Allied Telesis AT-8000S Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Logiciel Allied Telesis AT-8000S. Allied Telesis AT-8000S User`s guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 204
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Ethernet Switch

Layer 2Ethernet SwitchAT-8000S SeriesWeb Browser Interface User's Guide

Page 2

Getting StartedStarting the ApplicationPage 11Figure 2: System General Page

Page 3 - Table of Contents

Configuring InterfacesConfiguring VLANsPage 101• Select the interfaces displayed in the table.– Ports of Unit — Specifies the port and stacking member

Page 4

Configuring InterfacesDefining MAC Based GroupsPage 102Defining MAC Based GroupsThe MAC Based Groups Page allows network managers to group VLANs based

Page 5

Configuring InterfacesDefining MAC Based GroupsPage 103• Group ID — Defines the protocol group ID to which the interface is added.• VLAN ID — Attaches

Page 6

Configuring InterfacesDefining MAC Based GroupsPage 104To add a mapped group:1. Click Layer 2 > MAC Based Groups. The MAC Based Groups Page opens:2

Page 7

Configuring System LogsPage 105Section 8. Configuring System LogsThis section provides information for managing system logs. System logs enable viewin

Page 8 - Contacting Allied Telesis

Configuring System LogsPage 106The Event Log Page page contains fields for defining which events are recorded to which logs. It contains fields for en

Page 9 - Section 1. Getting Started

Configuring System LogsPage 107• IP Address — Displays the defined IP address of the syslog server.• Minimum Severity — Indicates the defined minimum

Page 10 - Figure 2: System General Page

Configuring System LogsPage 108• Facility — Defines an application from which system logs are sent to the remote server. Only one facility can be assi

Page 11

Configuring System LogsPage 109Figure 80: View Flash Log PageThe View Flash Log Page and View Temporary Log Page list the following information:• Log

Page 12 - User Interface Components

Configuring Spanning TreeConfiguring Classic Spanning TreePage 110Section 9. Configuring Spanning TreeSpanning Tree Protocol (STP) provides tree topog

Page 13 - Using the Management Buttons

Getting StartedUsing the Web Browser InterfacePage 12Using the Web Browser InterfaceThis section provides general information about the interface, and

Page 14 - Figure 5: Add Local User Page

Configuring Spanning TreeConfiguring Classic Spanning TreePage 111Defining STP PropertiesThe Spanning Tree Page contains parameters for enabling and c

Page 15 - Logging Out

Configuring Spanning TreeConfiguring Classic Spanning TreePage 112• Path Cost Default Values — Specifies the method used to assign default path cost t

Page 16 - Resetting the Device

Configuring Spanning TreeConfiguring Classic Spanning TreePage 113Defining STP InterfacesNetwork administrators can assign STP settings to a specific

Page 17

Configuring Spanning TreeConfiguring Classic Spanning TreePage 114• Port Fast — Indicates if Fast Link is enabled on the port. If Fast Link mode is en

Page 18

Configuring Spanning TreeConfiguring Classic Spanning TreePage 115Figure 83: Spanning Tree Configuration PageIn addition to the STP Interface Configur

Page 19 - Setting the System Clock

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 116Configuring Rapid Spanning TreeWhile Classic STP prevents Layer 2 forwarding loops in

Page 20 - Configuring SNTP

Configuring Spanning TreeConfiguring Rapid Spanning TreePage 117• Mode — Displays the current STP mode. The STP mode is selected in the Spanning Tree

Page 21 - Broadcast Time Information

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 118Configuring Multiple Spanning TreeMultiple Spanning Tree Protocol (MSTP) provides d

Page 22

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 119The MSTP Page contains the following fields: • Region Name — User-defined STP regio

Page 23

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 120The MSTP Interface Settings Page contains the following fields: • Instance ID — Lis

Page 24

Getting StartedUsing the Web Browser InterfacePage 13User Interface ComponentsThe System General Page example shows the interface components.Figure 4:

Page 25 - • Defining Access Control

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1213. Define the fields.4. Click Apply. MSTP is defined for the selected interface.5.

