Layer 2Ethernet SwitchAT-8000S SeriesWeb Browser Interface User's Guide
Getting StartedStarting the ApplicationPage 11Figure 2: System General Page
Configuring InterfacesConfiguring VLANsPage 101• Select the interfaces displayed in the table.– Ports of Unit — Specifies the port and stacking member
Configuring InterfacesDefining MAC Based GroupsPage 102Defining MAC Based GroupsThe MAC Based Groups Page allows network managers to group VLANs based
Configuring InterfacesDefining MAC Based GroupsPage 103• Group ID — Defines the protocol group ID to which the interface is added.• VLAN ID — Attaches
Configuring InterfacesDefining MAC Based GroupsPage 104To add a mapped group:1. Click Layer 2 > MAC Based Groups. The MAC Based Groups Page opens:2
Configuring System LogsPage 105Section 8. Configuring System LogsThis section provides information for managing system logs. System logs enable viewin
Configuring System LogsPage 106The Event Log Page page contains fields for defining which events are recorded to which logs. It contains fields for en
Configuring System LogsPage 107• IP Address — Displays the defined IP address of the syslog server.• Minimum Severity — Indicates the defined minimum
Configuring System LogsPage 108• Facility — Defines an application from which system logs are sent to the remote server. Only one facility can be assi
Configuring System LogsPage 109Figure 80: View Flash Log PageThe View Flash Log Page and View Temporary Log Page list the following information:• Log
Configuring Spanning TreeConfiguring Classic Spanning TreePage 110Section 9. Configuring Spanning TreeSpanning Tree Protocol (STP) provides tree topog
Getting StartedUsing the Web Browser InterfacePage 12Using the Web Browser InterfaceThis section provides general information about the interface, and
Configuring Spanning TreeConfiguring Classic Spanning TreePage 111Defining STP PropertiesThe Spanning Tree Page contains parameters for enabling and c
Configuring Spanning TreeConfiguring Classic Spanning TreePage 112• Path Cost Default Values — Specifies the method used to assign default path cost t
Configuring Spanning TreeConfiguring Classic Spanning TreePage 113Defining STP InterfacesNetwork administrators can assign STP settings to a specific
Configuring Spanning TreeConfiguring Classic Spanning TreePage 114• Port Fast — Indicates if Fast Link is enabled on the port. If Fast Link mode is en
Configuring Spanning TreeConfiguring Classic Spanning TreePage 115Figure 83: Spanning Tree Configuration PageIn addition to the STP Interface Configur
Configuring Spanning TreeConfiguring Rapid Spanning TreePage 116Configuring Rapid Spanning TreeWhile Classic STP prevents Layer 2 forwarding loops in
Configuring Spanning TreeConfiguring Rapid Spanning TreePage 117• Mode — Displays the current STP mode. The STP mode is selected in the Spanning Tree
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 118Configuring Multiple Spanning TreeMultiple Spanning Tree Protocol (MSTP) provides d
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 119The MSTP Page contains the following fields: • Region Name — User-defined STP regio
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 120The MSTP Interface Settings Page contains the following fields: • Instance ID — Lis
Getting StartedUsing the Web Browser InterfacePage 13User Interface ComponentsThe System General Page example shows the interface components.Figure 4:
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1213. Define the fields.4. Click Apply. MSTP is defined for the selected interface.5.
