Allied-telesis AT-S60 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Matériel informatique Allied-telesis AT-S60. Allied Telesis AT-S60 User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 858
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
AT-S60
Management
Software
AT-S60
User’s Guide
AT-8400 SERIES SWITCH
VERSION 2.1.0
®
PN 613-50400-00 Rev C
Vue de la page 0
1 2 3 4 5 6 ... 857 858

Résumé du contenu

Page 1 - User’s Guide

AT-S60Management SoftwareAT-S60◆User’s GuideAT-8400 SERIES SWITCHVERSION 2.1.0®PN 613-50400-00 Rev C

Page 2

Table of Contents10Chapter 25Secure Sockets Layer (SSL) ...

Page 3

Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 100Displaying an SNMPv1 and SNMPv2c CommunityUse the following procedure to displ

Page 4

Section I: Basic Features 101Chapter 6Port ParametersThe chapter contains procedures for viewing and changing the parameter settings for the individua

Page 5 - Section II

Chapter 6: Port ParametersSection I: Basic Features 102Displaying Port StatusThis section provides a procedure to display the status of a port. To dis

Page 6

AT-S60 Management Software User’s GuideSection I: Basic Features 103The information in this menu is for viewing purposes only. The columns in the menu

Page 7 - Section III

Chapter 6: Port ParametersSection I: Basic Features 104Disabled - Indicates the port has been manually disabled. The port is not able to send or recei

Page 8

AT-S60 Management Software User’s GuideSection I: Basic Features 105Enabled - Flow control occurs on both frames entering and leaving the port.Disable

Page 9 - Section V

Chapter 6: Port ParametersSection I: Basic Features 106Configuring Port ParametersTo configure the parameter settings for a port on the switch, perfor

Page 10 - Web Browser Management

AT-S60 Management Software User’s GuideSection I: Basic Features 1074. Adjust the port parameters as desired. You adjust a parameter by typing its num

Page 11

Chapter 6: Port ParametersSection I: Basic Features 108High Priority - Indicates high priority has been assigned to the port. All ingress tagged and u

Page 12 - Table of Contents

AT-S60 Management Software User’s GuideSection I: Basic Features 109Disabled - Indicates that no flow control occurs on the port.Enabled - Indicates t

Page 13

AT-S60 Management Software User’s Guide11Chapter 30Basic Switch Parameters ...

Page 14

Chapter 6: Port ParametersSection I: Basic Features 1109 - Duplex:Use this selection to configure the duplex mode of the port. See Table 2 for duplex

Page 15 - List of Figures

AT-S60 Management Software User’s GuideSection I: Basic Features 111NoteMDI/X applies only to copper ports, not fiber ports.B - Media SelectionUse thi

Page 16

Chapter 6: Port ParametersSection I: Basic Features 112Displaying Port StatisticsTo display Ethernet port statistics, perform the following procedure:

Page 17

AT-S60 Management Software User’s GuideSection I: Basic Features 113The Display Port Statistics Menu is shown in Figure 30. Figure 30 Display Port St

Page 18

Chapter 6: Port ParametersSection I: Basic Features 114Total Bytes ReceivedNumber of bytes received by the port.JabberNumber of occurrences of corrupt

Page 19

Section I: Basic Features 115Chapter 7MAC Address TableThis chapter provides an overview of MAC addresses. In addition, it describes the procedures fo

Page 20

Chapter 7: MAC Address TableSection I: Basic Features 116MAC Address OverviewEvery hardware device that you connect to your network has a unique MAC a

Page 21

AT-S60 Management Software User’s GuideSection I: Basic Features 117The type of MAC address described above is referred to as a dynamic MAC address. D

Page 22 - How This Guide is Organized

Chapter 7: MAC Address TableSection I: Basic Features 118Displaying MAC AddressesThe management software has menu selections for displaying all or par

Page 23

AT-S60 Management Software User’s GuideSection I: Basic Features 1193. Select the desired option. Each option is described below:1 - Display All MAC A

Page 24 - Document Conventions

Table of Contents12Chapter 37Event Log ...

Page 25

Chapter 7: MAC Address TableSection I: Basic Features 1202 - Display All static MAC AddressesThis option displays only the static MAC addresses. The c

Page 26 - Contacting Allied Telesyn

AT-S60 Management Software User’s GuideSection I: Basic Features 1216 - Display Multicast MAC AddressesThis selection displays the multicast MAC addre

Page 27 - AT-S60 Overview

Chapter 7: MAC Address TableSection I: Basic Features 122Adding Static Unicast and Multicast MAC AddressesThis section contains the procedure for addi

Page 28

AT-S60 Management Software User’s GuideSection I: Basic Features 123The following prompt is displayed:Please enter MAC address ->4. Enter the stati

Page 29 - Local Management Session

Chapter 7: MAC Address TableSection I: Basic Features 124Deleting MAC AddressesThis section contains the procedure for deleting static and dynamic uni

Page 30 - Telnet Management Session

AT-S60 Management Software User’s GuideSection I: Basic Features 125b. Type Y for yes to delete the dynamic MAC addresses or N for no to cancel the pr

Page 31

Chapter 7: MAC Address TableSection I: Basic Features 126Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addresse

Page 32 - SNMP Management Session

Section I: Basic Features 127Chapter 8Port TrunkingThis chapter describes port trunking and contains the procedures for creating, deleting, and modify

Page 33 - Management Access Levels

Chapter 8: Port TrunkingSection I: Basic Features 128Port Trunking OverviewPort trunking is an economical way for you to increase the bandwidth betwee

Page 34 - Specifying Ports

AT-S60 Management Software User’s GuideSection I: Basic Features 129The example in Figure 36 illustrates a 10/100 port trunk with 8 data links between

Page 35 - Specifying Time and Date

AT-S60 Management Software User’s Guide13Modifying a Target Parameters Table Entry ...

Page 36 - Basic Features

Chapter 8: Port TrunkingSection I: Basic Features 130❑ For 10/100 port trunks, such as those on an AT-8411 TX line card, all ports included in the tru

Page 37 - AT-S80 User’s Guide

AT-S60 Management Software User’s GuideSection I: Basic Features 131Before CreatingPort TrunksAs mentioned in the above guidelines for creating port t

Page 38 - Management Session

Chapter 8: Port TrunkingSection I: Basic Features 132Creating a Port TrunkThis section contains the procedure for creating a port trunk on the switch.

Page 39

AT-S60 Management Software User’s GuideSection I: Basic Features 1333. Type 1 to select Create Trunk.The following prompt is displayed.Enter Trunk Nam

Page 40 - Management

Chapter 8: Port TrunkingSection I: Basic Features 134Deleting a Port TrunkUse this procedure to delete an existing port trunk, including the trunk ID,

Page 41 - Section I: Basic Features 41

AT-S60 Management Software User’s GuideSection I: Basic Features 135Modifying a Port TrunkUse this procedure to modify an existing port trunk. See the

Page 42 - Local Session

Chapter 8: Port TrunkingSection I: Basic Features 136The Modify Trunk menu is shown in Figure 38. Notice the two current port trunks, called highschoo

Page 43

AT-S60 Management Software User’s GuideSection I: Basic Features 137Changing theName of thePort TrunkUse this procedure to change the name of an port

Page 44 - Section I: Basic Features 44

Chapter 8: Port TrunkingSection I: Basic Features 1382. From the Port Menu, type 4 to select Port Trunking.The Trunk Configuration menu is shown in Fi

Page 45 - Basic Switch Parameters

AT-S60 Management Software User’s GuideSection I: Basic Features 139Deleting Portsfrom a PortTrunkUse this procedure to delete ports from an existing

Page 46 - Section I: Basic Features 46

Table of Contents14Enabling Port-Based Access Control ...

Page 47 - Address?

Chapter 8: Port TrunkingSection I: Basic Features 140Replacing Portsin a TrunkUse this procedure to overwrite, or replace, the current ports in a port

Page 48 - Section I: Basic Features 48

AT-S60 Management Software User’s GuideSection I: Basic Features 141Clearing Portsin a Port TrunkUse this procedure to clear, or delete, all of the cu

Page 49 - Section I: Basic Features 49

Section I: Basic Features 142Chapter 9Port MirroringThis chapter describes port mirroring and provides the procedures for creating and deleting a port

Page 50 - Section I: Basic Features 50

AT-S60 Management Software User’s GuideSection I: Basic Features 143Port Mirroring OverviewThe port mirroring feature allows you to monitor the traffi

Page 51 - Information

Chapter 9: Port MirroringSection I: Basic Features 144Creating a Port MirrorUse the following procedure to create a port mirror. For information about

Page 52 - Section I: Basic Features 52

AT-S60 Management Software User’s GuideSection I: Basic Features 145NoteYou cannot assign a range of ports on the same line card as source mirror port

Page 53 - Card Statistics

Chapter 9: Port MirroringSection I: Basic Features 146Modifying a Source Port MirrorUse the following procedure to add, delete, set (overwrite), or cl

Page 54 - Clearing Line

AT-S60 Management Software User’s GuideSection I: Basic Features 147The following prompt appears:Enter Source Port(s) [port-list]:6. Enter the source

Page 55

Chapter 9: Port MirroringSection I: Basic Features 148Deleting a Destination Port MirrorTo delete a destination port mirror and its source mirror port

Page 56 - Statistics

AT-S60 Management Software User’s GuideSection I: Basic Features 149Enabling a Destination Port MirrorUse this procedure if you have previously disabl

Page 57 - Section I: Basic Features 57

15List of FiguresFigure 1: Main Menu ...

Page 58 - Section I: Basic Features 58

Chapter 9: Port MirroringSection I: Basic Features 150Disabling a Destination Port MirrorUse this procedure to prevent traffic from the source mirror

Page 59

151Section IIAdvanced FeaturesThe chapters in Section II explain how to manage the advanced features on an AT-8400 switch from a local or Telnet manag

Page 60 - Section I: Basic Features 60

Section II: Advanced Features 152Chapter 10File System ConfigurationThe chapter describes the file system operations you can perform on configuration

Page 61 - Section I: Basic Features 61

AT-S60 Management Software User’s GuideSection II: Advanced Features 153File System Configuration OverviewThe File System Menus allow you to choose th

Page 62 - Disabled) ->

Chapter 10: File System Configuration154File NamingConventionsThe file subsystem provides a flat file system which means directories are not supported

Page 63 - Rebooting a Switch

AT-S60 Management Software User’s GuideSection II: Advanced Features 155Using Wildcards to Specify Groups of FilesYou can use the asterisk character (

Page 64 - Section I: Basic Features 64

Chapter 10: File System Configuration156Setting, Creating, Editing, and Displaying System Configuration FilesUse the procedures in this section to loa

Page 65 - Passwords

AT-S60 Management Software User’s GuideSection II: Advanced Features 157The File Menu is shown in Figure 41.Figure 41 File Menu2. Type 1 to select Bo

Page 66

Chapter 10: File System Configuration158Creating aSystemConfigurationFileThis procedure allows you to save your system configuration to a file on the

Page 67 - Section I: Basic Features 67

AT-S60 Management Software User’s GuideSection II: Advanced Features 159Editing aSystemConfigurationFileYou can edit a system configuration file on yo

Page 68 - Hardware

List of Figures16Figure 38: Modify Trunk Menu ...

Page 69

Chapter 10: File System Configuration160The View Configuration File Menu is shown in Figure 42.Figure 42 View Configuration File Menu (page 1)3. Pres

Page 70 - Section I: Basic Features 70

AT-S60 Management Software User’s GuideSection II: Advanced Features 161The second page of the View Configuration File Menu is shown in Figure 43.Figu

Page 71

Chapter 10: File System Configuration162Copying and Renaming System FilesUse this procedure to copy and rename system files that reside on the switch.

Page 72 - Section I: Basic Features 72

AT-S60 Management Software User’s GuideSection II: Advanced Features 163Deleting System FilesUse this procedure to delete a system file. You can delet

Page 73 - Init Done!

Chapter 10: File System Configuration1642. From the File Menu, type 8 to select Delete file to delete a system file.The following prompt is displayed:

Page 74 - Section I: Basic Features 74

AT-S60 Management Software User’s GuideSection II: Advanced Features 165Displaying System FilesUse this procedure to display a list of current system

Page 75

Chapter 10: File System Configuration166The Display File(s) Menu is shown in Figure 44.Figure 44 Display File(s) MenuThe format of the Display File(s

Page 76 - Enhanced Stacking Overview

Section II: Advanced Features 167Chapter 11File Downloads and UploadsThis chapter contains procedures for downloading and uploading files to a switch,

Page 77 - Section I: Basic Features 77

Chapter 11: File Downloads and UploadsSection II: Advanced Features 168OverviewDownloading and uploading are useful system features that make switch m

Page 78 - IP Address

AT-S60 Management Software User’s GuideSection II: Advanced Features 169contains the factory default settings. For more information, refer to Appendix

Page 79 - Section I: Basic Features 79

AT-S60 Management Software User’s Guide17Figure 93: CIST Menu ...

Page 80

Chapter 11: File Downloads and UploadsSection II: Advanced Features 170The final section, Downloading the AT-S60 Image Switch to Switch on page 201, c

Page 81 - Section I: Basic Features 81

AT-S60 Management Software User’s GuideSection II: Advanced Features 171Obtaining Management Software UpdatesNew releases of management software for o

Page 82 - Section I: Basic Features 82

Chapter 11: File Downloads and UploadsSection II: Advanced Features 172Downloading FilesThis section contains the procedures for downloading files ont

Page 83 - Returning to

AT-S60 Management Software User’s GuideSection II: Advanced Features 173Downloadingan Image FileUsing Xmodemor TFTPThe following procedures describe h

Page 84 - SNMPv1 and SNMPv2c

Chapter 11: File Downloads and UploadsSection II: Advanced Features 174NoteMenu options 2 and 4 in the menu are described in Uploading Files on page 1

Page 85 - SNMP Overview

AT-S60 Management Software User’s GuideSection II: Advanced Features 175Downloading an Image File Using XmodemTo download an image file using Xmodem (

Page 86 - SNMP Protocol

Chapter 11: File Downloads and UploadsSection II: Advanced Features 1765. Click on the Protocol field and select as the transfer protocol either Xmode

Page 87 - Section I: Basic Features 87

AT-S60 Management Software User’s GuideSection II: Advanced Features 177The Downloads & Uploads Menu is displayed, as shown in Figure 46 on page 1

Page 88 - Communities

Chapter 11: File Downloads and UploadsSection II: Advanced Features 178Downloading an Image File Using TFTPTo download a file using TFTP, perform the

Page 89 - Enter SNMP Community Name:

AT-S60 Management Software User’s GuideSection II: Advanced Features 1795. If the new image file differs from the existing one, the following message

Page 90 - Enter Trap Receiver IP Addr:

List of Figures18Figure 148: GIP Connected Ports Ring Menu ...

