany 132

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 2178. In the Storage Type field, select one of the following storage types fo

Strany 133

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 218Configuring the SNMPv3 Target Address TableYou can create, delete, and modify an SNMPv3 T

Strany 134

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 219The SNMPv3 Target Address Table Page is shown in Figure 74.Figure 74 SNMP

Strany 135

Chapter 1: Starting a Web Browser Management SessionSection I: Basic Operations 22The main menu is on the left side of the Home page and consists of t

Strany 136

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 2206. In the Target Address Name field, enter the name of the SNMP manager, or host, that ma

Strany 137 - Quality of Service

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 221NonVolatileSelect this storage type if you want the ability to save an ent

Strany 138 - Managing Flow Groups

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 222Modifying TargetAddress TableEntryTo modify an entry in the SNMPv3 Target Address Table,

Strany 139

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 223You can enter a UDP port in the range of 0 to 65,535. The default UDP port

Strany 140 - Modifying a Flow

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 224Configuring the SNMPv3 Target Parameters TableYou can create, delete, and modify an SNMPv

Strany 141

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 2255. To create an SNMPv3 Target Parameters Table entry, click Add.The Add Ne

Strany 142 - Displaying Flow

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 2268. In the Security Model field, select one of the following SNMP protocols as the Securit

Strany 143

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 227This level provides the greatest level of security. You can select this va

Strany 144 - Managing Traffic Classes

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 228A warning message is displayed. Click OK to remove the Target Parameters Table entry.6. T

Strany 145

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 229NoteEnter a value for the Message Processing Model field only if you selec

Strany 146

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 23Saving Your Parameter ChangesWhen you make a change to a switch parameter, the

Strany 147

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 230NoteIf you have selected SNMPv1 or SNMPv2c as the Security Model, you must select No Auth

Strany 148 - Traffic Class

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 231Configuring the SNMPv3 Community TableYou can create, delete, and modify a

Strany 149 - Deleting a Traffic

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 232Figure 80 SNMPv3 Community Table Page5. To create an SNMPv3 Community Table entry, click

Strany 150 - Traffic Classes

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 2336. In the Community Index field, enter a numerical value for this Communit

Strany 151 - Managing Policies

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 234making changes to an SNMPv3 Community Table entry with a NonVolatile storage type, the Sa

Strany 152

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 235Modifying anSNMPv3CommunityTable EntryTo modify an entry in the SNMPv3 Com

Strany 153

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 236This name must be unique. Enter a value of up to 32 alphanumeric characters.NoteDo not us

Strany 154

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 237Displaying SNMPv3 TablesThis section contains procedures to display the SN

Strany 155 - Policies

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 238Displaying UserTable EntriesTo display entries in the SNMPv3 User Table, perform the foll

Strany 156 - Class of Service

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 239Displaying ViewTable EntriesTo display entries in the SNMPv3 View Table, p

Strany 157 - Configuring CoS

Chapter 1: Starting a Web Browser Management SessionSection I: Basic Operations 24Quitting a Web Browser Management SessionTo exit a web browser manag

Strany 158 - Chapter 15: Class of Service

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 240DisplayingAccess TableEntriesTo display entries in the SNMPv3 Access Table, perform the f

Strany 159

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 241DisplayingSecurityToGroupTable EntriesTo display entries in the SNMPv3 Sec

Strany 160

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 242Displaying NotifyTable EntriesTo display entries in the SNMPv3 Notify Table, perform the

Strany 161

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 243Displaying TargetAddress TableEntriesTo display entries in the SNMPv3 Targ

Strany 162 - Displaying the CoS Settings

Chapter 19: SNMPv3 ProtocolSection III: SNMPv3 Operations 244Displaying TargetParameters TableEntriesTo display entries in the SNMPv3 Target Parameter

Strany 163

AT-S62 Web Browser Interface User’s GuideSection III: SNMPv3 Operations 245DisplayingSNMPv3CommunityTable EntriesTo display entries in the SNMPv3 Com

Strany 164 - IGMP Snooping

246Section IVSpanning Tree ProtocolsThe chapter in this section explain the spanning tree protocols:❑ Chapter 20: STP, RSTP, and MSTP on page 247

