AT-S60Management SoftwareAT-S60◆User’s GuideAT-8400 SERIES SWITCHVERSION 2.1.0®PN 613-50400-00 Rev C
Table of Contents10Chapter 25Secure Sockets Layer (SSL) ...
Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 100Displaying an SNMPv1 and SNMPv2c CommunityUse the following procedure to displ
Section I: Basic Features 101Chapter 6Port ParametersThe chapter contains procedures for viewing and changing the parameter settings for the individua
Chapter 6: Port ParametersSection I: Basic Features 102Displaying Port StatusThis section provides a procedure to display the status of a port. To dis
AT-S60 Management Software User’s GuideSection I: Basic Features 103The information in this menu is for viewing purposes only. The columns in the menu
Chapter 6: Port ParametersSection I: Basic Features 104Disabled - Indicates the port has been manually disabled. The port is not able to send or recei
AT-S60 Management Software User’s GuideSection I: Basic Features 105Enabled - Flow control occurs on both frames entering and leaving the port.Disable
Chapter 6: Port ParametersSection I: Basic Features 106Configuring Port ParametersTo configure the parameter settings for a port on the switch, perfor
AT-S60 Management Software User’s GuideSection I: Basic Features 1074. Adjust the port parameters as desired. You adjust a parameter by typing its num
Chapter 6: Port ParametersSection I: Basic Features 108High Priority - Indicates high priority has been assigned to the port. All ingress tagged and u
AT-S60 Management Software User’s GuideSection I: Basic Features 109Disabled - Indicates that no flow control occurs on the port.Enabled - Indicates t
AT-S60 Management Software User’s Guide11Chapter 30Basic Switch Parameters ...
Chapter 6: Port ParametersSection I: Basic Features 1109 - Duplex:Use this selection to configure the duplex mode of the port. See Table 2 for duplex
AT-S60 Management Software User’s GuideSection I: Basic Features 111NoteMDI/X applies only to copper ports, not fiber ports.B - Media SelectionUse thi
Chapter 6: Port ParametersSection I: Basic Features 112Displaying Port StatisticsTo display Ethernet port statistics, perform the following procedure:
AT-S60 Management Software User’s GuideSection I: Basic Features 113The Display Port Statistics Menu is shown in Figure 30. Figure 30 Display Port St
Chapter 6: Port ParametersSection I: Basic Features 114Total Bytes ReceivedNumber of bytes received by the port.JabberNumber of occurrences of corrupt
Section I: Basic Features 115Chapter 7MAC Address TableThis chapter provides an overview of MAC addresses. In addition, it describes the procedures fo
Chapter 7: MAC Address TableSection I: Basic Features 116MAC Address OverviewEvery hardware device that you connect to your network has a unique MAC a
AT-S60 Management Software User’s GuideSection I: Basic Features 117The type of MAC address described above is referred to as a dynamic MAC address. D
Chapter 7: MAC Address TableSection I: Basic Features 118Displaying MAC AddressesThe management software has menu selections for displaying all or par
AT-S60 Management Software User’s GuideSection I: Basic Features 1193. Select the desired option. Each option is described below:1 - Display All MAC A
Table of Contents12Chapter 37Event Log ...
Chapter 7: MAC Address TableSection I: Basic Features 1202 - Display All static MAC AddressesThis option displays only the static MAC addresses. The c
AT-S60 Management Software User’s GuideSection I: Basic Features 1216 - Display Multicast MAC AddressesThis selection displays the multicast MAC addre
Chapter 7: MAC Address TableSection I: Basic Features 122Adding Static Unicast and Multicast MAC AddressesThis section contains the procedure for addi
AT-S60 Management Software User’s GuideSection I: Basic Features 123The following prompt is displayed:Please enter MAC address ->4. Enter the stati
Chapter 7: MAC Address TableSection I: Basic Features 124Deleting MAC AddressesThis section contains the procedure for deleting static and dynamic uni
AT-S60 Management Software User’s GuideSection I: Basic Features 125b. Type Y for yes to delete the dynamic MAC addresses or N for no to cancel the pr
Chapter 7: MAC Address TableSection I: Basic Features 126Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MAC addresse
Section I: Basic Features 127Chapter 8Port TrunkingThis chapter describes port trunking and contains the procedures for creating, deleting, and modify
Chapter 8: Port TrunkingSection I: Basic Features 128Port Trunking OverviewPort trunking is an economical way for you to increase the bandwidth betwee
AT-S60 Management Software User’s GuideSection I: Basic Features 129The example in Figure 36 illustrates a 10/100 port trunk with 8 data links between
AT-S60 Management Software User’s Guide13Modifying a Target Parameters Table Entry ...
Chapter 8: Port TrunkingSection I: Basic Features 130❑ For 10/100 port trunks, such as those on an AT-8411 TX line card, all ports included in the tru
AT-S60 Management Software User’s GuideSection I: Basic Features 131Before CreatingPort TrunksAs mentioned in the above guidelines for creating port t
Chapter 8: Port TrunkingSection I: Basic Features 132Creating a Port TrunkThis section contains the procedure for creating a port trunk on the switch.
AT-S60 Management Software User’s GuideSection I: Basic Features 1333. Type 1 to select Create Trunk.The following prompt is displayed.Enter Trunk Nam
Chapter 8: Port TrunkingSection I: Basic Features 134Deleting a Port TrunkUse this procedure to delete an existing port trunk, including the trunk ID,
AT-S60 Management Software User’s GuideSection I: Basic Features 135Modifying a Port TrunkUse this procedure to modify an existing port trunk. See the
Chapter 8: Port TrunkingSection I: Basic Features 136The Modify Trunk menu is shown in Figure 38. Notice the two current port trunks, called highschoo
AT-S60 Management Software User’s GuideSection I: Basic Features 137Changing theName of thePort TrunkUse this procedure to change the name of an port
Chapter 8: Port TrunkingSection I: Basic Features 1382. From the Port Menu, type 4 to select Port Trunking.The Trunk Configuration menu is shown in Fi
AT-S60 Management Software User’s GuideSection I: Basic Features 139Deleting Portsfrom a PortTrunkUse this procedure to delete ports from an existing
Table of Contents14Enabling Port-Based Access Control ...
Chapter 8: Port TrunkingSection I: Basic Features 140Replacing Portsin a TrunkUse this procedure to overwrite, or replace, the current ports in a port
AT-S60 Management Software User’s GuideSection I: Basic Features 141Clearing Portsin a Port TrunkUse this procedure to clear, or delete, all of the cu
Section I: Basic Features 142Chapter 9Port MirroringThis chapter describes port mirroring and provides the procedures for creating and deleting a port
AT-S60 Management Software User’s GuideSection I: Basic Features 143Port Mirroring OverviewThe port mirroring feature allows you to monitor the traffi
Chapter 9: Port MirroringSection I: Basic Features 144Creating a Port MirrorUse the following procedure to create a port mirror. For information about
AT-S60 Management Software User’s GuideSection I: Basic Features 145NoteYou cannot assign a range of ports on the same line card as source mirror port
Chapter 9: Port MirroringSection I: Basic Features 146Modifying a Source Port MirrorUse the following procedure to add, delete, set (overwrite), or cl
AT-S60 Management Software User’s GuideSection I: Basic Features 147The following prompt appears:Enter Source Port(s) [port-list]:6. Enter the source
Chapter 9: Port MirroringSection I: Basic Features 148Deleting a Destination Port MirrorTo delete a destination port mirror and its source mirror port
AT-S60 Management Software User’s GuideSection I: Basic Features 149Enabling a Destination Port MirrorUse this procedure if you have previously disabl
15List of FiguresFigure 1: Main Menu ...
Chapter 9: Port MirroringSection I: Basic Features 150Disabling a Destination Port MirrorUse this procedure to prevent traffic from the source mirror
151Section IIAdvanced FeaturesThe chapters in Section II explain how to manage the advanced features on an AT-8400 switch from a local or Telnet manag
Section II: Advanced Features 152Chapter 10File System ConfigurationThe chapter describes the file system operations you can perform on configuration
AT-S60 Management Software User’s GuideSection II: Advanced Features 153File System Configuration OverviewThe File System Menus allow you to choose th
Chapter 10: File System Configuration154File NamingConventionsThe file subsystem provides a flat file system which means directories are not supported
AT-S60 Management Software User’s GuideSection II: Advanced Features 155Using Wildcards to Specify Groups of FilesYou can use the asterisk character (
Chapter 10: File System Configuration156Setting, Creating, Editing, and Displaying System Configuration FilesUse the procedures in this section to loa
AT-S60 Management Software User’s GuideSection II: Advanced Features 157The File Menu is shown in Figure 41.Figure 41 File Menu2. Type 1 to select Bo
Chapter 10: File System Configuration158Creating aSystemConfigurationFileThis procedure allows you to save your system configuration to a file on the
AT-S60 Management Software User’s GuideSection II: Advanced Features 159Editing aSystemConfigurationFileYou can edit a system configuration file on yo
List of Figures16Figure 38: Modify Trunk Menu ...
Chapter 10: File System Configuration160The View Configuration File Menu is shown in Figure 42.Figure 42 View Configuration File Menu (page 1)3. Pres
AT-S60 Management Software User’s GuideSection II: Advanced Features 161The second page of the View Configuration File Menu is shown in Figure 43.Figu
Chapter 10: File System Configuration162Copying and Renaming System FilesUse this procedure to copy and rename system files that reside on the switch.
AT-S60 Management Software User’s GuideSection II: Advanced Features 163Deleting System FilesUse this procedure to delete a system file. You can delet
Chapter 10: File System Configuration1642. From the File Menu, type 8 to select Delete file to delete a system file.The following prompt is displayed:
AT-S60 Management Software User’s GuideSection II: Advanced Features 165Displaying System FilesUse this procedure to display a list of current system
Chapter 10: File System Configuration166The Display File(s) Menu is shown in Figure 44.Figure 44 Display File(s) MenuThe format of the Display File(s
Section II: Advanced Features 167Chapter 11File Downloads and UploadsThis chapter contains procedures for downloading and uploading files to a switch,
Chapter 11: File Downloads and UploadsSection II: Advanced Features 168OverviewDownloading and uploading are useful system features that make switch m
AT-S60 Management Software User’s GuideSection II: Advanced Features 169contains the factory default settings. For more information, refer to Appendix
AT-S60 Management Software User’s Guide17Figure 93: CIST Menu ...
Chapter 11: File Downloads and UploadsSection II: Advanced Features 170The final section, Downloading the AT-S60 Image Switch to Switch on page 201, c
AT-S60 Management Software User’s GuideSection II: Advanced Features 171Obtaining Management Software UpdatesNew releases of management software for o
Chapter 11: File Downloads and UploadsSection II: Advanced Features 172Downloading FilesThis section contains the procedures for downloading files ont
AT-S60 Management Software User’s GuideSection II: Advanced Features 173Downloadingan Image FileUsing Xmodemor TFTPThe following procedures describe h
Chapter 11: File Downloads and UploadsSection II: Advanced Features 174NoteMenu options 2 and 4 in the menu are described in Uploading Files on page 1
AT-S60 Management Software User’s GuideSection II: Advanced Features 175Downloading an Image File Using XmodemTo download an image file using Xmodem (
Chapter 11: File Downloads and UploadsSection II: Advanced Features 1765. Click on the Protocol field and select as the transfer protocol either Xmode
AT-S60 Management Software User’s GuideSection II: Advanced Features 177The Downloads & Uploads Menu is displayed, as shown in Figure 46 on page 1
Chapter 11: File Downloads and UploadsSection II: Advanced Features 178Downloading an Image File Using TFTPTo download a file using TFTP, perform the
AT-S60 Management Software User’s GuideSection II: Advanced Features 1795. If the new image file differs from the existing one, the following message
List of Figures18Figure 148: GIP Connected Ports Ring Menu ...
