Allied-telesis AT-S94 Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítačový hardware Allied-telesis AT-S94. Allied Telesis AT-S94 User Manual [en] Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 250
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - WEB User’s Guide

613-001104 Rev. BManagementSoftwareAT-S94WEB User’s GuideAT-8000S Series Stackable Gigabit Ethernet SwitchesVersion 2.0.0

Strany 2

Getting StartedStarting the ApplicationPage 10Section 1. Getting StartedThis section provides an introduction to the Web Browser Interface, and includ

Strany 3 - Table of Contents

Configuring PortsSetting Ports ConfigurationsPage 100Section 7. Configuring PortsPort Configuration includes the following procedures for configuring

Strany 4

Configuring PortsSetting Ports ConfigurationsPage 101The Port Settings Page contains the Zoom View of the device ports. The possible port settings are

Strany 5

Configuring PortsSetting Ports ConfigurationsPage 102The Port Setting Configuration Page contains the following fields:• Port— Lists the names of conf

Strany 6

Configuring PortsSetting Ports ConfigurationsPage 103• Admin Advertisement — Defines the auto negotiation setting the port advertises. The possible fi

Strany 7 - • Intended Audience

Configuring PortsSetting Ports ConfigurationsPage 104Configuring Port MirroringPort mirroring monitors and mirrors network traffic by forwarding copie

Strany 8 - Intended Audience

Configuring PortsSetting Ports ConfigurationsPage 105• Status — Indicates if the port is currently monitored. The possible field values are:– Active —

Strany 9 - Contacting Allied Telesis

Configuring PortsSetting Ports ConfigurationsPage 1063. Define the Type field.4. Click Apply. The Port mirroring is modified, and the device is update

Strany 10 - Section 1. Getting Started

Configuring PortsAggregating PortsPage 107Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a singl

Strany 11 - Getting Started

Configuring PortsAggregating PortsPage 108Defining Trunk SettingsThe Trunk Settings Page contains parameters for defining Trunks. To define a port tru

Strany 12 - Figure 2: System General Page

Configuring PortsAggregating PortsPage 109• Flow Control — Displays the flow control status of the trunk.• LACP — Indicates if LACP is enabled on the

Strany 13

Getting StartedStarting the ApplicationPage 11Figure 1: Embedded Web System Login Page3. Enter manager in the User Name field. 4. Enter friend in the

Strany 14 - User Interface Components

Configuring PortsAggregating PortsPage 110• Current Status — Indicates whether the trunk is currently operational or non-operational. The possible fie

Strany 15 - Using the Management Buttons

Configuring PortsAggregating PortsPage 111Defining Port TrunkingThe Port Trunking Page displays information about the defined trunks.To modify Port Tr

Strany 16

Configuring PortsAggregating PortsPage 1123. Click Modify. The Port Trunking Configuration Page opens:Figure 67: Port Trunking Configuration PageIn ad

Strany 17 - Figure 5: Add Community Page

Configuring PortsAggregating PortsPage 113Configuring LACPTrunk ports can contain different media types if the ports are operating at the same speed.

Strany 18 - Saving Configurations

Configuring PortsAggregating PortsPage 1142. Click Modify. the LACP Configuration Page opens:Figure 69: LACP Configuration Page3. Define the fields.4.

Strany 19 - Logging Out

Configuring InterfacesPage 115Section 8. Configuring InterfacesThis section contains information on configuring the interfaces of the device.This sect

Strany 20 - Resetting the Device

Configuring InterfacesPage 116The MAC Address Page contains the following fields:• View Static — Displays the static addresses assigned to the ports o

Strany 21

Configuring InterfacesPage 1174. Click Apply. The new MAC address is added to the addresses table and the device information is updated.To delete all

Strany 22

Configuring InterfacesConfiguring VLANsPage 118Configuring VLANs This section describes how to create and configure Virtual LANs (VLANs).VLANs are log

Strany 23 - Defining IPv6 Interfaces

Configuring InterfacesConfiguring VLANsPage 119Defining VLAN PropertiesThe VLAN Page provides information and global parameters for configuring and wo

Strany 24

Getting StartedStarting the ApplicationPage 12Figure 2: System General Page

Strany 25

Configuring InterfacesConfiguring VLANsPage 120The second section contains a table that maps VLAN parameters to ports. • Select the interfaces display

Strany 26

Configuring InterfacesConfiguring VLANsPage 1213. Click Modify. The VLAN Configuration opens.Figure 75: VLAN Configuration4. Change the Interface Stat

Strany 27

Configuring InterfacesConfiguring VLANsPage 122Defining VLAN Interface SettingsThe VLAN Interface Page contains fields for managing ports that are par

Strany 28

Configuring InterfacesConfiguring VLANsPage 123• Frame Type — Specifies the packet type accepted on the port. The possible field values are:– Admit Ta

Strany 29 - Configuring Tunnels

Configuring InterfacesConfiguring VLANsPage 124Defining GVRPThe GVRP Page enables users to configure GARP VLAN Registration Protocol (GVRP) on the dev

Strany 30 - Defining IPv6 Neighbors

Configuring InterfacesConfiguring VLANsPage 125• Interface — Displays the port or trunk name on which GVRP is enabled.• GVRP State — Indicates if GVRP

Strany 31

Configuring InterfacesDefining MAC Based GroupsPage 126Defining MAC Based GroupsThe MAC Based Groups Page allows network managers to group VLANs based