Page 26 - Defining Access Profiles

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 122Defining MSTP Instance MappingsNetwork administrators can assign MSTP mapping to a

Page 27

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 123Defining MSTP Instance SettingsMSTP maps VLANs into STP instances. Packets assigned

Page 28

Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1243. Define the fields.4. Click Apply. MSTP is defined for the selected instance, and

Page 29

Configuring Multicast ForwardingPage 125Section 10.Configuring Multicast ForwardingMulticast forwarding allows a single packet to be forwarded to mult

Page 30 - Defining Profile Rules

Configuring Multicast ForwardingPage 126Configuring IGMP SnoopingWhen IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. Th

Page 31

Configuring Multicast ForwardingPage 127• IGMP Snooping Status — Indicates if IGMP snooping is enabled on the VLAN. The possible field values are: – E

Page 32

Configuring Multicast ForwardingPage 128Figure 92: IGMP Configuration PageIn addition to the IGMP Page, the IGMP Configuration Page contains the follo

Page 33

Configuring Multicast ForwardingPage 129Figure 93: Multicast Group PageThe Multicast Group Page contains the following fields:• Enable Bridge Multicas

Page 34

Configuring Multicast ForwardingPage 130Figure 94: Add Multicast Group Page 4. Select the VLAN ID.5. Enter the Bridge Multicast MAC Address and the Br

Page 35

Getting StartedUsing the Web Browser InterfacePage 14Using the Management Buttons Management buttons provide an easy method of configuring device info

Page 36

Configuring Multicast ForwardingPage 131Defining Multicast Forward All SettingsMulticast forwarding enables transmitting packets from either a specifi

Page 37

Configuring Multicast ForwardingPage 1322. Select interfaces to modify.3. Click Modify. The Multicast Forward All Configuration Page opens:Figure 97:

Page 38 - Configuring TACACS+

Configuring SNMPPage 133Section 11. Configuring SNMPSimple Network Management Protocol (SNMP) provides a method for managing network devices. Equipmen

Page 39

Configuring SNMPPage 134Enabling SNMPThe SNMP Global Page provides fields for globally enabling and configuring SNMP on the device.To enable SNMP: 1.

Page 40

Configuring SNMPPage 135Defining SNMP CommunitiesAccess rights are managed by defining communities in the SNMP Community Page. When the community name

Page 41 - Configuring RADIUS

Configuring SNMPPage 136• Access Mode — Defines the access rights of the community. The possible field values are:– Read Only — Management access is r

Page 42

Configuring SNMPPage 137Figure 101:Community Configuration Page3. Define the Basic or Advanced configuration of the community.4. Click Apply. The SNMP

Page 43

Configuring SNMPPage 138Defining SNMP GroupsThe SNMP Group Page provides information for creating SNMP groups, and assigning SNMP access control privi

Page 44 - Configuring Local Users

Configuring SNMPPage 1392. Click Add. The Add Group Page opens:Figure 103:Add Group Page3. Define the Group Name, Security Level, Security Model, and

Page 45

Configuring SNMPPage 140Defining SNMP UsersThe SNMP Users Page enables assigning system users to SNMP groups, as well as defining the user authenticat

Page 46 - Defining Line Passwords

Getting StartedUsing the Web Browser InterfacePage 15Adding, Modifying and Deleting InformationThe WBI contains and tables for configuring devices. Us

Page 47 - Configuring Network Security

Configuring SNMPPage 141• Authentication — Displays the method used to authenticate users. The possible field values are:– MD5 Key — Users are authent

Page 48 - Figure 29: Port Security Page

Configuring SNMPPage 142• Authentication Key — Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are en

Page 49

Configuring SNMPPage 143Defining SNMP ViewsThe SNMP views provide or block access to device features or portions of features. Feature access is grante

Page 50 - Defining 802.1x Port Access

Configuring SNMPPage 144Figure 109:Add SNMP VIew Page3. Define the View Name field.4. Select the Subtree ID Tree using one of the following options:–

Page 51

Configuring SNMPPage 145Defining Notification RecipientsThe SNMP Notify Page contains fields for defining SNMP notification recipients. the page conta

Page 52

Configuring SNMPPage 146SNMPv1,2c Notification RecipientThe SNMP v1, v2c Recipient table contains the following fields:• Recipients IP — Displays the

Page 53

Configuring SNMPPage 147Figure 111: Add Notify Page 3. Define the relevant fields.4. Click Apply. The notification recipient settings are saved and th