Page 91

Chapter 11: File Downloads and UploadsSection II: Advanced Features 180Downloading aFile UsingXmodem orTFTPThe following procedures describe how to do

Page 92 - Attributes

AT-S60 Management Software User’s GuideSection II: Advanced Features 181The Downloads & Uploads menu is shown in Figure 50.Figure 50 Downloads &a

Page 93

Chapter 11: File Downloads and UploadsSection II: Advanced Features 182Downloading a File Using XmodemTo download certificate, certificate enrollment

Page 94

AT-S60 Management Software User’s GuideSection II: Advanced Features 183The Send File window is shown in Figure 52. Figure 52 Send File WindowNoteThe

Page 95 - [Yes/No]->

Chapter 11: File Downloads and UploadsSection II: Advanced Features 1847. Click Send.The file immediately begins to download onto the switch. The Xmod

Page 96 - (Y/N): [Yes/No]->

AT-S60 Management Software User’s GuideSection II: Advanced Features 185Downloading a File Using TFTPTo download a certificate, certificate enrollment

Page 97

Chapter 11: File Downloads and UploadsSection II: Advanced Features 186Press any key. The Downloads & Uploads Menu is displayed, as shown in Figur

Page 98

AT-S60 Management Software User’s GuideSection II: Advanced Features 187Uploading FilesThis section contains procedures for uploading the following fi

Page 99

Chapter 11: File Downloads and UploadsSection II: Advanced Features 188Uploading anImage FileUsing Xmodemor TFTPThe following procedures describe how

Page 100 - Section I: Basic Features 100

AT-S60 Management Software User’s GuideSection II: Advanced Features 1894. Type 2 to upload the AT-S60 software image from the switch.If you are using

Page 101 - Port Parameters

AT-S60 Management Software User’s Guide19Figure 203: System Maintenance Tab ...

Page 102 - Displaying Port Status

Chapter 11: File Downloads and UploadsSection II: Advanced Features 190Uploading an Image File Using Xmodem To upload an image file using Xmodem (this

Page 103 - Section I: Basic Features 103

AT-S60 Management Software User’s GuideSection II: Advanced Features 1915. Click on the Protocol field and select as the transfer protocol either Xmod

Page 104 - Section I: Basic Features 104

Chapter 11: File Downloads and UploadsSection II: Advanced Features 192The file immediately begins to upload onto the system. The Xmodem File Receive

Page 105 - Section I: Basic Features 105

AT-S60 Management Software User’s GuideSection II: Advanced Features 193Uploading an Image File Using TFTPTo upload an image file using TFTP, perform

Page 106 - Configuring Port Parameters

Chapter 11: File Downloads and UploadsSection II: Advanced Features 194Uploading a FileUsing Xmodemor TFTPThe following procedures describe how to upl

Page 107 - Section I: Basic Features 107

AT-S60 Management Software User’s GuideSection II: Advanced Features 1954. Type 2 to upload the AT-S60 software image from the switch.If you are using

Page 108 - Section I: Basic Features 108

Chapter 11: File Downloads and UploadsSection II: Advanced Features 196Uploading a File Using Xmodem To upload a file using Xmodem (this procedure sho

Page 109 - Section I: Basic Features 109

AT-S60 Management Software User’s GuideSection II: Advanced Features 1974. In the HyperTerminal main window, select the Transfer menu. Then select Rec

Page 110 - Section I: Basic Features 110

Chapter 11: File Downloads and UploadsSection II: Advanced Features 1988. Enter a name for storing the uploaded file.This will be the name for the fil

Page 111 - Section I: Basic Features 111

AT-S60 Management Software User’s GuideSection II: Advanced Features 199Uploading a File Using TFTPTo upload a file using TFTP, perform the following

Page 112 - Displaying Port Statistics

Copyright © 2005 Allied Telesyn, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied

Page 113 - Section I: Basic Features 113

List of Figures20Figure 258: SNMPv3 Target Address Table Page ...

Page 114 - Section I: Basic Features 114

Chapter 11: File Downloads and UploadsSection II: Advanced Features 200NoteThe file name must already exist on the switch.NoteIf you receive the follo

Page 115 - MAC Address Table

AT-S60 Management Software User’s GuideSection II: Advanced Features 201Downloading the AT-S60 Image Switch to SwitchThis procedure explains how to do

Page 116 - MAC Address Overview

Chapter 11: File Downloads and UploadsSection II: Advanced Features 202NoteYou can update only AT-8400 Series switches. You cannot download AT-S60 man

Page 117 - Section I: Basic Features 117

203Chapter 12Event LogThis chapter describes the event log. Sections in the chapter include:❑ Event Log Overview on page 204❑ Configuring the Event Lo

Page 118 - Displaying MAC Addresses

Chapter 12: Event LogSection II: Advanced Features 204Event Log OverviewA managed switch is a complex piece of computer equipment that includes both h

Page 119 - High School Switch 142

AT-S60 Management Software User’s GuideSection II: Advanced Features 205Configuring the Event LogTo enable or disable the event log and specify what t

Page 120 - Please enter MAC address:

Chapter 12: Event LogSection II: Advanced Features 206HaltOnce the event log reaches its maximum capacity, this option causes the log to stop adding n

Page 121 - Section I: Basic Features 121

AT-S60 Management Software User’s GuideSection II: Advanced Features 207Displaying EventsTo specify the types of events you want to display in the eve

Page 122 - Return to Previous Menu

Chapter 12: Event LogSection II: Advanced Features 2085. Choose one or more of the following selections:The default is to display informational events

Page 123 - XXXXXX XXXXXX

AT-S60 Management Software User’s GuideSection II: Advanced Features 209An example of an event log is show in Figure 65. This log is in the Full displ

Page 124 - Deleting MAC Addresses

21PrefaceThis guide contains instructions on how to configure an AT-8400 Series Switch using the AT-S60 management software. The Preface contains the

Page 125 - Section I: Basic Features 125

Chapter 12: Event LogSection II: Advanced Features 210❑ Date - The date the event occurred.❑ Time - The time the event occurred.❑ Event - The module w

Page 126 - Changing the Aging Time

AT-S60 Management Software User’s GuideSection II: Advanced Features 211PSEC Port security (MAC address-based)PTRUNK Port trunkingRADIUS RADIUS authen

Page 127 - Port Trunking

Chapter 12: Event LogSection II: Advanced Features 212Saving the Event LogTo save the current contents of the event log as a file in the file system,

Page 128 - Port Trunking Overview

AT-S60 Management Software User’s GuideSection II: Advanced Features 213Clearing the Event LogTo clear all events from the log, perform the following

Page 129 - Guidelines

Section II: Advanced Features 214Chapter 13Class of Service (CoS)This chapter contains the procedures for configuring Class of Service (CoS). Sections

Page 130 - Section I: Basic Features 130

AT-S60 Management Software User’s GuideSection II: Advanced Features 215Class of Service OverviewWhen a port on an Ethernet switch becomes oversubscri

Page 131 - Distribution

Chapter 13: Class of ServiceSection II: Advanced Features 216Each switch port has two egress queues, low and high. When a tagged frame enters a switch

Page 132 - Creating a Port Trunk

AT-S60 Management Software User’s GuideSection II: Advanced Features 217Configuring CoSTo configure CoS for a port, perform the following procedure:1.

Page 133 - New ID = 1

Section II: Advanced Features 218Chapter 14IGMP SnoopingThis chapter provides a description of the Internet Group Management Protocol (IGMP) snooping

Page 134 - Deleting a Port Trunk

AT-S60 Management Software User’s GuideSection II: Advanced Features 219IGMP Snooping OverviewIGMP enables routers to create lists of nodes that are m

Page 135 - Modifying a Port Trunk

Preface22How This Guide is OrganizedThis manual is divided into the following six sections:❑ Section I: Basic Features❑ Section II: Advanced Features❑

Page 136 - Section I: Basic Features 136

Chapter 14: IGMP SnoopingSection II: Advanced Features 220IGMP snooping enables the Fast Ethernet switch to monitor the flow of queries from a router

Page 137 - Enter new trunk name:

AT-S60 Management Software User’s GuideSection II: Advanced Features 221Configuring IGMP SnoopingTo configure, enable, or disable IGMP snooping on the

Page 138 - Enter ports to add to trunk:

Chapter 14: IGMP SnoopingSection II: Advanced Features 222Options 1 through 5 are described below:1 - IGMP Snooping StatusEnables and disables IGMP sn

Page 139 - Deleting Ports

AT-S60 Management Software User’s GuideSection II: Advanced Features 223This parameter is useful with networks that contain a large number of multicas

Page 140 - Replacing Ports

Chapter 14: IGMP SnoopingSection II: Advanced Features 224Displaying a List of Host NodesThis procedure displays a list of the multicast groups on a s

Page 141 - Clearing Ports

AT-S60 Management Software User’s GuideSection II: Advanced Features 225StatusThe status of the host node. The status can be either Active, meaning th

Page 142 - Port Mirroring

Chapter 14: IGMP SnoopingSection II: Advanced Features 226Displaying a List of Multicast RoutersA multicast router is a router that is receiving multi

Page 143 - Port Mirroring Overview

AT-S60 Management Software User’s GuideSection II: Advanced Features 227RouterIPThe IP address of the multicast router.If you enter the multicast rout

Page 144 - Creating a Port Mirror

Section II: Advanced Features 228Chapter 15STP and RSTPThis chapter provides background information on the Spanning Tree Protocol (STP) and Rapid Span

Page 145 - Section I: Basic Features 145

AT-S60 Management Software User’s GuideSection II: Advanced Features 229STP and RSTP OverviewA physical loop in a network topology can pose a signific

Page 146 - Section I: Basic Features 146

AT-S60 Management Software User’s Guide23Section V: Security FeaturesThe chapters in this section describe how to configure the authentication and adv

Page 147 - Section I: Basic Features 147

Chapter 15: STP and RSTPSection II: Advanced Features 230NoteSpanning tree is disabled by default on the switch.NoteFor information about Multiple Spa

Page 148 - Enter Destination Port:

AT-S60 Management Software User’s GuideSection II: Advanced Features 231Path Costs and Port CostsOnce the Root Bridge has been selected, the bridges m

Page 149 - Section I: Basic Features 149

Chapter 15: STP and RSTPSection II: Advanced Features 232The port costs of the ports on an AT-8400 Series switch can be adjusted through the managemen

Page 150 - Section I: Basic Features 150

AT-S60 Management Software User’s GuideSection II: Advanced Features 233The range for port priority is 0 to 240 in increments of 16. Just as with the

Page 151 - Advanced Features

Chapter 15: STP and RSTPSection II: Advanced Features 234The forwarding delay value is adjustable on the AT-8400 Series switch through the management

Page 152 - File System Configuration

AT-S60 Management Software User’s GuideSection II: Advanced Features 235There are two possible selections:❑ Point-to-point❑ Edge portIf a bridge port

Page 153

Chapter 15: STP and RSTPSection II: Advanced Features 236If a port is operating in half-duplex mode and is not connected to any further bridges partic

Page 154 - Conventions

AT-S60 Management Software User’s GuideSection II: Advanced Features 237A port can be both point-to-point and edge at the same time. It would operate

Page 155

Chapter 15: STP and RSTPSection II: Advanced Features 238The single spanning tree encompasses all ports on the switch. If the ports are grouped into d

Page 156 - Configuration Files

AT-S60 Management Software User’s GuideSection II: Advanced Features 239Another approach is to connect your VLANs with tagged ports instead of untagge

Page 157

Preface24Document ConventionsThis document uses the following conventions:WarningWarnings inform you that performing or omitting a specific action may

Page 158 - Configuration

Chapter 15: STP and RSTPSection II: Advanced Features 240Enabling or Disabling STP and RSTPThe AT-8400 Series switch can support STP, RSTP, and MSTP.

Page 159

AT-S60 Management Software User’s GuideSection II: Advanced Features 241The following prompt is displayed:Enter new value (S-STP, R-RSTP, M-MSTP):4. T

Page 160 - Configuration File Menu

Chapter 15: STP and RSTPSection II: Advanced Features 242Configuring STPThis section contains the following procedures:❑ Configuring STP Bridge Settin

Page 161 - Figure 43

AT-S60 Management Software User’s GuideSection II: Advanced Features 243The STP Menu is shown in Figure 75.Figure 75 STP Menu3. Adjust the bridge STP

Page 162 - Renaming please wait

Chapter 15: STP and RSTPSection II: Advanced Features 2443 - Bridge ForwardingThe waiting period in seconds before a bridge changes to a new state, fo

Page 163 - Deleting System Files

AT-S60 Management Software User’s GuideSection II: Advanced Features 245Configuring STPPort ParametersTo adjust a port’s STP parameters, perform the f

Page 164 - Deleting file...please wait

Chapter 15: STP and RSTPSection II: Advanced Features 246The STP Port Configuration menu is shown in Figure 77.Figure 77 Configure STP Port Settings

Page 165 - Displaying System Files

AT-S60 Management Software User’s GuideSection II: Advanced Features 247Displaying STPPort SettingsTo display port STP settings, perform the following

Page 166

Chapter 15: STP and RSTPSection II: Advanced Features 248Configuring RSTPThis section contains the following procedures: ❑ Configuring RSTP Bridge Set

Page 167 - File Downloads and Uploads

AT-S60 Management Software User’s GuideSection II: Advanced Features 249The RSTP Menu is shown in Figure 79.Figure 79 RSTP Menu3. Adjust the paramete

Page 168 - Overview

AT-S60 Management Software User’s Guide25Where to Find Web-based GuidesThe installation and user guides for all Allied Telesyn products are available

Page 169

Chapter 15: STP and RSTPSection II: Advanced Features 2503 - Bridge Hello TimeThe time interval, in seconds, between generating and sending configurat

Page 170

AT-S60 Management Software User’s GuideSection II: Advanced Features 2518 - Root PriorityIndicates the bridge priority value on the root bridge. The b

Page 171

Chapter 15: STP and RSTPSection II: Advanced Features 252ConfiguringRSTP PortParametersTo adjust a port’s RSTP parameters, perform the following proce

Page 172 - Downloading Files

AT-S60 Management Software User’s GuideSection II: Advanced Features 253The Configure RSTP Port Settings Menu is shown in Figure 81.Figure 81 Configu

Page 173 - Using Xmodem

Chapter 15: STP and RSTPSection II: Advanced Features 254C - Check Migration To RSTP on Selected Ports (MCHECK)This parameter resets a RSTP port, allo

Page 174 - TFTP server IP address:

AT-S60 Management Software User’s GuideSection II: Advanced Features 255The Display RSTP Port Configuration Menu is shown in Figure 78.Figure 82 Disp

Page 175

Chapter 15: STP and RSTPSection II: Advanced Features 256The Display RSTP Port State Menu is shown in Figure 78.Figure 83 Display RSTP Port StateThis

Page 176 - Press any key to continue

Section II: Advanced Features 257Chapter 16Multiple Spanning Tree Protocol (MSTP)This chapter provides background information on the Multiple Spanning

Page 177 - [Yes/No]

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 258MSTP OverviewAs mentioned in Chapter 15, STP and RSTP on page 228, STP and RSTP are

Page 178

AT-S60 Management Software User’s GuideSection II: Advanced Features 259NoteDue to different vendor implementations of the new IEEE 802.1s standard, c

Page 179

Preface26Contacting Allied Telesyn This section provides Allied Telesyn contact information for technical support as well as sales and corporate infor

Page 180 - Xmodem or

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 260If the switches were running STP or RSTP, one of the links would be blocked because

Page 181

AT-S60 Management Software User’s GuideSection II: Advanced Features 261Figure 85 illustrates the same two AT-8400 Series switches and the same two vi

Page 182 - Local file name:

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 262A MSTI can contain more than one VLAN. This is illustrated in Figure 86 where there

Page 183

AT-S60 Management Software User’s GuideSection II: Advanced Features 263This example illustrates Allied Telesyn’s implementation of MSTP. It shows tha

Page 184

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 264A configuration name is a name you assign to a region to help you identify it. You

Page 185 - Remote File Name:

AT-S60 Management Software User’s GuideSection II: Advanced Features 265Figure 87 illustrates the concept of regions. It shows one MSTP region consist

Page 186 - File successfully sent!