Chapter 11: File Downloads and UploadsSection II: Advanced Features 180Downloading aFile UsingXmodem orTFTPThe following procedures describe how to do
AT-S60 Management Software User’s GuideSection II: Advanced Features 181The Downloads & Uploads menu is shown in Figure 50.Figure 50 Downloads &a
Chapter 11: File Downloads and UploadsSection II: Advanced Features 182Downloading a File Using XmodemTo download certificate, certificate enrollment
AT-S60 Management Software User’s GuideSection II: Advanced Features 183The Send File window is shown in Figure 52. Figure 52 Send File WindowNoteThe
Chapter 11: File Downloads and UploadsSection II: Advanced Features 1847. Click Send.The file immediately begins to download onto the switch. The Xmod
AT-S60 Management Software User’s GuideSection II: Advanced Features 185Downloading a File Using TFTPTo download a certificate, certificate enrollment
Chapter 11: File Downloads and UploadsSection II: Advanced Features 186Press any key. The Downloads & Uploads Menu is displayed, as shown in Figur
AT-S60 Management Software User’s GuideSection II: Advanced Features 187Uploading FilesThis section contains procedures for uploading the following fi
Chapter 11: File Downloads and UploadsSection II: Advanced Features 188Uploading anImage FileUsing Xmodemor TFTPThe following procedures describe how
AT-S60 Management Software User’s GuideSection II: Advanced Features 1894. Type 2 to upload the AT-S60 software image from the switch.If you are using
AT-S60 Management Software User’s Guide19Figure 203: System Maintenance Tab ...
Chapter 11: File Downloads and UploadsSection II: Advanced Features 190Uploading an Image File Using Xmodem To upload an image file using Xmodem (this
AT-S60 Management Software User’s GuideSection II: Advanced Features 1915. Click on the Protocol field and select as the transfer protocol either Xmod
Chapter 11: File Downloads and UploadsSection II: Advanced Features 192The file immediately begins to upload onto the system. The Xmodem File Receive
AT-S60 Management Software User’s GuideSection II: Advanced Features 193Uploading an Image File Using TFTPTo upload an image file using TFTP, perform
Chapter 11: File Downloads and UploadsSection II: Advanced Features 194Uploading a FileUsing Xmodemor TFTPThe following procedures describe how to upl
AT-S60 Management Software User’s GuideSection II: Advanced Features 1954. Type 2 to upload the AT-S60 software image from the switch.If you are using
Chapter 11: File Downloads and UploadsSection II: Advanced Features 196Uploading a File Using Xmodem To upload a file using Xmodem (this procedure sho
AT-S60 Management Software User’s GuideSection II: Advanced Features 1974. In the HyperTerminal main window, select the Transfer menu. Then select Rec
Chapter 11: File Downloads and UploadsSection II: Advanced Features 1988. Enter a name for storing the uploaded file.This will be the name for the fil
AT-S60 Management Software User’s GuideSection II: Advanced Features 199Uploading a File Using TFTPTo upload a file using TFTP, perform the following
Copyright © 2005 Allied Telesyn, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied
List of Figures20Figure 258: SNMPv3 Target Address Table Page ...
Chapter 11: File Downloads and UploadsSection II: Advanced Features 200NoteThe file name must already exist on the switch.NoteIf you receive the follo
AT-S60 Management Software User’s GuideSection II: Advanced Features 201Downloading the AT-S60 Image Switch to SwitchThis procedure explains how to do
Chapter 11: File Downloads and UploadsSection II: Advanced Features 202NoteYou can update only AT-8400 Series switches. You cannot download AT-S60 man
203Chapter 12Event LogThis chapter describes the event log. Sections in the chapter include:❑ Event Log Overview on page 204❑ Configuring the Event Lo
Chapter 12: Event LogSection II: Advanced Features 204Event Log OverviewA managed switch is a complex piece of computer equipment that includes both h
AT-S60 Management Software User’s GuideSection II: Advanced Features 205Configuring the Event LogTo enable or disable the event log and specify what t
Chapter 12: Event LogSection II: Advanced Features 206HaltOnce the event log reaches its maximum capacity, this option causes the log to stop adding n
AT-S60 Management Software User’s GuideSection II: Advanced Features 207Displaying EventsTo specify the types of events you want to display in the eve
Chapter 12: Event LogSection II: Advanced Features 2085. Choose one or more of the following selections:The default is to display informational events
AT-S60 Management Software User’s GuideSection II: Advanced Features 209An example of an event log is show in Figure 65. This log is in the Full displ
21PrefaceThis guide contains instructions on how to configure an AT-8400 Series Switch using the AT-S60 management software. The Preface contains the
Chapter 12: Event LogSection II: Advanced Features 210❑ Date - The date the event occurred.❑ Time - The time the event occurred.❑ Event - The module w
AT-S60 Management Software User’s GuideSection II: Advanced Features 211PSEC Port security (MAC address-based)PTRUNK Port trunkingRADIUS RADIUS authen
Chapter 12: Event LogSection II: Advanced Features 212Saving the Event LogTo save the current contents of the event log as a file in the file system,
AT-S60 Management Software User’s GuideSection II: Advanced Features 213Clearing the Event LogTo clear all events from the log, perform the following
Section II: Advanced Features 214Chapter 13Class of Service (CoS)This chapter contains the procedures for configuring Class of Service (CoS). Sections
AT-S60 Management Software User’s GuideSection II: Advanced Features 215Class of Service OverviewWhen a port on an Ethernet switch becomes oversubscri
Chapter 13: Class of ServiceSection II: Advanced Features 216Each switch port has two egress queues, low and high. When a tagged frame enters a switch
AT-S60 Management Software User’s GuideSection II: Advanced Features 217Configuring CoSTo configure CoS for a port, perform the following procedure:1.
Section II: Advanced Features 218Chapter 14IGMP SnoopingThis chapter provides a description of the Internet Group Management Protocol (IGMP) snooping
AT-S60 Management Software User’s GuideSection II: Advanced Features 219IGMP Snooping OverviewIGMP enables routers to create lists of nodes that are m
Preface22How This Guide is OrganizedThis manual is divided into the following six sections:❑ Section I: Basic Features❑ Section II: Advanced Features❑
Chapter 14: IGMP SnoopingSection II: Advanced Features 220IGMP snooping enables the Fast Ethernet switch to monitor the flow of queries from a router
AT-S60 Management Software User’s GuideSection II: Advanced Features 221Configuring IGMP SnoopingTo configure, enable, or disable IGMP snooping on the
Chapter 14: IGMP SnoopingSection II: Advanced Features 222Options 1 through 5 are described below:1 - IGMP Snooping StatusEnables and disables IGMP sn
AT-S60 Management Software User’s GuideSection II: Advanced Features 223This parameter is useful with networks that contain a large number of multicas
Chapter 14: IGMP SnoopingSection II: Advanced Features 224Displaying a List of Host NodesThis procedure displays a list of the multicast groups on a s
AT-S60 Management Software User’s GuideSection II: Advanced Features 225StatusThe status of the host node. The status can be either Active, meaning th
Chapter 14: IGMP SnoopingSection II: Advanced Features 226Displaying a List of Multicast RoutersA multicast router is a router that is receiving multi
AT-S60 Management Software User’s GuideSection II: Advanced Features 227RouterIPThe IP address of the multicast router.If you enter the multicast rout
Section II: Advanced Features 228Chapter 15STP and RSTPThis chapter provides background information on the Spanning Tree Protocol (STP) and Rapid Span
AT-S60 Management Software User’s GuideSection II: Advanced Features 229STP and RSTP OverviewA physical loop in a network topology can pose a signific
AT-S60 Management Software User’s Guide23Section V: Security FeaturesThe chapters in this section describe how to configure the authentication and adv
Chapter 15: STP and RSTPSection II: Advanced Features 230NoteSpanning tree is disabled by default on the switch.NoteFor information about Multiple Spa
AT-S60 Management Software User’s GuideSection II: Advanced Features 231Path Costs and Port CostsOnce the Root Bridge has been selected, the bridges m
Chapter 15: STP and RSTPSection II: Advanced Features 232The port costs of the ports on an AT-8400 Series switch can be adjusted through the managemen
AT-S60 Management Software User’s GuideSection II: Advanced Features 233The range for port priority is 0 to 240 in increments of 16. Just as with the
Chapter 15: STP and RSTPSection II: Advanced Features 234The forwarding delay value is adjustable on the AT-8400 Series switch through the management
AT-S60 Management Software User’s GuideSection II: Advanced Features 235There are two possible selections:❑ Point-to-point❑ Edge portIf a bridge port
Chapter 15: STP and RSTPSection II: Advanced Features 236If a port is operating in half-duplex mode and is not connected to any further bridges partic
AT-S60 Management Software User’s GuideSection II: Advanced Features 237A port can be both point-to-point and edge at the same time. It would operate
Chapter 15: STP and RSTPSection II: Advanced Features 238The single spanning tree encompasses all ports on the switch. If the ports are grouped into d
AT-S60 Management Software User’s GuideSection II: Advanced Features 239Another approach is to connect your VLANs with tagged ports instead of untagge
Preface24Document ConventionsThis document uses the following conventions:WarningWarnings inform you that performing or omitting a specific action may
Chapter 15: STP and RSTPSection II: Advanced Features 240Enabling or Disabling STP and RSTPThe AT-8400 Series switch can support STP, RSTP, and MSTP.