Page 54 - Enabling Storm Control

Configuring SNMPPage 148Figure 112:SNMP Notify Configuration Page3. Define the fields.4. Click Apply. The SNMP Notification configuration is modified,

Page 55

Configuring SNMPPage 149Defining Notification FiltersThe SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a

Page 56 - Defining Access Control

Configuring SNMPPage 150To add an SNMP notification filter:1. Click the Add button. The Add SNMP Notification Filter Page opens:Figure 114:Add SNMP No

Page 57

Getting StartedLogging OutPage 164. Define the fields. 5. Click Apply. The fields are modified, and the information is saved to the device. To delete

Page 58 - Adding ACE Rules

Configuring Power Over EthernetPage 151Section 12.Configuring Power Over EthernetThis section describes configuring Power over Ethernet (PoE) for an A

Page 59

Configuring Power Over EthernetPage 152Figure 115:Power Over Ethernet Page The Power Over Ethernet Page contains the following fields:Global PoE Confi

Page 60

Configuring Power Over EthernetPage 153Defining Power Over Ethernet ConfigurationTo modify PoE port settings: 1. In the Power Over Ethernet Page Zoom

Page 61 - Defining IP Based ACL

Configuring Power Over EthernetPage 154– Fault — Indicates one of the following:– The powered device test has failed. For example, a port could not be

Page 62

Configuring ServicesPage 155Section 13.Configuring ServicesThis section describes Quality of Service related configurations. QoS supports activating o

Page 63

Configuring ServicesPage 156Enabling Class of Service (CoS)The CoS Page enables configuring the CoS ports or trunks on the device.To configure CoS por

Page 64

Configuring ServicesPage 157• Select the interfaces displayed in the table.– Ports of Unit — Specifies the port and stacking member for which the CoS

Page 65

Configuring ServicesPage 158Configuring CoS Queueing and SchedulingThe CoS Queuing & Scheduling Page provides fields for configuring CoS Priority

Page 66

Configuring ServicesPage 159Mapping CoS Values to QueuesThe Configure CoS Page contains fields for classifying CoS settings to traffic queues.To set C

Page 67 - Defining ACL Binding

Configuring ServicesPage 160Mapping DSCP Values to QueuesThe Configure DSCP Page contains fields for classifying DSCP settings to traffic queues. For

Page 68

Getting StartedResetting the DevicePage 17Resetting the DeviceThe Reset option enables resetting the device from a remote location. NoteSave all chang

Page 69 - • Defining Trusted Interfaces

Configuring ServicesPage 161The Configure DSCP Page contains the following fields:• Restore Defaults — Restores the device factory defaults for mappin

Page 70

Configuring ServicesPage 162As a default the Bandwidth Page opens displaying the port options. The fields are identical when displaying the trunk CoS.

Page 71

System UtilitiesPage 163Section 14.System UtilitiesThe configuration file structure involves the following configuration files:• Startup Configuration

Page 72 - Defining Trusted Interfaces

System UtilitiesPage 164Restoring the Default Configurationin the System Utilities Page, the Reset to Factory Defaults function restores the Configura

Page 73

System UtilitiesPage 165To reset the configuration file to defaults with reboot: 1. Check the Reboot Switch After Resetting to Defaults option.2. Sele

Page 74

System UtilitiesPage 166• Destination File — Defines the type of file that the device creates. If the TFTP Operation is Firmware, the possible values

Page 75

System UtilitiesPage 167Viewing Integrated Cable TestsThe Cable Test Page contains fields for performing tests on copper cables. Cable testing provide

Page 76 - Section 6. Configuring Ports

System UtilitiesPage 168• Cable Length — Indicates the approximate cable length. This test can only be performed when the port is up and operating at

Page 77 - Configuring Ports

System UtilitiesPage 169Viewing Optical TransceiversThe Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Opti

Page 78

System UtilitiesPage 170Resetting the DeviceThe Reset page enables the user to reset the system. Save all changes to the Running Configuration file be

Page 79

Defining System InformationPage 18Section 2. Defining System InformationThe System General Page contains general device information, including system

Page 80 - Configuring Port Mirroring

Viewing StatisticsViewing Device StatisticsPage 171Section 15.Viewing StatisticsThe device provides statistics for RMON, interfaces, and Etherlike. Th