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 266The AT-8400 Series switch determines regional boundaries by examining the MSTP BPDU

Page 187 - Uploading Files

AT-S60 Management Software User’s GuideSection II: Advanced Features 267❑ Each MSTI must have a regional root for locating loops in the instance. MSTI

Page 188 - Image File

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 268MSTP with STP and RSTPMSTP is fully compatible with STP and RSTP. If a port on an A

Page 189

AT-S60 Management Software User’s GuideSection II: Advanced Features 269❑ All of the bridges in a region must have the same configuration name, revisi

Page 190

27Chapter 1AT-S60 OverviewThis chapter describes the AT-S60 software functions, the types of sessions you can use to access the software, and the mana

Page 191

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 270This is shown in Figure 88. Port 8 on a line card in Switch A is a member of a VLAN

Page 192

AT-S60 Management Software User’s GuideSection II: Advanced Features 271A problem can arise if you assign some VLANs to MSTIs while leaving others ass

Page 193 - TFTP Server IP address:

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 272This is illustrated in Figure 90. The example shows two switches, each residing in

Page 194 - Uploading a File

AT-S60 Management Software User’s GuideSection II: Advanced Features 273Here is an example. Let’s assume that you have two regions that contain the fo

Page 195

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 274Configuring MSTPThis section contains the following procedures:❑ Enabling or Disabl

Page 196

AT-S60 Management Software User’s GuideSection II: Advanced Features 275The Spanning Tree Menu is shown in Figure 91.Figure 91 Spanning Tree MenuNote

Page 197

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 2765. Type Y for yes or N for no. The switch reboots and if you select Yes, the select

Page 198

AT-S60 Management Software User’s GuideSection II: Advanced Features 277ConfiguringMSTP BridgeSettingsThis section contains the procedure for configur

Page 199

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 2782 - Hello TimeThe time interval between generating and sending configuration messag

Page 200

AT-S60 Management Software User’s GuideSection II: Advanced Features 279revision level must be the same on all bridges in a region. Different regions

Page 201

Chapter 1: AT-S60 Overview28OverviewThe AT-S60 management software is intended for the AT-8400 Series switch. The software is used to monitor and adju

Page 202

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 280more bridges have the same bridge or CIST priority values, the bridge with the nume

Page 203 - Event Log

AT-S60 Management Software User’s GuideSection II: Advanced Features 281The MSTI Menu is shown in Figure 94.Figure 94 MSTI MenuThe fields in the tabl

Page 204 - Event Log Overview

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 2825. Enter the new MSTP ID. The MSTI IDs range is from 1 to 15. You can specify only

Page 205 - Configuring the Event Log

AT-S60 Management Software User’s GuideSection II: Advanced Features 283Modifying an MSTI IDTo change the MSTI priority value for an MSTI, do the foll

Page 206 - Chapter 12: Event Log

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 284Adding or Removing a VLAN from an MSTI IDThis procedure explains how to associate V

Page 207 - Displaying Events

AT-S60 Management Software User’s GuideSection II: Advanced Features 285The VLAN-MSTI Association Menu is shown in Figure 95.Figure 95 VLAN-MSTI Asso

Page 208

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 286Associating a VLAN to an MSTI IDTo associate a VLAN to an MSTP ID, do the following

Page 209

AT-S60 Management Software User’s GuideSection II: Advanced Features 2874. From the VLAN-MSTI Association Menu, type 2 to select Delete VLANs from MST

Page 210 - Software

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 288You can enter more than one VLAN at a time (for example, 2,4,7) (To view VIDs, refe

Page 211

AT-S60 Management Software User’s GuideSection II: Advanced Features 289The Configure MSTP Port Settings menu is shown in Figure 97.Figure 97 Configu

Page 212 - Saving the Event Log

AT-S60 Management Software User’s Guide29The following sections in this chapter briefly describe each type of management session. In addition, the fol

Page 213 - Clearing the Event Log

Chapter 16: Multiple Spanning TreeSection II: Advanced Features 2905 - Edge PortThis parameter defines whether the port is functioning as an edge port

Page 214 - Class of Service (CoS)

AT-S60 Management Software User’s GuideSection II: Advanced Features 2915. To display MSTP port state information, type 3 to select Display MSTP Port

Page 215 - Class of Service Overview

292Section IIISNMPv3 ProtocolThere is one chapter in this section that describes the SNMPv3 Protocol. This chapter explains how to configure an AT-840

Page 216 - Chapter 13: Class of Service

293Chapter 17SNMPv3 ConfigurationThis chapter provides a description of the AT-S60 implementation of the SNMPv3 protocol. In addition, it provides pro

Page 217 - Configuring CoS

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 294SNMPv3 OverviewThe SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c protocol

Page 218 - IGMP Snooping

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 295With the SNMPv3 protocol, you create users, determine the protocol used for mes

Page 219 - IGMP Snooping Overview

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 296SNMPv3 PrivacyProtocolAfter you have configured an authentication protocol, you have t

Page 220 - Chapter 14: IGMP Snooping

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 297The AT-S60 software supports the MIB tree, starting with the Internet MIBs, as

Page 221 - Configuring IGMP Snooping

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 298To determine the destination of the message, you configure the IP address of the host.

Page 222

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 299First, you create a user in the Configure SNMPv3 User Table. Then you define th

Page 223

3Table of ContentsList of Figures ...

Page 224

Chapter 1: AT-S60 Overview30Telnet Management SessionAny management workstation on your network that has the Telnet application protocol can be used t

Page 225

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 300You start the message notification configuration by defining the type of message you w

Page 226

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 301❑ SNMPv3 Target Parameters Table on page 302❑ SNMPv3 Community Table on page 30

Page 227 - RouterIP

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 302SNMPv3 SecurityToGroup TableThe Configure SNMPv3 SecurityToGroup Table Menu allows you

Page 228 - STP and RSTP

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 303SNMPv3 Community TableThe Configure SNMPv3 Community Table Menu allows you to c

Page 229 - STP and RSTP Overview

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 304Configuring the SNMPv3 ProtocolThis section describes how to configure the SNMPv3 prot

Page 230 - Bridge Priority

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 305Configuring the SNMPv3 User TableThis section contains a description of the SNM

Page 231

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 306The Configure SNMPv3 Table Menu is shown in Figure 101.Figure 101 Configure SNMPv3 Ta

Page 232 - Chapter 15: STP and RSTP

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 307The Configure SNMPv3 User Table Menu is shown in Figure 102.Figure 102 Configu

Page 233

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 308protocol after a message is received. This algorithm generates the message digest. The

Page 234

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 309You are prompted to re-enter the password.The following prompt is displayed:Ent

Page 235 - Modular Switch System

AT-S60 Management Software User’s Guide31Web Browser Management SessionYou can also use a web browser to manage a switch. Using a web browser manageme

Page 236 - Edge Port

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 310The following prompt is displayed:Enter User (Security) Name:4. Enter the User Name of

Page 237 - Spanning Tree

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 311The Modify SNMPv3 User Table is shown in Figure 103. Figure 103 Modify SNMPv3

Page 238

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 312message digest. The user is authenticated when the authentication protocol checks the

Page 239

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3132. From the Configure SNMPv3 Table Menu, type 2 to select Configure SNMPv3 User

Page 240

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 314Modifying the Storage TypeTo modify the Storage Type in an SNMPv3 User Table entry, pe

Page 241

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 315Configuring the SNMPv3 View TableThis section contains a description of the SNM

Page 242 - Configuring STP

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 316The Configure SNMPv3 View Table Menu is shown in Figure 104.Figure 104 Configure SNMP

Page 243

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3175. Enter subtree that this view will or will not be permitted to display.You ca

Page 244

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3188. Select one of the following storage types for this table entry:V - VolatileSelect t

Page 245

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 319The following prompt is displayed:Enter View Subtree (OID format/Text Name):5.

Page 246

Chapter 1: AT-S60 Overview32SNMP Management SessionAnother way to remotely manage the switch is with an SNMP management program. AT-S60 software suppo

Page 247 - Port Settings

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 320The Modify SNMPv3 View Table Menu is shown in Figure 105.Figure 105 Modify SNMPv3 Vie

Page 248 - Configuring RSTP

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 321This is an optional parameter that is used to further refine the value in the V

Page 249

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 322The text format is for TCP/IP is:tcpThe following prompt is displayed:Enter View Type

Page 250

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3236. Enter the View Subtree for this View Name.The following prompt is displayed:

Page 251

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 324Configuring the SNMPv3 Access TableThis section contains a description of the SNMPv3 A

Page 252 - Parameters

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 325The Configure SNMPv3 Access Table Menu is shown in Figure 106.Figure 106 Confi

Page 253

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 326NoteThe Context Prefix and the Context Match fields are a read only fields. The Contex

Page 254 - Displaying

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 327greatest level of security. You can select this value if you configured the Sec

Page 255

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 328NoteThe Row Status parameter is a read-only field in the Telnet and Local interfaces.

Page 256

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 329Deleting anSNMPv3 AccessTable EntryYou may want to delete an entry from the SNM

Page 257 - Chapter 16

AT-S60 Management Software User’s Guide33Management Access LevelsThere are two levels of management access on an AT-8400 switch: Manager and Operator.

Page 258 - MSTP Overview

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3306. Enter the Security Level of this Group Name.Select one of the following Security Le

Page 259 - Instance (MSTI)

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 331Configure the values of the Read View Name, Write View Name, and Notify View Na

Page 260 - AT-8400 SERIES

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 332The Modify SNMPv3 Access Table is shown in Figure 107.Figure 107 Modify SNMPv3 Access

Page 261

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 333The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthN

Page 262

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 334Modifying the Write View Name To modify the Write View Name parameter in an SNMPv3 Acc

Page 263 - Associations

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 335The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthN

Page 264

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 336Modifying the Notify View NameTo modify the Notify View Name parameter in an SNMPv3 Ac

Page 265

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 337The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthN

Page 266

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 338Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Access Tab

Page 267

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3397. Enter the Security Level configured for this Group Name. You cannot change t

Page 268 - Summary of

Chapter 1: AT-S60 Overview34Specifying PortsMany of the commands and parameters, in this manual involve specifying the port(s) on the switch. Port num

Page 269

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 340Configuring the SNMPv3 SecurityToGroup TableThis section contains a description of the

Page 270

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 341The Configure SNMPv3 SecurityToGroup Table Menu is shown in Figure 108.Figure 1

Page 271

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3423-v3Select this value to associate the Group Name with the SNMPv3 protocol. The follow

Page 272

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 343Deleting anSNMPv3SecurityToGroupTable EntryYou may want to delete an entry from

Page 273

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 344The following prompt is displayed:Do you want to delete this table entry? (Y/N): [Yes/

Page 274 - Configuring MSTP

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 345The Modify SecurityToGroup Table is displayed as shown Figure 108.Figure 109 M

Page 275

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3463-v3Select this value to associate the User Name with the SNMPv3 protocol. The followi

Page 276

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 347Select one of the following SNMP protocols:1-v1Select this value if this User N

Page 277 - Settings

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 348Configuring the SNMPv3 Notify TableThis section contains a description of the SNMPv3 N

Page 278

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 349The Configure SNMPv3 Notify Table Menu is shown in Figure 110.Figure 110 Confi

Page 279 - CIST Priority

AT-S60 Management Software User’s Guide35Specifying Time and DateThe Simple Network Time Protocol (SNTP) feature places the time and date on the local

Page 280 - Modifying MSTI

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 350I-InformIndicates this notify table is used to send inform messages. With this message

Page 281

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 351NoteTo display a Group Name and its associated parameters from the Configure SN

Page 282 - Enter the list of VLANs:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 352The Modify SNMPv3 Notify Table Menu is displayed as shown in Figure 111.Figure 111 Mo

Page 283 - VLANs to MSTI

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 353Modifying a Notify TypeTo modify the Notify Type parameter in an SNMPv3 Notify

Page 284

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 354Modifying a Storage TypeTo modify the Storage Type parameter in an SNMPv3 Notify Table

Page 285

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 355Configuring the SNMPv3 Target Address TableThis section contains a description

Page 286

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 356Creating anSNMPv3 TargetAddress TableEntryTo create an entry in the Configure SNMPv3 T

Page 287

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3575. Enter the IP address of the host.Use the following format for an IP address:

Page 288 - MSTP Port

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 358This name can consist of up to 32-alphanumeric characters. The value configured here m

Page 289

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 359The Configure SNMPv3 Target Address Table Menu is shown in Figure 114 on page

Page 290 - Settings and

36Section IBasic FeaturesThe chapters in Section I explain how to manage an AT-8400 switch from a local or Telnet management session. It includes the

Page 291

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 360Modifying the Target IP AddressTo modify the target IP address in an SNMPv3 Target Add

Page 292 - SNMPv3 Protocol

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3614. To change the Target IP Address, type 1 to select Set Target IP Address.The

Page 293 - SNMPv3 Configuration

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 362This is the name of the SNMP manager, or host, that manages the SNMP activity on your

Page 294 - SNMPv3 Overview

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3636. Enter a timeout value in milliseconds.When an Inform message is generated, i

Page 295 - Protocols

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3646. Enter the number of times the switch will retry, or resend, the Inform message.The

Page 296 - SNMPv3 MIB

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 365Modifying the Target Parameters FieldTo modify the Target Parameters field in a

Page 297 - Notification

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 366Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Target Add

Page 298

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3677. After making changes, type R until you return to the Main Menu. Then type S

Page 299 - SNMPv3 Access Table

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 368Configuring the SNMPv3 Target Parameters TableThis section contains a description of t

Page 300

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 369There are three functions you can perform with the Configure SNMPv3 Target Para

Page 301

AT-S80 User’s Guide37

Page 302

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3703. To create an SNMPv3 Target Parameters Table, type 1 to select Create SNMPv3 Table E

Page 303

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3717. Select one of the following Security Levels:NoteThe value you configure for

Page 304

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 372entry with a NonVolatile storage type, the S - Save Configuration Changes option appea

Page 305 - Table Entry

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3735. Enter Y to delete the SNMPv3 Target Address Table entry or N to save it.6. A

Page 306

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 374NoteYou cannot modify an entry in the SNMPv3 Target Parameter Table that contains a va

Page 307

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 375The Modify SNMPv3 Target Parameters Table Menu is shown in Figure 115.Figure 11

Page 308 - Enter Privacy Password:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 376Modifying the Security ModelFor the Security or User Name you have selected, the value