Strany 32

Configuring InterfacesDefining MAC Based GroupsPage 127• VLAN ID — Attaches the interface to a user-defined VLAN ID. VLAN group ports can be attached

Strany 33

Configuring InterfacesDefining MAC Based GroupsPage 128To add a mapped group:1. Click Layer 2 > MAC Based Groups. The MAC Based Groups Page opens:2

Strany 34 - Setting the System Clock

Configuring System LogsPage 129Section 9. Configuring System LogsThis section provides information for managing system logs. System logs enable viewin

Strany 35 - Configuring SNTP

Getting StartedUsing the Web Browser InterfacePage 13Using the Web Browser InterfaceThis section provides general information about the interface, and

Strany 36

Configuring System LogsPage 130The Event Log Page contains the following fields:The Configure Log Outputs table displays the following log information

Strany 37

Configuring System LogsPage 131The Add Syslog Page contains the following fields:• Description — Provides any additional information about the syslog

Strany 38

Configuring System LogsPage 132Modifying Log Servers Clicking Modify opens the Event Log Configuration Page, in which administrators can modify Server

Strany 39

Configuring System LogsPage 1333. Click View. The selected log page opens:Figure 88: View Flash Log PageThe View Flash Log Page and View Temporary Log

Strany 40 - • Defining Access Control

Configuring Spanning TreeConfiguring Classic Spanning TreePage 134Section 10. Configuring Spanning TreeSpanning Tree Protocol (STP) provides tree topo

Strany 41 - Defining Access Profiles

Configuring Spanning TreeConfiguring Classic Spanning TreePage 135Defining STP PropertiesThe Spanning Tree Page contains parameters for enabling and c

Strany 42

Configuring Spanning TreeConfiguring Classic Spanning TreePage 136• Path Cost Default Values — Specifies the method used to assign default path cost t

Strany 43

Configuring Spanning TreeConfiguring Classic Spanning TreePage 137Defining STP InterfacesNetwork administrators can assign STP settings to a specific

Strany 44

Configuring Spanning TreeConfiguring Classic Spanning TreePage 138• Port Fast — Indicates if Fast Link is enabled on the port. If Fast Link mode is en

Strany 45 - Defining Profile Rules

Configuring Spanning TreeConfiguring Classic Spanning TreePage 139• Designated Cost — Indicates the cost of the port participating in the STP topology

Strany 46

Getting StartedUsing the Web Browser InterfacePage 14User Interface ComponentsThe System General Page example shows the interface components.Figure 4:

Strany 47

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 140Configuring Rapid Spanning TreeWhile Classic STP prevents Layer 2 forwarding loops in

Strany 48

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 141• Mode — Displays the current STP mode. The STP mode is selected in the Spanning Tree

Strany 49

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 142– Learning — Indicates the port is currently in the learning mode. The interface canno

Strany 50

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 143Configuring Multiple Spanning TreeMultiple Spanning Tree Protocol (MSTP) provides d

Strany 51

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 144• IST Master — Identifies the Spanning Tree Master instance. The IST Master is the

Strany 52

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 145The MSTP Interface Settings Page contains the following fields: • Instance ID — Lis

Strany 53

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1463. Define the fields.4. Click Apply. MSTP is defined for the selected interface.5.

Strany 54

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 147Defining MSTP Instance MappingsNetwork administrators can assign MSTP mapping to a

Strany 55 - Configuring TACACS+

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 148Defining MSTP Instance SettingsMSTP maps VLANs into STP instances. Packets assigned

Strany 56

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1493. Define the fields.4. Click Apply. MSTP is defined for the selected instance, and

Strany 57 - Figure 28: Add TACACS+ Page

Getting StartedUsing the Web Browser InterfacePage 15Using the Management Buttons Management buttons provide an easy method of configuring device info

Strany 58

Configuring Multicast ForwardingPage 150Section 11. Configuring Multicast ForwardingMulticast forwarding allows a single packet to be forwarded to mul

Strany 59 - Configuring RADIUS

Configuring Multicast ForwardingPage 151Configuring IGMP SnoopingWhen IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. Th

Strany 60

Configuring Multicast ForwardingPage 152• IGMP Querier Status — Indicates if the specific VLAN can operate as an IGMP Querier. The possible field valu

Strany 61 - Figure 31: Add RADIUS Page

Configuring Multicast ForwardingPage 153To modify the IGMP Snooping configuration: 1. Click Multicast > IGMP. The IGMP Page opens.2. Click Modify.

Strany 62

Configuring Multicast ForwardingPage 154To define Multicast Groups:1. Click Multicast > Multicast Group. The Multicast Group Page opens:Figure 101:

Strany 63 - Configuring Local Users

Configuring Multicast ForwardingPage 1553. Click Add. The Add Multicast Group Page opens:Figure 102:Add Multicast Group Page 4. Select the VLAN ID.5.