Page 81

Viewing StatisticsViewing Device StatisticsPage 172The Interface Statistics Page contains the following fields:• Select the interfaces displayed in th

Page 82

Viewing StatisticsViewing Device StatisticsPage 173Viewing Etherlike Statistics The Etherlike Statistics Page displays interface statistics. To view E

Page 83 - Aggregating Ports

Viewing StatisticsViewing Device StatisticsPage 174• Excessive Collisions — Displays the number of excessive collisions received on the selected inter

Page 84

Viewing StatisticsManaging RMON StatisticsPage 175Managing RMON StatisticsThis section contains the following topics: • Viewing RMON Statistics• Confi

Page 85

Viewing StatisticsManaging RMON StatisticsPage 176• Refresh Rate — Defines the frequency of the RMON statistics updates. The possible field values are

Page 86

Viewing StatisticsManaging RMON StatisticsPage 177Configuring RMON HistoryThe RMON History Page contains information about samples of data taken from

Page 87 - Defining Port Trunking

Viewing StatisticsManaging RMON StatisticsPage 1782. Click Add. The Add RMON History Page opens:Figure 134:Add RMON History PageIn addition to the RMO

Page 88

Viewing StatisticsManaging RMON StatisticsPage 179Viewing the RMON History TableThe RMON History Table Page contains interface specific statistical ne

Page 89 - Configuring LACP

Viewing StatisticsManaging RMON StatisticsPage 180• CRC Align Errors — Displays the number of CRC and Align errors that have occurred on the interface

Page 90

Defining System InformationPage 19• Default Gateway — The IP address of a router for remote management of the device. The address must be entered in t

Page 91 - Defining MAC Addresses

Viewing StatisticsManaging RMON StatisticsPage 181Configuring RMON EventsThe RMON Events Page contains fields for defining, modifying and viewing RMON

Page 92

Viewing StatisticsManaging RMON StatisticsPage 182Figure 138:Add RMON Events Page3. Define the Community, Description, Type and Owner fields.4. Click

Page 93

Viewing StatisticsManaging RMON StatisticsPage 183Viewing the RMON Events LogsThe RMON Events Logs Page contains interface specific statistical networ

Page 94 - Configuring VLANs

Viewing StatisticsManaging RMON StatisticsPage 184Defining RMON Alarms The RMON Alarm Page contains fields for setting network alarms. Network alarms

Page 95 - Defining VLAN Properties

Viewing StatisticsManaging RMON StatisticsPage 185• Rising Event — Displays the event that triggers the specific alarm. The possible field values are

Page 96

Viewing StatisticsManaging RMON StatisticsPage 186Figure 143:Alarm Configuration Page3. Define the fields.4. Click Apply. The RMON alarm is saved, and

Page 97

Managing StackingStacking OverviewPage 187Section 16.Managing StackingThis section describes the stacking control management and includes the followin

Page 98

Managing StackingStacking OverviewPage 188Stacking Chain TopologyIn a chain topology, there are two units that have only one neighbor. Every unit has

Page 99 - Defining GVRP

Managing StackingStacking OverviewPage 189Each port in the stack has a specific Unit ID, port type, and port number, which are part of both the config

Page 100 - Page 101

Managing StackingConfiguring Stacking ManagementPage 190Configuring Stacking ManagementThe Stacking Page allows network managers to either reset the e

Page 101 - Defining MAC Based Groups

Configuring System TimePage 20Section 3. Configuring System TimeThe System Time Page provides information for configuring system time parameters, incl

Page 102 - Page 103

Downloading Software with CLIConnecting a TerminalPage 191Appendix A. Downloading Software with CLIThis section describes how to download system files

Page 103 - Configuring Interfaces

Downloading Software with CLIInitial ConfigurationPage 192Initial ConfigurationBefore a device can download system software, the device must have an i

Page 104 - Defining Log Settings

Downloading Software with CLIDownloading SoftwarePage 193To check the configuration, enter the command “show ip interface” as illustrated in the follo

Page 105 - Page 106

Downloading Software with CLIDownloading SoftwarePage 1942. Enter the copy command to download the boot file.3. Enter the “bootvar” command to determi

Page 106 - Adding Log Servers

Downloading Software with CLIDownloading SoftwarePage 1955. Enter the “copy” command to download the system file.6. Reboot the device. The device boot

Page 107 - Modifying Log Servers

Downloading Software with CLIDownloading SoftwarePage 196Stacking Member Software DownloadEnsure the stack has been correctly connected as described i

Page 108 - Page 109

Downloading Software with CLIDownloading SoftwarePage 1975. Enter the “copy” command to download the system file.6. Reboot the devices being updated.