Strany 165 - Configuring IGMP Snooping

247Chapter 20STP, RSTP, and MSTPThis chapter explains how to configure the STP, RSTP and MSTP parameters on an AT-8500 Series switch from a web browse

Strany 166 - Chapter 16: IGMP Snooping

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 248Enabling or Disabling Spanning TreeTo enable or disable spanning tree on the swi

Strany 167

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 249Configuring STPCautionThe bridge provides default STP parameters that

Strany 168

25Chapter 2Enhanced StackingThis chapter contains the following procedures:❑ Setting a Switch’s Enhanced Stacking Status on page 26❑ Selecting a Switc

Strany 169

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 2502. Adjust the STP bridge settings as needed. The parameters are described below.

Strany 170 - Denial of Service Defense

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 251Bridge Max AgeThe length of time after which stored bridge protocol da

Strany 171

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 252port priority is 0 to 240. As with bridge priority, this range is broken into in

Strany 172

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 253Table 9 lists the STP port costs with Auto-Detect when a port is part

Strany 173

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 254Configuring RSTPCautionThe bridge provides default RSTP parameters that are adeq

Strany 174 - Displaying the DoS Settings

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 2552. Adjust the parameters are desired. The parameters are defined below

Strany 175 - Power Over Ethernet

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 2566 - Bridge IdentifierThe MAC address of the bridge. The bridge identifier is use

Strany 176 - Setting the PoE Threshold

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 257Table 11 lists the RSTP port costs with Auto-Detect when the port is p

Strany 177

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 258Configuring MSTPThis section is divided into the following procedures:❑ Configur

Strany 178 - Configuring PoE Port Settings

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 259The MSTP Spanning Tree tab is shown in Figure 96.Figure 96 MSTP Spann

Strany 179

Chapter 2: Enhanced StackingSection I: Basic Operations 26Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the switch can be

Strany 180

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 2605. Adjust the bridge MSTP settings as needed. The parameters are described below

Strany 181

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 261❑ MaxAge must be less than (2 x (ForwardingDelay - 1))Bridge Max HopsM

Strany 182

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 2622. To create or delete an MSTI ID and to associate VLANs to MSTIs, do the follow

Strany 183 - SNMPv3 Operations

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 263The Modify MSTI window is shown in Figure 98.Figure 98 Modify MSTI Wi

Strany 184 - SNMPv3 Protocol

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 264ConfiguringMSTP PortParametersTo configure MSTP port parameters, perform the fol

Strany 185

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 265An MSTI-specific parameter can be set on a per MSTI basis. This means

Strany 186 - Enabling the SNMP Protocol

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 266Table 11 lists the MSTP port costs with Auto Update when the port is part of a p

Strany 187

AT-S62 Web Browser Interface User’s GuideSection IV: Spanning Tree Protocols 267Table 15 lists the MSTP port costs with the Auto setting when the port

Strany 188 - Table Entry

Chapter 20: STP, RSTP, and MSTPSection IV: Spanning Tree Protocols 268Displaying Spanning Tree SettingsTo display the parameter settings for the activ

Strany 189

269Section VVirtual LANsThe chapters in this section explain virtual LANs (VLANs). The chapters include:❑ Chapter 21: Virtual LANs on page 270❑ Chapte

Strany 190 - Chapter 19: SNMPv3 Protocol

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 27NoteIf the window does not have an Enhanced Stacking tab, you have accessed the

Strany 191

270Chapter 21Virtual LANsThis chapter explains how to create, modify, and delete port-based and tagged VLANs from a web browser management session. Th

Strany 192

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 271Creating a New Port-based or Tagged VLANTo create a new port-based or tagged VLAN,

Strany 193

Chapter 21: Virtual LANsSection V: Virtual LANs 272This tab displays the VLANs on the switch. The columns in the tab are defined below:VLAN IDThe VID

Strany 194

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 2735. Select the VID field and enter a VID value for the new VLAN. The range of the V

Strany 195

Chapter 21: Virtual LANsSection V: Virtual LANs 2748. To select the ports for the VLAN, click the ports in the switch image. Clicking repeatedly on a