AT-S60 Management Software User’s GuideSection II: Advanced Features 241The following prompt is displayed:Enter new value (S-STP, R-RSTP, M-MSTP):4. T
Chapter 15: STP and RSTPSection II: Advanced Features 242Configuring STPThis section contains the following procedures:❑ Configuring STP Bridge Settin
AT-S60 Management Software User’s GuideSection II: Advanced Features 243The STP Menu is shown in Figure 75.Figure 75 STP Menu3. Adjust the bridge STP
Chapter 15: STP and RSTPSection II: Advanced Features 2443 - Bridge ForwardingThe waiting period in seconds before a bridge changes to a new state, fo
AT-S60 Management Software User’s GuideSection II: Advanced Features 245Configuring STPPort ParametersTo adjust a port’s STP parameters, perform the f
Chapter 15: STP and RSTPSection II: Advanced Features 246The STP Port Configuration menu is shown in Figure 77.Figure 77 Configure STP Port Settings
AT-S60 Management Software User’s GuideSection II: Advanced Features 247Displaying STPPort SettingsTo display port STP settings, perform the following
Chapter 15: STP and RSTPSection II: Advanced Features 248Configuring RSTPThis section contains the following procedures: ❑ Configuring RSTP Bridge Set
AT-S60 Management Software User’s GuideSection II: Advanced Features 249The RSTP Menu is shown in Figure 79.Figure 79 RSTP Menu3. Adjust the paramete
AT-S60 Management Software User’s Guide25Where to Find Web-based GuidesThe installation and user guides for all Allied Telesyn products are available
Chapter 15: STP and RSTPSection II: Advanced Features 2503 - Bridge Hello TimeThe time interval, in seconds, between generating and sending configurat
AT-S60 Management Software User’s GuideSection II: Advanced Features 2518 - Root PriorityIndicates the bridge priority value on the root bridge. The b
Chapter 15: STP and RSTPSection II: Advanced Features 252ConfiguringRSTP PortParametersTo adjust a port’s RSTP parameters, perform the following proce
AT-S60 Management Software User’s GuideSection II: Advanced Features 253The Configure RSTP Port Settings Menu is shown in Figure 81.Figure 81 Configu
Chapter 15: STP and RSTPSection II: Advanced Features 254C - Check Migration To RSTP on Selected Ports (MCHECK)This parameter resets a RSTP port, allo
AT-S60 Management Software User’s GuideSection II: Advanced Features 255The Display RSTP Port Configuration Menu is shown in Figure 78.Figure 82 Disp
Chapter 15: STP and RSTPSection II: Advanced Features 256The Display RSTP Port State Menu is shown in Figure 78.Figure 83 Display RSTP Port StateThis
Section II: Advanced Features 257Chapter 16Multiple Spanning Tree Protocol (MSTP)This chapter provides background information on the Multiple Spanning
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 258MSTP OverviewAs mentioned in Chapter 15, STP and RSTP on page 228, STP and RSTP are
AT-S60 Management Software User’s GuideSection II: Advanced Features 259NoteDue to different vendor implementations of the new IEEE 802.1s standard, c
Preface26Contacting Allied Telesyn This section provides Allied Telesyn contact information for technical support as well as sales and corporate infor
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 260If the switches were running STP or RSTP, one of the links would be blocked because
AT-S60 Management Software User’s GuideSection II: Advanced Features 261Figure 85 illustrates the same two AT-8400 Series switches and the same two vi
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 262A MSTI can contain more than one VLAN. This is illustrated in Figure 86 where there
AT-S60 Management Software User’s GuideSection II: Advanced Features 263This example illustrates Allied Telesyn’s implementation of MSTP. It shows tha
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 264A configuration name is a name you assign to a region to help you identify it. You
AT-S60 Management Software User’s GuideSection II: Advanced Features 265Figure 87 illustrates the concept of regions. It shows one MSTP region consist
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 266The AT-8400 Series switch determines regional boundaries by examining the MSTP BPDU
AT-S60 Management Software User’s GuideSection II: Advanced Features 267❑ Each MSTI must have a regional root for locating loops in the instance. MSTI
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 268MSTP with STP and RSTPMSTP is fully compatible with STP and RSTP. If a port on an A
AT-S60 Management Software User’s GuideSection II: Advanced Features 269❑ All of the bridges in a region must have the same configuration name, revisi
27Chapter 1AT-S60 OverviewThis chapter describes the AT-S60 software functions, the types of sessions you can use to access the software, and the mana
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 270This is shown in Figure 88. Port 8 on a line card in Switch A is a member of a VLAN
AT-S60 Management Software User’s GuideSection II: Advanced Features 271A problem can arise if you assign some VLANs to MSTIs while leaving others ass
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 272This is illustrated in Figure 90. The example shows two switches, each residing in
AT-S60 Management Software User’s GuideSection II: Advanced Features 273Here is an example. Let’s assume that you have two regions that contain the fo
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 274Configuring MSTPThis section contains the following procedures:❑ Enabling or Disabl
AT-S60 Management Software User’s GuideSection II: Advanced Features 275The Spanning Tree Menu is shown in Figure 91.Figure 91 Spanning Tree MenuNote
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 2765. Type Y for yes or N for no. The switch reboots and if you select Yes, the select
AT-S60 Management Software User’s GuideSection II: Advanced Features 277ConfiguringMSTP BridgeSettingsThis section contains the procedure for configur
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 2782 - Hello TimeThe time interval between generating and sending configuration messag
AT-S60 Management Software User’s GuideSection II: Advanced Features 279revision level must be the same on all bridges in a region. Different regions
Chapter 1: AT-S60 Overview28OverviewThe AT-S60 management software is intended for the AT-8400 Series switch. The software is used to monitor and adju
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 280more bridges have the same bridge or CIST priority values, the bridge with the nume
AT-S60 Management Software User’s GuideSection II: Advanced Features 281The MSTI Menu is shown in Figure 94.Figure 94 MSTI MenuThe fields in the tabl
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 2825. Enter the new MSTP ID. The MSTI IDs range is from 1 to 15. You can specify only
AT-S60 Management Software User’s GuideSection II: Advanced Features 283Modifying an MSTI IDTo change the MSTI priority value for an MSTI, do the foll
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 284Adding or Removing a VLAN from an MSTI IDThis procedure explains how to associate V
AT-S60 Management Software User’s GuideSection II: Advanced Features 285The VLAN-MSTI Association Menu is shown in Figure 95.Figure 95 VLAN-MSTI Asso
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 286Associating a VLAN to an MSTI IDTo associate a VLAN to an MSTP ID, do the following
AT-S60 Management Software User’s GuideSection II: Advanced Features 2874. From the VLAN-MSTI Association Menu, type 2 to select Delete VLANs from MST
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 288You can enter more than one VLAN at a time (for example, 2,4,7) (To view VIDs, refe
AT-S60 Management Software User’s GuideSection II: Advanced Features 289The Configure MSTP Port Settings menu is shown in Figure 97.Figure 97 Configu
AT-S60 Management Software User’s Guide29The following sections in this chapter briefly describe each type of management session. In addition, the fol
Chapter 16: Multiple Spanning TreeSection II: Advanced Features 2905 - Edge PortThis parameter defines whether the port is functioning as an edge port
AT-S60 Management Software User’s GuideSection II: Advanced Features 2915. To display MSTP port state information, type 3 to select Display MSTP Port
292Section IIISNMPv3 ProtocolThere is one chapter in this section that describes the SNMPv3 Protocol. This chapter explains how to configure an AT-840
293Chapter 17SNMPv3 ConfigurationThis chapter provides a description of the AT-S60 implementation of the SNMPv3 protocol. In addition, it provides pro
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 294SNMPv3 OverviewThe SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c protocol
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 295With the SNMPv3 protocol, you create users, determine the protocol used for mes
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 296SNMPv3 PrivacyProtocolAfter you have configured an authentication protocol, you have t
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 297The AT-S60 software supports the MIB tree, starting with the Internet MIBs, as
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 298To determine the destination of the message, you configure the IP address of the host.
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 299First, you create a user in the Configure SNMPv3 User Table. Then you define th
3Table of ContentsList of Figures ...
Chapter 1: AT-S60 Overview30Telnet Management SessionAny management workstation on your network that has the Telnet application protocol can be used t
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 300You start the message notification configuration by defining the type of message you w
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 301❑ SNMPv3 Target Parameters Table on page 302❑ SNMPv3 Community Table on page 30
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 302SNMPv3 SecurityToGroup TableThe Configure SNMPv3 SecurityToGroup Table Menu allows you
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 303SNMPv3 Community TableThe Configure SNMPv3 Community Table Menu allows you to c
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 304Configuring the SNMPv3 ProtocolThis section describes how to configure the SNMPv3 prot
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 305Configuring the SNMPv3 User TableThis section contains a description of the SNM
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 306The Configure SNMPv3 Table Menu is shown in Figure 101.Figure 101 Configure SNMPv3 Ta
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 307The Configure SNMPv3 User Table Menu is shown in Figure 102.Figure 102 Configu
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 308protocol after a message is received. This algorithm generates the message digest. The
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 309You are prompted to re-enter the password.The following prompt is displayed:Ent
AT-S60 Management Software User’s Guide31Web Browser Management SessionYou can also use a web browser to manage a switch. Using a web browser manageme
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 310The following prompt is displayed:Enter User (Security) Name:4. Enter the User Name of
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 311The Modify SNMPv3 User Table is shown in Figure 103. Figure 103 Modify SNMPv3
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 312message digest. The user is authenticated when the authentication protocol checks the
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3132. From the Configure SNMPv3 Table Menu, type 2 to select Configure SNMPv3 User
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 314Modifying the Storage TypeTo modify the Storage Type in an SNMPv3 User Table entry, pe
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 315Configuring the SNMPv3 View TableThis section contains a description of the SNM
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 316The Configure SNMPv3 View Table Menu is shown in Figure 104.Figure 104 Configure SNMP
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3175. Enter subtree that this view will or will not be permitted to display.You ca
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3188. Select one of the following storage types for this table entry:V - VolatileSelect t
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 319The following prompt is displayed:Enter View Subtree (OID format/Text Name):5.
Chapter 1: AT-S60 Overview32SNMP Management SessionAnother way to remotely manage the switch is with an SNMP management program. AT-S60 software suppo
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 320The Modify SNMPv3 View Table Menu is shown in Figure 105.Figure 105 Modify SNMPv3 Vie
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 321This is an optional parameter that is used to further refine the value in the V
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 322The text format is for TCP/IP is:tcpThe following prompt is displayed:Enter View Type
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3236. Enter the View Subtree for this View Name.The following prompt is displayed:
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 324Configuring the SNMPv3 Access TableThis section contains a description of the SNMPv3 A
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 325The Configure SNMPv3 Access Table Menu is shown in Figure 106.Figure 106 Confi
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 326NoteThe Context Prefix and the Context Match fields are a read only fields. The Contex
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 327greatest level of security. You can select this value if you configured the Sec
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 328NoteThe Row Status parameter is a read-only field in the Telnet and Local interfaces.
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 329Deleting anSNMPv3 AccessTable EntryYou may want to delete an entry from the SNM
AT-S60 Management Software User’s Guide33Management Access LevelsThere are two levels of management access on an AT-8400 switch: Manager and Operator.
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3306. Enter the Security Level of this Group Name.Select one of the following Security Le
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 331Configure the values of the Read View Name, Write View Name, and Notify View Na
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 332The Modify SNMPv3 Access Table is shown in Figure 107.Figure 107 Modify SNMPv3 Access
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 333The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthN
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 334Modifying the Write View Name To modify the Write View Name parameter in an SNMPv3 Acc
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 335The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthN
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 336Modifying the Notify View NameTo modify the Notify View Name parameter in an SNMPv3 Ac
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 337The following prompt is displayed:Enter Security Level [N-NoAuthNoPriv, A-AuthN
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 338Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Access Tab
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3397. Enter the Security Level configured for this Group Name. You cannot change t
Chapter 1: AT-S60 Overview34Specifying PortsMany of the commands and parameters, in this manual involve specifying the port(s) on the switch. Port num
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 340Configuring the SNMPv3 SecurityToGroup TableThis section contains a description of the
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 341The Configure SNMPv3 SecurityToGroup Table Menu is shown in Figure 108.Figure 1
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3423-v3Select this value to associate the Group Name with the SNMPv3 protocol. The follow
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 343Deleting anSNMPv3SecurityToGroupTable EntryYou may want to delete an entry from
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 344The following prompt is displayed:Do you want to delete this table entry? (Y/N): [Yes/
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 345The Modify SecurityToGroup Table is displayed as shown Figure 108.Figure 109 M
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3463-v3Select this value to associate the User Name with the SNMPv3 protocol. The followi
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 347Select one of the following SNMP protocols:1-v1Select this value if this User N
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 348Configuring the SNMPv3 Notify TableThis section contains a description of the SNMPv3 N
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 349The Configure SNMPv3 Notify Table Menu is shown in Figure 110.Figure 110 Confi
AT-S60 Management Software User’s Guide35Specifying Time and DateThe Simple Network Time Protocol (SNTP) feature places the time and date on the local
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 350I-InformIndicates this notify table is used to send inform messages. With this message
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 351NoteTo display a Group Name and its associated parameters from the Configure SN
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 352The Modify SNMPv3 Notify Table Menu is displayed as shown in Figure 111.Figure 111 Mo
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 353Modifying a Notify TypeTo modify the Notify Type parameter in an SNMPv3 Notify
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 354Modifying a Storage TypeTo modify the Storage Type parameter in an SNMPv3 Notify Table
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 355Configuring the SNMPv3 Target Address TableThis section contains a description
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 356Creating anSNMPv3 TargetAddress TableEntryTo create an entry in the Configure SNMPv3 T
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3575. Enter the IP address of the host.Use the following format for an IP address:
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 358This name can consist of up to 32-alphanumeric characters. The value configured here m
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 359The Configure SNMPv3 Target Address Table Menu is shown in Figure 114 on page
36Section IBasic FeaturesThe chapters in Section I explain how to manage an AT-8400 switch from a local or Telnet management session. It includes the
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 360Modifying the Target IP AddressTo modify the target IP address in an SNMPv3 Target Add
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3614. To change the Target IP Address, type 1 to select Set Target IP Address.The
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 362This is the name of the SNMP manager, or host, that manages the SNMP activity on your
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3636. Enter a timeout value in milliseconds.When an Inform message is generated, i
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3646. Enter the number of times the switch will retry, or resend, the Inform message.The
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 365Modifying the Target Parameters FieldTo modify the Target Parameters field in a
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 366Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Target Add
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3677. After making changes, type R until you return to the Main Menu. Then type S
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 368Configuring the SNMPv3 Target Parameters TableThis section contains a description of t
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 369There are three functions you can perform with the Configure SNMPv3 Target Para
AT-S80 User’s Guide37
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3703. To create an SNMPv3 Target Parameters Table, type 1 to select Create SNMPv3 Table E
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3717. Select one of the following Security Levels:NoteThe value you configure for
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 372entry with a NonVolatile storage type, the S - Save Configuration Changes option appea
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3735. Enter Y to delete the SNMPv3 Target Address Table entry or N to save it.6. A
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 374NoteYou cannot modify an entry in the SNMPv3 Target Parameter Table that contains a va
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 375The Modify SNMPv3 Target Parameters Table Menu is shown in Figure 115.Figure 11
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 376Modifying the Security ModelFor the Security or User Name you have selected, the value
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 3772-v2cSelect this value if this User Name is associated with the SNMPv2c protoco
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 378Select one of the following Security Levels:NoteThe value you configure for the Securi
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 379The Configure SNMPv3 Table Menu is shown in Figure 101 on page 306.2. From the
Section I: Basic Features 38Chapter 2Starting a Local or Telnet Management SessionThis chapter contains the procedure for starting a local or Telnet m
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 380Modifying the Storage TypeTo modify the Storage Type parameter in an SNMPv3 Target Par
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 381Configuring the SNMPv3 Community TableThis section contains a description of th
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 382For each SNMPv3 Community Table entry, you can configure the following parameters:❑ Co
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 383The Configure SNMPv3 Community Table Menu is shown in Figure 116.Figure 116 Co
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 384NoteAllied Telesyn recommends that you select SNMP Community Names carefully to ensure
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 385NoteThe Row Status parameter is a read-only field in the Telnet and Local inter
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 386Modifying anSNMPv3CommunityTable EntryFor each entry in the SNMPv3 Community Table, yo
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 387The Modify SNMPv3 Community Table Menu is shown in Figure 117.Figure 117 Modif
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 3887. After making changes, type R until you return to the Main Menu. Then type S to sele
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 389The Configure SNMPv3 Table Menu is displayed as shown in Figure 101 on page 30
AT-S60 Management Software User’s GuideSection I: Basic Features 39Local Management SessionTo establish a local management session using the AT-S60 ma
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 390The following prompt is displayed:Enter Community Index:5. Enter the Community Index o
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 391Displaying SNMPv3 Table MenusThe procedures in this section describe how to dis
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 392The Display SNMPv3 Table Menu is shown in Figure 118.Figure 118 Display SNMPv3 Table
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 393Displaying theDisplay SNMPv3View TableMenuThis section describes how to display
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 394Displaying theDisplay SNMPv3Access TableMenuThis section describes how to display the
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 395Displaying theDisplay SNMPv3SecurityToGroupTable MenuThis section describes how
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 396Displaying theDisplay SNMPv3Notify TableMenuThis section describes how to display the
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 397Displaying theDisplay SNMPv3Target AddressTable MenuThis section describes how
Chapter 17: SNMPv3 ConfigurationSection III: SNMPv3 Protocol 398Displaying theDisplay SNMPv3TargetParametersTable MenuThis section describes how to di
AT-S60 Management Software User’s GuideSection III: SNMPv3 Protocol 399Displaying theDisplay SNMPv3CommunityTable MenuThis section describes how to di
Table of Contents4Chapter 3Basic Switch Parameters ...