Page 309 - Deleting an

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3772-v2cSelect this value if this User Name is associated with the SNMPv2c protoco

Page 310 - Modifying an

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 378Select one of the following Security Levels:NoteThe value you configure for the Securi

Page 311

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 379The Configure SNMPv3 Table Menu is shown in Figure 101 on page 306.2. From the

Page 312

Section I: Basic Features 38Chapter 2Starting a Local or Telnet Management SessionThis chapter contains the procedure for starting a local or Telnet m

Page 313 - Enter User (Security) Name:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 380Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Target Par

Page 314

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 381Configuring the SNMPv3 Community TableThis section contains a description of th

Page 315 - SNMPv3 View

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 382For each SNMPv3 Community Table entry, you can configure the following parameters:❑ Co

Page 316

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 383The Configure SNMPv3 Community Table Menu is shown in Figure 116.Figure 116 Co

Page 317 - 1.3.6.1.2.1.6

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 384NoteAllied Telesyn recommends that you select SNMP Community Names carefully to ensure

Page 318

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 385NoteThe Row Status parameter is a read-only field in the Telnet and Local inter

Page 319

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 386Modifying anSNMPv3CommunityTable EntryFor each entry in the SNMPv3 Community Table, yo

Page 320

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 387The Modify SNMPv3 Community Table Menu is shown in Figure 117.Figure 117 Modif

Page 321 - Enter View Name:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3887. After making changes, type R until you return to the Main Menu. Then type S to sele

Page 322

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 389The Configure SNMPv3 Table Menu is displayed as shown in Figure 101 on page 30

Page 323

AT-S60 Management Software User’s GuideSection I: Basic Features 39Local Management SessionTo establish a local management session using the AT-S60 ma

Page 324 - SNMPv3 Access

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 390The following prompt is displayed:Enter Community Index:5. Enter the Community Index o

Page 325

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 391Displaying SNMPv3 Table MenusThe procedures in this section describe how to dis

Page 326 - P-AuthPriv]:

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 392The Display SNMPv3 Table Menu is shown in Figure 118.Figure 118 Display SNMPv3 Table

Page 327 - Enter Notify View Name:

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 393Displaying theDisplay SNMPv3View TableMenuThis section describes how to display

Page 328

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 394Displaying theDisplay SNMPv3Access TableMenuThis section describes how to display the

Page 329

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 395Displaying theDisplay SNMPv3SecurityToGroupTable MenuThis section describes how

Page 330

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 396Displaying theDisplay SNMPv3Notify TableMenuThis section describes how to display the

Page 331

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 397Displaying theDisplay SNMPv3Target AddressTable MenuThis section describes how

Page 332

Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 398Displaying theDisplay SNMPv3TargetParametersTable MenuThis section describes how to di

Page 333

AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 399Displaying theDisplay SNMPv3CommunityTable MenuThis section describes how to di

Page 334 - Enter Group Name:

Table of Contents4Chapter 3Basic Switch Parameters ...

Page 335

Chapter 2: Starting a Local or Telnet Mangement SessionSection I: Basic Features 40Starting a LocalManagementSessionTo start a local management sessio

Page 336

400Section IVVLANsThe chapters in Section IV explain how to configure VLANs on an AT-8400 switch using a local or Telnet management session. The chapt

Page 337

Section IV: VLANs 401 Chapter 18Tagged and Port-based Virtual LANsThis chapter contains basic information about virtual LANs (VLANs). It also contains

Page 338

Chapter 18: Virtual LANsSection IV: VLANs 402VLAN OverviewA VLAN is a group of ports on an Ethernet switch that form a logical Ethernet segment. The p

Page 339

AT-S60 Management Software User’s GuideSection IV: VLANs 403workstations physically, or having to change group memberships by moving cables from one s

Page 340 - SecurityToGroup

Chapter 18: Virtual LANsSection IV: VLANs 404Port-based VLAN OverviewAs explained in the VLAN Overview section, a VLAN consists of a group of ports on

Page 341

AT-S60 Management Software User’s GuideSection IV: VLANs 405If a VLAN consists only of ports located on one physical switch in your network, you would

Page 342

Chapter 18: Virtual LANsSection IV: VLANs 406For example, assume that you were creating a port-based VLAN on a switch and you had assigned the VLAN th

Page 343

AT-S60 Management Software User’s GuideSection IV: VLANs 407❑ The introduction of a router into your network could create security issues from unautho

Page 344 - Table Entr

Chapter 18: Virtual LANsSection IV: VLANs 408Port-BasedExamplesWhat follows are two examples of port-based VLANs that illustrate the basic principles

Page 345

AT-S60 Management Software User’s GuideSection IV: VLANs 409The table below lists the port assignments for the Sales and Production VLANs on the AT-84

Page 346

AT-S60 Management Software User’s GuideSection I: Basic Features 41When prompted for the user name and password, enter one of the following options. ❑

Page 347

Chapter 18: Virtual LANsSection IV: VLANs 410Example 2Figure 128 illustrates our second port-based example. The two VLANs, Sales and Production, now s

Page 348 - SNMPv3 Notify

AT-S60 Management Software User’s GuideSection IV: VLANs 411The table below lists the port assignments for the Sales and Production VLANs on the switc

Page 349

Chapter 18: Virtual LANsSection IV: VLANs 412Tagged VLAN OverviewThe second type of VLAN supported by the AT-8400 Series switch is the tagged VLAN. Ta

Page 350

AT-S60 Management Software User’s GuideSection IV: VLANs 413The parts of a tagged VLAN are much the same as those for a port-based VLAN. They are:❑ VL

Page 351

Chapter 18: Virtual LANsSection IV: VLANs 414General Rulesfor Creating aTagged VLANBelow is a summary of the rules to observe when creating a tagged V

Page 352

AT-S60 Management Software User’s GuideSection IV: VLANs 415Tagged VLANExampleFigure 129 illustrates how tagged ports can be used to interconnect IEEE

Page 353 - Enter Notify Name:

Chapter 18: Virtual LANsSection IV: VLANs 416This example is nearly identical to the port-based VLAN Example 2 earlier in this chapter. Tagged ports h

Page 354

AT-S60 Management Software User’s GuideSection IV: VLANs 417Basic VLAN Mode OverviewThe Fast Ethernet Switches support a special VLAN configuration re

Page 355

Chapter 18: Virtual LANsSection IV: VLANs 418Displaying VLANsThe procedure in this section displays all the port-based and tagged VLANs on the AT-8400

Page 356 - Address Table

AT-S60 Management Software User’s GuideSection IV: VLANs 4193. From the Display VLAN Menu, type 3 to select Display Port Based VLAN.The Display Port B

Page 357

Chapter 2: Starting a Local or Telnet Mangement SessionSection I: Basic Features 42Please note the following:❑ The Command Line Interface selection in

Page 358

Chapter 18: Virtual LANsSection IV: VLANs 420If only the Protocol is GARP, then the corresponding tagged port in the menu was added by GVRP to an exis

Page 359

AT-S60 Management Software User’s GuideSection IV: VLANs 421Creating a Port-based or Tagged VLANTo create a new port-based or tagged VLAN, perform the

Page 360

Chapter 18: Virtual LANsSection IV: VLANs 4223. From the Configure VLAN menu, type 4 to select Configure Port-Based VLAN.The Configure Port Based VLAN

Page 361 - Enter IP Address:

AT-S60 Management Software User’s GuideSection IV: VLANs 423After you have entered a name, the following prompt is displayed:Enter VLAN VID: [2 to 409

Page 362

Chapter 18: Virtual LANsSection IV: VLANs 424If this VLAN does not contain any untagged ports, leave this field empty. For information on entering por

Page 363

AT-S60 Management Software User’s GuideSection IV: VLANs 425Example of Creating a Port-Based VLANThe following procedure creates the Sales VLAN illust

Page 364 - Enter Tag List:

Chapter 18: Virtual LANsSection IV: VLANs 426Example of Creating a Tagged VLANThe following procedure creates the Production VLAN in the AT-8400 Serie

Page 365 - Enter Target Parameters:

AT-S60 Management Software User’s GuideSection IV: VLANs 427Modifying a VLANThe section contains the procedure for adding or deleting ports from a tag

Page 366

Chapter 18: Virtual LANsSection IV: VLANs 428Each menu selection is explained below.1 - Add Ports to VLANTo add ports to a VLAN, do the following:a. T

Page 367

AT-S60 Management Software User’s GuideSection IV: VLANs 429c. If you want to remove one or more tagged ports from the VLAN, enter the ports at this p

Page 368

AT-S60 Management Software User’s GuideSection I: Basic Features 43Telnet Management SessionYou can use the Telnet application protocol from a worksta

Page 369

Chapter 18: Virtual LANsSection IV: VLANs 4304 - Clear Ports from VLANTo remove all ports from the VLAN, do the following:a. Type 4 to select Clear Po

Page 370 - Enter Target Parameters Name:

AT-S60 Management Software User’s GuideSection IV: VLANs 431Deleting a VLANTo delete a VLAN, perform the following procedure: 1. From the Configure Po

Page 371

Chapter 18: Virtual LANsSection IV: VLANs 432Setting a Switch’s VLAN ModeThis section contains the procedure for setting a switch’s VLAN mode. You can

Page 372

AT-S60 Management Software User’s GuideSection IV: VLANs 433Specifying a Management VLANThe management VLAN is the VLAN through which an AT-8400 Serie

Page 373

Chapter 18: Virtual LANsSection IV: VLANs 434Now let’s assume that you decided to create a VLAN called NMS with a VID of 24 for the sole purpose of re

Page 374

Section IV: VLANs 435Chapter 19Multiple VLAN ModesThis chapter explains the Multiple VLAN modes and how to select a mode. This chapter contains the fo

Page 375

Chapter 19: Multiple VLAN ModesSection IV: VLANs 436Multiple VLAN Mode OverviewThe Multiple VLAN modes simplify the task of configuring a switch in a

Page 376

AT-S60 Management Software User’s GuideSection IV: VLANs 437NoteThe Multiple VLAN modes are supported only in single switch (that is, an edge switch)

Page 377

Chapter 19: Multiple VLAN ModesSection IV: VLANs 438NoteIn 802.1Q Multiple VLAN mode, the device connected to the uplink port must be 802.1Q-compliant

Page 378

AT-S60 Management Software User’s GuideSection IV: VLANs 439CautionThe non-802.1Q-Compliant Multiple VLAN mode does not protect the switch from VLAN l

Page 379

Chapter 2: Starting a Local or Telnet Mangement SessionSection I: Basic Features 44Starting a TelnetManagementSessionTo start a Telnet management inte

Page 380

Chapter 19: Multiple VLAN ModesSection IV: VLANs 440Selecting a VLAN ModeThe following procedure explains how to select a VLAN mode on an AT-8400 Seri

Page 381

AT-S60 Management Software User’s GuideSection IV: VLANs 441The following confirmation is displayed:Setting VLAN mode to Multiple VLAN. Please wait...

Page 382 - Community

Chapter 19: Multiple VLAN ModesSection IV: VLANs 442Changing the Uplink PortOnce the switch is operating in a Multiple VLAN mode, you can always chang

Page 383

AT-S60 Management Software User’s GuideSection IV: VLANs 443Displaying VLAN InformationTo view the name, VID number, and member ports of the VLANs on

Page 384 - Enter Transport Tag:

Section IV: VLANs 444Chapter 20GARP VLAN Registration ProtocolThis chapter describes the GARP VLAN Registration Protocol (GVRP). It contains the follo

Page 385

AT-S60 Management Software User’s GuideSection IV: VLANs 445GARP VLAN Registration Protocol (GVRP) OverviewThe GARP VLAN Registration Protocol (GVRP)

Page 386

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 446Figure 137 provides an example of how GVRP works.Figure 137 GVRP Example Switches #1

Page 387

AT-S60 Management Software User’s GuideSection IV: VLANs 447it is not a member, it automatically adds the port to the VLAN as an tagged dynamic GVRP p

Page 388 - Enter Community Index:

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 448❑ You can convert dynamic GVRP VLANs and dynamic GVRP port assignments to static VLANs

Page 389

AT-S60 Management Software User’s GuideSection IV: VLANs 449GenericAttributeRegistrationProtocol (GARP)OverviewThe following is a technical overview o

Page 390

Section I: Basic Features 45Chapter 3Basic Switch ParametersThis chapter contains a variety of information about basic switch parameters and procedure

Page 391 - Displaying SNMPv3 Table Menus

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 450The architecture of GARP is shown in Figure 138. Figure 138 GARP Architecture The GAR

Page 392

AT-S60 Management Software User’s GuideSection IV: VLANs 451An instance of GID consists of the set of state machines that define the current registrat

Page 393 - View Table

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 452The Applicant is therefore looking after the interests of all would-be Participants. T

Page 394 - Access Table

AT-S60 Management Software User’s GuideSection IV: VLANs 453Configuring GVRPUse the following procedure to configure GVRP. The timers in the following

Page 395

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 4546. Choose one of the following:E to enable GIP.D to disable GIP.NoteDo not disable GIP

Page 396 - Notify Table

AT-S60 Management Software User’s GuideSection IV: VLANs 455Enabling or Disabling GVRP on a PortThis procedure enables and disables GVRP on a switch p

Page 397 - Table Menu

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 4565. Enter a port or a list of ports. For information about how to specify ports, see Sp

Page 398

AT-S60 Management Software User’s GuideSection IV: VLANs 4579. After making changes, type R until you return to the Main Menu. Then type S to select S

Page 399

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 458Displaying GVRP Parameters and StatisticsTo display GVRP counters, database, state mac

Page 400 - Section IV

AT-S60 Management Software User’s GuideSection IV: VLANs 459GVRP Counters Option 1 - Display GVRP Counters in the Other GARP Port Parameters displays

Page 401 - Virtual LANs

Chapter 3: Basic Switch ParametersSection I: Basic Features 46Assigning an IP Address to a SwitchWhen building or expanding your network, you need to

Page 402 - VLAN Overview

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 460Figure 146 GVRP Counters Menu (page 2)The GVRP counters in the menus are defined in T

Page 403 - Section IV: VLANs 403

AT-S60 Management Software User’s GuideSection IV: VLANs 461Transmit Discarded: GARP DisabledNumber of GARP PDUs discarded because the GARP applicatio

Page 404 - Port-based VLAN Overview

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 462Transmit GARP Messages: JoinEmptyTotal number of GARP JoinEmpty messages transmitted f

Page 405 - Section IV: VLANs 405

AT-S60 Management Software User’s GuideSection IV: VLANs 463GVRP Database Option 2 - Display GVRP Database in the Other GARP Port Parameters displays

Page 406 - Section IV: VLANs 406

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 464GIP ConnectedPorts RingOption 3 - Display GIP Connected Ports Ring in the Other GARP P

Page 407 - Section IV: VLANs 407

AT-S60 Management Software User’s GuideSection IV: VLANs 465GVRP StateMachineOption 4 - Display GVRP State Machine in the Other GARP Port Parameters d

Page 408 - Examples

Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 466App Applicant state machine for the GID index on that particular port. One of:Normal P

Page 409 - Production VLAN

AT-S60 Management Software User’s GuideSection IV: VLANs 467App (Continued) Non-Participant Management state:“Von” Very Anxious Observer“Aon” Anxious

Page 410 - Example 2

468Section VSecurity FeaturesThe chapters in Section V explain how to configure an AT-8400 switch with security features. The chapters include:❑ Chapt

Page 411

Section V: Security Features 469Chapter 21Port SecurityThis chapter describes port security and provides the procedures for setting port security with

Page 412 - Tagged VLAN Overview

AT-S60 Management Software User’s GuideSection I: Basic Features 47How Do YouAssign an IPAddress?Once you have decided which, if any, switches on your

Page 413 - Section IV: VLANs 413

Chapter 21: Port SecuritySection V: Security Features 470Port Security OverviewThe port security feature can enhance the security of your network. You

Page 414 - Tagged VLAN

AT-S60 Management Software User’s GuideSection V: Security Features 471When the Limited security mode is activated on a port, all dynamic MAC addresse

Page 415

Chapter 21: Port SecuritySection V: Security Features 472SecurityViolations andIntrusionActionsWhen you set a port’s security level, you can also set

Page 416 - Section IV: VLANs 416

AT-S60 Management Software User’s GuideSection V: Security Features 473Configuring Port SecurityTo configure port security, do the following:To set a

Page 417 - Basic VLAN Mode Overview

Chapter 21: Port SecuritySection V: Security Features 4743. Type 1 to select Configure Port Security.The following prompt is shown:Enter port-list:4.