Strany 64

Configuring Multicast ForwardingPage 156Defining Multicast Forward All SettingsMulticast forwarding enables transmitting packets from either a specifi

Strany 65

Configuring Multicast ForwardingPage 1573. Click Modify. The Multicast Forward All Configuration Page opens:Figure 105:Multicast Forward All Configura

Strany 66 - Defining Line Passwords

Configuring Multicast ForwardingPage 158Defining Unregistered Multicast SettingsMulticast frames are generally forwarded to all ports in the VLAN. If

Strany 67 - Configuring Network Security

Configuring Multicast ForwardingPage 1592. Click Modify. The Unregistered Multicast Configuration Page opens:Figure 107:Unregistered Multicast Configu

Strany 68 - Figure 37: Port Security Page

Getting StartedUsing the Web Browser InterfacePage 16Test Performs a diagnostic test.Clear All Counters Removes all counters.The application menu incl

Strany 69

Configuring SNMPPage 160Section 12. Configuring SNMPSimple Network Management Protocol (SNMP) provides a method for managing network devices. Equipmen

Strany 70 - Defining 802.1x Port Access

Configuring SNMPPage 161Enabling SNMPThe SNMP Global Page provides fields for globally enabling and configuring SNMP on the device.To enable SNMP: 1.

Strany 71

Configuring SNMPPage 162Defining SNMP CommunitiesAccess rights are managed by defining communities in the SNMP Community Page. When the community name

Strany 72

Configuring SNMPPage 163• Access Mode — Defines the access rights of the community. The possible field values are:– Read Only — Management access is r

Strany 73

Configuring SNMPPage 164The Add SNMP Community Page contains the following fields:• Supported IP Format — Indicates the type of IP addressing protocol

Strany 74

Configuring SNMPPage 165To modify SNMP community settings: 1. Select an SNMP community entry in the Basic table or in the Advanced Table.2. Click Modi

Strany 75 - Enabling Storm Control

Configuring SNMPPage 166Defining SNMP GroupsThe SNMP Group Page provides information for creating SNMP groups, and assigning SNMP access control privi

Strany 76

Configuring SNMPPage 167• Security Level — Defines the security level attached to the group. Security levels apply to SNMPv3 only. The possible field

Strany 77 - Defining Access Control

Configuring SNMPPage 168To modify an SNMP group:1. Click SNMP > Groups. The SNMP Group Page opens.2. Click Modify. The Group Configuration Page ope

Strany 78

Configuring SNMPPage 169Defining SNMP UsersThe SNMP Users Page enables assigning system users to SNMP groups, as well as defining the user authenticat

Strany 79

Getting StartedUsing the Web Browser InterfacePage 17Adding, Modifying and Deleting InformationThe WBI contains and tables for configuring devices. Us

Strany 80 - Defining IPv4 Based ACL

Configuring SNMPPage 170• Authentication — Displays the method used to authenticate users. The possible field values are:– MD5 Key — Users are authent

Strany 81

Configuring SNMPPage 171• Authentication Key — Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are en

Strany 82

Configuring SNMPPage 172Defining SNMP ViewsThe SNMP views provide or block access to device features or portions of features. Feature access is grante

Strany 83

Configuring SNMPPage 1732. Click Add. The Add SNMP VIew Page opens:Figure 119: Add SNMP VIew Page3. Define the View Name field.4. Select the Object ID

Strany 84

Configuring SNMPPage 174Defining Notification RecipientsThe SNMP Notify Page contains fields for defining SNMP notification recipients. The page conta

Strany 85 - Adding ACE Rules

Configuring SNMPPage 175SNMPv1,2c Notification RecipientThe SNMP v1, v2c Recipient table contains the following fields:• Recipients IP Address — Displ

Strany 86 - Defining IPv6 Based ACL

Configuring SNMPPage 1762. Click Add. The Add Notify Page opens:Figure 121:Add Notify Page In addition to the SNMP Notify Page, the Add Notify Page co

Strany 87

Configuring SNMPPage 1774. Click Apply. The notification recipient settings are saved and the device is updated.5. Click Save Config on the menu to sa

Strany 88

Configuring SNMPPage 178Defining Notification FiltersThe SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a

Strany 89

Configuring SNMPPage 179To add an SNMP notification filter:1. Click the Add button. The Add SNMP Notification Filter Page opens:Figure 124:Add SNMP No

Strany 90 - Defining ACL Binding

Getting StartedUsing the Web Browser InterfacePage 18Figure 6: Local User Settings Page4. Define the fields. 5. Click Apply. The fields are modified,

Strany 91

Configuring LLDPPage 180Section 13. Configuring LLDPLink Layer Discovery Protocol (LLDP) is a Layer 2 protocol that allows a network device supporting

Strany 92 - • Defining Trusted Interfaces

Configuring LLDPPage 181Defining Global LLDP PropertiesThe LLDP Properties Page allows network managers to assign global LLDP parameters. To enable an

Strany 93

Configuring LLDPPage 182• Transmit Delay (1 - 8192) — Indicates the amount of time that passes between successive LLDP frame transmissions due to chan

Strany 94

Configuring LLDPPage 183• State — Indicates the LLDP state on the port. The possible field values are: – Tx Only — Enables transmitting LLDP packets o

Strany 95 - Defining Trusted Interfaces

Configuring LLDPPage 184Defining LLDP Media Endpoint Discovery Network PolicyLLDP Media Endpoint Discovery (LLDP MED) is an enhancement to the 802.1ab

Strany 96

Configuring LLDPPage 185– Guest VLAN Signaling — Indicates that the network policy is defined for a Guest VLAN Signalling application. – Softphone Voi

Strany 97

Configuring LLDPPage 186To modify a network policy setting:1. Click LLDP > Profile Rules: The LLDP MED Network Policy Page opens.2. Click Modify. T

Strany 98

Configuring LLDPPage 187Defining LLDP MED Port SettingsThe LLDP MED Port Settings Page contains parameters for assigning LLDP network policies to spec