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 122Defining MSTP Instance MappingsNetwork administrators can assign MSTP mapping to a
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 123Defining MSTP Instance SettingsMSTP maps VLANs into STP instances. Packets assigned
Configuring Spanning TreeConfiguring Multiple Spanning TreePage 1243. Define the fields.4. Click Apply. MSTP is defined for the selected instance, and
Configuring Multicast ForwardingPage 125Section 10.Configuring Multicast ForwardingMulticast forwarding allows a single packet to be forwarded to mult
Configuring Multicast ForwardingPage 126Configuring IGMP SnoopingWhen IGMP Snooping is enabled globally, all IGMP packets are forwarded to the CPU. Th
Configuring Multicast ForwardingPage 127• IGMP Snooping Status — Indicates if IGMP snooping is enabled on the VLAN. The possible field values are: – E
Configuring Multicast ForwardingPage 128Figure 92: IGMP Configuration PageIn addition to the IGMP Page, the IGMP Configuration Page contains the follo
Configuring Multicast ForwardingPage 129Figure 93: Multicast Group PageThe Multicast Group Page contains the following fields:• Enable Bridge Multicas
Configuring Multicast ForwardingPage 130Figure 94: Add Multicast Group Page 4. Select the VLAN ID.5. Enter the Bridge Multicast MAC Address and the Br
Getting StartedUsing the Web Browser InterfacePage 14Using the Management Buttons Management buttons provide an easy method of configuring device info
Configuring Multicast ForwardingPage 131Defining Multicast Forward All SettingsMulticast forwarding enables transmitting packets from either a specifi
Configuring Multicast ForwardingPage 1322. Select interfaces to modify.3. Click Modify. The Multicast Forward All Configuration Page opens:Figure 97:
Configuring SNMPPage 133Section 11. Configuring SNMPSimple Network Management Protocol (SNMP) provides a method for managing network devices. Equipmen
Configuring SNMPPage 134Enabling SNMPThe SNMP Global Page provides fields for globally enabling and configuring SNMP on the device.To enable SNMP: 1.
Configuring SNMPPage 135Defining SNMP CommunitiesAccess rights are managed by defining communities in the SNMP Community Page. When the community name
Configuring SNMPPage 136• Access Mode — Defines the access rights of the community. The possible field values are:– Read Only — Management access is r
Configuring SNMPPage 137Figure 101:Community Configuration Page3. Define the Basic or Advanced configuration of the community.4. Click Apply. The SNMP
Configuring SNMPPage 138Defining SNMP GroupsThe SNMP Group Page provides information for creating SNMP groups, and assigning SNMP access control privi
Configuring SNMPPage 1392. Click Add. The Add Group Page opens:Figure 103:Add Group Page3. Define the Group Name, Security Level, Security Model, and
Configuring SNMPPage 140Defining SNMP UsersThe SNMP Users Page enables assigning system users to SNMP groups, as well as defining the user authenticat
Getting StartedUsing the Web Browser InterfacePage 15Adding, Modifying and Deleting InformationThe WBI contains and tables for configuring devices. Us
Configuring SNMPPage 141• Authentication — Displays the method used to authenticate users. The possible field values are:– MD5 Key — Users are authent
Configuring SNMPPage 142• Authentication Key — Defines the HMAC-MD5-96 or HMAC-SHA-96 authentication level. The authentication and privacy keys are en
Configuring SNMPPage 143Defining SNMP ViewsThe SNMP views provide or block access to device features or portions of features. Feature access is grante
Configuring SNMPPage 144Figure 109:Add SNMP VIew Page3. Define the View Name field.4. Select the Subtree ID Tree using one of the following options:–
Configuring SNMPPage 145Defining Notification RecipientsThe SNMP Notify Page contains fields for defining SNMP notification recipients. the page conta
Configuring SNMPPage 146SNMPv1,2c Notification RecipientThe SNMP v1, v2c Recipient table contains the following fields:• Recipients IP — Displays the
Configuring SNMPPage 147Figure 111: Add Notify Page 3. Define the relevant fields.4. Click Apply. The notification recipient settings are saved and th
Configuring SNMPPage 148Figure 112:SNMP Notify Configuration Page3. Define the fields.4. Click Apply. The SNMP Notification configuration is modified,
Configuring SNMPPage 149Defining Notification FiltersThe SNMP Notification Filter Page permits filtering traps based on OIDs. Each OID is linked to a
Configuring SNMPPage 150To add an SNMP notification filter:1. Click the Add button. The Add SNMP Notification Filter Page opens:Figure 114:Add SNMP No