Page 418 - Displaying VLANs

AT-S60 Management Software User’s GuideSection V: Security Features 475If you selected one of the other security levels, several new menu options are

Page 419 - Section IV: VLANs 419

Chapter 21: Port SecuritySection V: Security Features 4769. If you selected the Limited security mode for the port, do the following to specify the ma

Page 420 - Section IV: VLANs 420

Section V: Security Features 477Chapter 22Web ServerThe chapter provides an overview of the web server feature. In addition, it describes how to confi

Page 421 - Section IV: VLANs 421

Chapter 22: Web ServerSection V: Security Features 478Web Server OverviewBy default, the switch is configured as a non-secure web server. The web serv

Page 422 - Port Based VLAN

AT-S60 Management Software User’s GuideSection V: Security Features 479Configuring the Web Server for Security FeaturesThis procedure allows you to en

Page 423 - Enter Untagged Port-list:

Chapter 3: Basic Switch ParametersSection I: Basic Features 48Configuring an IP Address and Switch NameThe procedure in this section explains how to m

Page 424 - Section IV: VLANs 424

Chapter 22: Web ServerSection V: Security Features 4805. Type 1 to select Status to enable or disable the web server. To configure the web server, you

Page 425 - Enter VID [2 to 4094]:

AT-S60 Management Software User’s GuideSection V: Security Features 481Configuring SSL CertificatesThe high-level configuration procedures included in

Page 426

Chapter 22: Web ServerSection V: Security Features 482WarningUsing this command creates a certificate that is only suitable for secure switch manageme

Page 427 - Modifying a VLAN

AT-S60 Management Software User’s GuideSection V: Security Features 4836. Use TFTP to upload an enrollment request.See Downloading Files on page 172.7

Page 428 - Section IV: VLANs 428

Section V: Security Features 484Chapter 23EncryptionThis chapter contains a description of encryption and procedures for creating keys for encryption

Page 429

AT-S60 Management Software User’s GuideSection V: Security Features 485Encryption OverviewThis chapter describes the data security services available

Page 430 - Section IV: VLANs 430

Chapter 23: EncryptionSection V: Security Features 486Data EncryptionData encryption for switches is driven by the need for organizations to keep sens

Page 431 - Deleting a VLAN

AT-S60 Management Software User’s GuideSection V: Security Features 487by a 64-bit Initialization Vector (IV). This is the DES mode used for the switc

Page 432 - Setting a Switch’s VLAN Mode

Chapter 23: EncryptionSection V: Security Features 488digital signature. The signature station publishes its public key, and then signs its messages b

Page 433 - Specifying a Management VLAN

AT-S60 Management Software User’s GuideSection V: Security Features 489Data AuthenticationData authentication for switches is driven by the need for o

Page 434 - Section IV: VLANs 434

AT-S60 Management Software User’s GuideSection I: Basic Features 492. Change the parameters as desired. The parameters in the Administrative Menu are

Page 435 - Multiple VLAN Modes

Chapter 23: EncryptionSection V: Security Features 490Key Exchange AlgorithmsKey exchange algorithms are used by switches to securely generate and exc

Page 436 - Multiple VLAN Mode Overview

AT-S60 Management Software User’s GuideSection V: Security Features 491Configuring Keys for EncryptionUse the following procedures to configure, modif

Page 437 - Multiple VLANs

Chapter 23: EncryptionSection V: Security Features 492The Keys/Certificate Configuration Menu is shown in Figure 156.Figure 156 Keys/Certificate Conf

Page 438 - Non-802.1Q

AT-S60 Management Software User’s GuideSection V: Security Features 493The Key Management Menu is shown in Figure 157.Figure 157 Key Management MenuN

Page 439 - Modes and the

Chapter 23: EncryptionSection V: Security Features 494The Create Key Menu is shown in Figure 158.Figure 158 Create Key MenuNoteOnce you have configur

Page 440 - Selecting a VLAN Mode

AT-S60 Management Software User’s GuideSection V: Security Features 49510. Type 4 to create a key description.The following prompt is displayed:Enter

Page 441 - The VLAN mode is changed

Chapter 23: EncryptionSection V: Security Features 4967. To delete a key, select 2 - Delete Key from the Key Management menu.The following message is

Page 442 - Changing the Uplink Port

AT-S60 Management Software User’s GuideSection V: Security Features 497Exporting Keys The following procedure allows you to export a key to a file. Wh

Page 443 - Displaying VLAN Information

Chapter 23: EncryptionSection V: Security Features 498NoteKey Type is a read-only field. You cannot change this value.7. To specify the format of the

Page 444 - Chapter 20

AT-S60 Management Software User’s GuideSection V: Security Features 499The Import Key From File Menu is shown in Figure 160.Figure 160 Import Key Fro

Page 445 - Section IV: VLANs 445

AT-S60 Management Software User’s Guide5Deleting MAC Addresses ...

Page 446 - Section IV: VLANs 446

Chapter 3: Basic Switch ParametersSection I: Basic Features 509 - Set Console Baud RateThis selection allows you set the baud rate of the serial port

Page 447 - Section IV: VLANs 447

Chapter 23: EncryptionSection V: Security Features 50010. Type 5 to select Import Key From File to import a key to the switch from an external file.Th

Page 448 - Section IV: VLANs 448

Section V: Security Features 501Chapter 24Public Key Infrastructure (PKI)This chapter describes the Public Key Infrastructure (PKI) feature and provid

Page 449 - Protocol (GARP)

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 502Public Key Infrastructure OverviewThis chapter describes the Public Key Inf

Page 450 - Section IV: VLANs 450

AT-S60 Management Software User’s GuideSection V: Security Features 503MessageEncryptionOne of the two main services provided by public key encryption

Page 451 - Section IV: VLANs 451

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 504An X.509 v3 certificate consists of:❑ A serial number, which distinguishes

Page 452 - Section IV: VLANs 452

AT-S60 Management Software User’s GuideSection V: Security Features 505Certification AuthoritiesA Certification Authority is an entity which issues, u

Page 453 - Configuring GVRP

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 506Root CA CertificatesA root CA must sign its own certificate. The root CA is

Page 454 - > 1000

AT-S60 Management Software User’s GuideSection V: Security Features 507PKI ImplementationThe following sections discuss Allied Telesyn’s implementatio

Page 455 - Section IV: VLANs 455

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 508Configuring CertificatesUse the procedures in this section to create a cert

Page 456 - Section IV: VLANs 456

AT-S60 Management Software User’s GuideSection V: Security Features 509The Public Key Infrastructure (PKI) Certification Menu is shown in Figure 161.F

Page 457 - Section IV: VLANs 457

AT-S60 Management Software User’s GuideSection I: Basic Features 51Displaying and Clearing Line Card InformationThis section describes how to display

Page 458 - Section IV: VLANs 458

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 510The X509 Certificate Management Menu is shown in Figure 162.Figure 162 X50

Page 459 - Section IV: VLANs 459

AT-S60 Management Software User’s GuideSection V: Security Features 511The Create Self-Signed Certificate Menu is shown in Figure 163.Figure 163 Crea

Page 460 - Section IV: VLANs 460

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 51210. Type 3 - Format to select the type of encoding format the certificate i

Page 461 - Section IV: VLANs 461

AT-S60 Management Software User’s GuideSection V: Security Features 513Country names are generally given in the form of the two-letter ISO 3166 code f

Page 462 - Section IV: VLANs 462

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 514The X509 Certificate Management Menu is shown in Figure 162 on page 510.5.

Page 463 - Section IV: VLANs 463

AT-S60 Management Software User’s GuideSection V: Security Features 515The filename is the Certificate Name with the *.cer extension. For example, if

Page 464 - Ports Ring

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 516The following message is displayed:Enter a certificate name ->8. Enter t

Page 465 - GVRP State

AT-S60 Management Software User’s GuideSection V: Security Features 51711. Type 4 - Modify Certificate to update your changes in the certificate datab

Page 466 - Section IV: VLANs 466

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 518ViewingCertificatesTo view the details of a certificate, perform the follow

Page 467 - Section IV: VLANs 467

AT-S60 Management Software User’s GuideSection V: Security Features 519The View Certificate Details Menu (page 1) is shown in Figure 166.Figure 166 V

Page 468 - Security Features

Chapter 3: Basic Switch ParametersSection I: Basic Features 52The Display Line Card Menu is shown in Figure 6.Figure 6 Display Line Card Menu3. From

Page 469 - Port Security

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 5207. The following fields are displayed:Name - lists the name of the certific

Page 470 - Port Security Overview

AT-S60 Management Software User’s GuideSection V: Security Features 521Generating Enrollment RequestsTo request a certificate from a Certificate Autho

Page 471

Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 5225. Type 1 - Request Name.The following message is displayed:Enter Enrollmen

Page 472 - Intrusion

Section V: Security Features 523Chapter 25Secure Sockets Layer (SSL)The chapter contains information about Secure Sockets Layer (SSL) as well as a pro

Page 473 - Configuring Port Security

Chapter 25: Secure Sockets Layer (SSL)Section V: Security Features 524Secure Sockets Layer OverviewThis chapter describes the Secure Sockets Layer (SS

Page 474 - Chapter 21: Port Security

AT-S60 Management Software User’s GuideSection V: Security Features 525SSL Encryption SSL uses encryption to ensure the security of data transmission.

Page 475

Chapter 25: Secure Sockets Layer (SSL)Section V: Security Features 526The Change Cipher Spec message informs the receiving party that all subsequent m

Page 476

AT-S60 Management Software User’s GuideSection V: Security Features 527SSL andEnhancedStackingSecure Sockets Layer (SSL) is supported in an enhanced s

Page 477 - Web Server

Chapter 25: Secure Sockets Layer (SSL)Section V: Security Features 528Configuring SSLThis section describes how to configure SSL. This procedure is pa

Page 478 - Web Server Overview

Section V: Security Features 529Chapter 26Secure Shell (SSH)The chapter contains overview information about the Secure Shell (SSH) protocol as well a

Page 479

AT-S60 Management Software User’s GuideSection I: Basic Features 53Displaying LineCard StatisticsTo display the current line card statistics, perform

Page 480 - Enter SSL Key ID ->

Chapter 26: Secure Shell (SSH)Section V: Security Features 530SSH OverviewThis chapter describes the Secure Shell (SSH) protocol, including:❑ Support

Page 481 - Configuring SSL Certificates

AT-S60 Management Software User’s GuideSection V: Security Features 531❑ RSA public keys with lengths of 512 to 1536 bits are supported. Keys are stor

Page 482 - Certificates

Chapter 26: Secure Shell (SSH)Section V: Security Features 532SSH Clients The SSH protocol provides a secure connection between the switch and SSH cli

Page 483

AT-S60 Management Software User’s GuideSection V: Security Features 533This is shown in Figure 170. The figure shows an SSH management workstation tha

Page 484 - Encryption

Chapter 26: Secure Shell (SSH)Section V: Security Features 534SSH Overall Configuration Configuring the SSH server requires you to perform several pro

Page 485 - Encryption Overview

AT-S60 Management Software User’s GuideSection V: Security Features 535Configuring SSHThis section describes how to configure the switch as an SSH ser

Page 486 - Data Encryption

Chapter 26: Secure Shell (SSH)Section V: Security Features 536The Secure Shell (SSH) Menu is shown in Figure 171.Figure 171 Secure Shell (SSH) Menu3.

Page 487 - (Public Key)

AT-S60 Management Software User’s GuideSection V: Security Features 537This timer determines how often the server key is regenerated. Naturally, a ser

Page 488 - Chapter 23: Encryption

Chapter 26: Secure Shell (SSH)Section V: Security Features 538Displaying SSH InformationTo display SSH server information, perform the following proce

Page 489 - Data Authentication

AT-S60 Management Software User’s GuideSection V: Security Features 539❑ Server Port: Indicates the well-known port for SSH. The default is port 22.❑

Page 490 - Key Exchange Algorithms

Chapter 3: Basic Switch ParametersSection I: Basic Features 54Clearing LineCard StatisticsTo clear the current line card statistics, perform the follo

Page 491 - Name and Keys

Section V: Security Features 540Chapter 27TACACS+ and RADIUS ProtocolsThis chapter explains how you can use the two authentication protocols TACACS+ a

Page 492

AT-S60 Management Software User’s GuideSection V: Security Features 541TACACS+ and RADIUS OverviewThe AT-S60 software has two standard management logi

Page 493

Chapter 27: TACACS+ and RADIUS ProtocolsSection V: Security Features 542Authorization defines what a user can do once logged in to a switch. You assig

Page 494

AT-S60 Management Software User’s GuideSection V: Security Features 543NoteThis manual does not explain how to configure TACACS+ or RADIUS server soft

Page 495 - Deleting Keys

Chapter 27: TACACS+ and RADIUS ProtocolsSection V: Security Features 544Enabling TACACS+ or RADIUSTo enable or disable the server-based authentication

Page 496

AT-S60 Management Software User’s GuideSection V: Security Features 545Configuring TACACS+To configure TACACS+, perform the following procedure:1. Fro

Page 497

Chapter 27: TACACS+ and RADIUS ProtocolsSection V: Security Features 546However, if you are specifying only one TACACS+ server or if the servers have

Page 498

AT-S60 Management Software User’s GuideSection V: Security Features 547Configuring RADIUSTo configure RADIUS, perform the following procedure:1. From

Page 499

Chapter 27: TACACS+ and RADIUS ProtocolsSection V: Security Features 548the server cannot respond. If the timeout expires and the server hasn’t respon

Page 500

Section V: Security Features 549Chapter 28802.1x Port-based Network Access ControlThis chapter explains 802.1x Port-based Network Access Control and h

Page 501 - Chapter 24

AT-S60 Management Software User’s GuideSection I: Basic Features 55Displaying and Clearing System InformationThis section describes how to display and

Page 502

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 550802.1x Port-based Access Network Control OverviewThe AT-S60 management sof

Page 503 - Signatures

AT-S60 Management Software User’s GuideSection V: Security Features 551❑ Authentication server - The authentication server is the network device that

Page 504 - Infrastructure

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 5527. When the supplicant sends an EAPOL-Logoff message, the switch removes t

Page 505 - Validation

AT-S60 Management Software User’s GuideSection V: Security Features 553Figure 177 Example of Authenticator RoleAs mentioned earlier, the switch does

Page 506 - Revocation Lists

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 554The supplicant role is shown in Figure 178 on page 554. Port 3.2 on Switch

Page 507 - PKI Implementation

AT-S60 Management Software User’s GuideSection V: Security Features 555Authentication Server The authentication server verifies the supplicant’s detai

Page 508 - Configuring Certificates

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 556RADIUSAccountingThe AT-S60 management software supports RADIUS accounting

Page 509

AT-S60 Management Software User’s GuideSection V: Security Features 557Enabling and Disabling Port-based Access ControlTo globally enable or disable p

Page 510

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 5584. Type E to enable port-based access control, or D to disable port-based

Page 511

AT-S60 Management Software User’s GuideSection V: Security Features 559Setting the Port Access Role Use this procedure to configure a port with an acc

Page 512

Chapter 3: Basic Switch ParametersSection I: Basic Features 56The Display System Statistics Menu is shown in Figure 10.Figure 10 Display System Stati

Page 513 - Certificates to

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 560The Port Access Control Menu is shown in Figure 181.Figure 181 Configure

Page 514

AT-S60 Management Software User’s GuideSection V: Security Features 561Configuring Authenticator ParametersAfter you have enabled port-based access co

Page 515 - Modifying

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 5623. From the Port Access Control menu, type 4 to select Configure Authentic

Page 516

AT-S60 Management Software User’s GuideSection V: Security Features 563The Configure Authenticator Port Access Parameters Menu is shown in Figure 183.