Page 109 - Page 110

System DefaultsPage 197Appendix B. System DefaultsThis section contains the system defaults, and includes the following topics:• RS-232 Port Settings•

Page 110 - Defining STP Properties

System DefaultsRS-232 Port SettingsPage 198RS-232 Port SettingsThe following table contains the RS-232 port setting defaults: Port DefaultsThe followi

Page 111 - Page 112

System DefaultsConfiguration DefaultsPage 199Configuration DefaultsThe following are the initial device configuration defaults: Security DefaultsThe f

Page 112 - Defining STP Interfaces

Allied Telesis AT-8000S Web Browser Interface User’s Guide

Page 113 - Page 114

Configuring System TimePage 21The Clock Source and System Time sections of the System Time Page contain the following fields:• Clock Source — The sour

Page 114 - Configuring Spanning Tree

System DefaultsSpanning Tree DefaultsPage 200Spanning Tree DefaultsThe following are the spanning tree defaults:Address Table DefaultsThe following th

Page 115 - Page 116

System DefaultsTrunking DefaultsPage 201Trunking DefaultsThe following are the trunking defaults:Multicast DefaultsThe following are the Multicast def

Page 116 - Page 117

IndexPage 202IndexSymbols802.1x port access 51AAbsolute 186Access level 45access profiles 27rules 31ACE 57ACL 57, 68ACL Binding 68Alarms 186Alert 107A

Page 117 - Defining MSTP Properties

IndexPage 203GGARP VLAN Registration Protocol (GVRP) 102Guest VLAN 51GVRP 103configuration 102HHost 105HTTP 29, 38IIGMPv1 and 2 128IGMPv3 128Informati

Page 118 - Defining MSTP Interfaces

IndexPage 204SSamples 179Scheduling 160Secure HTTP 29, 38Secure Telnet 29, 37security802.1x port access 51server based authentication methods 39server

Page 119 - Page 120

Configuring System TimePage 22Broadcast Time InformationBroadcast information is used when the server IP address is unknown. When a broadcast message

Page 120

Configuring System TimePage 23• From — Indicates the time that DST begins in countries other than the USA and Europe, in the format Day/Month/Year in

Page 121

Configuring System TimePage 24• Belgium — From the last weekend of March until the last weekend of October.• Brazil — From the third Sunday in October

Page 122 - Page 123

Configuring System TimePage 25• Spain — From the last weekend of March until the last weekend of October. • Sweden — From the last weekend of March un

Page 123

Configuring Device SecurityPage 26Section 4. Configuring Device SecurityThis section describes setting security parameters for ports, device managemen

Page 124 - • Configuring IGMP Snooping

Configuring Device SecurityConfiguring Management SecurityPage 27Configuring Management SecurityThis section provides information for configuring devi

Page 125 - Configuring IGMP Snooping

Configuring Device SecurityConfiguring Management SecurityPage 28Figure 10: Access Profile PageThe Access Profile Page contains a table listing the cu

Page 126 - Page 127

Configuring Device SecurityConfiguring Management SecurityPage 29Figure 11: Add Access Profile PageThe Add Access Profile Page contains the following

Page 127 - Page 128

Configuring Device SecurityConfiguring Management SecurityPage 30• Action — Defines the action attached to the access rule. The possible field values

Page 128 - Page 129

Table of ContentsPage 3 Table of ContentsPreface...