Getting StartedLogging OutPage 164. Define the fields. 5. Click Apply. The fields are modified, and the information is saved to the device. To delete
Configuring Power Over EthernetPage 151Section 12.Configuring Power Over EthernetThis section describes configuring Power over Ethernet (PoE) for an A
Configuring Power Over EthernetPage 152Figure 115:Power Over Ethernet Page The Power Over Ethernet Page contains the following fields:Global PoE Confi
Configuring Power Over EthernetPage 153Defining Power Over Ethernet ConfigurationTo modify PoE port settings: 1. In the Power Over Ethernet Page Zoom
Configuring Power Over EthernetPage 154– Fault — Indicates one of the following:– The powered device test has failed. For example, a port could not be
Configuring ServicesPage 155Section 13.Configuring ServicesThis section describes Quality of Service related configurations. QoS supports activating o
Configuring ServicesPage 156Enabling Class of Service (CoS)The CoS Page enables configuring the CoS ports or trunks on the device.To configure CoS por
Configuring ServicesPage 157• Select the interfaces displayed in the table.– Ports of Unit — Specifies the port and stacking member for which the CoS
Configuring ServicesPage 158Configuring CoS Queueing and SchedulingThe CoS Queuing & Scheduling Page provides fields for configuring CoS Priority
Configuring ServicesPage 159Mapping CoS Values to QueuesThe Configure CoS Page contains fields for classifying CoS settings to traffic queues.To set C
Configuring ServicesPage 160Mapping DSCP Values to QueuesThe Configure DSCP Page contains fields for classifying DSCP settings to traffic queues. For
Getting StartedResetting the DevicePage 17Resetting the DeviceThe Reset option enables resetting the device from a remote location. NoteSave all chang
Configuring ServicesPage 161The Configure DSCP Page contains the following fields:• Restore Defaults — Restores the device factory defaults for mappin
Configuring ServicesPage 162As a default the Bandwidth Page opens displaying the port options. The fields are identical when displaying the trunk CoS.
System UtilitiesPage 163Section 14.System UtilitiesThe configuration file structure involves the following configuration files:• Startup Configuration
System UtilitiesPage 164Restoring the Default Configurationin the System Utilities Page, the Reset to Factory Defaults function restores the Configura
System UtilitiesPage 165To reset the configuration file to defaults with reboot: 1. Check the Reboot Switch After Resetting to Defaults option.2. Sele
System UtilitiesPage 166• Destination File — Defines the type of file that the device creates. If the TFTP Operation is Firmware, the possible values
System UtilitiesPage 167Viewing Integrated Cable TestsThe Cable Test Page contains fields for performing tests on copper cables. Cable testing provide
System UtilitiesPage 168• Cable Length — Indicates the approximate cable length. This test can only be performed when the port is up and operating at
System UtilitiesPage 169Viewing Optical TransceiversThe Optical Transceivers Page allows network managers to perform tests on Fiber Optic cables. Opti
System UtilitiesPage 170Resetting the DeviceThe Reset page enables the user to reset the system. Save all changes to the Running Configuration file be
Defining System InformationPage 18Section 2. Defining System InformationThe System General Page contains general device information, including system
Viewing StatisticsViewing Device StatisticsPage 171Section 15.Viewing StatisticsThe device provides statistics for RMON, interfaces, and Etherlike. Th
Viewing StatisticsViewing Device StatisticsPage 172The Interface Statistics Page contains the following fields:• Select the interfaces displayed in th
Viewing StatisticsViewing Device StatisticsPage 173Viewing Etherlike Statistics The Etherlike Statistics Page displays interface statistics. To view E
Viewing StatisticsViewing Device StatisticsPage 174• Excessive Collisions — Displays the number of excessive collisions received on the selected inter
Viewing StatisticsManaging RMON StatisticsPage 175Managing RMON StatisticsThis section contains the following topics: • Viewing RMON Statistics• Confi
Viewing StatisticsManaging RMON StatisticsPage 176• Refresh Rate — Defines the frequency of the RMON statistics updates. The possible field values are
Viewing StatisticsManaging RMON StatisticsPage 177Configuring RMON HistoryThe RMON History Page contains information about samples of data taken from