Page 517

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 564❑ Force-unauthorized: Causes the port to remain in the unauthorized state,

Page 518

AT-S60 Management Software User’s GuideSection V: Security Features 565Configuring Supplicant ParametersAfter you have enabled port-based access contr

Page 519

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 566The Configure Supplicant Menu is shown in Figure 184.Figure 184 Configure

Page 520

AT-S60 Management Software User’s GuideSection V: Security Features 5676. Select the parameter that you want to modify. They are described below:1 - A

Page 521

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 568Configuring RADIUS AccountingThe AT-S60 management software supports RADIU

Page 522

AT-S60 Management Software User’s GuideSection V: Security Features 5695. Select a status for the RADIUS Accounting feature.Choose from the following

Page 523 - Secure Sockets Layer (SSL)

AT-S60 Management Software User’s GuideSection I: Basic Features 57Activating the BootP and DHCP ServicesThe BootP and DHCP application protocols were

Page 524 - Secure Sockets Layer Overview

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 570Choose from the following selections:E - Select E to enable the switch to

Page 525 - Verification

AT-S60 Management Software User’s GuideSection V: Security Features 571Displaying Port-based Access Control StatusThere are three ways to display port

Page 526

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 572The Display Port Access Status menu is shown in Figure 187.Figure 187 Dis

Page 527

AT-S60 Management Software User’s GuideSection V: Security Features 573When you configure a port with a Supplicant role, the Status field can have the

Page 528 - Configuring SSL

Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 574The Display Authenticator Port Access Parameters Menu is shown in Figure 1

Page 529 - Secure Shell (SSH)

AT-S60 Management Software User’s GuideSection V: Security Features 575The Display Supplicant Port Access Parameters Menu is shown in Figure 189. Figu

Page 530 - SSH Overview

576Section VIWeb Browser ManagementThe chapters in Section IV explain how to manage an AT-8400 switch using a web browser. The chapters include:❑ Chap

Page 531

AT-S80 User’s Guide577❑ Chapter 45: TACACS+ and RADIUS Protocols on page 796❑ Chapter 46: 802.1x Port-based Network Access Control on page 806

Page 532

Section VI: Web Browser Management 578Chapter 29Starting a Web Browser Management SessionThis chapter contains the procedure for starting a management

Page 533

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 579Starting a Web Browser Management SessionThis section explains how to sta

Page 534 - SSH Overall Configuration

Chapter 3: Basic Switch ParametersSection I: Basic Features 58NoteIf you activate BOOTP/DHCP, the switch immediately begins to query the network for a

Page 535 - Configuring SSH

Chapter 29: Starting a Web Browser Management SessionSection VI: Web Browser Management 5802. Enter the IP address of the switch in the URL field of t

Page 536

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 581The main menu is on the left side of the Home Page. It consists of the fo

Page 537

Section VI: Web Browser Management 582Chapter 30Basic Switch ParametersThis chapter provides the following procedures for configuring basic switch par

Page 538 - Displaying SSH Information

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 583Configuring an IP Address and Switch NameThis procedure describes the par

Page 539

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 584The Configuration System Page is displayed with the General Tab selected by d

Page 540 - TACACS+ and RADIUS Protocols

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 5852. Change the following parameters as desired:System NameThis parameter s

Page 541 - TACACS+ and RADIUS Overview

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 586Manager PasswordManager Confirm PasswordThese parameters are used to change t

Page 542

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 5873. After you have set the parameters, click Apply.Your changes are activa

Page 543

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 588Setting the System TimeTo set system time manually on the switch, perform the

Page 544 - Enabling TACACS+ or RADIUS

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 5895. In the Additional Time Parameters section you can specify the UTC offs

Page 545 - Configuring TACACS+

AT-S60 Management Software User’s GuideSection I: Basic Features 59Setting the System TimeTo set system time on the switch, configure the Simple Netwo

Page 546

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 590Setting Up SNTPWhen you set up SNTP, the switch polls an SNTP or NTP server f

Page 547 - Configuring RADIUS

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 591Activating the BOOTP and DHCP ServicesFor background information on BOOTP

Page 548

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 592Displaying System InformationTo view system information you access the Monito

Page 549 - Access Control

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 593The sections in the Tab are defined below.GeneralThis section displays th

Page 550

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 594❑ Switch Mode - Defines the switch’s current VLAN mode. If this parameter dis

Page 551

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 595Configuring SNMPv1 and SNMPv2c ProtocolsThis section provides instruction

Page 552

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 596The SNMP Tab is shown in Figure 195.Figure 195 Configuration System Page, SN

Page 553

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 5976. To configure SNMPv1 and SNMPv2 communities, click Configure in the SNM

Page 554 - Switch B

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 598The Add New SNMPv1 & SNMPv2c Community Page is shown in Figure 197. Figur

Page 555 - Authentication Server

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 599Access ModeClick Read Only to allow read access to the SNMP community. To

Page 556 - Accounting

Table of Contents6Chapter 12Event Log ...

Page 557

Chapter 3: Basic Switch ParametersSection I: Basic Features 60The Configure System Software Menu is displayed in Figure 12.Figure 12 Configure System

Page 558

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 600Figure 198 Modify SNMPv1 & SNMPv2c Community Page5. Modify the following

Page 559 - Setting the Port Access Role

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 601Manager IP Address1 through Manager IP Address 8Enter an IP Address of a

Page 560

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 602The SNMP Monitoring Tab is shown in Figure 199.Figure 199 SNMP Monitoring Ta

Page 561

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 603The Monitoring, SNMPv1 & SNMPv2c Communities Page is shown in Figure

Page 562

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 604Resetting a SwitchTo reset a switch, perform the following procedure: 1. From

Page 563

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 605Pinging a Remote SystemYou can instruct the switch to ping a node on your

Page 564

Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 606Returning the AT-S60 Software to the Factory Default ValuesThe procedure in t

Page 565

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6073. Click the Reboot Switch After Setting Defaults checkbox.4. Click Apply

Page 566

608Chapter 31File Downloads and UploadsThis chapter contains the procedure for downloading a new AT-S60 image file onto the switch using a web browser

Page 567

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 609Downloading a FileThis procedure explains how to download a file from a T

Page 568 - Configuring RADIUS Accounting

AT-S60 Management Software User’s GuideSection I: Basic Features 615. Type 1 - System Time to manually set the time and date for the switch. To set sy

Page 569 - Only)-> [1 to 2]-> 1

Chapter 31: File Downloads and UploadsSection VI: Web Browser Management 610❑ Installing a new AT-S60 software image does not change the current confi

Page 570 - [30 to 300]-> 60

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6113. In the Server IP Address field, enter the IP address of the network no

Page 571 - Access Status

Chapter 31: File Downloads and UploadsSection VI: Web Browser Management 612Uploading a FileThis procedure explains how to upload a file from the swit

Page 572 - 00:a0:d2:18:1a:c8

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6134. In the Operation field, click Upload.5. In the Server Filename field,

Page 573 - Authenticator

Section VI: Web Browser Management 614Chapter 32Enhanced StackingThis chapter introduces enhanced stacking, describes how to assign enhanced stacking

Page 574 - Supplicant

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 615OverviewUsing a web browser management session, you can view and set the

Page 575

Chapter 32: Enhanced StackingSection VI: Web Browser Management 616Setting a Switch’s Enhanced Stacking StatusTo adjust a switch’s enhanced stacking s

Page 576

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 617Selecting a Switch in an Enhanced StackYou can use the AT-S60 software to

Page 577

Chapter 32: Enhanced StackingSection VI: Web Browser Management 618The master switch polls the network for all remote switches in the same subnet and

Page 578 - Starting a Web Browser

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 619The Home Page for the remote switch you selected is displayed. An example

Page 579

Chapter 3: Basic Switch ParametersSection I: Basic Features 6211. Enter an IP address of your SNTP or NTP server.Use the standard IP format: xxx.xxx.x

Page 580 - Switch’s IP Address

Section VI: Web Browser Management 620Chapter 33Port ParametersThe procedures in this chapter allow you to view and change the parameter settings for

Page 581 - Quitting a Web

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 621Configuring Port ParametersThis procedure describes how to configure one

Page 582

Chapter 33: Port ParametersSection VI: Web Browser Management 622CautionUse caution when you update the port that is connected to your management work

Page 583

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 623To select a value, click the circle next it. Possible values are:❑ Auto-N

Page 584

Chapter 33: Port ParametersSection VI: Web Browser Management 624❑ High - Indicates high priority has been assigned to the port. As a result, all tagg

Page 585

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 625Back PressureYou can use this selection only if the port or ports you spe

Page 586

Chapter 33: Port ParametersSection VI: Web Browser Management 626Displaying Port Status and StatisticsThe procedures in this section display the opera

Page 587

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6273. Click on a port. You can select more than one port at a time when you

Page 588 - Setting the System Time

Chapter 33: Port ParametersSection VI: Web Browser Management 628The columns on the page are described below:PortIndicates the port number in the foll

Page 589

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 629❑ Down - indicates that the port and the end node have not established a

Page 590 - Setting Up SNTP

AT-S60 Management Software User’s GuideSection I: Basic Features 63Rebooting a SwitchTo reset a switch while preserving the switch configuration, perf

Page 591

Chapter 33: Port ParametersSection VI: Web Browser Management 630STP StateThe current operating status of the port. Possible values are:❑ Forwarding -

Page 592 - Displaying System Information

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 631You can select only one port when displaying statistics. After you select

Page 593

Chapter 33: Port ParametersSection VI: Web Browser Management 632Bytes SentNumber of bytes transmitted from the port.Frames SentNumber of frames trans

Page 594

Section VI: Web Browser Management 633Chapter 34MAC Address TableThis chapter describes how to display the dynamic and static addresses in the MAC add

Page 595 - SNMPv1 and

Chapter 34: MAC Address TableSection VI: Web Browser Management 634Displaying the MAC Address TableTo view the MAC address table, perform the followin

Page 596

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 635View Static MAC AddressesThis option displays only the static MAC address

Page 597

Chapter 34: MAC Address TableSection VI: Web Browser Management 636The MAC addresses are displayed in a table. The columns in the table are:VLAN IDThe

Page 598

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 637Adding Static Unicast and Multicast MAC AddressesThis section contains th

Page 599

Chapter 34: MAC Address TableSection VI: Web Browser Management 6385. In the Port Number field, enter the port number that is to be assigned the MAC a

Page 600

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 639Deleting MAC AddressesTo delete a static, dynamic, or multicast MAC addre

Page 601

Chapter 3: Basic Switch ParametersSection I: Basic Features 64Configuring the AT-S60 Software Security FeaturesThe AT-S60 software has several securit

Page 602 - Monitoring Tab

Chapter 34: MAC Address TableSection VI: Web Browser Management 640Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MA

Page 603

Section VI: Web Browser Management 641Chapter 35Port TrunkingThis chapter explains how to configure a port trunk using a web browser management sessio

Page 604 - Resetting a Switch

Chapter 35: Port TrunkingSection VI: Web Browser Management 642Creating or Deleting a Port TrunkThe following procedures allow you to create or delete

Page 605 - Pinging a Remote System

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6434. Click Add.The Add New Trunk Page is shown in Figure 216.Figure 216 Ad

Page 606

Chapter 35: Port TrunkingSection VI: Web Browser Management 64410. Configure the ports on the remote switch for port trunking.You can now connect the

Page 607

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 645Modifying a Port TrunkThis procedure allows you to modify a port trunk us

Page 608

Chapter 35: Port TrunkingSection VI: Web Browser Management 646The Modify Trunk Page is shown in Figure 217.Figure 217 Modify Trunk Page5. Click on t

Page 609 - Downloading a File

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 647Displaying the Port TrunksThis procedure allows you to view the port trun

Page 610

Section VI: Web Browser Management 648Chapter 36Port MirroringThis chapter explains how to configure a port mirror using a web browser management sess

Page 611

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 649Creating or Deleting a Port MirrorUse the following procedures to create,

Page 612

AT-S60 Management Software User’s GuideSection I: Basic Features 65Configuring theManagementPasswordsThere are two levels of management access on an A

Page 613

Chapter 36: Port MirroringSection VI: Web Browser Management 650The Add New Mirror Page is displayed as shown in Figure 220.Figure 220 Add New Mirror

Page 614 - Enhanced Stacking

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 651Deleting a PortMirrorUse this procedure to delete a port mirror using a w

Page 615

Chapter 36: Port MirroringSection VI: Web Browser Management 652Modifying a Port MirrorTo change the source mirror port or the destination mirror port

Page 616 - Chapter 32: Enhanced Stacking

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6535. Configure the mirror ports:❑ Click once to select S for source mirror

Page 617

Chapter 36: Port MirroringSection VI: Web Browser Management 654Displaying the Port Mirror ListThis procedure allows you to view the list of port mirr

Page 618

655Chapter 37Event LogThis chapter describes how to configure the Event Log using a web browser management session. It includes the following procedur

Page 619

Chapter 37: Event LogSection VI: Web Browser Management 656Enabling or Disabling the Event LogAllied Telesyn recommends setting the switch’s date and

Page 620

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 657If you enable the log, the system immediately begins to add events to the

Page 621

Chapter 37: Event LogSection VI: Web Browser Management 658Displaying EventsTo view the Event Log, do the following:1. From the Home Page, click eithe