Strany 99

Configuring LLDPPage 1882. Click Modify. The Modify LLDP MED Port Settings Page opens: Figure 132:Modify LLDP MED Port Settings PageThis page contains

Strany 100 - Section 7. Configuring Ports

Configuring LLDPPage 1896. Define the port location in the Location Coordinate (16 Bytes in Hex), Location Civic Address (6-160 Bytes in Hex), Locatio

Strany 101 - Configuring Ports

Getting StartedLogging OutPage 19Logging OutThe Logout option enables the user to log out of the device thereby terminating the running session.To log

Strany 102 - Page 102

Configuring LLDPPage 1902. Click Details to view the Neighbors Information Details Page for ports. Figure 134:Neighbors Information Details PageThe Ne

Strany 103 - Page 103

Configuring LLDPPage 191LLDP MED Power over EthernetThe port PoE information.• Power Type — Indicates the power type advertised on the port.• Power So

Strany 104 - Configuring Port Mirroring

Configuring Power Over EthernetPage 192Section 14. Configuring Power Over EthernetThis section describes configuring Power over Ethernet (PoE) for an

Strany 105 - Page 105

Configuring Power Over EthernetPage 193To enable PoE for the device: 1. Click System > Power Over Ethernet. The Power Over Ethernet Page opens:Figu

Strany 106

Configuring Power Over EthernetPage 1944. Click Modify. PoE is enabled on the device and global settings are saved. The new threshold is immediately a

Strany 107 - Aggregating Ports

Configuring Power Over EthernetPage 195Defining Power Over Ethernet ConfigurationTo modify PoE port settings: 1. In the Power Over Ethernet Page Zoom

Strany 108 - Defining Trunk Settings

Configuring Power Over EthernetPage 196– Searching — Indicates that the device is currently searching for a powered device. Searching is the default P

Strany 109 - Page 109

Configuring ServicesPage 197Section 15. Configuring ServicesThis section describes Quality of Service related configurations. QoS supports activating

Strany 110 - Page 110

Configuring ServicesPage 198Enabling Class of Service (CoS)The CoS Page enables configuring the CoS ports or trunks on the device.To configure CoS por

Strany 111 - Defining Port Trunking

Configuring ServicesPage 199• Interface — Displays the interface number.• Default CoS— Determines the default CoS value for incoming packets for which

Strany 112 - Page 112

Copyright © 2008 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied

Strany 113 - Configuring LACP

Getting StartedResetting the DevicePage 20Resetting the DeviceThe Reset option enables resetting the device from a remote location. NoteSave all chang

Strany 114

Configuring ServicesPage 200Configuring CoS Queueing and SchedulingThe CoS Queuing & Scheduling Page provides fields for configuring CoS Priority

Strany 115 - Defining MAC Addresses

Configuring ServicesPage 201Mapping CoS Values to QueuesThe Configure CoS Page contains fields for classifying CoS settings to traffic queues. When co

Strany 116 - Page 116

Configuring ServicesPage 202Mapping DSCP Values to QueuesThe Configure DSCP Page contains fields for classifying DSCP settings to traffic queues. For

Strany 117 - Configuring Interfaces

Configuring ServicesPage 203Configuring QoS BandwidthThe Bandwidth Page allows network managers to define the bandwidth settings for a specified egres

Strany 118 - Configuring VLANs

Configuring ServicesPage 204As a default the Bandwidth Page opens displaying the port options. The fields are identical when displaying the trunk CoS.

Strany 119 - Defining VLAN Properties

Configuring ServicesPage 2054. Click Modify. The Bandwidth Configuration Page opens:Figure 143:Bandwidth Configuration Page5. Define the fields.6. Cli

Strany 120 - Page 120

System UtilitiesPage 206Section 16. System UtilitiesThe configuration file structure involves the following configuration files:• Startup Configuratio

Strany 121 - Figure 75: VLAN Configuration

System UtilitiesPage 207Restoring the Default ConfigurationThe Reset to Factory Defaults function restores the Configuration file to factory defaults

Strany 122 - Page 122

System UtilitiesPage 208To reset the configuration file to defaults with reboot: 1. Check the Reboot Switch After Resetting to Defaults option.2. Sele

Strany 123 - Page 123

System UtilitiesPage 209• Link Local Interface — If Link Local is selected as the supported IPv6 Address Type, indicates the supported interface. The

Strany 124 - Defining GVRP

Defining System InformationPage 21Section 2. Defining System InformationThe System General Page contains general device information, including system

Strany 125 - Page 125

System UtilitiesPage 210The Configuration Copy section of the File System Page contains the following fields:• Copy Configuration— Allows the copy con

Strany 126 - Defining MAC Based Groups

System UtilitiesPage 211Viewing Integrated Cable TestsThe Cable Test Page contains fields for performing tests on copper cables. Cable testing provide

Strany 127

System UtilitiesPage 2123. Click Test. The cable test is performed.4. Click Advanced. The Cable Test Configuration Page opens, and the copper cable te

Strany 128

System UtilitiesPage 213Viewing Optical TransceiversThe Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Opti

Strany 129 - Defining Log Settings

System UtilitiesPage 214Resetting the DeviceThe Reset Page enables the user to reset the system. Save all changes to the Running Configuration file be