Strany 196 - 1.3.6.1.2.1.6

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 275Modifying a Port-based or Tagged VLANThis procedure explains how to add or remove

Strany 197

Chapter 21: Virtual LANsSection V: Virtual LANs 276The modified VLAN is now ready for network operations.8. To permanently save the change, select the

Strany 198 - Deleting a View

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 277Deleting a Port-based or Tagged VLANTo delete a port-based or tagged VLAN from the

Strany 199 - Modifying a View

Chapter 21: Virtual LANsSection V: Virtual LANs 278Displaying VLANsTo display the current VLANs on a switch, perform the following procedure:1. From t

Strany 200

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 279Selecting a VLAN ModeThe AT-S62 management software features three VLAN modes:❑ Po

Strany 201

Chapter 2: Enhanced StackingSection I: Basic Operations 28Selecting a Switch in an Enhanced StackThe first thing that you should do before you perform

Strany 202

Chapter 21: Virtual LANsSection V: Virtual LANs 280Specifying a Management VLANThe management VLAN is the VLAN through which an AT-8500 Series switch

Strany 203

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 281Now let’s assume that you decide to create a VLAN called NMS with a VID of 24 for

Strany 204 - Access Table

282Chapter 22GARP VLAN Registration ProtocolThis chapter explains how to configure GVRP on the switch. The procedures include:❑ Configuring GVRP on pa

Strany 205

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 283Configuring GVRPTo configure the GVRP parameters, perform the following procedure:

Strany 206 - Modifying an

Chapter 22: GARP VLAN Registration ProtocolSection V: Virtual LANs 284Join TimeSets the duration of the Join Period timer. The range is from 10 to 60

Strany 207

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 285Enabling or Disabling GVRP on a PortThis procedure enables and disables GVRP on a

Strany 208 - SecurityToGroup

Chapter 22: GARP VLAN Registration ProtocolSection V: Virtual LANs 286Displaying the GVRP SettingsTo view the GVRP settings, perform the following pro

Strany 209

287Chapter 23Protected Ports VLANsThis chapter explains how to create, modify, and delete a protected ports VLAN using a web browser management sessio

Strany 210 - Deleting a

Chapter 23: Protected Ports VLANsSection V: Virtual LANs 288Deleting a Protected Ports VLANTo delete a protected ports VLAN from the switch, perform t

Strany 211

AT-S62 Web Browser Interface User’s GuideSection V: Virtual LANs 289Displaying a Protected Ports VLANTo display the details of a protected port VLAN,

Strany 212

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 29NoteThe list does not include the master switch on which you started the manage

Strany 213

290Section VIPort SecurityThe chapters in this section explain the port security features of the AT-8524M switch The chapters include:❑ Chapter 24: MA

Strany 214

291Chapter 24MAC Address SecurityThis chapter explains how to display and configure MAC address security on the ports on a switch. It contains the fol

Strany 215

Chapter 24: MAC Address SecuritySection VI: Port Security 292Configuring MAC Address SecurityMAC address security allows you to control access to a po

Strany 216 - Notify Table

AT-S62 Web Browser Interface User’s GuideSection VI: Port Security 293The Security for Port(s) window is shown in Figure 106.Figure 106 Security for

Strany 217

Chapter 24: MAC Address SecuritySection VI: Port Security 294LockedInstructs a port to immediately stop learning new dynamic MAC addresses. Frames are

Strany 218 - Address Table

AT-S62 Web Browser Interface User’s GuideSection VI: Port Security 295Displaying MAC Address SecurityTo display the MAC address security level of a po

Strany 219

Chapter 24: MAC Address SecuritySection VI: Port Security 296ParticipatingThis column applies only when the intrusion action on a port is set to trap

Strany 220

297Chapter 25802.1x Port-based Access ControlThis chapter contains instructions on how to configure the 802.1x port-based access control feature on th

Strany 221

Chapter 25: 802.1x Port-based Access ControlSection VI: Port Security 298Enabling or Disabling Port-based Access ControlThis procedure explains how to

Strany 222 - Modifying Target

AT-S62 Web Browser Interface User’s GuideSection VI: Port Security 2994. To enable or disable the feature, do the following:a. Click the Enable Port A

Strany 223

3Table of ContentsList of Figures ...