Viewing StatisticsManaging RMON StatisticsPage 1782. Click Add. The Add RMON History Page opens:Figure 134:Add RMON History PageIn addition to the RMO
Viewing StatisticsManaging RMON StatisticsPage 179Viewing the RMON History TableThe RMON History Table Page contains interface specific statistical ne
Viewing StatisticsManaging RMON StatisticsPage 180• CRC Align Errors — Displays the number of CRC and Align errors that have occurred on the interface
Defining System InformationPage 19• Default Gateway — The IP address of a router for remote management of the device. The address must be entered in t
Viewing StatisticsManaging RMON StatisticsPage 181Configuring RMON EventsThe RMON Events Page contains fields for defining, modifying and viewing RMON
Viewing StatisticsManaging RMON StatisticsPage 182Figure 138:Add RMON Events Page3. Define the Community, Description, Type and Owner fields.4. Click
Viewing StatisticsManaging RMON StatisticsPage 183Viewing the RMON Events LogsThe RMON Events Logs Page contains interface specific statistical networ
Viewing StatisticsManaging RMON StatisticsPage 184Defining RMON Alarms The RMON Alarm Page contains fields for setting network alarms. Network alarms
Viewing StatisticsManaging RMON StatisticsPage 185• Rising Event — Displays the event that triggers the specific alarm. The possible field values are
Viewing StatisticsManaging RMON StatisticsPage 186Figure 143:Alarm Configuration Page3. Define the fields.4. Click Apply. The RMON alarm is saved, and
Managing StackingStacking OverviewPage 187Section 16.Managing StackingThis section describes the stacking control management and includes the followin
Managing StackingStacking OverviewPage 188Stacking Chain TopologyIn a chain topology, there are two units that have only one neighbor. Every unit has
Managing StackingStacking OverviewPage 189Each port in the stack has a specific Unit ID, port type, and port number, which are part of both the config
Managing StackingConfiguring Stacking ManagementPage 190Configuring Stacking ManagementThe Stacking Page allows network managers to either reset the e
Configuring System TimePage 20Section 3. Configuring System TimeThe System Time Page provides information for configuring system time parameters, incl
Downloading Software with CLIConnecting a TerminalPage 191Appendix A. Downloading Software with CLIThis section describes how to download system files
Downloading Software with CLIInitial ConfigurationPage 192Initial ConfigurationBefore a device can download system software, the device must have an i
Downloading Software with CLIDownloading SoftwarePage 193To check the configuration, enter the command “show ip interface” as illustrated in the follo
Downloading Software with CLIDownloading SoftwarePage 1942. Enter the copy command to download the boot file.3. Enter the “bootvar” command to determi
Downloading Software with CLIDownloading SoftwarePage 1955. Enter the “copy” command to download the system file.6. Reboot the device. The device boot
Downloading Software with CLIDownloading SoftwarePage 196Stacking Member Software DownloadEnsure the stack has been correctly connected as described i
Downloading Software with CLIDownloading SoftwarePage 1975. Enter the “copy” command to download the system file.6. Reboot the devices being updated.
System DefaultsPage 197Appendix B. System DefaultsThis section contains the system defaults, and includes the following topics:• RS-232 Port Settings•
System DefaultsRS-232 Port SettingsPage 198RS-232 Port SettingsThe following table contains the RS-232 port setting defaults: Port DefaultsThe followi
System DefaultsConfiguration DefaultsPage 199Configuration DefaultsThe following are the initial device configuration defaults: Security DefaultsThe f
Allied Telesis AT-8000S Web Browser Interface User’s Guide
Configuring System TimePage 21The Clock Source and System Time sections of the System Time Page contain the following fields:• Clock Source — The sour
System DefaultsSpanning Tree DefaultsPage 200Spanning Tree DefaultsThe following are the spanning tree defaults:Address Table DefaultsThe following th
System DefaultsTrunking DefaultsPage 201Trunking DefaultsThe following are the trunking defaults:Multicast DefaultsThe following are the Multicast def
IndexPage 202IndexSymbols802.1x port access 51AAbsolute 186Access level 45access profiles 27rules 31ACE 57ACL 57, 68ACL Binding 68Alarms 186Alert 107A
IndexPage 203GGARP VLAN Registration Protocol (GVRP) 102Guest VLAN 51GVRP 103configuration 102HHost 105HTTP 29, 38IIGMPv1 and 2 128IGMPv3 128Informati