Page 129 - Page 130

Configuring Device SecurityConfiguring Management SecurityPage 31Defining Profile RulesAccess profiles can contain up to 128 rules that determine whic

Page 130 - Page 131

Configuring Device SecurityConfiguring Management SecurityPage 32• Management Method — Defines the management method for which the rule is defined. Us

Page 131 - Page 132

Configuring Device SecurityConfiguring Management SecurityPage 33To modify an access rule:1. Click Mgmt. Security > Profile Rules: The Profile Rule

Page 132 - Section 11. Configuring SNMP

Configuring Device SecurityConfiguring Management SecurityPage 34Defining Authentication ProfilesAuthentication profiles allow network administrators

Page 133 - Enabling SNMP

Configuring Device SecurityConfiguring Management SecurityPage 35– RADIUS — Authenticates the user at the RADIUS server. For more information, see Def

Page 134 - Defining SNMP Communities

Configuring Device SecurityConfiguring Management SecurityPage 364. Enter the Profile Name.5. Using the arrows, move the method(s) from the Optional M

Page 135 - Page 136

Configuring Device SecurityConfiguring Management SecurityPage 37Mapping Authentication ProfilesAfter authentication profiles are defined, they can be

Page 136 - Configuring SNMP

Configuring Device SecurityConfiguring Management SecurityPage 38• Secure HTTP — Indicates that authentication methods are used for secure HTTP access

Page 137 - Defining SNMP Groups

Configuring Device SecurityConfiguring Server Based AuthenticationPage 39Configuring Server Based AuthenticationNetwork administrators assign authenti

Page 138 - Figure 103:Add Group Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 40The TACACS+ Page contains the following fields:• Timeout for Reply — Defines

Page 139 - Defining SNMP Users

Table of ContentsPage 4 Configuring DHCP Snooping ... 70D

Page 140 - Page 141

Configuring Device SecurityConfiguring Server Based AuthenticationPage 41To modify TACACS+ server settings:1. Click Mgmt. Protocols > TACACS+. The

Page 141

Configuring Device SecurityConfiguring Server Based AuthenticationPage 42Configuring RADIUSRemote Authorization Dial-In User Service (RADIUS) servers

Page 142 - Defining SNMP Views

Configuring Device SecurityConfiguring Server Based AuthenticationPage 43• Authentication Port — Identifies the authentication port. The authenticatio

Page 143 - Figure 109:Add SNMP VIew Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 44Figure 24: RADIUS Configuration Page3. Define the relevant fields.4. Click Ap

Page 144 - Page 145

Configuring Device SecurityConfiguring Server Based AuthenticationPage 45Configuring Local UsersNetwork administrators can define users, passwords, an

Page 145 - SNMPv3 Notification Recipient

Configuring Device SecurityConfiguring Server Based AuthenticationPage 46Figure 26: Add Local User PageIn addition to the fields in the Local Users Pa

Page 146 - Figure 111: Add Notify Page

Configuring Device SecurityConfiguring Server Based AuthenticationPage 47Defining Line PasswordsNetwork administrators can define line passwords in th

Page 147

Configuring Device SecurityConfiguring Network SecurityPage 48Configuring Network SecurityNetwork security manages locked ports.Port-based authenticat

Page 148 - Defining Notification Filters

Configuring Device SecurityConfiguring Network SecurityPage 49Figure 29: Port Security PageThe Port Security Page displays the Zoom View of the select

Page 149 - Page 150

Configuring Device SecurityConfiguring Network SecurityPage 50Figure 30: Port Security Configuration PageThe Port Security Configuration Page contains

Page 150 - Page 151

Table of ContentsPage 5 Configuring SNMP ...

Page 151 - Page 152

Configuring Device SecurityConfiguring Network SecurityPage 51Defining 802.1x Port AccessThe 802.1x Port Access Page allows enabling port access globa

Page 152 - Page 153

Configuring Device SecurityConfiguring Network SecurityPage 52The 802.1x Port Access Page also displays the Zoom View of the selected stacking member’

Page 153 - Page 154

Configuring Device SecurityConfiguring Network SecurityPage 53The Port Authentication Settings Page contains the following port authentication paramet

Page 154 - Page 155

Configuring Device SecurityConfiguring Network SecurityPage 542. Click Apply. The port authentication configuration is saved and the device is updated

Page 155 - Page 156

Configuring Device SecurityConfiguring Network SecurityPage 55Enabling Storm ControlStorm control limits the amount of unknown Unicast, Multicast and

Page 156 - Page 157

Configuring Device SecurityConfiguring Network SecurityPage 56The Storm Control Page displays the Zoom View of the selected stacking member’s (defined

Page 157 - Page 158

Configuring Device SecurityDefining Access ControlPage 57Defining Access ControlAccess Control Lists (ACL) allow network managers to define classifica