Strany 224 - Parameters Table

Chapter 2: Enhanced StackingSection I: Basic Operations 30Displaying the Enhanced Stacking StatusTo display the enhanced stacking status of a switch,

Strany 225

Chapter 25: 802.1x Port-based Access ControlSection VI: Port Security 300Setting Port RolesTo set port roles for port-based access control, perform th

Strany 226

AT-S62 Web Browser Interface User’s GuideSection VI: Port Security 3019. To configure authenticator port settings, go to Configuring Authenticator Por

Strany 227

Chapter 25: 802.1x Port-based Access ControlSection VI: Port Security 302Configuring Authenticator Port ParametersTo configure authenticator port para

Strany 228

AT-S62 Web Browser Interface User’s GuideSection VI: Port Security 303changes or the port receives an EAPOL-Start packet from a supplicant. The switch

Strany 229

Chapter 25: 802.1x Port-based Access ControlSection VI: Port Security 304regardless of the client. If set to Disabled, then the switch port forwards o

Strany 230

AT-S62 Web Browser Interface User’s GuideSection VI: Port Security 3055. To permanently save the changes, select the Save Config menu selection.

Strany 231

Chapter 25: 802.1x Port-based Access ControlSection VI: Port Security 306Configuring Supplicant Port ParametersTo configure supplicant port parameters

Strany 232

AT-S62 Web Browser Interface User’s GuideSection VI: Port Security 307Held PeriodSpecifies the amount of time in seconds the supplicant is to refrain

Strany 233

Chapter 25: 802.1x Port-based Access ControlSection VI: Port Security 308Displaying the Port-based Access Control SettingsTo display port-based access

Strany 234 - Community

309Section VIIManagement SecurityThe chapters in this section explain the management security features of the AT-S62 software. The chapters include:❑

Strany 235

31Chapter 3Basic Switch ParametersThis chapter contains the following sections:❑ Configuring an IP Address and Switch Name on page 32❑ Activating the

Strany 236

310Chapter 26Encryption Keys, PKI, and SSLThis chapter explains how to view the encryption keys, PKI certificates, and SSL settings. It includes the f

Strany 237

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 311Displaying Encryption KeysTo display the SSL and SSH encryption key pairs

Strany 238 - Table Entries

Chapter 26: Encryption Keys, SSL, and PKISection VII: Management Security 312Displaying PKI Settings and CertificatesTo display the self-signed and CA

Strany 239 - Displaying View

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 313MTrust (Manually Trusted)The certificate has been manually verified that

Strany 240

Chapter 26: Encryption Keys, SSL, and PKISection VII: Management Security 314SubjectThe Subject distinguished name.IssuerThe certificate issuer’s dist

Strany 241

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 315Displaying the SSL SettingsTo display the SSL settings, perform the follo

Strany 242 - Displaying Notify

316Chapter 27Secure Shell ProtocolThis chapter contains the procedure for configuring the SSH protocol settings. Sections in this chapter include:❑ Co

Strany 243 - Displaying Target

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 317Configuring the SSH ServerThis section describes how to configure the SSH

Strany 244

Chapter 27: Secure Shell ProtocolSection VII: Management Security 3184. Configure the parameters as needed. The parameters are described below: Status

Strany 245

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 319Displaying SSH InformationTo display SSH information, do the following:1.

Strany 246 - Spanning Tree Protocols

Chapter 3: Basic Switch ParametersSection I: Basic Operations 32Configuring an IP Address and Switch NameNoteFor guidelines on when to assign an IP ad

Strany 247 - STP, RSTP, and MSTP

320Chapter 28RADIUS and TACACS+ Authentication ProtocolsThis chapter contains instructions on how to configure the authentication protocols. This chap

Strany 248

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 321Configuring RADIUS and TACACS+To configure the authentication protocols,

Strany 249 - Configuring STP

Chapter 28: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 3225. Click Apply.NoteTo configure TACACS+, go to Step 6. To c

Strany 250

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 323IP Address and Server SecretUse these fields to specify the IP addresses