IndexPage 204SSamples 179Scheduling 160Secure HTTP 29, 38Secure Telnet 29, 37security802.1x port access 51server based authentication methods 39server
Configuring System TimePage 22Broadcast Time InformationBroadcast information is used when the server IP address is unknown. When a broadcast message
Configuring System TimePage 23• From — Indicates the time that DST begins in countries other than the USA and Europe, in the format Day/Month/Year in
Configuring System TimePage 24• Belgium — From the last weekend of March until the last weekend of October.• Brazil — From the third Sunday in October
Configuring System TimePage 25• Spain — From the last weekend of March until the last weekend of October. • Sweden — From the last weekend of March un
Configuring Device SecurityPage 26Section 4. Configuring Device SecurityThis section describes setting security parameters for ports, device managemen
Configuring Device SecurityConfiguring Management SecurityPage 27Configuring Management SecurityThis section provides information for configuring devi
Configuring Device SecurityConfiguring Management SecurityPage 28Figure 10: Access Profile PageThe Access Profile Page contains a table listing the cu
Configuring Device SecurityConfiguring Management SecurityPage 29Figure 11: Add Access Profile PageThe Add Access Profile Page contains the following
Configuring Device SecurityConfiguring Management SecurityPage 30• Action — Defines the action attached to the access rule. The possible field values
Table of ContentsPage 3 Table of ContentsPreface...
Configuring Device SecurityConfiguring Management SecurityPage 31Defining Profile RulesAccess profiles can contain up to 128 rules that determine whic
Configuring Device SecurityConfiguring Management SecurityPage 32• Management Method — Defines the management method for which the rule is defined. Us
Configuring Device SecurityConfiguring Management SecurityPage 33To modify an access rule:1. Click Mgmt. Security > Profile Rules: The Profile Rule
Configuring Device SecurityConfiguring Management SecurityPage 34Defining Authentication ProfilesAuthentication profiles allow network administrators
Configuring Device SecurityConfiguring Management SecurityPage 35– RADIUS — Authenticates the user at the RADIUS server. For more information, see Def
Configuring Device SecurityConfiguring Management SecurityPage 364. Enter the Profile Name.5. Using the arrows, move the method(s) from the Optional M
Configuring Device SecurityConfiguring Management SecurityPage 37Mapping Authentication ProfilesAfter authentication profiles are defined, they can be
Configuring Device SecurityConfiguring Management SecurityPage 38• Secure HTTP — Indicates that authentication methods are used for secure HTTP access
Configuring Device SecurityConfiguring Server Based AuthenticationPage 39Configuring Server Based AuthenticationNetwork administrators assign authenti
Configuring Device SecurityConfiguring Server Based AuthenticationPage 40The TACACS+ Page contains the following fields:• Timeout for Reply — Defines
Table of ContentsPage 4 Configuring DHCP Snooping ... 70D
Configuring Device SecurityConfiguring Server Based AuthenticationPage 41To modify TACACS+ server settings:1. Click Mgmt. Protocols > TACACS+. The
Configuring Device SecurityConfiguring Server Based AuthenticationPage 42Configuring RADIUSRemote Authorization Dial-In User Service (RADIUS) servers
Configuring Device SecurityConfiguring Server Based AuthenticationPage 43• Authentication Port — Identifies the authentication port. The authenticatio
Configuring Device SecurityConfiguring Server Based AuthenticationPage 44Figure 24: RADIUS Configuration Page3. Define the relevant fields.4. Click Ap
Configuring Device SecurityConfiguring Server Based AuthenticationPage 45Configuring Local UsersNetwork administrators can define users, passwords, an
Configuring Device SecurityConfiguring Server Based AuthenticationPage 46Figure 26: Add Local User PageIn addition to the fields in the Local Users Pa
Configuring Device SecurityConfiguring Server Based AuthenticationPage 47Defining Line PasswordsNetwork administrators can define line passwords in th
Configuring Device SecurityConfiguring Network SecurityPage 48Configuring Network SecurityNetwork security manages locked ports.Port-based authenticat
Configuring Device SecurityConfiguring Network SecurityPage 49Figure 29: Port Security PageThe Port Security Page displays the Zoom View of the select
Configuring Device SecurityConfiguring Network SecurityPage 50Figure 30: Port Security Configuration PageThe Port Security Configuration Page contains
Table of ContentsPage 5 Configuring SNMP ...