Chapter 2: Starting a Local or Telnet Mangement SessionSection I: Basic Features 40Starting a LocalManagementSessionTo start a local management sessio
400Section IVVLANsThe chapters in Section IV explain how to configure VLANs on an AT-8400 switch using a local or Telnet management session. The chapt
Section IV: VLANs 401 Chapter 18Tagged and Port-based Virtual LANsThis chapter contains basic information about virtual LANs (VLANs). It also contains
Chapter 18: Virtual LANsSection IV: VLANs 402VLAN OverviewA VLAN is a group of ports on an Ethernet switch that form a logical Ethernet segment. The p
AT-S60 Management Software User’s GuideSection IV: VLANs 403workstations physically, or having to change group memberships by moving cables from one s
Chapter 18: Virtual LANsSection IV: VLANs 404Port-based VLAN OverviewAs explained in the VLAN Overview section, a VLAN consists of a group of ports on
AT-S60 Management Software User’s GuideSection IV: VLANs 405If a VLAN consists only of ports located on one physical switch in your network, you would
Chapter 18: Virtual LANsSection IV: VLANs 406For example, assume that you were creating a port-based VLAN on a switch and you had assigned the VLAN th
AT-S60 Management Software User’s GuideSection IV: VLANs 407❑ The introduction of a router into your network could create security issues from unautho
Chapter 18: Virtual LANsSection IV: VLANs 408Port-BasedExamplesWhat follows are two examples of port-based VLANs that illustrate the basic principles
AT-S60 Management Software User’s GuideSection IV: VLANs 409The table below lists the port assignments for the Sales and Production VLANs on the AT-84
AT-S60 Management Software User’s GuideSection I: Basic Features 41When prompted for the user name and password, enter one of the following options. ❑
Chapter 18: Virtual LANsSection IV: VLANs 410Example 2Figure 128 illustrates our second port-based example. The two VLANs, Sales and Production, now s
AT-S60 Management Software User’s GuideSection IV: VLANs 411The table below lists the port assignments for the Sales and Production VLANs on the switc
Chapter 18: Virtual LANsSection IV: VLANs 412Tagged VLAN OverviewThe second type of VLAN supported by the AT-8400 Series switch is the tagged VLAN. Ta
AT-S60 Management Software User’s GuideSection IV: VLANs 413The parts of a tagged VLAN are much the same as those for a port-based VLAN. They are:❑ VL
Chapter 18: Virtual LANsSection IV: VLANs 414General Rulesfor Creating aTagged VLANBelow is a summary of the rules to observe when creating a tagged V
AT-S60 Management Software User’s GuideSection IV: VLANs 415Tagged VLANExampleFigure 129 illustrates how tagged ports can be used to interconnect IEEE
Chapter 18: Virtual LANsSection IV: VLANs 416This example is nearly identical to the port-based VLAN Example 2 earlier in this chapter. Tagged ports h
AT-S60 Management Software User’s GuideSection IV: VLANs 417Basic VLAN Mode OverviewThe Fast Ethernet Switches support a special VLAN configuration re
Chapter 18: Virtual LANsSection IV: VLANs 418Displaying VLANsThe procedure in this section displays all the port-based and tagged VLANs on the AT-8400
AT-S60 Management Software User’s GuideSection IV: VLANs 4193. From the Display VLAN Menu, type 3 to select Display Port Based VLAN.The Display Port B
Chapter 2: Starting a Local or Telnet Mangement SessionSection I: Basic Features 42Please note the following:❑ The Command Line Interface selection in
Chapter 18: Virtual LANsSection IV: VLANs 420If only the Protocol is GARP, then the corresponding tagged port in the menu was added by GVRP to an exis
AT-S60 Management Software User’s GuideSection IV: VLANs 421Creating a Port-based or Tagged VLANTo create a new port-based or tagged VLAN, perform the
Chapter 18: Virtual LANsSection IV: VLANs 4223. From the Configure VLAN menu, type 4 to select Configure Port-Based VLAN.The Configure Port Based VLAN
AT-S60 Management Software User’s GuideSection IV: VLANs 423After you have entered a name, the following prompt is displayed:Enter VLAN VID: [2 to 409
Chapter 18: Virtual LANsSection IV: VLANs 424If this VLAN does not contain any untagged ports, leave this field empty. For information on entering por
AT-S60 Management Software User’s GuideSection IV: VLANs 425Example of Creating a Port-Based VLANThe following procedure creates the Sales VLAN illust
Chapter 18: Virtual LANsSection IV: VLANs 426Example of Creating a Tagged VLANThe following procedure creates the Production VLAN in the AT-8400 Serie
AT-S60 Management Software User’s GuideSection IV: VLANs 427Modifying a VLANThe section contains the procedure for adding or deleting ports from a tag
Chapter 18: Virtual LANsSection IV: VLANs 428Each menu selection is explained below.1 - Add Ports to VLANTo add ports to a VLAN, do the following:a. T
AT-S60 Management Software User’s GuideSection IV: VLANs 429c. If you want to remove one or more tagged ports from the VLAN, enter the ports at this p
AT-S60 Management Software User’s GuideSection I: Basic Features 43Telnet Management SessionYou can use the Telnet application protocol from a worksta
Chapter 18: Virtual LANsSection IV: VLANs 4304 - Clear Ports from VLANTo remove all ports from the VLAN, do the following:a. Type 4 to select Clear Po
AT-S60 Management Software User’s GuideSection IV: VLANs 431Deleting a VLANTo delete a VLAN, perform the following procedure: 1. From the Configure Po
Chapter 18: Virtual LANsSection IV: VLANs 432Setting a Switch’s VLAN ModeThis section contains the procedure for setting a switch’s VLAN mode. You can
AT-S60 Management Software User’s GuideSection IV: VLANs 433Specifying a Management VLANThe management VLAN is the VLAN through which an AT-8400 Serie
Chapter 18: Virtual LANsSection IV: VLANs 434Now let’s assume that you decided to create a VLAN called NMS with a VID of 24 for the sole purpose of re
Section IV: VLANs 435Chapter 19Multiple VLAN ModesThis chapter explains the Multiple VLAN modes and how to select a mode. This chapter contains the fo
Chapter 19: Multiple VLAN ModesSection IV: VLANs 436Multiple VLAN Mode OverviewThe Multiple VLAN modes simplify the task of configuring a switch in a
AT-S60 Management Software User’s GuideSection IV: VLANs 437NoteThe Multiple VLAN modes are supported only in single switch (that is, an edge switch)
Chapter 19: Multiple VLAN ModesSection IV: VLANs 438NoteIn 802.1Q Multiple VLAN mode, the device connected to the uplink port must be 802.1Q-compliant
AT-S60 Management Software User’s GuideSection IV: VLANs 439CautionThe non-802.1Q-Compliant Multiple VLAN mode does not protect the switch from VLAN l
Chapter 2: Starting a Local or Telnet Mangement SessionSection I: Basic Features 44Starting a TelnetManagementSessionTo start a Telnet management inte
Chapter 19: Multiple VLAN ModesSection IV: VLANs 440Selecting a VLAN ModeThe following procedure explains how to select a VLAN mode on an AT-8400 Seri
AT-S60 Management Software User’s GuideSection IV: VLANs 441The following confirmation is displayed:Setting VLAN mode to Multiple VLAN. Please wait...
Chapter 19: Multiple VLAN ModesSection IV: VLANs 442Changing the Uplink PortOnce the switch is operating in a Multiple VLAN mode, you can always chang
AT-S60 Management Software User’s GuideSection IV: VLANs 443Displaying VLAN InformationTo view the name, VID number, and member ports of the VLANs on
Section IV: VLANs 444Chapter 20GARP VLAN Registration ProtocolThis chapter describes the GARP VLAN Registration Protocol (GVRP). It contains the follo
AT-S60 Management Software User’s GuideSection IV: VLANs 445GARP VLAN Registration Protocol (GVRP) OverviewThe GARP VLAN Registration Protocol (GVRP)
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 446Figure 137 provides an example of how GVRP works.Figure 137 GVRP Example Switches #1
AT-S60 Management Software User’s GuideSection IV: VLANs 447it is not a member, it automatically adds the port to the VLAN as an tagged dynamic GVRP p
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 448❑ You can convert dynamic GVRP VLANs and dynamic GVRP port assignments to static VLANs
AT-S60 Management Software User’s GuideSection IV: VLANs 449GenericAttributeRegistrationProtocol (GARP)OverviewThe following is a technical overview o
Section I: Basic Features 45Chapter 3Basic Switch ParametersThis chapter contains a variety of information about basic switch parameters and procedure
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 450The architecture of GARP is shown in Figure 138. Figure 138 GARP Architecture The GAR
AT-S60 Management Software User’s GuideSection IV: VLANs 451An instance of GID consists of the set of state machines that define the current registrat
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 452The Applicant is therefore looking after the interests of all would-be Participants. T
AT-S60 Management Software User’s GuideSection IV: VLANs 453Configuring GVRPUse the following procedure to configure GVRP. The timers in the following
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 4546. Choose one of the following:E to enable GIP.D to disable GIP.NoteDo not disable GIP
AT-S60 Management Software User’s GuideSection IV: VLANs 455Enabling or Disabling GVRP on a PortThis procedure enables and disables GVRP on a switch p
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 4565. Enter a port or a list of ports. For information about how to specify ports, see Sp
AT-S60 Management Software User’s GuideSection IV: VLANs 4579. After making changes, type R until you return to the Main Menu. Then type S to select S
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 458Displaying GVRP Parameters and StatisticsTo display GVRP counters, database, state mac
AT-S60 Management Software User’s GuideSection IV: VLANs 459GVRP Counters Option 1 - Display GVRP Counters in the Other GARP Port Parameters displays
Chapter 3: Basic Switch ParametersSection I: Basic Features 46Assigning an IP Address to a SwitchWhen building or expanding your network, you need to
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 460Figure 146 GVRP Counters Menu (page 2)The GVRP counters in the menus are defined in T
AT-S60 Management Software User’s GuideSection IV: VLANs 461Transmit Discarded: GARP DisabledNumber of GARP PDUs discarded because the GARP applicatio
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 462Transmit GARP Messages: JoinEmptyTotal number of GARP JoinEmpty messages transmitted f
AT-S60 Management Software User’s GuideSection IV: VLANs 463GVRP Database Option 2 - Display GVRP Database in the Other GARP Port Parameters displays
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 464GIP ConnectedPorts RingOption 3 - Display GIP Connected Ports Ring in the Other GARP P
AT-S60 Management Software User’s GuideSection IV: VLANs 465GVRP StateMachineOption 4 - Display GVRP State Machine in the Other GARP Port Parameters d
Chapter 20: GARP VLAN Registration ProtocolSection IV: VLANs 466App Applicant state machine for the GID index on that particular port. One of:Normal P
AT-S60 Management Software User’s GuideSection IV: VLANs 467App (Continued) Non-Participant Management state:“Von” Very Anxious Observer“Aon” Anxious
468Section VSecurity FeaturesThe chapters in Section V explain how to configure an AT-8400 switch with security features. The chapters include:❑ Chapt
Section V: Security Features 469Chapter 21Port SecurityThis chapter describes port security and provides the procedures for setting port security with
AT-S60 Management Software User’s GuideSection I: Basic Features 47How Do YouAssign an IPAddress?Once you have decided which, if any, switches on your
Chapter 21: Port SecuritySection V: Security Features 470Port Security OverviewThe port security feature can enhance the security of your network. You
AT-S60 Management Software User’s GuideSection V: Security Features 471When the Limited security mode is activated on a port, all dynamic MAC addresse
Chapter 21: Port SecuritySection V: Security Features 472SecurityViolations andIntrusionActionsWhen you set a port’s security level, you can also set
AT-S60 Management Software User’s GuideSection V: Security Features 473Configuring Port SecurityTo configure port security, do the following:To set a
Chapter 21: Port SecuritySection V: Security Features 4743. Type 1 to select Configure Port Security.The following prompt is shown:Enter port-list:4.