Strany 130 - Adding Log Servers

Viewing StatisticsViewing Device StatisticsPage 215Not approved by Document Control. For review only.Section 17. Viewing StatisticsThis section provi

Strany 131 - Configuring System Logs

Viewing StatisticsViewing Device StatisticsPage 216Not approved by Document Control. For review only.The Interface Statistics Page contains the follo

Strany 132 - Modifying Log Servers

Viewing StatisticsViewing Device StatisticsPage 217Not approved by Document Control. For review only.Viewing Etherlike Statistics The Etherlike Stati

Strany 133 - Page 133

Viewing StatisticsViewing Device StatisticsPage 218Not approved by Document Control. For review only.• Internal MAC Receive Errors — Displays the num

Strany 134 - Page 134

Viewing StatisticsManaging RMON StatisticsPage 219Not approved by Document Control. For review only.Managing RMON StatisticsThis section contains the

Strany 135 - Defining STP Properties

Defining System InformationPage 22• Default Gateway — The IP address of a router for remote management of the device. The address must be entered in t

Strany 136 - Page 136

Viewing StatisticsManaging RMON StatisticsPage 220Not approved by Document Control. For review only.– 15 Sec — Indicates that the RMON statistics are

Strany 137 - Defining STP Interfaces

Viewing StatisticsManaging RMON StatisticsPage 221Not approved by Document Control. For review only.Configuring RMON HistoryThe RMON History Page con

Strany 138 - Page 138

Viewing StatisticsManaging RMON StatisticsPage 222Not approved by Document Control. For review only.Figure 154:Add RMON History Page3. Define the Sou

Strany 139 - Page 139

Viewing StatisticsManaging RMON StatisticsPage 223Not approved by Document Control. For review only.Viewing the RMON History TableThe RMON History Ta

Strany 140 - Page 140

Viewing StatisticsManaging RMON StatisticsPage 224Not approved by Document Control. For review only.• Undersize Packets — Displays the number of unde

Strany 141 - Page 141

Viewing StatisticsManaging RMON StatisticsPage 225Not approved by Document Control. For review only.Configuring RMON EventsThe RMON Events Page conta

Strany 142 - Configuring Spanning Tree

Viewing StatisticsManaging RMON StatisticsPage 226Not approved by Document Control. For review only.Figure 158:Add RMON Events Page3. Define the Comm

Strany 143 - Defining MSTP Properties

Viewing StatisticsManaging RMON StatisticsPage 227Not approved by Document Control. For review only.Figure 159:RMON Events Logs PageThe RMON Events L

Strany 144 - Defining MSTP Interfaces

Viewing StatisticsManaging RMON StatisticsPage 228Not approved by Document Control. For review only.Defining RMON Alarms The RMON Alarm Page contains

Strany 145 - Page 145

Viewing StatisticsManaging RMON StatisticsPage 229Not approved by Document Control. For review only.• Falling Event — Displays the event that trigger

Strany 146

Configuring Internet Protocol Version 6Page 23Section 3. Configuring Internet Protocol Version 6The device functions as an IPv6 compliant Host, as wel

Strany 147

Viewing StatisticsManaging RMON StatisticsPage 230Not approved by Document Control. For review only.Figure 162:Alarm Configuration Page3. Define the

Strany 148 - Page 148

Managing StackingStacking OverviewPage 231Section 18. Managing StackingThis section describes the stacking control management and includes the followi

Strany 149

Managing StackingStacking OverviewPage 232After the stacking issues are resolved, the device can be reconnected to the stack without interruption, and

Strany 150 - • Configuring IGMP Snooping

Managing StackingStacking OverviewPage 233During the Warm Standby, the Master and the Secondary Master are synchronized with the static configuration

Strany 151 - Configuring IGMP Snooping

Managing StackingStacking OverviewPage 234Exchanging Stacking MembersIn normal operation of the stack, the running configuration file in the master is

Strany 152 - Page 152

Managing StackingConfiguring Stacking ManagementPage 235Configuring Stacking ManagementThe Stacking Page allows network managers to either reset the e

Strany 153 - Page 153

Downloading Software with CLIConnecting a TerminalPage 236Appendix A. Downloading Software with CLIThis section describes how to download system files

Strany 154 - Page 154

Downloading Software with CLIInitial ConfigurationPage 237Initial ConfigurationBefore a device can download system software, the device must have an i

Strany 155 - Page 155

Downloading Software with CLIDownloading SoftwarePage 238To check the configuration, enter the command “show ip interface” as illustrated in the follo

Strany 156 - Page 156

Downloading Software with CLIDownloading SoftwarePage 2392. Enter the copy command to download the boot file.3. Enter the “bootvar” command to determi

Strany 157 - Page 157

Configuring Internet Protocol Version 6Page 24In addition to the dynamically configured IPv6 interfaces, there are two types of static IP addresses th

Strany 158 - Page 158

Downloading Software with CLIDownloading SoftwarePage 2405. Enter the “copy” command to download the system file.6. Reboot the device. The device boot

Strany 159 - Page 159

Downloading Software with CLIDownloading SoftwarePage 241Stacking Member Software DownloadEnsure the stack has been correctly connected as described i

Strany 160 - Section 12. Configuring SNMP

Downloading Software with CLIDownloading SoftwarePage 2425. Enter the “copy” command to download the system file.6. Reboot the devices being updated.