Strany 251

Chapter 28: RADIUS and TACACS+ Authentication ProtocolsSection VII: Management Security 324Global Server TimeoutThis parameter specifies the maximum a

Strany 252

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 325Displaying the RADIUS or TACSACS+ SettingsTo display the RADIUS or TACACS

Strany 253

326Chapter 29Management Access Control ListThis chapter explains how to create a Management Access Control List (ACL). You can use the ACL to restrict

Strany 254 - Configuring RSTP

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 327Creating a Management ACLTo create a Management ACL, perform the followin

Strany 255

Chapter 29: Management Access Control ListSection VII: Management Security 3284. In the Mgmt. ACL IP Mask field enter a mask that indicates the parts

Strany 256

AT-S62 Web Browser Interface User’s GuideSection VII: Management Security 329Adding or Deleting an ACEYou can add or delete ACEs from the management A

Strany 257

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 33NoteThis procedure describes the parameters in the Administration section of th

Strany 258 - Configuring MSTP

Chapter 29: Management Access Control ListSection VII: Management Security 330Displaying the Management ACLTo display the ACEs in the Management ACL,

Strany 259

331IndexNumerics802.1x port-based network access controlaccess role, configuring 300configuring 300configuring a supplicant port 306configuring an aut

Strany 260

Index332Cciphers available parameter 319CIST priority 261Class of Service (CoS)configuring 157mapping to egress queues 159scheduling 161classifierscre

Strany 261 - VLANs to MSTIs

AT-S62 Web Browser Interface User’s Guide333MMAC address tableadding addresses 72aging time 37, 76deleting addresses 74, 75displaying 69MACs available

Strany 262

Index334Power over Ethernet (PoE)configuring port settings 178displaying status 181setting threshold 176protected ports VLANsdeleting 288displaying 28

Strany 263

AT-S62 Web Browser Interface User’s Guide335Spanning Tree Protocol (STP)configuring bridge parameters 249configuring port parameters 251disabling 248d

Strany 264 - Parameters

Chapter 3: Basic Switch ParametersSection I: Basic Operations 34CommentsThis parameter specifies the location of the switch, (for example, 4th Floor -

Strany 265

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 356. Click the Save Config menu option to permanently save your changes.

Strany 266

Chapter 3: Basic Switch ParametersSection I: Basic Operations 36Activating the BOOTP or DHCP Client SoftwareFor background information on BOOTP and DH

Strany 267

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 37Displaying System InformationTo view basic information about the switch, perfor

Strany 268

Chapter 3: Basic Switch ParametersSection I: Basic Operations 38Configuring the Manager and Operator PasswordsThere are two levels of management acces

Strany 269 - Virtual LANs

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 39CautionYou should not use spaces or special characters, such as asterisks (*) a

Strany 270

Table of Contents4Pinging a Remote System ...

Strany 271 - Section V: Virtual LANs 271

Chapter 3: Basic Switch ParametersSection I: Basic Operations 40Rebooting a SwitchNoteAny parameters changes that have not been saved will be discarde

Strany 272

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 41Setting the System TimeThis procedure explains how to set the switch’s date and

Strany 273 - Section V: Virtual LANs 273

Chapter 3: Basic Switch ParametersSection I: Basic Operations 42The System Time tab is shown in Figure 8.Figure 8 System Time Tab4. To set the system

Strany 274

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 43NoteThe switch does not set DST automatically. If the switch is in a locale tha

Strany 275 - Section V: Virtual LANs 275

Chapter 3: Basic Switch ParametersSection I: Basic Operations 44Pinging a Remote SystemYou can instruct the switch to ping a node on your network. Thi

Strany 276

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 45Returning the AT-S62 Software to the Factory Default ValuesThe procedure in thi

Strany 277 - Section V: Virtual LANs 277

Chapter 3: Basic Switch ParametersSection I: Basic Operations 46The System Utilities tab is shown in Figure 10.Figure 10 System Utilities TabThe TFTP

Strany 278

47Chapter 4SNMPv1 and SNMPv2c Community StringsThis chapter explains how to activate SNMP management on the switch and how to create, modify, and dele

Strany 279 - Selecting a VLAN Mode

Chapter 4: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 48Enabling or Disabling SNMP ManagementTo enable or disable SNMP management

Strany 280

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 49A change to SNMP access is immediately activated on the switch.7. To permanentl

Strany 281 - Section V: Virtual LANs 281

AT-S62 Web Browser Interface User’s Guide5Saving the Event Log ...