AT-S60 Management Software User’s GuideSection V: Security Features 475If you selected one of the other security levels, several new menu options are
Chapter 21: Port SecuritySection V: Security Features 4769. If you selected the Limited security mode for the port, do the following to specify the ma
Section V: Security Features 477Chapter 22Web ServerThe chapter provides an overview of the web server feature. In addition, it describes how to confi
Chapter 22: Web ServerSection V: Security Features 478Web Server OverviewBy default, the switch is configured as a non-secure web server. The web serv
AT-S60 Management Software User’s GuideSection V: Security Features 479Configuring the Web Server for Security FeaturesThis procedure allows you to en
Chapter 3: Basic Switch ParametersSection I: Basic Features 48Configuring an IP Address and Switch NameThe procedure in this section explains how to m
Chapter 22: Web ServerSection V: Security Features 4805. Type 1 to select Status to enable or disable the web server. To configure the web server, you
AT-S60 Management Software User’s GuideSection V: Security Features 481Configuring SSL CertificatesThe high-level configuration procedures included in
Chapter 22: Web ServerSection V: Security Features 482WarningUsing this command creates a certificate that is only suitable for secure switch manageme
AT-S60 Management Software User’s GuideSection V: Security Features 4836. Use TFTP to upload an enrollment request.See Downloading Files on page 172.7
Section V: Security Features 484Chapter 23EncryptionThis chapter contains a description of encryption and procedures for creating keys for encryption
AT-S60 Management Software User’s GuideSection V: Security Features 485Encryption OverviewThis chapter describes the data security services available
Chapter 23: EncryptionSection V: Security Features 486Data EncryptionData encryption for switches is driven by the need for organizations to keep sens
AT-S60 Management Software User’s GuideSection V: Security Features 487by a 64-bit Initialization Vector (IV). This is the DES mode used for the switc
Chapter 23: EncryptionSection V: Security Features 488digital signature. The signature station publishes its public key, and then signs its messages b
AT-S60 Management Software User’s GuideSection V: Security Features 489Data AuthenticationData authentication for switches is driven by the need for o
AT-S60 Management Software User’s GuideSection I: Basic Features 492. Change the parameters as desired. The parameters in the Administrative Menu are
Chapter 23: EncryptionSection V: Security Features 490Key Exchange AlgorithmsKey exchange algorithms are used by switches to securely generate and exc
AT-S60 Management Software User’s GuideSection V: Security Features 491Configuring Keys for EncryptionUse the following procedures to configure, modif
Chapter 23: EncryptionSection V: Security Features 492The Keys/Certificate Configuration Menu is shown in Figure 156.Figure 156 Keys/Certificate Conf
AT-S60 Management Software User’s GuideSection V: Security Features 493The Key Management Menu is shown in Figure 157.Figure 157 Key Management MenuN
Chapter 23: EncryptionSection V: Security Features 494The Create Key Menu is shown in Figure 158.Figure 158 Create Key MenuNoteOnce you have configur
AT-S60 Management Software User’s GuideSection V: Security Features 49510. Type 4 to create a key description.The following prompt is displayed:Enter
Chapter 23: EncryptionSection V: Security Features 4967. To delete a key, select 2 - Delete Key from the Key Management menu.The following message is
AT-S60 Management Software User’s GuideSection V: Security Features 497Exporting Keys The following procedure allows you to export a key to a file. Wh
Chapter 23: EncryptionSection V: Security Features 498NoteKey Type is a read-only field. You cannot change this value.7. To specify the format of the
AT-S60 Management Software User’s GuideSection V: Security Features 499The Import Key From File Menu is shown in Figure 160.Figure 160 Import Key Fro
AT-S60 Management Software User’s Guide5Deleting MAC Addresses ...
Chapter 3: Basic Switch ParametersSection I: Basic Features 509 - Set Console Baud RateThis selection allows you set the baud rate of the serial port
Chapter 23: EncryptionSection V: Security Features 50010. Type 5 to select Import Key From File to import a key to the switch from an external file.Th
Section V: Security Features 501Chapter 24Public Key Infrastructure (PKI)This chapter describes the Public Key Infrastructure (PKI) feature and provid
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 502Public Key Infrastructure OverviewThis chapter describes the Public Key Inf
AT-S60 Management Software User’s GuideSection V: Security Features 503MessageEncryptionOne of the two main services provided by public key encryption
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 504An X.509 v3 certificate consists of:❑ A serial number, which distinguishes
AT-S60 Management Software User’s GuideSection V: Security Features 505Certification AuthoritiesA Certification Authority is an entity which issues, u
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 506Root CA CertificatesA root CA must sign its own certificate. The root CA is
AT-S60 Management Software User’s GuideSection V: Security Features 507PKI ImplementationThe following sections discuss Allied Telesyn’s implementatio
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 508Configuring CertificatesUse the procedures in this section to create a cert
AT-S60 Management Software User’s GuideSection V: Security Features 509The Public Key Infrastructure (PKI) Certification Menu is shown in Figure 161.F
AT-S60 Management Software User’s GuideSection I: Basic Features 51Displaying and Clearing Line Card InformationThis section describes how to display
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 510The X509 Certificate Management Menu is shown in Figure 162.Figure 162 X50
AT-S60 Management Software User’s GuideSection V: Security Features 511The Create Self-Signed Certificate Menu is shown in Figure 163.Figure 163 Crea
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 51210. Type 3 - Format to select the type of encoding format the certificate i
AT-S60 Management Software User’s GuideSection V: Security Features 513Country names are generally given in the form of the two-letter ISO 3166 code f
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 514The X509 Certificate Management Menu is shown in Figure 162 on page 510.5.
AT-S60 Management Software User’s GuideSection V: Security Features 515The filename is the Certificate Name with the *.cer extension. For example, if
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 516The following message is displayed:Enter a certificate name ->8. Enter t
AT-S60 Management Software User’s GuideSection V: Security Features 51711. Type 4 - Modify Certificate to update your changes in the certificate datab
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 518ViewingCertificatesTo view the details of a certificate, perform the follow
AT-S60 Management Software User’s GuideSection V: Security Features 519The View Certificate Details Menu (page 1) is shown in Figure 166.Figure 166 V
Chapter 3: Basic Switch ParametersSection I: Basic Features 52The Display Line Card Menu is shown in Figure 6.Figure 6 Display Line Card Menu3. From
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 5207. The following fields are displayed:Name - lists the name of the certific
AT-S60 Management Software User’s GuideSection V: Security Features 521Generating Enrollment RequestsTo request a certificate from a Certificate Autho
Chapter 24: Public Key Infrastructure (PKI)Section V: Security Features 5225. Type 1 - Request Name.The following message is displayed:Enter Enrollmen
Section V: Security Features 523Chapter 25Secure Sockets Layer (SSL)The chapter contains information about Secure Sockets Layer (SSL) as well as a pro
Chapter 25: Secure Sockets Layer (SSL)Section V: Security Features 524Secure Sockets Layer OverviewThis chapter describes the Secure Sockets Layer (SS
AT-S60 Management Software User’s GuideSection V: Security Features 525SSL Encryption SSL uses encryption to ensure the security of data transmission.
Chapter 25: Secure Sockets Layer (SSL)Section V: Security Features 526The Change Cipher Spec message informs the receiving party that all subsequent m
AT-S60 Management Software User’s GuideSection V: Security Features 527SSL andEnhancedStackingSecure Sockets Layer (SSL) is supported in an enhanced s
Chapter 25: Secure Sockets Layer (SSL)Section V: Security Features 528Configuring SSLThis section describes how to configure SSL. This procedure is pa
Section V: Security Features 529Chapter 26Secure Shell (SSH)The chapter contains overview information about the Secure Shell (SSH) protocol as well a
AT-S60 Management Software User’s GuideSection I: Basic Features 53Displaying LineCard StatisticsTo display the current line card statistics, perform
Chapter 26: Secure Shell (SSH)Section V: Security Features 530SSH OverviewThis chapter describes the Secure Shell (SSH) protocol, including:❑ Support
AT-S60 Management Software User’s GuideSection V: Security Features 531❑ RSA public keys with lengths of 512 to 1536 bits are supported. Keys are stor
Chapter 26: Secure Shell (SSH)Section V: Security Features 532SSH Clients The SSH protocol provides a secure connection between the switch and SSH cli
AT-S60 Management Software User’s GuideSection V: Security Features 533This is shown in Figure 170. The figure shows an SSH management workstation tha
Chapter 26: Secure Shell (SSH)Section V: Security Features 534SSH Overall Configuration Configuring the SSH server requires you to perform several pro
AT-S60 Management Software User’s GuideSection V: Security Features 535Configuring SSHThis section describes how to configure the switch as an SSH ser
Chapter 26: Secure Shell (SSH)Section V: Security Features 536The Secure Shell (SSH) Menu is shown in Figure 171.Figure 171 Secure Shell (SSH) Menu3.
AT-S60 Management Software User’s GuideSection V: Security Features 537This timer determines how often the server key is regenerated. Naturally, a ser
Chapter 26: Secure Shell (SSH)Section V: Security Features 538Displaying SSH InformationTo display SSH server information, perform the following proce
AT-S60 Management Software User’s GuideSection V: Security Features 539❑ Server Port: Indicates the well-known port for SSH. The default is port 22.❑
Chapter 3: Basic Switch ParametersSection I: Basic Features 54Clearing LineCard StatisticsTo clear the current line card statistics, perform the follo
Section V: Security Features 540Chapter 27TACACS+ and RADIUS ProtocolsThis chapter explains how you can use the two authentication protocols TACACS+ a
AT-S60 Management Software User’s GuideSection V: Security Features 541TACACS+ and RADIUS OverviewThe AT-S60 software has two standard management logi
Chapter 27: TACACS+ and RADIUS ProtocolsSection V: Security Features 542Authorization defines what a user can do once logged in to a switch. You assig
AT-S60 Management Software User’s GuideSection V: Security Features 543NoteThis manual does not explain how to configure TACACS+ or RADIUS server soft
Chapter 27: TACACS+ and RADIUS ProtocolsSection V: Security Features 544Enabling TACACS+ or RADIUSTo enable or disable the server-based authentication
AT-S60 Management Software User’s GuideSection V: Security Features 545Configuring TACACS+To configure TACACS+, perform the following procedure:1. Fro
Chapter 27: TACACS+ and RADIUS ProtocolsSection V: Security Features 546However, if you are specifying only one TACACS+ server or if the servers have
AT-S60 Management Software User’s GuideSection V: Security Features 547Configuring RADIUSTo configure RADIUS, perform the following procedure:1. From
Chapter 27: TACACS+ and RADIUS ProtocolsSection V: Security Features 548the server cannot respond. If the timeout expires and the server hasn’t respon
Section V: Security Features 549Chapter 28802.1x Port-based Network Access ControlThis chapter explains 802.1x Port-based Network Access Control and h
AT-S60 Management Software User’s GuideSection I: Basic Features 55Displaying and Clearing System InformationThis section describes how to display and
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 550802.1x Port-based Access Network Control OverviewThe AT-S60 management sof
AT-S60 Management Software User’s GuideSection V: Security Features 551❑ Authentication server - The authentication server is the network device that
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 5527. When the supplicant sends an EAPOL-Logoff message, the switch removes t
AT-S60 Management Software User’s GuideSection V: Security Features 553Figure 177 Example of Authenticator RoleAs mentioned earlier, the switch does
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 554The supplicant role is shown in Figure 178 on page 554. Port 3.2 on Switch
AT-S60 Management Software User’s GuideSection V: Security Features 555Authentication Server The authentication server verifies the supplicant’s detai
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 556RADIUSAccountingThe AT-S60 management software supports RADIUS accounting
AT-S60 Management Software User’s GuideSection V: Security Features 557Enabling and Disabling Port-based Access ControlTo globally enable or disable p
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 5584. Type E to enable port-based access control, or D to disable port-based
AT-S60 Management Software User’s GuideSection V: Security Features 559Setting the Port Access Role Use this procedure to configure a port with an acc
Chapter 3: Basic Switch ParametersSection I: Basic Features 56The Display System Statistics Menu is shown in Figure 10.Figure 10 Display System Stati
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 560The Port Access Control Menu is shown in Figure 181.Figure 181 Configure
AT-S60 Management Software User’s GuideSection V: Security Features 561Configuring Authenticator ParametersAfter you have enabled port-based access co
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 5623. From the Port Access Control menu, type 4 to select Configure Authentic
AT-S60 Management Software User’s GuideSection V: Security Features 563The Configure Authenticator Port Access Parameters Menu is shown in Figure 183.