Page 622 - Chapter 33: Port Parameters

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 659Figure 224 shows an example of the Event Log in the Full display mode. Th

Page 623

Chapter 3: Basic Switch ParametersSection I: Basic Features 66NoteYou must assign different values to each password.ConfiguringManagementAccessThis pr

Page 624

Chapter 37: Event LogSection VI: Web Browser Management 660Saving the Event LogYou can save the Event Log as a file in the file system. Once you save

Page 625

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 661Clearing the Event LogTo clear all events from the log, perform the follo

Page 626

Section VI: Web Browser Management 662Chapter 38IGMP SnoopingThis chapter describes how to configure the IGMP snooping feature on the switch. It conta

Page 627

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 663Configuring IGMP SnoopingTo configure IGMP snooping from a web browser ma

Page 628

Chapter 38: IGMP SnoopingSection VI: Web Browser Management 664Select the Single-Host/Port (Edge) setting when there is only one host node connected t

Page 629

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 665If the switch does not detect any queries from a multicast router during

Page 630

Chapter 38: IGMP SnoopingSection VI: Web Browser Management 666Displaying a List of Host Nodes and Multicast RoutersYou can use the AT-S60 software to

Page 631

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 667The View Multicast Hosts List Page is shown in Figure 227.Figure 227 Vie

Page 632

Chapter 38: IGMP SnoopingSection VI: Web Browser Management 668The View Multicast Routers List Page is shown in Figure 228.Figure 228 View Multicast

Page 633

Section VI: Web Browser Management 669Chapter 39STP, RSTP, and MSTPThis chapter explains how to configure STP, RSTP, and MSTP parameters on an AT-8400

Page 634 - Chapter 34: MAC Address Table

AT-S60 Management Software User’s GuideSection I: Basic Features 678. To configure SNMPv1 and SNMPv2 access, type 8 to select Configure SNMP. The Conf

Page 635

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 670Enabling STP, RSTP, or MSTPThe AT-8400 Series switch can support the three spanni

Page 636

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 671NoteIf you do not want to change the active spanning tree protocol and ju

Page 637

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 672Configuring and Modifying STPTo configure and modify STP, perform the following p

Page 638

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 673.Figure 231 Expanded STP Spanning Tree Tab3. In the Configure STP Parame

Page 639

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 674parameter can be from 0 (zero) to 15, with 0 having the highest priority. For a l

Page 640

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 675The STP Settings Page is shown in Figure 232.Figure 232 STP Settings Pag

Page 641

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 676Configuring and Modifying RSTPTo configure and modify RSTP, perform the following

Page 642 - Creating a Port

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 677Figure 233 Expanded RSTP Spanning Tree Tab4. In the Configure RSTP Param

Page 643

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 678bridges have the same priority value, the bridge with the numerically lowest MAC

Page 644 - Deleting a Port

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 679Root PriorityIndicates the bridge priority value on the root bridge. The

Page 645

Chapter 3: Basic Switch ParametersSection I: Basic Features 68Displaying the AT-S60 Hardware and Software InformationThe procedures in this section di

Page 646 - Chapter 35: Port Trunking

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 680Each time an RSTP port is reset by receiving STP BPDUs, you need to reset the RST

Page 647 - Displaying the Port Trunks

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 681Configuring and Modifying MSTPThe procedures for configuring and modifyin

Page 648

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 682The expanded MSTP Spanning Tree Tab is displayed as shown in Figure 235.Figure 23

Page 649

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 683NoteThis procedure explains the Configure MSTP Parameters section of the

Page 650 - Chapter 36: Port Mirroring

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 684All bridges in a single-instance bridged LAN use this aging time to test the age

Page 651

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 685Creating,Deleting, orModifying MSTIIDsTo create, delete, or modify MSTI I

Page 652 - Modifying a Port Mirror

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 686Deleting an MSTI IDTo delete an MSTI ID, do the following:1. Display the Spanning

Page 653

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6874. In the Priority field, enter a new MSTI Priority value. This parameter

Page 654

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 688Modifying a VLAN AssociationTo modify a VLAN association, do the following:1. Dis

Page 655

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 689ConfiguringMSTP PortParametersTo configure MSTP port parameters, perform

Page 656 - Chapter 37: Event Log

AT-S60 Management Software User’s GuideSection I: Basic Features 694. To display fan information, select 4 - Display System Fan A Information or selec

Page 657

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 690Edge PortThis parameter defines whether the port is functioning as an edge port.

Page 658

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 691Displaying STP, RSTP, or MSTP SettingsTo display spanning tree parameter

Page 659

Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 692Figure 240 shows an example of the Monitor STP Parameters Tab. The contents of th

Page 660

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 693The STP Settings Page is shown in Figure 241.Figure 241 STP Settings Pag

Page 661

Section VI: Web Browser Management 694Chapter 40SNMPv3 ProtocolThis chapter provides the following procedures for configuring basic switch parameters

Page 662

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 695Configuring the SNMPv3 ProtocolTo configure the SNMPv3 protocol, you need

Page 663

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 696Enabling the SNMP ProtocolIn order to allow an NMS (an SNMP manager) to access the sw

Page 664 - Chapter 38: IGMP Snooping

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 697Use this parameter to enable the switch to be remotely managed with an SN

Page 665

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 698Configuring the SNMPv3 User TableYou can create, delete, and modify an SNMPv3 User Ta

Page 666

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 699The SNMPv3 User Table Page is shown in Figure 243.Figure 243 SNMPv3 User

Page 667

AT-S60 Management Software User’s Guide7Section IIISNMPv3 Protocol ...

Page 668

Chapter 3: Basic Switch ParametersSection I: Basic Features 70You cannot change the information displayed in selections 1 through 6 in the Display Sys

Page 669 - STP, RSTP, and MSTP

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7006. In the Authentication Protocol field, enter an authentication protocol. This is an

Page 670 - Enabling STP, RSTP, or MSTP

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 70110. In the Privacy Password field, enter a privacy password of up to 32 a

Page 671

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7025. To save your changes, return to the General Tab and click Save Changes.Modifying a

Page 672 - Configuring and Modifying STP

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 703Select one of the following:NoneThis value represents no authentication p

Page 673

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 704DESSelect this value to make the DES privacy (or encryption) protocol the privacy pro

Page 674

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 705Configuring the SNMPv3 View TableYou can create, delete, and modify an SN

Page 675

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7064. To create a new SNMPv3 View Table entry click Add.The Add New SNMPv3 View Page is

Page 676

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 707The View Subtree parameter defines a MIB View and the Subtree Mask furthe

Page 677

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7083. In the SNMPv3 section of the page, click the circle next to Configure View Table.

Page 678

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7095. In the Subtree Mask field, enter a subtree mask in hexidecimal format.

Page 679

AT-S60 Management Software User’s GuideSection I: Basic Features 71Pinging a Remote SystemYou can instruct the switch to ping a remote device on your

Page 680

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 710Configuring the SNMPv3 Access TableYou can create, delete, and modify an SNMPv3 Acces

Page 681

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 711The Add New SNMPv3 Access Page is shown in Figure 250.Figure 250 Add New

Page 682 - Figure 235

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 712This parameter allows the users assigned to this Group Name to view the information s

Page 683

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 713SNMP users, but you do not want to encrypt messages using a privacy proto

Page 684

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 714Deleting anAccess TableEntryTo delete an entry in the SNMPv3 Access Table, perform th

Page 685 - Deleting, or

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 715The Modify SNMPv3 Access Page is shown in Figure 251.Figure 251 Modify S

Page 686

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 716NoteThe Context Match field is a read only field. The Context Match field is always s

Page 687 - Associations to

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 717Configuring the SNMPv3 SecurityToGroup TableYou can create, delete, and m

Page 688

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7184. To create an SNMPv3 SecurityToGroup Table entry, click Add.The Add New SNMPv3 Secu

Page 689

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 719There are four default values for this field that are reserved for SNMPv1

Page 690

Chapter 3: Basic Switch ParametersSection I: Basic Features 72Returning the AT-S60 Software to the Factory Default ValuesThe procedure in this section

Page 691

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 720The SNMPv3 SecurityToGroup Table Page is shown in Figure 252 on page 717.4. Click the

Page 692

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7215. In the Group Name field, enter a Group Name that you configured in the

Page 693 - 6. Click OK

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 722Configuring the SNMPv3 Notify TableYou can create, delete, and modify an SNMPv3 Notif

Page 694

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7234. To create an SNMPv3 Notify Table entry, click Add.The Add New SNMPv3 N

Page 695

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 724NonVolatileSelect this storage type if you want the ability to save an entry in the N

Page 696 - Enabling the SNMP Protocol

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7253. In the SNMPv3 section of the page, click the circle next to Configure

Page 697

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 726NonVolatileSelect this storage type if you want the ability to save an entry in the N

Page 698 - Creating a User

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 727Configuring the SNMPv3 Target Address TableYou can create, delete, and mo

Page 699

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 728Figure 258 SNMPv3 Target Address Table Page4. To create an SNMPv3 Target Address Tab

Page 700 - Chapter 40: SNMPv3 Protocol

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7295. In the Target Address Name field, enter the name of the SNMP manager,

Page 701 - Deleting a User

AT-S60 Management Software User’s GuideSection I: Basic Features 737. Type Y to reboot the switch.The operating parameters are returned to their defau

Page 702 - User Table

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 730NonVolatileSelect this storage type if you want the ability to save an entry in the T

Page 703

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 731The Configuration System Page is displayed with the General Tab selected

Page 704

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 732When an Inform message is generated, it requires a response from the switch. The time

Page 705 - Creating a View

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 733Configuring the SNMPv3 Target Parameters TableYou can create, delete, and

Page 706

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7344. To create an SNMPv3 Target Parameters Table entry, click Add.The Add New SNMPv3 Ta

Page 707 - Deleting a View

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 735v3Select this value to process messages with the SNMPv3 protocol. 7. In t

Page 708

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 736This level provides the greatest level of security. You can select this value if you

Page 709

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 737A warning message is displayed. Click OK to remove the Target Parameters

Page 710

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 738NoteEnter a value for the Message Processing Model field only if you select SNMPv1 or

Page 711

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 739NoteIf you have selected SNMPv1 or SNMPv2c as the Security Model, you mus

Page 712

Chapter 3: Basic Switch ParametersSection I: Basic Features 74Configuring the Console Startup ModeYou can configure the AT-S60 software to display eit

Page 713

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 740Configuring the SNMPv3 Community TableYou can create, delete, and modify an SNMPv3 Co

Page 714

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 741Figure 264 SNMPv3 Community Table Page4. To create an SNMPv3 Community T

Page 715

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7425. In the Community Index field, enter a numerical value for this Community.This para

Page 716

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 743making changes to an SNMPv3 Community Table entry with a NonVolatile stor

Page 717

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7443. In the SNMPv3 section of the page, click the circle next to Configure Community Ta

Page 718

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 745NoteDo not use a value configured with the User Name parameter in the SNM

Page 719 - Deleting a

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 746Displaying SNMPv3 TablesThis section contains procedures to display the SNMPv3 Tables

Page 720

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 747Displaying UserTable EntriesTo display entries in the SNMPv3 User Table,

Page 721

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 748Displaying ViewTable EntriesTo display entries in the SNMPv3 View Table, perform the

Page 722

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 749DisplayingAccess TableEntriesTo display entries in the SNMPv3 Access Tabl

Page 723

Section I: Basic Features 75Chapter 4Enhanced StackingThis chapter explains the enhanced stacking feature and provides procedures for using this featu

Page 724

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 750DisplayingSecurityToGroupTable EntriesTo display entries in the SNMPv3 SecurityToGrou

Page 725

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 751DisplayingNotify TableEntriesTo display entries in the SNMPv3 Notify Tabl

Page 726

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 752DisplayingTarget AddressTable EntriesTo display entries in the SNMPv3 Target Address

Page 727

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 753DisplayingTargetParametersTable EntriesTo display entries in the SNMPv3 T

Page 728 - Figure 259

Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 754DisplayingSNMPv3CommunityTable EntriesTo display entries in the SNMPv3 Community Tabl

Page 729

Section VI: Web Browser Management 755Chapter 41Port-based VLANsThis chapter explains how to create, modify, and delete VLANs using a web browser mana

Page 730

Chapter 41: Port-based VLANsSection VI: Web Browser Management 756Creating a Port Based VLANTo create a new port-based or tagged VLAN, perform the fol

Page 731

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 757Figure 276 Port-Based VLANs Page5. Click Add.The Add New VLAN Page is sh

Page 732

Chapter 41: Port-based VLANsSection VI: Web Browser Management 7586. In the VID field, enter a VID value for the new VLAN. The range of the VID value

Page 733

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 759NoteThe untagged ports that you assign to the new VLAN are automatically

Page 734

Chapter 4: Enhanced StackingSection I: Basic Features 76Enhanced Stacking OverviewThe enhanced stacking feature can make it easier for you to manage a

Page 735

Chapter 41: Port-based VLANsSection VI: Web Browser Management 760Modifying a Port-Based VLANTo modify a port-based or tagged VLAN, perform the follow

Page 736

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 761The Modify VLAN Page is displayed as shown in Figure 278.Figure 278 Modi

Page 737

Chapter 41: Port-based VLANsSection VI: Web Browser Management 762Deleting a VLANTo delete a port-based or tagged VLAN from the switch, perform the fo

Page 738

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 763Displaying VLANsTo display all the existing VLANs on a switch, perform th

Page 739

Chapter 41: Port-based VLANsSection VI: Web Browser Management 764The Port-Based VLANs Page is shown in Figure 280.Figure 280 Monitoring, Port-Based

Page 740

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 765Setting the Switch’s VLAN ModeThis section contains the procedure for set

Page 741

Section VI: Web Browser Management 766Chapter 42GARP VLAN Registration ProtocolThis chapter about web server security contains the following procedure

Page 742

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 767Configuring GVRPTo configure GVRP, perform the following procedure: 1. Fr

Page 743

Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 7684. Configure the following parameters: Enable GVRPClick in this box t

Page 744

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 769Resetting GVRP to the DefaultsTo reset GVRP to the defaults:1. From the H

Page 745

AT-S60 Management Software User’s GuideSection I: Basic Features 77There are three basic steps to implementing this feature on your network:1. Select

Page 746 - Displaying SNMPv3 Tables

Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 770Modifying the GVRP Port ConfigurationTo modify the GVRP port configur

Page 747 - Table Entries

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 771Displaying the GVRP SettingsThe procedures in this section allow you to d

Page 748 - Displaying View

Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 772The GVRP Tab is shown in Figure 283.Figure 283 Monitoring Layer 2 Pa

Page 749

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 773The GVRP Port Configuration Page is shown in Figure 284.Figure 284 GVRP

Page 750

Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 774The GVRP Counters Page is shown in Figure 285.Figure 285 GVRP Counte

Page 751

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 775Transmit Discarded: GARPDisabledNumber of GARP packets (PDUs) discarded b

Page 752

Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 776Transmit GARP Messages: JoinInTotal number of GARP JoinIn messages tr

Page 753

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 777The GVRP Database Page is shown in Figure 286.Figure 286 GVRP Database P