Strany 282

Chapter 4: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 50Creating a SNMPv1 or SNMPv2c Community StringTo create a new SNMPv1 or SNM

Strany 283 - Configuring GVRP

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 51Open AccessDisplays the opened or closed access status of the string:Yes - The

Strany 284 - Section V: Virtual LANs 284

Chapter 4: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 526. In the Community Name field, enter the new community string. The name c

Strany 285

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 53Modifying a Community StringTo modify a community string, perform the following

Strany 286 - Displaying the GVRP Settings

Chapter 4: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 54NoteYou cannot change the name of a community string.7. Use the Status opt

Strany 287 - Protected Ports VLANs

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 55Deleting a Community StringTo delete a community string, do the following:1. Fr

Strany 288 - Section V: Virtual LANs 288

Chapter 4: SNMPv1 and SNMPv2 Community StringsSection I: Basic Operations 56Displaying the SNMP Status and Community StringsTo display the SNMPv1 and

Strany 289

57Chapter 5Port ParametersThis chapter explains how to view and change the parameter settings for the individual ports on a switch. Examples of the pa

Strany 290 - Port Security

Chapter 5: Port ParametersSection I: Basic Operations 58Configuring Port ParametersTo configure the parameter settings of a port on the switch, perfor

Strany 291 - MAC Address Security

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 59The Port Configuration page is shown Figure 16.Figure 16 Port Configuration Pa

Strany 292 - Section VI: Port Security 292

Table of Contents6Chapter 17Denial of Service Defense ...

Strany 293

Chapter 5: Port ParametersSection I: Basic Operations 60If you are configuring a twisted pair port and you select Auto-Negotiation, which is the defau

Strany 294 - Section VI: Port Security 294

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 61HOL BlockingFor a definition of Head of Line Blocking, refer to the AT-S62 Menu

Strany 295

Chapter 5: Port ParametersSection I: Basic Operations 62When you activate this feature on a port, the port will discard all egress broadcast packets.

Strany 296 - Section VI: Port Security 296

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 63Possible values are:Auto - The port will use flow control if it detects that th

Strany 297

Chapter 5: Port ParametersSection I: Basic Operations 64Displaying Port Status and StatisticsThe procedure in this section displays the operating stat

Strany 298 - Section VI: Port Security 298

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 65LinkThe status of the link between the port and the end node connected to the p

Strany 299

Chapter 5: Port ParametersSection I: Basic Operations 66If you select Statistics, the Statistics page in Figure 18 is displayed.Figure 18 Port Statis

Strany 300

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 67Frames 1024 - 1518 BytesFrames 1519 - 1522 BytesNumber of frames transmitted fr

Strany 301 - Section VI: Port Security 301

68Chapter 6MAC Address TableThis chapter contains instructions on how to view the dynamic and static addresses in the MAC address table of the switch.

Strany 302

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 69Displaying the MAC Address TableTo view the MAC address table, perform the foll

Strany 303 - Section VI: Port Security 303

AT-S62 Web Browser Interface User’s Guide7Displaying Notify Table Entries ...

Strany 304

Chapter 6:MAC Address TableSection I: Basic Operations 70The top section displays unicast addresses while the middle section displays multicast addres

Strany 305 - Section VI: Port Security 305

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 71Vlan ID - The ID number of the VLAN where the port is a member.Type - The type

Strany 306

Chapter 6:MAC Address TableSection I: Basic Operations 72Adding Static Unicast and Multicast MAC AddressesThis section contains the procedure for assi

Strany 307 - Section VI: Port Security 307

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 737. In the VLAN ID field, enter the VLAN ID where the port is a member.8. Click

Strany 308

Chapter 6:MAC Address TableSection I: Basic Operations 74Deleting Unicast and Multicast MAC AddressesTo delete a specific static or dynamic unicast or