Page 158 - Mapping CoS Values to Queues

Configuring Device SecurityDefining Access ControlPage 58The MAC Based ACL Page contains the following fields:• ACL Name — Displays the specific MAC b

Page 159 - Mapping DSCP Values to Queues

Configuring Device SecurityDefining Access ControlPage 59Figure 36: Add MAC Based ACL Page3. In the ACL Name field, type a name for the ACL.4. Enable

Page 160 - Configuring QoS Bandwidth

Configuring Device SecurityDefining Access ControlPage 60Figure 37: Add MAC Based ACE Page3. Define the fields.4. Click Apply. The MAC Based ACE rule

Page 161 - Page 162

Table of ContentsPage 6 Downloading Software with CLI... 191Con

Page 162 - Section 14.System Utilities

Configuring Device SecurityDefining Access ControlPage 613. Define the fields.4. Click Apply. The MAC Based ACL configuration is defined, and the devi

Page 163 - Page 164

Configuring Device SecurityDefining Access ControlPage 62Defining IP Based ACLThe IP Based ACL Page contains information for defining IP Based ACLs, i

Page 164 - Page 165

Configuring Device SecurityDefining Access ControlPage 63– TCP — Transmission Control Protocol (TCP). Enables two hosts to communicate and exchange da

Page 165 - Page 166

Configuring Device SecurityDefining Access ControlPage 64• Destination– IP Address — Matches the destination port IP address to which packets are addr

Page 166 - Page 167

Configuring Device SecurityDefining Access ControlPage 65Figure 40: Add IP Based ACL PageIn addition to the IP Based ACL Page, the Add IP Based ACL Pa

Page 167 - System Utilities

Configuring Device SecurityDefining Access ControlPage 66Adding ACE Rules1. Click Network Security > IP Based ACL. The IP Based ACL Page opens.2. C

Page 168 - Viewing Optical Transceivers

Configuring Device SecurityDefining Access ControlPage 67Figure 42: IP Based ACL Configuration Page3. Define the fields.4. Click Apply. The IP Based A

Page 169

Configuring Device SecurityDefining Access ControlPage 68Defining ACL BindingWhen an ACL is bound to an interface, all the ACE rules that have been de

Page 170 - Section 15.Viewing Statistics

Configuring Device SecurityDefining Access ControlPage 69Figure 44: ACL Binding ConfigurationThe ACL Binding Configuration contains the following fiel

Page 171 - Page 172

Configuring DHCP SnoopingPage 70Section 5. Configuring DHCP SnoopingDHCP Snooping expands network security by providing an extra layer of security bet

Page 172 - Viewing Etherlike Statistics

PrefaceWeb Browser Interface User’s Guide OverviewPage 7PrefaceThis guide contains instructions on how to configure an AT-8000S Series Layer 2+ Gigabi

Page 173 - Page 174

Configuring DHCP SnoopingPage 71Figure 45: DHCP Snooping General PageThe DHCP Snooping General Page contains the following fields:• Enable DHCP Snoopi

Page 174 - Managing RMON Statistics

Configuring DHCP SnoopingPage 72• DHCP Option 82 Insertion — DHCP Option 82 attaches authentication messages to the packets sent to DHCP Server via TC

Page 175 - Page 176

Configuring DHCP SnoopingPage 73Defining Trusted InterfacesThe Trusted Interfaces Page allows network manager to define Trusted interfaces. Trusted in

Page 176 - Configuring RMON History

Configuring DHCP SnoopingPage 742. From the global Interface field, define the specific port or trunk.3. In the table, select an interface and click M

Page 177 - Viewing Statistics

Configuring DHCP SnoopingPage 75Binding Addresses to the DHCP Snooping DatabaseThe Binding Database Page contains parameters for querying and adding I

Page 178 - Page 179

Configuring DHCP SnoopingPage 76Query ResultsThe Query Results table contains the following fields:• MAC Address — Indicates the MAC address found dur

Page 179 - Page 180

Configuring PortsSetting Ports ConfigurationsPage 77Section 6. Configuring PortsPort Configuration includes the following procedures for configuring p

Page 180 - Configuring RMON Events

Configuring PortsSetting Ports ConfigurationsPage 78The Port Settings Page contains the Zoom View of the device ports. The possible port settings are:

Page 181

Configuring PortsSetting Ports ConfigurationsPage 79The Port Setting Configuration Page contains the following fields:• Port— Lists the names of confi

Page 182 - Viewing the RMON Events Logs

Configuring PortsSetting Ports ConfigurationsPage 80• Admin Advertisement — Defines the auto negotiation setting the port advertises. The possible fie

Page 183 - Defining RMON Alarms

PrefaceIntended AudiencePage 8• Section 16, “Managing Stacking” — Provides information for stacking, including a stacking overview. • Appendix A, “Dow

Page 184 - Page 185

Configuring PortsSetting Ports ConfigurationsPage 81Configuring Port MirroringPort mirroring monitors and mirrors network traffic by forwarding copies

Page 185

Configuring PortsSetting Ports ConfigurationsPage 82• Status — Indicates if the port is currently monitored. The possible field values are:– Active —

Page 186 - Section 16.Managing Stacking

Configuring PortsSetting Ports ConfigurationsPage 833. Define the Type field.4. Click Apply. The Port mirroring is modified, and the device is updated

Page 187 - Stacking Members and Unit ID

Configuring PortsAggregating PortsPage 84Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a single

Page 188 - Exchanging Stacking Members

Configuring PortsAggregating PortsPage 85Figure 56: Trunk Settings PageThe Trunk Settings Page displays information about the currently defined trunks

Page 189 - Figure 144:Stacking Page

Configuring PortsAggregating PortsPage 86• LACP — Indicates if LACP is enabled on the trunk. The possible values are:– Enable — LACP is enabled on the

Page 190 - Connecting a Terminal

Configuring PortsAggregating PortsPage 87• Current Status — Indicates whether the trunk is currently operational or non-operational. The possible fiel

Page 191 - Initial Configuration

Configuring PortsAggregating PortsPage 88• PVE — Enables a port to be a Private VLAN Edge (PVE) port. When a port is defined as PVE, it bypasses the F

Page 192 - Downloading Software

Configuring PortsAggregating PortsPage 89Figure 59: Port Trunking Configuration PageIn addition to the fields in the The Port Trunking Page, the Port

Page 193 - Downloading Software with CLI

Configuring PortsAggregating PortsPage 90Configuring LACPTrunk ports can contain different media types if the ports are operating at the same speed. A

Page 194

Getting StartedStarting the ApplicationPage 10Section 1. Getting StartedThis section provides an introduction to the Web Browser Interface, and includ

Page 195

Configuring PortsAggregating PortsPage 91Figure 61: LACP Configuration Page3. Define the fields.4. Click Apply. The LACP settings are saved and the de

Page 196

Configuring InterfacesPage 92Section 7. Configuring InterfacesThis section contains information on configuring the interfaces of the device.This secti

Page 197 - Appendix B. System Defaults

Configuring InterfacesPage 93The MAC Address Page contains the following fields:• View Static — Displays the static addresses assigned to the ports on

Page 198 - RS-232 Port Settings

Configuring InterfacesPage 94To delete all MAC addresses: 1. Click Layer 2 > MAC Address. The MAC Address Page opens.2. Click Delete in the Delete

Page 199 - System Time Defaults

Configuring InterfacesConfiguring VLANsPage 95Configuring VLANs This section describes how to create and configure Virtual LANs (VLANs).VLANs are logi

Page 200 - VLAN Defaults

Configuring InterfacesConfiguring VLANsPage 96Defining VLAN PropertiesThe VLAN Page provides information and global parameters for configuring and wor

Page 201 - QoS Defaults

Configuring InterfacesConfiguring VLANsPage 97• Interface Status — Indicates the interface’s membership status in the VLAN. The possible field values

Page 202 - Page 202

Configuring InterfacesConfiguring VLANsPage 98Defining VLAN Interface SettingsThe VLAN Interface Page contains fields for managing ports that are part

Page 203 - Page 203

Configuring InterfacesConfiguring VLANsPage 99• PVID — Port Default VLAN ID. Assigns a VLAN ID to untagged packets. The possible values are 1-4094. VL

Page 204 - Page 204

Configuring InterfacesConfiguring VLANsPage 100Defining GVRPThe GVRP Page enables users to configure GARP VLAN Registration Protocol (GVRP) on the dev

Commentaires sur ces manuels

Pas de commentaire