Strany 161 - Enabling SNMP

System DefaultsPage 243Appendix B. System DefaultsThis section contains the system defaults, and includes the following topics:• RS-232 Port Settings•

Strany 162 - Defining SNMP Communities

System DefaultsRS-232 Port SettingsPage 244RS-232 Port SettingsThe following table contains the RS-232 port setting defaults: Port DefaultsThe followi

Strany 163 - Page 163

System DefaultsConfiguration DefaultsPage 245Configuration DefaultsThe following are the initial device configuration defaults: Security DefaultsThe f

Strany 164 - Page 164

System DefaultsSpanning Tree DefaultsPage 246Spanning Tree DefaultsThe following are the spanning tree defaults:Address Table DefaultsThe following th

Strany 165 - Configuring SNMP

System DefaultsTrunking DefaultsPage 247Trunking DefaultsThe following are the trunking defaults:Multicast DefaultsThe following are the Multicast def

Strany 166 - Defining SNMP Groups

IndexPage 248IndexSymbols802.1x port access 70AAbsolute 228Access level 63Access profiles 41access profilesrules 45ACE 77ACL 77, 90ACL Binding 90Alarm

Strany 167 - Page 167

IndexPage 249GVRP configuration 124, 125HHost 127HTTP 43, 54IIGMP 151interface configurationaccess profiles 41Internet Group Management Protocol (IGMP

Strany 168

Configuring Internet Protocol Version 6Page 25The IPv6 Interface Table on the IPv6 Interface Page displays the IPv6 interfaces defined on the selected

Strany 169 - Defining SNMP Users

IndexPage 250RRADIUS 50RADIUS authentication 59RADIUS serverauthentication methods 50Rate limiting 204Remote Authorization Dial-In User Service (RADIU

Strany 170 - Page 170

Configuring Internet Protocol Version 6Page 26Adding Multiple IPv6 AddressesThe Add IPv6 Address Page allows the user to add multiple IPv6 addresses t

Strany 171

Configuring Internet Protocol Version 6Page 27Defining the IPv6 Default GatewayThe IPv6 Default Gateway Page enables you to configure the IPv6 address

Strany 172 - Defining SNMP Views

Configuring Internet Protocol Version 6Page 28– Tunnel• Type — Specifies the means by which the default gateway was configured. The possible field val

Strany 173

Configuring Internet Protocol Version 6Page 29Configuring TunnelsThe Tunneling Page defines the tunneling process on the device, which encapsulates IP

Strany 174 - Page 174

Table of ContentsPage 3 Table of ContentsPreface...

Strany 175 - SNMPv3 Notification Recipient

Configuring Internet Protocol Version 6Page 30• Domain Name Query Interval (10-3600) — Specifies the interval between DNS Queries (before the IP addre

Strany 176 - Page 176

Configuring Internet Protocol Version 6Page 31The IPv6 Neighbors Page contains the following fields:View IPV6 Neighbors•View Static — Displays the sta

Strany 177

Configuring Internet Protocol Version 6Page 323. Click Add. The Add IPv6 Neighbor Page opens.Figure 15: Add IPv6 Neighbor Page4. Define the static IPv

Strany 178 - Defining Notification Filters

Configuring Internet Protocol Version 6Page 33To view IPv6 Neighbor entries:1. Click System > IPv6 Neighbors. The IPv6 Neighbors Page opens.2. Sele

Strany 179 - Page 179

Configuring System TimePage 34Section 4. Configuring System TimeThe System Time Page provides information for configuring system time parameters, incl

Strany 180 - Section 13. Configuring LLDP

Configuring System TimePage 35• System Date — Sets the system date. The field format is Day/Month/Year. For example: 04/May/2050 (May 4, 2050).• Time

Strany 181 - Page 181

Configuring System TimePage 36To define SNTP global parameters: 1. Click System > System Time. The System Time Page opens.The Simple Network Time P

Strany 182 - Defining LLDP Port Settings

Configuring System TimePage 37• Time Set Offset — Used for non-USA and European countries to set the amount of time for DST (in minutes). The default

Strany 183 - Page 183

Configuring System TimePage 38• Bahamas — From April to October, in conjunction with Daylight Savings Time in the United States. • Belarus — From the

Strany 184 - Page 184

Configuring System TimePage 39• Slovak Republic - From the last weekend of March until the last weekend of October.• South Africa — South Africa does

Strany 185 - Page 185

Table of ContentsPage 4 Configuring Network Security ...

Strany 186 - Configuring LLDP

Configuring Device SecurityPage 40Section 5. Configuring Device SecurityThis section describes setting security parameters for ports, device managemen

Strany 187 - Page 187

Configuring Device SecurityConfiguring Management SecurityPage 41Configuring Management SecurityThis section provides information for configuring devi

Strany 188 - Page 188

Configuring Device SecurityConfiguring Management SecurityPage 42To define access profiles:1. Click Mgmt. Security > Access Profile. The Access Pro

Strany 189 - Page 189

Configuring Device SecurityConfiguring Management SecurityPage 432. Click Add. The Add Access Profile Page opens:Figure 19: Add Access Profile PageIn

Strany 190 - Page 190

Configuring Device SecurityConfiguring Management SecurityPage 44• Supported IP Format — Defines the supported Internet Protocol on which the access p

Strany 191 - Page 191

Configuring Device SecurityConfiguring Management SecurityPage 45Defining Profile RulesAccess profiles can contain up to 128 rules that determine whic

Strany 192 - Page 192

Configuring Device SecurityConfiguring Management SecurityPage 46• Management Method — Defines the management method for which the rule is defined. Us