Configuring Device SecurityConfiguring Network SecurityPage 51Defining 802.1x Port AccessThe 802.1x Port Access Page allows enabling port access globa
Configuring Device SecurityConfiguring Network SecurityPage 52The 802.1x Port Access Page also displays the Zoom View of the selected stacking member’
Configuring Device SecurityConfiguring Network SecurityPage 53The Port Authentication Settings Page contains the following port authentication paramet
Configuring Device SecurityConfiguring Network SecurityPage 542. Click Apply. The port authentication configuration is saved and the device is updated
Configuring Device SecurityConfiguring Network SecurityPage 55Enabling Storm ControlStorm control limits the amount of unknown Unicast, Multicast and
Configuring Device SecurityConfiguring Network SecurityPage 56The Storm Control Page displays the Zoom View of the selected stacking member’s (defined
Configuring Device SecurityDefining Access ControlPage 57Defining Access ControlAccess Control Lists (ACL) allow network managers to define classifica
Configuring Device SecurityDefining Access ControlPage 58The MAC Based ACL Page contains the following fields:• ACL Name — Displays the specific MAC b
Configuring Device SecurityDefining Access ControlPage 59Figure 36: Add MAC Based ACL Page3. In the ACL Name field, type a name for the ACL.4. Enable
Configuring Device SecurityDefining Access ControlPage 60Figure 37: Add MAC Based ACE Page3. Define the fields.4. Click Apply. The MAC Based ACE rule
Table of ContentsPage 6 Downloading Software with CLI... 191Con
Configuring Device SecurityDefining Access ControlPage 613. Define the fields.4. Click Apply. The MAC Based ACL configuration is defined, and the devi
Configuring Device SecurityDefining Access ControlPage 62Defining IP Based ACLThe IP Based ACL Page contains information for defining IP Based ACLs, i
Configuring Device SecurityDefining Access ControlPage 63– TCP — Transmission Control Protocol (TCP). Enables two hosts to communicate and exchange da
Configuring Device SecurityDefining Access ControlPage 64• Destination– IP Address — Matches the destination port IP address to which packets are addr
Configuring Device SecurityDefining Access ControlPage 65Figure 40: Add IP Based ACL PageIn addition to the IP Based ACL Page, the Add IP Based ACL Pa
Configuring Device SecurityDefining Access ControlPage 66Adding ACE Rules1. Click Network Security > IP Based ACL. The IP Based ACL Page opens.2. C
Configuring Device SecurityDefining Access ControlPage 67Figure 42: IP Based ACL Configuration Page3. Define the fields.4. Click Apply. The IP Based A
Configuring Device SecurityDefining Access ControlPage 68Defining ACL BindingWhen an ACL is bound to an interface, all the ACE rules that have been de
Configuring Device SecurityDefining Access ControlPage 69Figure 44: ACL Binding ConfigurationThe ACL Binding Configuration contains the following fiel
Configuring DHCP SnoopingPage 70Section 5. Configuring DHCP SnoopingDHCP Snooping expands network security by providing an extra layer of security bet
PrefaceWeb Browser Interface User’s Guide OverviewPage 7PrefaceThis guide contains instructions on how to configure an AT-8000S Series Layer 2+ Gigabi
Configuring DHCP SnoopingPage 71Figure 45: DHCP Snooping General PageThe DHCP Snooping General Page contains the following fields:• Enable DHCP Snoopi
Configuring DHCP SnoopingPage 72• DHCP Option 82 Insertion — DHCP Option 82 attaches authentication messages to the packets sent to DHCP Server via TC
Configuring DHCP SnoopingPage 73Defining Trusted InterfacesThe Trusted Interfaces Page allows network manager to define Trusted interfaces. Trusted in
Configuring DHCP SnoopingPage 742. From the global Interface field, define the specific port or trunk.3. In the table, select an interface and click M
Configuring DHCP SnoopingPage 75Binding Addresses to the DHCP Snooping DatabaseThe Binding Database Page contains parameters for querying and adding I