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 564❑ Force-unauthorized: Causes the port to remain in the unauthorized state,
AT-S60 Management Software User’s GuideSection V: Security Features 565Configuring Supplicant ParametersAfter you have enabled port-based access contr
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 566The Configure Supplicant Menu is shown in Figure 184.Figure 184 Configure
AT-S60 Management Software User’s GuideSection V: Security Features 5676. Select the parameter that you want to modify. They are described below:1 - A
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 568Configuring RADIUS AccountingThe AT-S60 management software supports RADIU
AT-S60 Management Software User’s GuideSection V: Security Features 5695. Select a status for the RADIUS Accounting feature.Choose from the following
AT-S60 Management Software User’s GuideSection I: Basic Features 57Activating the BootP and DHCP ServicesThe BootP and DHCP application protocols were
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 570Choose from the following selections:E - Select E to enable the switch to
AT-S60 Management Software User’s GuideSection V: Security Features 571Displaying Port-based Access Control StatusThere are three ways to display port
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 572The Display Port Access Status menu is shown in Figure 187.Figure 187 Dis
AT-S60 Management Software User’s GuideSection V: Security Features 573When you configure a port with a Supplicant role, the Status field can have the
Chapter 28: 802.1x Port-based Access ControlSection V: Security Features 574The Display Authenticator Port Access Parameters Menu is shown in Figure 1
AT-S60 Management Software User’s GuideSection V: Security Features 575The Display Supplicant Port Access Parameters Menu is shown in Figure 189. Figu
576Section VIWeb Browser ManagementThe chapters in Section IV explain how to manage an AT-8400 switch using a web browser. The chapters include:❑ Chap
AT-S80 User’s Guide577❑ Chapter 45: TACACS+ and RADIUS Protocols on page 796❑ Chapter 46: 802.1x Port-based Network Access Control on page 806
Section VI: Web Browser Management 578Chapter 29Starting a Web Browser Management SessionThis chapter contains the procedure for starting a management
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 579Starting a Web Browser Management SessionThis section explains how to sta
Chapter 3: Basic Switch ParametersSection I: Basic Features 58NoteIf you activate BOOTP/DHCP, the switch immediately begins to query the network for a
Chapter 29: Starting a Web Browser Management SessionSection VI: Web Browser Management 5802. Enter the IP address of the switch in the URL field of t
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 581The main menu is on the left side of the Home Page. It consists of the fo
Section VI: Web Browser Management 582Chapter 30Basic Switch ParametersThis chapter provides the following procedures for configuring basic switch par
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 583Configuring an IP Address and Switch NameThis procedure describes the par
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 584The Configuration System Page is displayed with the General Tab selected by d
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 5852. Change the following parameters as desired:System NameThis parameter s
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 586Manager PasswordManager Confirm PasswordThese parameters are used to change t
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 5873. After you have set the parameters, click Apply.Your changes are activa
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 588Setting the System TimeTo set system time manually on the switch, perform the
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 5895. In the Additional Time Parameters section you can specify the UTC offs
AT-S60 Management Software User’s GuideSection I: Basic Features 59Setting the System TimeTo set system time on the switch, configure the Simple Netwo
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 590Setting Up SNTPWhen you set up SNTP, the switch polls an SNTP or NTP server f
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 591Activating the BOOTP and DHCP ServicesFor background information on BOOTP
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 592Displaying System InformationTo view system information you access the Monito
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 593The sections in the Tab are defined below.GeneralThis section displays th
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 594❑ Switch Mode - Defines the switch’s current VLAN mode. If this parameter dis
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 595Configuring SNMPv1 and SNMPv2c ProtocolsThis section provides instruction
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 596The SNMP Tab is shown in Figure 195.Figure 195 Configuration System Page, SN
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 5976. To configure SNMPv1 and SNMPv2 communities, click Configure in the SNM
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 598The Add New SNMPv1 & SNMPv2c Community Page is shown in Figure 197. Figur
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 599Access ModeClick Read Only to allow read access to the SNMP community. To
Table of Contents6Chapter 12Event Log ...
Chapter 3: Basic Switch ParametersSection I: Basic Features 60The Configure System Software Menu is displayed in Figure 12.Figure 12 Configure System
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 600Figure 198 Modify SNMPv1 & SNMPv2c Community Page5. Modify the following
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 601Manager IP Address1 through Manager IP Address 8Enter an IP Address of a
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 602The SNMP Monitoring Tab is shown in Figure 199.Figure 199 SNMP Monitoring Ta
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 603The Monitoring, SNMPv1 & SNMPv2c Communities Page is shown in Figure
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 604Resetting a SwitchTo reset a switch, perform the following procedure: 1. From
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 605Pinging a Remote SystemYou can instruct the switch to ping a node on your
Chapter 30: Basic Switch ParametersSection VI: Web Browser Management 606Returning the AT-S60 Software to the Factory Default ValuesThe procedure in t
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6073. Click the Reboot Switch After Setting Defaults checkbox.4. Click Apply
608Chapter 31File Downloads and UploadsThis chapter contains the procedure for downloading a new AT-S60 image file onto the switch using a web browser
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 609Downloading a FileThis procedure explains how to download a file from a T
AT-S60 Management Software User’s GuideSection I: Basic Features 615. Type 1 - System Time to manually set the time and date for the switch. To set sy
Chapter 31: File Downloads and UploadsSection VI: Web Browser Management 610❑ Installing a new AT-S60 software image does not change the current confi
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6113. In the Server IP Address field, enter the IP address of the network no
Chapter 31: File Downloads and UploadsSection VI: Web Browser Management 612Uploading a FileThis procedure explains how to upload a file from the swit
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6134. In the Operation field, click Upload.5. In the Server Filename field,
Section VI: Web Browser Management 614Chapter 32Enhanced StackingThis chapter introduces enhanced stacking, describes how to assign enhanced stacking
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 615OverviewUsing a web browser management session, you can view and set the
Chapter 32: Enhanced StackingSection VI: Web Browser Management 616Setting a Switch’s Enhanced Stacking StatusTo adjust a switch’s enhanced stacking s
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 617Selecting a Switch in an Enhanced StackYou can use the AT-S60 software to
Chapter 32: Enhanced StackingSection VI: Web Browser Management 618The master switch polls the network for all remote switches in the same subnet and
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 619The Home Page for the remote switch you selected is displayed. An example
Chapter 3: Basic Switch ParametersSection I: Basic Features 6211. Enter an IP address of your SNTP or NTP server.Use the standard IP format: xxx.xxx.x
Section VI: Web Browser Management 620Chapter 33Port ParametersThe procedures in this chapter allow you to view and change the parameter settings for
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 621Configuring Port ParametersThis procedure describes how to configure one
Chapter 33: Port ParametersSection VI: Web Browser Management 622CautionUse caution when you update the port that is connected to your management work
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 623To select a value, click the circle next it. Possible values are:❑ Auto-N
Chapter 33: Port ParametersSection VI: Web Browser Management 624❑ High - Indicates high priority has been assigned to the port. As a result, all tagg
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 625Back PressureYou can use this selection only if the port or ports you spe
Chapter 33: Port ParametersSection VI: Web Browser Management 626Displaying Port Status and StatisticsThe procedures in this section display the opera
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6273. Click on a port. You can select more than one port at a time when you
Chapter 33: Port ParametersSection VI: Web Browser Management 628The columns on the page are described below:PortIndicates the port number in the foll
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 629❑ Down - indicates that the port and the end node have not established a
AT-S60 Management Software User’s GuideSection I: Basic Features 63Rebooting a SwitchTo reset a switch while preserving the switch configuration, perf
Chapter 33: Port ParametersSection VI: Web Browser Management 630STP StateThe current operating status of the port. Possible values are:❑ Forwarding -
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 631You can select only one port when displaying statistics. After you select
Chapter 33: Port ParametersSection VI: Web Browser Management 632Bytes SentNumber of bytes transmitted from the port.Frames SentNumber of frames trans
Section VI: Web Browser Management 633Chapter 34MAC Address TableThis chapter describes how to display the dynamic and static addresses in the MAC add
Chapter 34: MAC Address TableSection VI: Web Browser Management 634Displaying the MAC Address TableTo view the MAC address table, perform the followin
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 635View Static MAC AddressesThis option displays only the static MAC address
Chapter 34: MAC Address TableSection VI: Web Browser Management 636The MAC addresses are displayed in a table. The columns in the table are:VLAN IDThe
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 637Adding Static Unicast and Multicast MAC AddressesThis section contains th
Chapter 34: MAC Address TableSection VI: Web Browser Management 6385. In the Port Number field, enter the port number that is to be assigned the MAC a
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 639Deleting MAC AddressesTo delete a static, dynamic, or multicast MAC addre
Chapter 3: Basic Switch ParametersSection I: Basic Features 64Configuring the AT-S60 Software Security FeaturesThe AT-S60 software has several securit
Chapter 34: MAC Address TableSection VI: Web Browser Management 640Changing the Aging TimeThe switch uses the aging time to delete inactive dynamic MA
Section VI: Web Browser Management 641Chapter 35Port TrunkingThis chapter explains how to configure a port trunk using a web browser management sessio
Chapter 35: Port TrunkingSection VI: Web Browser Management 642Creating or Deleting a Port TrunkThe following procedures allow you to create or delete
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6434. Click Add.The Add New Trunk Page is shown in Figure 216.Figure 216 Ad
Chapter 35: Port TrunkingSection VI: Web Browser Management 64410. Configure the ports on the remote switch for port trunking.You can now connect the
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 645Modifying a Port TrunkThis procedure allows you to modify a port trunk us
Chapter 35: Port TrunkingSection VI: Web Browser Management 646The Modify Trunk Page is shown in Figure 217.Figure 217 Modify Trunk Page5. Click on t
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 647Displaying the Port TrunksThis procedure allows you to view the port trun
Section VI: Web Browser Management 648Chapter 36Port MirroringThis chapter explains how to configure a port mirror using a web browser management sess
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 649Creating or Deleting a Port MirrorUse the following procedures to create,
AT-S60 Management Software User’s GuideSection I: Basic Features 65Configuring theManagementPasswordsThere are two levels of management access on an A
Chapter 36: Port MirroringSection VI: Web Browser Management 650The Add New Mirror Page is displayed as shown in Figure 220.Figure 220 Add New Mirror
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 651Deleting a PortMirrorUse this procedure to delete a port mirror using a w
Chapter 36: Port MirroringSection VI: Web Browser Management 652Modifying a Port MirrorTo change the source mirror port or the destination mirror port
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6535. Configure the mirror ports:❑ Click once to select S for source mirror
Chapter 36: Port MirroringSection VI: Web Browser Management 654Displaying the Port Mirror ListThis procedure allows you to view the list of port mirr
655Chapter 37Event LogThis chapter describes how to configure the Event Log using a web browser management session. It includes the following procedur
Chapter 37: Event LogSection VI: Web Browser Management 656Enabling or Disabling the Event LogAllied Telesyn recommends setting the switch’s date and
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 657If you enable the log, the system immediately begins to add events to the
Chapter 37: Event LogSection VI: Web Browser Management 658Displaying EventsTo view the Event Log, do the following:1. From the Home Page, click eithe
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 659Figure 224 shows an example of the Event Log in the Full display mode. Th
Chapter 3: Basic Switch ParametersSection I: Basic Features 66NoteYou must assign different values to each password.ConfiguringManagementAccessThis pr
Chapter 37: Event LogSection VI: Web Browser Management 660Saving the Event LogYou can save the Event Log as a file in the file system. Once you save
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 661Clearing the Event LogTo clear all events from the log, perform the follo
Section VI: Web Browser Management 662Chapter 38IGMP SnoopingThis chapter describes how to configure the IGMP snooping feature on the switch. It conta
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 663Configuring IGMP SnoopingTo configure IGMP snooping from a web browser ma
Chapter 38: IGMP SnoopingSection VI: Web Browser Management 664Select the Single-Host/Port (Edge) setting when there is only one host node connected t
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 665If the switch does not detect any queries from a multicast router during
Chapter 38: IGMP SnoopingSection VI: Web Browser Management 666Displaying a List of Host Nodes and Multicast RoutersYou can use the AT-S60 software to
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 667The View Multicast Hosts List Page is shown in Figure 227.Figure 227 Vie
Chapter 38: IGMP SnoopingSection VI: Web Browser Management 668The View Multicast Routers List Page is shown in Figure 228.Figure 228 View Multicast
Section VI: Web Browser Management 669Chapter 39STP, RSTP, and MSTPThis chapter explains how to configure STP, RSTP, and MSTP parameters on an AT-8400
AT-S60 Management Software User’s GuideSection I: Basic Features 678. To configure SNMPv1 and SNMPv2 access, type 8 to select Configure SNMP. The Conf
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 670Enabling STP, RSTP, or MSTPThe AT-8400 Series switch can support the three spanni
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 671NoteIf you do not want to change the active spanning tree protocol and ju
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 672Configuring and Modifying STPTo configure and modify STP, perform the following p
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 673.Figure 231 Expanded STP Spanning Tree Tab3. In the Configure STP Parame
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 674parameter can be from 0 (zero) to 15, with 0 having the highest priority. For a l
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 675The STP Settings Page is shown in Figure 232.Figure 232 STP Settings Pag
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 676Configuring and Modifying RSTPTo configure and modify RSTP, perform the following
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 677Figure 233 Expanded RSTP Spanning Tree Tab4. In the Configure RSTP Param
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 678bridges have the same priority value, the bridge with the numerically lowest MAC
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 679Root PriorityIndicates the bridge priority value on the root bridge. The
Chapter 3: Basic Switch ParametersSection I: Basic Features 68Displaying the AT-S60 Hardware and Software InformationThe procedures in this section di
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 680Each time an RSTP port is reset by receiving STP BPDUs, you need to reset the RST