Strany 193 - Page 193

Configuring Device SecurityConfiguring Management SecurityPage 47– IPv6 — Indicates that IPv6 is supported.• IPv6 Address Type — If IPv6 is selected a

Strany 194 - Page 194

Configuring Device SecurityConfiguring Management SecurityPage 48To modify an access rule:1. Click Mgmt. Security > Profile Rules: The Profile Rule

Strany 195 - Page 195

Configuring Device SecurityConfiguring Management SecurityPage 49Defining Authentication ProfilesAuthentication profiles allow network administrators

Strany 196 - Page 196

Table of ContentsPage 5 Configuring Multicast Forwarding ... 150Co

Strany 197 - Page 197

Configuring Device SecurityConfiguring Management SecurityPage 50– RADIUS — Authenticates the user at the RADIUS server. For more information, see Def

Strany 198 - Page 198

Configuring Device SecurityConfiguring Management SecurityPage 51Figure 24: Add Authentication Profile Page3. Select the type of function to configure

Strany 199 - Page 199

Configuring Device SecurityConfiguring Management SecurityPage 52Figure 25: Authentication Profile Configuration Page3. Select the Profile Name from t

Strany 200 - Page 200

Configuring Device SecurityConfiguring Management SecurityPage 53Mapping Authentication ProfilesAfter authentication profiles are defined, they can be

Strany 201 - Mapping CoS Values to Queues

Configuring Device SecurityConfiguring Management SecurityPage 54• Secure HTTP — Indicates that authentication methods are used for secure HTTP access

Strany 202 - Mapping DSCP Values to Queues

Configuring Device SecurityConfiguring Server Based AuthenticationPage 55Configuring Server Based AuthenticationNetwork administrators assign authenti

Strany 203 - Configuring QoS Bandwidth

Configuring Device SecurityConfiguring Server Based AuthenticationPage 56Figure 27: TACACS+ PageThe TACACS+ Page contains the following fields:• Suppo

Strany 204 - Page 204

Configuring Device SecurityConfiguring Server Based AuthenticationPage 57Figure 28: Add TACACS+ Page3. Define the fields.4. Click Apply. The TACACS+ p

Strany 205 - Configuring Services

Configuring Device SecurityConfiguring Server Based AuthenticationPage 58To modify TACACS+ server settings:1. Click Mgmt. Protocols > TACACS+. The

Strany 206 - Section 16. System Utilities

Configuring Device SecurityConfiguring Server Based AuthenticationPage 59Configuring RADIUSRemote Authorization Dial-In User Service (RADIUS) servers

Strany 207 - Page 207

Table of ContentsPage 6 Managing Stacking ...

Strany 208 - Page 208

Configuring Device SecurityConfiguring Server Based AuthenticationPage 60• Default Dead Time — Defines the default amount of time (in minutes) that a

Strany 209 - Page 209

Configuring Device SecurityConfiguring Server Based AuthenticationPage 612. Click Add. The Add RADIUS Page opens.Figure 31: Add RADIUS Page3. Define t

Strany 210 - Page 210

Configuring Device SecurityConfiguring Server Based AuthenticationPage 62To modify RADIUS server settings:1. Click Mgmt. Protocols > RADIUS. The RA

Strany 211 - Page 211

Configuring Device SecurityConfiguring Server Based AuthenticationPage 63Configuring Local UsersNetwork administrators can define users, passwords, an

Strany 212 - System Utilities

Configuring Device SecurityConfiguring Server Based AuthenticationPage 642. Click Create. The Add Local User Page opens: Figure 34: Add Local User Pag

Strany 213 - Viewing Optical Transceivers

Configuring Device SecurityConfiguring Server Based AuthenticationPage 65To modify local users:1. Click Mgmt. Security > Local Users. The Local Use

Strany 214

Configuring Device SecurityConfiguring Server Based AuthenticationPage 66Defining Line PasswordsNetwork administrators can define line passwords in th

Strany 215 - Viewing Device Statistics

Configuring Device SecurityConfiguring Network SecurityPage 67Configuring Network SecurityNetwork security manages locked ports.Port-based authenticat

Strany 216 - Page 216

Configuring Device SecurityConfiguring Network SecurityPage 68To configure secure ports: 1. Click Network Security > Port Security. The Port Securi

Strany 217 - Viewing Etherlike Statistics

Configuring Device SecurityConfiguring Network SecurityPage 694. Click Modify. The Port Security Configuration Page opens:Figure 38: Port Security Con

Strany 218 - Viewing Statistics

PrefacePage 7 Page 7PrefaceThis guide contains instructions on how to configure an AT-8000S Series Layer 2+ Fast Ethernet Switch using the interface

Strany 219 - Managing RMON Statistics

Configuring Device SecurityConfiguring Network SecurityPage 706. Click Apply. The port security settings are saved and the device is updated.7. Click

Strany 220 - Page 220

Configuring Device SecurityConfiguring Network SecurityPage 71For example, a network administrator can use Guest VLANs to deny network access via port

Strany 221 - Configuring RMON History

Configuring Device SecurityConfiguring Network SecurityPage 72To modify port based authentication settings:1. Click Modify. The Port Authentication Se

Strany 222

Configuring Device SecurityConfiguring Network SecurityPage 73The Port Authentication Settings Page contains the following port authentication paramet