Page 754

Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 778Displaying GIPConnectedPorts RingTo display the GIP Connected Ports R

Page 755 - Port-based VLANs

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 779The information on this page is described in Table 19.DisplayingGVRP Stat

Page 756 - Creating a Port Based VLAN

Chapter 4: Enhanced StackingSection I: Basic Features 78This is explained in the procedure Setting a Switch’s Enhanced Stacking Status on page 79.Exam

Page 757 - Figure 277 Add New VLAN Page

Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 780The GVRP State Machine Page is shown in Figure 288.Figure 288 GVRP S

Page 758 - Chapter 41: Port-based VLANs

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 781App Applicant state machine for the GID index on that particular port. On

Page 759

Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 782App (Continued) Non-Participant Management state:“Von” Very Anxious O

Page 760 - Modifying a Port-Based VLAN

Section VI: Web Browser Management 783Chapter 43Port SecurityThis chapter explain how to display the port security status using a web browser manageme

Page 761

Chapter 43: Port SecuritySection VI: Web Browser Management 784Displaying the Port Security LevelTo display the switch’s port security levels, perform

Page 762

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7854. Click on the ports to display their security status. After you click o

Page 763

Chapter 43: Port SecuritySection VI: Web Browser Management 786❑ Lock all ports: The Lock All Ports security level causes the switch to immediately st

Page 764

Section VI: Web Browser Management 787Chapter 44Web Server SecurityThis chapter about web server security contains the following procedures:❑ Displayi

Page 765

Chapter 44: Web Server SecuritySection VI: Web Browser Management 788Displaying the Encryption KeysTo display the encryption keys, perform the followi

Page 766 - Chapter 42

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 789The following information is displayed: Key IDThe identification number f

Page 767

AT-S60 Management Software User’s GuideSection I: Basic Features 79Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the swit

Page 768

Chapter 44: Web Server SecuritySection VI: Web Browser Management 790Displaying the PKI SettingsTo display the PKI settings, perform the following pro

Page 769

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 791The PKI Tab is shown in Figure 292.Figure 292 Monitoring Security Page,

Page 770

Chapter 44: Web Server SecuritySection VI: Web Browser Management 7925. To view detailed information about the certificate, select the certificate and

Page 771 - Displaying the GVRP Settings

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 793Subject - Lists the Subject Distinguished Name.Issuer - Lists the Disting

Page 772 - Then click View

Chapter 44: Web Server SecuritySection VI: Web Browser Management 794Displaying the SSL Settings To view the SSL settings, perform the following proce

Page 773 - GVRP Counters

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 795The following information is displayed: Maximum Number of SessionsThe max

Page 774

Section VI: Web Browser Management 796Chapter 45TACACS+ and RADIUS ProtocolsThis chapter contains instructions on how to configure the authentication

Page 775

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 797Enabling TACACS+ or RADIUSTo configure the authentication protocols, perf

Page 776 - GVRP Database

Chapter 45: TACACS+ and RADIUS ProtocolsSection VI: Web Browser Management 7985. Click Apply.6. To save your changes, return to the General Tab and cl

Page 777

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 799Configuring TACACS+To configure TACACS+, perform the following procedure:

Page 778 - Connected

Table of Contents8Displaying the Display SNMPv3 Target Parameters Table Menu ...

Page 779

Chapter 4: Enhanced StackingSection I: Basic Features 80ConfiguringEnhancedStackingTo adjust a switch’s enhanced stacking status, perform the followin

Page 780

Chapter 45: TACACS+ and RADIUS ProtocolsSection VI: Web Browser Management 800Global Server TimeoutThis parameter specifies the maximum amount of time

Page 781

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 801Configuring RADIUSTo configure RADIUS, perform the following procedure:1.

Page 782

Chapter 45: TACACS+ and RADIUS ProtocolsSection VI: Web Browser Management 802IP Address, Port #, and Encryption KeyUse these fields to specify the IP

Page 783

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 803Displaying the TACACS+ SettingsTo display the TACACS+ RADIUS settings, pe

Page 784 - Chapter 43: Port Security

Chapter 45: TACACS+ and RADIUS ProtocolsSection VI: Web Browser Management 804The TACACS+ Client Configuration Page is shown in Figure 299.Figure 299

Page 785

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 805Displaying the RADIUS SettingsTo display the RADIUS settings, perform the

Page 786

Section VI: Web Browser Management 806Chapter 46802.1x Port-based Network Access ControlThis chapter describes how to configure and display port-based

Page 787 - Web Server Security

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 807Configuring Port AccessThe 802.1x Port-based Access Control feature uses

Page 788

Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 808Figure 301 802.1x Port Access Tab4. Click the Enable Port A

Page 789

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 8095. After setting the parameters, click Apply.Your changes are activated o

Page 790 - Displaying the PKI Settings

AT-S60 Management Software User’s GuideSection I: Basic Features 81Selecting a Switch in an Enhanced StackBefore performing a procedure on a switch, c

Page 791

Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 810Enable UpdateControls whether the switch is to send interim

Page 792

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 811The Port Role Configuration Page is displayed, as shown in Figure 302.Fig

Page 793

Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 812The Configuration 802.1x Port Access Tab is displayed as sho

Page 794 - Displaying the SSL Settings

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 813❑ Force-authorized: Disables 802.1X port-based authentication and causes

Page 795

Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 814Configuring aSupplicant PortThis section provides a procedur

Page 796

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 8155. Configure the following parameters:Auth Period - This is the initializ

Page 797

Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 816Displaying 802.1x Port-Based Access Control InformationTo vi

Page 798 - 5. Click Apply

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 8174. To display the status of the port, click the port or ports to select i

Page 799

Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 818For authenticator port(s), the Authenticator Port Parameters

Page 800

AT-S60 Management Software User’s GuideSection VI: Web Browser Management 819For a description of the parameters displayed on the Supplicant Port Para

Page 801

Chapter 4: Enhanced StackingSection I: Basic Features 823. Type 1 to select Get/Refresh List of Switches.The Master switch polls the network for all s

Page 802

820Appendix AAT-S60 Default SettingsThis appendix lists the AT-S60 factory default settings. It contains the following sections in alphabetical order:

Page 803

AT-S60 Management Software User’s Guide821Basic Switch Default SettingsThis section lists the default settings for basic switch parameters. The follow

Page 804

Appendix A: AT-S60 Default Settings822NoteFor the AT-8412/SC FX and AT-8412/MT FX line cards, the default setting for Negotiation is Manual. For all t

Page 805

AT-S60 Management Software User’s Guide823SwitchAdministrationDefault SettingsThe following table describes the switch administration default settings

Page 806

Appendix A: AT-S60 Default Settings824Enhanced Stacking Default SettingThe following table lists the Enhanced Stacking default setting.Enhanced Stacki

Page 807 - Configuring Port Access

AT-S60 Management Software User’s Guide825Event Log SettingsThis section lists the default settings for the Event Log feature.Event Log DefaultEvent L

Page 808

Appendix A: AT-S60 Default Settings826IGMP Snooping Default SettingsThe following table lists the IGMP Snooping default settings.IGMP Snooping Setting

Page 809

AT-S60 Management Software User’s Guide827PKI Default SettingsThe following table lists the PKI default settings, including the generate enrollment re

Page 810 - Setting the Port

Appendix A: AT-S60 Default Settings828Port Configuration Default SettingsThe following table lists the port configuration default settings.Port Config

Page 811 - Configuring an

AT-S60 Management Software User’s Guide829Port Security Default SettingsThe following table lists the port security default settings.Port Security Set

Page 812

AT-S60 Management Software User’s GuideSection I: Basic Features 836. Enter a username. The usernames are “manager” to view and change the switch sett

Page 813

Appendix A: AT-S60 Default Settings830Server-Based Authentication Default SettingsThis section describes the server-based authentication, RADIUS, and

Page 814 - Supplicant Port

AT-S60 Management Software User’s Guide831SNMP Default SettingsThis section lists the default settings for the SNMPv1 and SNMPv2c protocols. There are

Page 815

Appendix A: AT-S60 Default Settings832SSH Default SettingsThe following table lists the SSH and the SSH server default settings.SSH Setting DefaultSSH

Page 816

AT-S60 Management Software User’s Guide833SSL Default SettingsThe following table lists the SSL default settings.SSL Setting DefaultMaximum Number of

Page 817

Appendix A: AT-S60 Default Settings834STP, RSTP, and MSTP Default SettingsThis section provides the STP switch, STP, RSTP, and MSTP default settings.

Page 818

AT-S60 Management Software User’s Guide835RSTP DefaultSettingsThe following table describes the RSTP default settings.MSTP DefaultSettingsThe followin

Page 819

Appendix A: AT-S60 Default Settings836Internal Cost Auto UpdatePort Priority 128MSTP Setting Default

Page 820 - AT-S60 Default Settings

AT-S60 Management Software User’s Guide837VLAN Default SettingsThis section provides VLAN, GARP, and GVRP default settings.VLAN DefaultSettingsThe fol

Page 821 - Basic Switch Default Settings

Appendix A: AT-S60 Default Settings838Web Server Default SettingsThe following table lists the Web Server default settings.Web Server Configuration Se

Page 822 - SNTP Default

AT-S60 Management Software User’s Guide839802.1x Port-Based Network Access Control Default SettingsThe following table describes the 802.1x Port Acces

Page 823

84Chapter 5SNMPv1 and SNMPv2c ConfigurationThis chapter provides a description of the AT-S60 implementation of the SNMPv1 and SNMPv2c protocols. In ad

Page 824 - Switch State Slave

840Appendix BSNMPv3 Configuration ExamplesThis appendix provides two examples of SNMPv3 configuration using the SNMPv3 Table menus. In addition, a wor

Page 825 - Event Log Settings

AT-S60 Management Software User’s Guide841SNMPv3 Configuration ExamplesThis appendix provides SNMPv3 configuration examples for the following types of

Page 826

Appendix B: SNMPv3 Configuration Examples842Configure SNMPv3 SecurityToGroup TableUser Name:systemadmin24Security Model:v3Group Name: ManagersStorage

Page 827 - PKI Default Settings

AT-S60 Management Software User’s Guide843Configure SNMPv3 View Table Menu View Name: internetView Subtree OID: 1.3.6.1 (or internet)Subtree Mask: Vie

Page 828

Appendix B: SNMPv3 Configuration Examples844SNMPv3 Access Table MenuGroup NameSecurity ModelSecurity LevelRead View NameWrite View NameNotify View Nam

Page 829

AT-S60 Management Software User’s Guide845Storage TypeSNMPv3 Target Parameters TableTarget Parameters NameUser (Security) NameSecurity ModelSecurity L

Page 830

846Index802.1x port-based network access controlaccess role, configuring 559, 807authentication process 551authentication process diagram 555authentic

Page 831 - SNMP Default Settings

AT-S60 Management Software User’s Guide847Bback pressure parameter 108, 625, 828Basic VLAN modedefined 417setting 432, 765baud rate parameter 40Boot P

Page 832 - SSH Default Settings

Index848configuration name 264configuration name parameter 278, 683, 835console baud rate parameter 50, 823console disconnect timer interval parameter

Page 833 - SSL Default Settings

AT-S60 Management Software User’s Guide849file system, overview 153filesdownloading 172, 180naming 154uploading 187, 194flow control parameter 40, 104

Page 834 - STP Default

AT-S60 Management Software User’s GuideSection I: Basic Features 85SNMP OverviewThe SNMPv1 and SNMPv2c protocols allow you to create groups, called co

Page 835 - MSTP Default

Index850HTTP 478HTTPS 478IIEEE 802.1d standard 242, 248, 672, 676IGMP snooping status parameter 222, 663, 826IGMP snooping. See Internet Group Managem

Page 836 - MSTP Setting Default

AT-S60 Management Software User’s Guide851MCHECK parameter 254, 290, 679MD5 authentication algorithm 489MD5 authentication protocol 295Message Authent

Page 837 - VLAN Default Settings

Index852non-802.1Q compliant multiple VLANs 438overview 436uplink port, changing 442Nnegotiation parameter 104, 109, 622, 822, 828none port role 552No

Page 838 - Web Server Default Settings

AT-S60 Management Software User’s Guide853Rapid Spanning Tree Protocol (RSTP) 253, 679Spanning Tree Protocol (STP) 246, 675port priority, defined 232p

Page 839

Index854configuring 248, 676disabling 240, 274, 670edge port, configuring 253, 680enabling 240, 274, 670force version 249, 677MCHECK 254, 290, 679over

Page 840 - SNMPv3 Configuration Examples

AT-S60 Management Software User’s Guide855slave switchassigning 79, 615defined 79, 615SNMP communityconfiguring 88, 595deleting 91, 601displaying 100,

Page 841

Index856storage type 380user name 374SNMPv3 Target Parameters Table, described 302SNMPv3 trap 297SNMPv3 User Table entrycreating 305, 698deleting 309,

Page 842 - Operator

AT-S60 Management Software User’s Guide857system configuration filecopying 162creating 158renaming 162setting 156viewing 159See also system filessyste

Page 843 - Worksheet

Index858Virtual LANs (VLANs)associating to MSTI IDs 687VLAN and MSTI associations 263VLAN ID parameter 463, 777VLAN identifier (VID) 404, 423, 758VLAN

Page 844

Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 86Configuring the SNMPv1 and SNMPv2c ProtocolsThis section describes how to confi

Page 845

AT-S60 Management Software User’s GuideSection I: Basic Features 87To enable SNMPv1 and SNMPv2 as well as authentication trap messages, perform the fo

Page 846

Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 88When this parameter is enabled, the switch sends authentication failure traps u

Page 847

AT-S60 Management Software User’s GuideSection I: Basic Features 89The Configure SNMPv1 and SNMPv2c Community menu is shown in Figure 23.Figure 23 Co

Page 848

AT-S60 Management Software User’s Guide9Section VSecurity Features ...

Page 849

Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 909. Enter an open access status for the SNMP community. Choose one of the follow

Page 850

AT-S60 Management Software User’s GuideSection I: Basic Features 91Deleting anSNMPv1 andSNMPv2CommunityTo delete an SNMPv1 and SNMPv2c community, perf

Page 851

Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 92ModifyingSNMPv1 andSNMPv2CommunityAttributesFor each SNMPv1 and SNMPv2c communi

Page 852

AT-S60 Management Software User’s GuideSection I: Basic Features 93The Modify SNMPv1 and SNMPv2c Community Menu is shown in Figure 24.Figure 24 Modif

Page 853

Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 9411. After making changes, type R until you return to the Main Menu. Then type S

Page 854

AT-S60 Management Software User’s GuideSection I: Basic Features 959. Enter an IP address that you want to delete. Or, to skip this prompt, press Retu

Page 855

Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 96The Configure System Software Menu is shown in Figure 12 on page 60.4. From the

Page 856

AT-S60 Management Software User’s GuideSection I: Basic Features 97Changing the Community StatusYou may want to change the status of a community to te

Page 857

Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 98D - Select D to disable the SNMP Community.The following prompt is displayed:Do

Page 858

AT-S60 Management Software User’s GuideSection I: Basic Features 998. Enter a community name from the list at the top of the Modify SNMPv1 & SNMPv

Commentaires sur ces manuels

Pas de commentaire