Configuring DHCP SnoopingPage 76Query ResultsThe Query Results table contains the following fields:• MAC Address — Indicates the MAC address found dur
Configuring PortsSetting Ports ConfigurationsPage 77Section 6. Configuring PortsPort Configuration includes the following procedures for configuring p
Configuring PortsSetting Ports ConfigurationsPage 78The Port Settings Page contains the Zoom View of the device ports. The possible port settings are:
Configuring PortsSetting Ports ConfigurationsPage 79The Port Setting Configuration Page contains the following fields:• Port— Lists the names of confi
Configuring PortsSetting Ports ConfigurationsPage 80• Admin Advertisement — Defines the auto negotiation setting the port advertises. The possible fie
PrefaceIntended AudiencePage 8• Section 16, “Managing Stacking” — Provides information for stacking, including a stacking overview. • Appendix A, “Dow
Configuring PortsSetting Ports ConfigurationsPage 81Configuring Port MirroringPort mirroring monitors and mirrors network traffic by forwarding copies
Configuring PortsSetting Ports ConfigurationsPage 82• Status — Indicates if the port is currently monitored. The possible field values are:– Active —
Configuring PortsSetting Ports ConfigurationsPage 833. Define the Type field.4. Click Apply. The Port mirroring is modified, and the device is updated
Configuring PortsAggregating PortsPage 84Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a single
Configuring PortsAggregating PortsPage 85Figure 56: Trunk Settings PageThe Trunk Settings Page displays information about the currently defined trunks
Configuring PortsAggregating PortsPage 86• LACP — Indicates if LACP is enabled on the trunk. The possible values are:– Enable — LACP is enabled on the
Configuring PortsAggregating PortsPage 87• Current Status — Indicates whether the trunk is currently operational or non-operational. The possible fiel
Configuring PortsAggregating PortsPage 88• PVE — Enables a port to be a Private VLAN Edge (PVE) port. When a port is defined as PVE, it bypasses the F
Configuring PortsAggregating PortsPage 89Figure 59: Port Trunking Configuration PageIn addition to the fields in the The Port Trunking Page, the Port
Configuring PortsAggregating PortsPage 90Configuring LACPTrunk ports can contain different media types if the ports are operating at the same speed. A
Getting StartedStarting the ApplicationPage 10Section 1. Getting StartedThis section provides an introduction to the Web Browser Interface, and includ
Configuring PortsAggregating PortsPage 91Figure 61: LACP Configuration Page3. Define the fields.4. Click Apply. The LACP settings are saved and the de
Configuring InterfacesPage 92Section 7. Configuring InterfacesThis section contains information on configuring the interfaces of the device.This secti
Configuring InterfacesPage 93The MAC Address Page contains the following fields:• View Static — Displays the static addresses assigned to the ports on
Configuring InterfacesPage 94To delete all MAC addresses: 1. Click Layer 2 > MAC Address. The MAC Address Page opens.2. Click Delete in the Delete
Configuring InterfacesConfiguring VLANsPage 95Configuring VLANs This section describes how to create and configure Virtual LANs (VLANs).VLANs are logi
Configuring InterfacesConfiguring VLANsPage 96Defining VLAN PropertiesThe VLAN Page provides information and global parameters for configuring and wor
Configuring InterfacesConfiguring VLANsPage 97• Interface Status — Indicates the interface’s membership status in the VLAN. The possible field values
Configuring InterfacesConfiguring VLANsPage 98Defining VLAN Interface SettingsThe VLAN Interface Page contains fields for managing ports that are part
Configuring InterfacesConfiguring VLANsPage 99• PVID — Port Default VLAN ID. Assigns a VLAN ID to untagged packets. The possible values are 1-4094. VL
Configuring InterfacesConfiguring VLANsPage 100Defining GVRPThe GVRP Page enables users to configure GARP VLAN Registration Protocol (GVRP) on the dev
Commentaires sur ces manuels