Strany 309 - Management Security

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 75Deleting All Dynamic Unicast and Multicast MAC AddressesTo delete all dynamic u

Strany 310 - Encryption Keys, PKI, and SSL

Chapter 6:MAC Address TableSection I: Basic Operations 76Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addresse

Strany 311 - Displaying Encryption Keys

77Chapter 7Static Port TrunksThis chapter contains the procedure for creating, modifying, or deleting a static port trunk from a web browser managemen

Strany 312

Chapter 7: Static Port TrunksSection I: Basic Operations 78Creating a Static Port TrunkThis section contains the procedure for creating a static port

Strany 313

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 79The Port Trunking tab is shown in Figure 21.Figure 21 Port Trunking TabThis ta

Strany 314

Table of Contents8Chapter 25802.1x Port-based Access Control ...

Strany 315 - Displaying the SSL Settings

Chapter 7: Static Port TrunksSection I: Basic Operations 80The Add New Trunk page is shown in Figure 22.Figure 22 Add New Trunk Page5. In the Trunk N

Strany 316 - Secure Shell Protocol

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 81Modifying a Static Port TrunkThis section contains the procedure for modifying

Strany 317 - Configuring the SSH Server

Chapter 7: Static Port TrunksSection I: Basic Operations 82An example of the Modify Trunk page is shown in Figure 23.Figure 23 Modify Trunk PageNoteY

Strany 318

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 83Deleting a Static Port TrunkCautionDisconnect the cables from the port trunk on

Strany 319 - Displaying SSH Information

Chapter 7: Static Port TrunksSection I: Basic Operations 84Displaying the Static Port TrunksTo display the static port trunks on the switch, do the fo

Strany 320 - Authentication Protocols

85Chapter 8Port MirroringThis chapter contains the procedure for creating or deleting a port mirror. Sections in the chapter include:❑ Creating a Port

Strany 321

Chapter 8: Port MirroringSection I: Basic Operations 86Creating a Port MirrorTo create or delete a port mirror, perform the following procedure: 1. Fr

Strany 322

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 87StatusThis column contains the status of the mirroring feature. If enabled, tra

Strany 323

Chapter 8: Port MirroringSection I: Basic Operations 88Figure 26 shows an example of the Modify Mirror page configured for a port mirror. The egress t

Strany 324

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 89Modifying or Disabling a Port MirrorTo modify a port mirror, you perform the sa

Strany 325

9List of FiguresChapter 1Starting a Web Browser Management Session ...

Strany 326 - Chapter 29

Chapter 8: Port MirroringSection I: Basic Operations 90Deleting a Port MirrorTo delete a port mirror so that you can use the destination port for norm

Strany 327 - Creating a Management ACL

AT-S62 Web Browser Interface User’s GuideSection I: Basic Operations 91Displaying the Port MirrorTo display the port mirror, do the following:1. From

Strany 328

92Section IIAdvanced OperationsThe chapters in this section explain how to manage an AT-8524M switch from a local or Telnet management session. The ch

Strany 329 - Adding or Deleting an ACE

93Chapter 9File SystemThis chapter contains instructions on how to display the files stored in the switch’s file system and select a new active boot c

Strany 330 - Displaying the Management ACL

Chapter 9: File SystemSection II: Advanced Operations 94Viewing System Files or Changing the Active Configuration FileThis procedure displays the file

Strany 331

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 95The File System tab is shown in Figure 27.Figure 27 File System TabThe inf

Strany 332

Chapter 9: File SystemSection II: Advanced Operations 96Attributes - This can be any of the following:❑ Normal ❑ Read Only❑ Hidden❑ System❑ Volume❑ Di

Strany 333

97Chapter 10File Downloads and UploadsThis chapter contains the procedure for downloading a new AT-S62 image file onto the switch from a web browser m

Strany 334

Chapter 10: File Downloads and UploadsSection II: Advanced Operations 98Downloading a FileThis procedure explains how to download a file from a TFTP s

Strany 335

AT-S62 Web Browser Interface User’s GuideSection II: Advanced Operations 99of the switch using Xmodem or, alternatively, switch to switch. For instruc

Komentáře k této Příručce

Žádné komentáře