Strany 223 - Page 223

Configuring Device SecurityConfiguring Network SecurityPage 74• Enable Periodic Reauthentication — Permits port reauthentication. The possible field v

Strany 224 - Page 224

Configuring Device SecurityConfiguring Network SecurityPage 75Enabling Storm ControlStorm control limits the amount Multicast and Broadcast frames acc

Strany 225 - Configuring RMON Events

Configuring Device SecurityConfiguring Network SecurityPage 76The Storm Control Page displays the Zoom View of the selected stacking member’s (defined

Strany 226 - Viewing the RMON Events Logs

Configuring Device SecurityDefining Access ControlPage 77Defining Access ControlAccess Control Lists (ACL) allow network managers to define classifica

Strany 227 - Page 227

Configuring Device SecurityDefining Access ControlPage 78The MAC Based ACL Page contains the following fields:• ACL Name — Displays the specific MAC b

Strany 228 - Defining RMON Alarms

Configuring Device SecurityDefining Access ControlPage 792. Click the Add ACL button. The Add MAC Based ACL Page opens:Figure 44: Add MAC Based ACL Pa

Strany 229 - Page 229

PrefaceWeb Browser Interface User’s Guide OverviewPage 8 Page 8Web Browser Interface User’s Guide OverviewThe Web Browser Interface User’s Guide provi

Strany 230

Configuring Device SecurityDefining Access ControlPage 80Adding ACE Rules1. Click Network Security > MAC Based ACL. The MAC Based ACL Page opens.2.

Strany 231 - Section 18. Managing Stacking

Configuring Device SecurityDefining Access ControlPage 81Figure 46: IPv4 Based ACL PageThe IPv4 Based ACL Page contains the following fields:• ACL Nam

Strany 232 - Stacking Members and Unit ID

Configuring Device SecurityDefining Access ControlPage 82– HMP — Host Mapping Protocol (HMP). Collects network information from various networks hosts

Strany 233 - Page 233

Configuring Device SecurityDefining Access ControlPage 83• Destination– IPv4 Address — Matches the destination port IPv4 address to which packets are

Strany 234 - Exchanging Stacking Members

Configuring Device SecurityDefining Access ControlPage 842. Click the Add ACL Button. The Add IPv4 Based ACL Page opens:Figure 47: Add IPv4 Based ACL

Strany 235 - Figure 163:Stacking Page

Configuring Device SecurityDefining Access ControlPage 85Adding ACE Rules1. Click Network Security > IPv4 Based ACL. The IPv4 Based ACL Page opens.

Strany 236 - Connecting a Terminal

Configuring Device SecurityDefining Access ControlPage 86Defining IPv6 Based ACLThe IPv6 Based ACL Page contains information for defining IPv6-based A

Strany 237 - Initial Configuration

Configuring Device SecurityDefining Access ControlPage 87• Destination Port — Defines the TCP/UDP destination port. This field is active only if 800/6

Strany 238 - Downloading Software

Configuring Device SecurityDefining Access ControlPage 882. Click the Add ACL Button. The Add IPv6 Based ACL Page opens:Figure 50: Add IPv6 Based ACL

Strany 239 - Downloading Software with CLI

Configuring Device SecurityDefining Access ControlPage 89Adding ACE Rules1. Click Network Security > IPv6 Based ACL. The IPv6 Based ACL Page opens.

Strany 240

PrefaceDocument ConventionsPage 9 Page 9Document ConventionsThis document uses the following conventions:Contacting Allied TelesisThis section provide

Strany 241

Configuring Device SecurityDefining Access ControlPage 90Defining ACL BindingWhen an ACL is bound to an interface, all the ACE rules that have been de

Strany 242

Configuring Device SecurityDefining Access ControlPage 912. Click the Modify button. The ACL Binding Configuration opens:Figure 52: ACL Binding Config

Strany 243 - Appendix B. System Defaults

Configuring DHCP SnoopingPage 92Section 6. Configuring DHCP SnoopingDHCP Snooping expands network security by providing an extra layer of security bet

Strany 244 - Port Defaults

Configuring DHCP SnoopingPage 93Defining DHCP Snooping General PropertiesThe DHCP Snooping General Page contains parameters for enabling DHCP Snooping

Strany 245 - System Time Defaults

Configuring DHCP SnoopingPage 94• Backup Database — Indicates if the DHCP Snooping Database is enabled. The possible field values are: – Enable — Enab

Strany 246 - VLAN Defaults

Configuring DHCP SnoopingPage 95To define DHCP Snooping on VLANs: 1. Click DHCP Snooping > VLAN Settings. The VLAN Settings Page opens:Figure 54: V

Strany 247 - QoS Defaults

Configuring DHCP SnoopingPage 96To define trusted interfaces: 1. Click DHCP Snooping > Trusted Interfaces. The Trusted Interfaces Page opens:Figure

Strany 248 - Page 248

Configuring DHCP SnoopingPage 973. In the table, select an interface and click Modify. The Trusted Configuration Page opens.Figure 56: Trusted Configu

Strany 249 - Page 249

Configuring DHCP SnoopingPage 98Binding Addresses to the DHCP Snooping DatabaseThe Binding Database Page contains parameters for querying and adding I

Strany 250 - Page 250

Configuring DHCP SnoopingPage 99Query ResultsThe Query Results table contains the following fields:• MAC Address — Indicates the MAC address found dur

Komentáře k této Příručce

Žádné komentáře