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 681Configuring and Modifying MSTPThe procedures for configuring and modifyin
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 682The expanded MSTP Spanning Tree Tab is displayed as shown in Figure 235.Figure 23
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 683NoteThis procedure explains the Configure MSTP Parameters section of the
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 684All bridges in a single-instance bridged LAN use this aging time to test the age
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 685Creating,Deleting, orModifying MSTIIDsTo create, delete, or modify MSTI I
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 686Deleting an MSTI IDTo delete an MSTI ID, do the following:1. Display the Spanning
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 6874. In the Priority field, enter a new MSTI Priority value. This parameter
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 688Modifying a VLAN AssociationTo modify a VLAN association, do the following:1. Dis
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 689ConfiguringMSTP PortParametersTo configure MSTP port parameters, perform
AT-S60 Management Software User’s GuideSection I: Basic Features 694. To display fan information, select 4 - Display System Fan A Information or selec
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 690Edge PortThis parameter defines whether the port is functioning as an edge port.
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 691Displaying STP, RSTP, or MSTP SettingsTo display spanning tree parameter
Chapter 39: STP, RSTP, and MSTPSection VI: Web Browser Management 692Figure 240 shows an example of the Monitor STP Parameters Tab. The contents of th
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 693The STP Settings Page is shown in Figure 241.Figure 241 STP Settings Pag
Section VI: Web Browser Management 694Chapter 40SNMPv3 ProtocolThis chapter provides the following procedures for configuring basic switch parameters
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 695Configuring the SNMPv3 ProtocolTo configure the SNMPv3 protocol, you need
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 696Enabling the SNMP ProtocolIn order to allow an NMS (an SNMP manager) to access the sw
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 697Use this parameter to enable the switch to be remotely managed with an SN
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 698Configuring the SNMPv3 User TableYou can create, delete, and modify an SNMPv3 User Ta
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 699The SNMPv3 User Table Page is shown in Figure 243.Figure 243 SNMPv3 User
AT-S60 Management Software User’s Guide7Section IIISNMPv3 Protocol ...
Chapter 3: Basic Switch ParametersSection I: Basic Features 70You cannot change the information displayed in selections 1 through 6 in the Display Sys
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7006. In the Authentication Protocol field, enter an authentication protocol. This is an
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 70110. In the Privacy Password field, enter a privacy password of up to 32 a
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7025. To save your changes, return to the General Tab and click Save Changes.Modifying a
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 703Select one of the following:NoneThis value represents no authentication p
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 704DESSelect this value to make the DES privacy (or encryption) protocol the privacy pro
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 705Configuring the SNMPv3 View TableYou can create, delete, and modify an SN
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7064. To create a new SNMPv3 View Table entry click Add.The Add New SNMPv3 View Page is
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 707The View Subtree parameter defines a MIB View and the Subtree Mask furthe
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7083. In the SNMPv3 section of the page, click the circle next to Configure View Table.
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7095. In the Subtree Mask field, enter a subtree mask in hexidecimal format.
AT-S60 Management Software User’s GuideSection I: Basic Features 71Pinging a Remote SystemYou can instruct the switch to ping a remote device on your
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 710Configuring the SNMPv3 Access TableYou can create, delete, and modify an SNMPv3 Acces
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 711The Add New SNMPv3 Access Page is shown in Figure 250.Figure 250 Add New
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 712This parameter allows the users assigned to this Group Name to view the information s
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 713SNMP users, but you do not want to encrypt messages using a privacy proto
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 714Deleting anAccess TableEntryTo delete an entry in the SNMPv3 Access Table, perform th
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 715The Modify SNMPv3 Access Page is shown in Figure 251.Figure 251 Modify S
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 716NoteThe Context Match field is a read only field. The Context Match field is always s
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 717Configuring the SNMPv3 SecurityToGroup TableYou can create, delete, and m
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7184. To create an SNMPv3 SecurityToGroup Table entry, click Add.The Add New SNMPv3 Secu
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 719There are four default values for this field that are reserved for SNMPv1
Chapter 3: Basic Switch ParametersSection I: Basic Features 72Returning the AT-S60 Software to the Factory Default ValuesThe procedure in this section
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 720The SNMPv3 SecurityToGroup Table Page is shown in Figure 252 on page 717.4. Click the
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7215. In the Group Name field, enter a Group Name that you configured in the
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 722Configuring the SNMPv3 Notify TableYou can create, delete, and modify an SNMPv3 Notif
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7234. To create an SNMPv3 Notify Table entry, click Add.The Add New SNMPv3 N
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 724NonVolatileSelect this storage type if you want the ability to save an entry in the N
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7253. In the SNMPv3 section of the page, click the circle next to Configure
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 726NonVolatileSelect this storage type if you want the ability to save an entry in the N
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 727Configuring the SNMPv3 Target Address TableYou can create, delete, and mo
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 728Figure 258 SNMPv3 Target Address Table Page4. To create an SNMPv3 Target Address Tab
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7295. In the Target Address Name field, enter the name of the SNMP manager,
AT-S60 Management Software User’s GuideSection I: Basic Features 737. Type Y to reboot the switch.The operating parameters are returned to their defau
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 730NonVolatileSelect this storage type if you want the ability to save an entry in the T
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 731The Configuration System Page is displayed with the General Tab selected
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 732When an Inform message is generated, it requires a response from the switch. The time
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 733Configuring the SNMPv3 Target Parameters TableYou can create, delete, and
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7344. To create an SNMPv3 Target Parameters Table entry, click Add.The Add New SNMPv3 Ta
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 735v3Select this value to process messages with the SNMPv3 protocol. 7. In t
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 736This level provides the greatest level of security. You can select this value if you
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 737A warning message is displayed. Click OK to remove the Target Parameters
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 738NoteEnter a value for the Message Processing Model field only if you select SNMPv1 or
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 739NoteIf you have selected SNMPv1 or SNMPv2c as the Security Model, you mus
Chapter 3: Basic Switch ParametersSection I: Basic Features 74Configuring the Console Startup ModeYou can configure the AT-S60 software to display eit
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 740Configuring the SNMPv3 Community TableYou can create, delete, and modify an SNMPv3 Co
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 741Figure 264 SNMPv3 Community Table Page4. To create an SNMPv3 Community T
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7425. In the Community Index field, enter a numerical value for this Community.This para
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 743making changes to an SNMPv3 Community Table entry with a NonVolatile stor
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 7443. In the SNMPv3 section of the page, click the circle next to Configure Community Ta
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 745NoteDo not use a value configured with the User Name parameter in the SNM
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 746Displaying SNMPv3 TablesThis section contains procedures to display the SNMPv3 Tables
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 747Displaying UserTable EntriesTo display entries in the SNMPv3 User Table,
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 748Displaying ViewTable EntriesTo display entries in the SNMPv3 View Table, perform the
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 749DisplayingAccess TableEntriesTo display entries in the SNMPv3 Access Tabl
Section I: Basic Features 75Chapter 4Enhanced StackingThis chapter explains the enhanced stacking feature and provides procedures for using this featu
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 750DisplayingSecurityToGroupTable EntriesTo display entries in the SNMPv3 SecurityToGrou
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 751DisplayingNotify TableEntriesTo display entries in the SNMPv3 Notify Tabl
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 752DisplayingTarget AddressTable EntriesTo display entries in the SNMPv3 Target Address
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 753DisplayingTargetParametersTable EntriesTo display entries in the SNMPv3 T
Chapter 40: SNMPv3 ProtocolSection VI: Web Browser Management 754DisplayingSNMPv3CommunityTable EntriesTo display entries in the SNMPv3 Community Tabl
Section VI: Web Browser Management 755Chapter 41Port-based VLANsThis chapter explains how to create, modify, and delete VLANs using a web browser mana
Chapter 41: Port-based VLANsSection VI: Web Browser Management 756Creating a Port Based VLANTo create a new port-based or tagged VLAN, perform the fol
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 757Figure 276 Port-Based VLANs Page5. Click Add.The Add New VLAN Page is sh
Chapter 41: Port-based VLANsSection VI: Web Browser Management 7586. In the VID field, enter a VID value for the new VLAN. The range of the VID value
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 759NoteThe untagged ports that you assign to the new VLAN are automatically
Chapter 4: Enhanced StackingSection I: Basic Features 76Enhanced Stacking OverviewThe enhanced stacking feature can make it easier for you to manage a
Chapter 41: Port-based VLANsSection VI: Web Browser Management 760Modifying a Port-Based VLANTo modify a port-based or tagged VLAN, perform the follow
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 761The Modify VLAN Page is displayed as shown in Figure 278.Figure 278 Modi
Chapter 41: Port-based VLANsSection VI: Web Browser Management 762Deleting a VLANTo delete a port-based or tagged VLAN from the switch, perform the fo
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 763Displaying VLANsTo display all the existing VLANs on a switch, perform th
Chapter 41: Port-based VLANsSection VI: Web Browser Management 764The Port-Based VLANs Page is shown in Figure 280.Figure 280 Monitoring, Port-Based
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 765Setting the Switch’s VLAN ModeThis section contains the procedure for set
Section VI: Web Browser Management 766Chapter 42GARP VLAN Registration ProtocolThis chapter about web server security contains the following procedure
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 767Configuring GVRPTo configure GVRP, perform the following procedure: 1. Fr
Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 7684. Configure the following parameters: Enable GVRPClick in this box t
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 769Resetting GVRP to the DefaultsTo reset GVRP to the defaults:1. From the H
AT-S60 Management Software User’s GuideSection I: Basic Features 77There are three basic steps to implementing this feature on your network:1. Select
Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 770Modifying the GVRP Port ConfigurationTo modify the GVRP port configur
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 771Displaying the GVRP SettingsThe procedures in this section allow you to d
Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 772The GVRP Tab is shown in Figure 283.Figure 283 Monitoring Layer 2 Pa
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 773The GVRP Port Configuration Page is shown in Figure 284.Figure 284 GVRP
Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 774The GVRP Counters Page is shown in Figure 285.Figure 285 GVRP Counte
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 775Transmit Discarded: GARPDisabledNumber of GARP packets (PDUs) discarded b
Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 776Transmit GARP Messages: JoinInTotal number of GARP JoinIn messages tr
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 777The GVRP Database Page is shown in Figure 286.Figure 286 GVRP Database P
Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 778Displaying GIPConnectedPorts RingTo display the GIP Connected Ports R
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 779The information on this page is described in Table 19.DisplayingGVRP Stat
Chapter 4: Enhanced StackingSection I: Basic Features 78This is explained in the procedure Setting a Switch’s Enhanced Stacking Status on page 79.Exam
Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 780The GVRP State Machine Page is shown in Figure 288.Figure 288 GVRP S
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 781App Applicant state machine for the GID index on that particular port. On
Chapter 42: GARP VLAN Registration ProtocolSection VI: Web Browser Management 782App (Continued) Non-Participant Management state:“Von” Very Anxious O
Section VI: Web Browser Management 783Chapter 43Port SecurityThis chapter explain how to display the port security status using a web browser manageme
Chapter 43: Port SecuritySection VI: Web Browser Management 784Displaying the Port Security LevelTo display the switch’s port security levels, perform
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 7854. Click on the ports to display their security status. After you click o
Chapter 43: Port SecuritySection VI: Web Browser Management 786❑ Lock all ports: The Lock All Ports security level causes the switch to immediately st
Section VI: Web Browser Management 787Chapter 44Web Server SecurityThis chapter about web server security contains the following procedures:❑ Displayi
Chapter 44: Web Server SecuritySection VI: Web Browser Management 788Displaying the Encryption KeysTo display the encryption keys, perform the followi
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 789The following information is displayed: Key IDThe identification number f
AT-S60 Management Software User’s GuideSection I: Basic Features 79Setting a Switch’s Enhanced Stacking StatusThe enhanced stacking status of the swit
Chapter 44: Web Server SecuritySection VI: Web Browser Management 790Displaying the PKI SettingsTo display the PKI settings, perform the following pro
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 791The PKI Tab is shown in Figure 292.Figure 292 Monitoring Security Page,
Chapter 44: Web Server SecuritySection VI: Web Browser Management 7925. To view detailed information about the certificate, select the certificate and
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 793Subject - Lists the Subject Distinguished Name.Issuer - Lists the Disting
Chapter 44: Web Server SecuritySection VI: Web Browser Management 794Displaying the SSL Settings To view the SSL settings, perform the following proce
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 795The following information is displayed: Maximum Number of SessionsThe max
Section VI: Web Browser Management 796Chapter 45TACACS+ and RADIUS ProtocolsThis chapter contains instructions on how to configure the authentication
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 797Enabling TACACS+ or RADIUSTo configure the authentication protocols, perf
Chapter 45: TACACS+ and RADIUS ProtocolsSection VI: Web Browser Management 7985. Click Apply.6. To save your changes, return to the General Tab and cl
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 799Configuring TACACS+To configure TACACS+, perform the following procedure:
Table of Contents8Displaying the Display SNMPv3 Target Parameters Table Menu ...
Chapter 4: Enhanced StackingSection I: Basic Features 80ConfiguringEnhancedStackingTo adjust a switch’s enhanced stacking status, perform the followin
Chapter 45: TACACS+ and RADIUS ProtocolsSection VI: Web Browser Management 800Global Server TimeoutThis parameter specifies the maximum amount of time
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 801Configuring RADIUSTo configure RADIUS, perform the following procedure:1.
Chapter 45: TACACS+ and RADIUS ProtocolsSection VI: Web Browser Management 802IP Address, Port #, and Encryption KeyUse these fields to specify the IP
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 803Displaying the TACACS+ SettingsTo display the TACACS+ RADIUS settings, pe
Chapter 45: TACACS+ and RADIUS ProtocolsSection VI: Web Browser Management 804The TACACS+ Client Configuration Page is shown in Figure 299.Figure 299
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 805Displaying the RADIUS SettingsTo display the RADIUS settings, perform the
Section VI: Web Browser Management 806Chapter 46802.1x Port-based Network Access ControlThis chapter describes how to configure and display port-based
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 807Configuring Port AccessThe 802.1x Port-based Access Control feature uses
Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 808Figure 301 802.1x Port Access Tab4. Click the Enable Port A
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 8095. After setting the parameters, click Apply.Your changes are activated o
AT-S60 Management Software User’s GuideSection I: Basic Features 81Selecting a Switch in an Enhanced StackBefore performing a procedure on a switch, c
Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 810Enable UpdateControls whether the switch is to send interim
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 811The Port Role Configuration Page is displayed, as shown in Figure 302.Fig
Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 812The Configuration 802.1x Port Access Tab is displayed as sho
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 813❑ Force-authorized: Disables 802.1X port-based authentication and causes
Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 814Configuring aSupplicant PortThis section provides a procedur
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 8155. Configure the following parameters:Auth Period - This is the initializ
Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 816Displaying 802.1x Port-Based Access Control InformationTo vi
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 8174. To display the status of the port, click the port or ports to select i
Chapter 46: 802.1x Port-based Network Access ControlSection VI: Web Browser Management 818For authenticator port(s), the Authenticator Port Parameters
AT-S60 Management Software User’s GuideSection VI: Web Browser Management 819For a description of the parameters displayed on the Supplicant Port Para
Chapter 4: Enhanced StackingSection I: Basic Features 823. Type 1 to select Get/Refresh List of Switches.The Master switch polls the network for all s
820Appendix AAT-S60 Default SettingsThis appendix lists the AT-S60 factory default settings. It contains the following sections in alphabetical order:
AT-S60 Management Software User’s Guide821Basic Switch Default SettingsThis section lists the default settings for basic switch parameters. The follow
Appendix A: AT-S60 Default Settings822NoteFor the AT-8412/SC FX and AT-8412/MT FX line cards, the default setting for Negotiation is Manual. For all t
AT-S60 Management Software User’s Guide823SwitchAdministrationDefault SettingsThe following table describes the switch administration default settings
Appendix A: AT-S60 Default Settings824Enhanced Stacking Default SettingThe following table lists the Enhanced Stacking default setting.Enhanced Stacki
AT-S60 Management Software User’s Guide825Event Log SettingsThis section lists the default settings for the Event Log feature.Event Log DefaultEvent L
Appendix A: AT-S60 Default Settings826IGMP Snooping Default SettingsThe following table lists the IGMP Snooping default settings.IGMP Snooping Setting
AT-S60 Management Software User’s Guide827PKI Default SettingsThe following table lists the PKI default settings, including the generate enrollment re
Appendix A: AT-S60 Default Settings828Port Configuration Default SettingsThe following table lists the port configuration default settings.Port Config
AT-S60 Management Software User’s Guide829Port Security Default SettingsThe following table lists the port security default settings.Port Security Set
AT-S60 Management Software User’s GuideSection I: Basic Features 836. Enter a username. The usernames are “manager” to view and change the switch sett
Appendix A: AT-S60 Default Settings830Server-Based Authentication Default SettingsThis section describes the server-based authentication, RADIUS, and
AT-S60 Management Software User’s Guide831SNMP Default SettingsThis section lists the default settings for the SNMPv1 and SNMPv2c protocols. There are
Appendix A: AT-S60 Default Settings832SSH Default SettingsThe following table lists the SSH and the SSH server default settings.SSH Setting DefaultSSH
AT-S60 Management Software User’s Guide833SSL Default SettingsThe following table lists the SSL default settings.SSL Setting DefaultMaximum Number of
Appendix A: AT-S60 Default Settings834STP, RSTP, and MSTP Default SettingsThis section provides the STP switch, STP, RSTP, and MSTP default settings.
AT-S60 Management Software User’s Guide835RSTP DefaultSettingsThe following table describes the RSTP default settings.MSTP DefaultSettingsThe followin
Appendix A: AT-S60 Default Settings836Internal Cost Auto UpdatePort Priority 128MSTP Setting Default
AT-S60 Management Software User’s Guide837VLAN Default SettingsThis section provides VLAN, GARP, and GVRP default settings.VLAN DefaultSettingsThe fol
Appendix A: AT-S60 Default Settings838Web Server Default SettingsThe following table lists the Web Server default settings.Web Server Configuration Se
AT-S60 Management Software User’s Guide839802.1x Port-Based Network Access Control Default SettingsThe following table describes the 802.1x Port Acces
84Chapter 5SNMPv1 and SNMPv2c ConfigurationThis chapter provides a description of the AT-S60 implementation of the SNMPv1 and SNMPv2c protocols. In ad
840Appendix BSNMPv3 Configuration ExamplesThis appendix provides two examples of SNMPv3 configuration using the SNMPv3 Table menus. In addition, a wor
AT-S60 Management Software User’s Guide841SNMPv3 Configuration ExamplesThis appendix provides SNMPv3 configuration examples for the following types of
Appendix B: SNMPv3 Configuration Examples842Configure SNMPv3 SecurityToGroup TableUser Name:systemadmin24Security Model:v3Group Name: ManagersStorage
AT-S60 Management Software User’s Guide843Configure SNMPv3 View Table Menu View Name: internetView Subtree OID: 1.3.6.1 (or internet)Subtree Mask: Vie
Appendix B: SNMPv3 Configuration Examples844SNMPv3 Access Table MenuGroup NameSecurity ModelSecurity LevelRead View NameWrite View NameNotify View Nam
AT-S60 Management Software User’s Guide845Storage TypeSNMPv3 Target Parameters TableTarget Parameters NameUser (Security) NameSecurity ModelSecurity L
846Index802.1x port-based network access controlaccess role, configuring 559, 807authentication process 551authentication process diagram 555authentic
AT-S60 Management Software User’s Guide847Bback pressure parameter 108, 625, 828Basic VLAN modedefined 417setting 432, 765baud rate parameter 40Boot P
Index848configuration name 264configuration name parameter 278, 683, 835console baud rate parameter 50, 823console disconnect timer interval parameter
AT-S60 Management Software User’s Guide849file system, overview 153filesdownloading 172, 180naming 154uploading 187, 194flow control parameter 40, 104
AT-S60 Management Software User’s GuideSection I: Basic Features 85SNMP OverviewThe SNMPv1 and SNMPv2c protocols allow you to create groups, called co
Index850HTTP 478HTTPS 478IIEEE 802.1d standard 242, 248, 672, 676IGMP snooping status parameter 222, 663, 826IGMP snooping. See Internet Group Managem
AT-S60 Management Software User’s Guide851MCHECK parameter 254, 290, 679MD5 authentication algorithm 489MD5 authentication protocol 295Message Authent
Index852non-802.1Q compliant multiple VLANs 438overview 436uplink port, changing 442Nnegotiation parameter 104, 109, 622, 822, 828none port role 552No
AT-S60 Management Software User’s Guide853Rapid Spanning Tree Protocol (RSTP) 253, 679Spanning Tree Protocol (STP) 246, 675port priority, defined 232p
Index854configuring 248, 676disabling 240, 274, 670edge port, configuring 253, 680enabling 240, 274, 670force version 249, 677MCHECK 254, 290, 679over
AT-S60 Management Software User’s Guide855slave switchassigning 79, 615defined 79, 615SNMP communityconfiguring 88, 595deleting 91, 601displaying 100,
Index856storage type 380user name 374SNMPv3 Target Parameters Table, described 302SNMPv3 trap 297SNMPv3 User Table entrycreating 305, 698deleting 309,
AT-S60 Management Software User’s Guide857system configuration filecopying 162creating 158renaming 162setting 156viewing 159See also system filessyste
Index858Virtual LANs (VLANs)associating to MSTI IDs 687VLAN and MSTI associations 263VLAN ID parameter 463, 777VLAN identifier (VID) 404, 423, 758VLAN
Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 86Configuring the SNMPv1 and SNMPv2c ProtocolsThis section describes how to confi
AT-S60 Management Software User’s GuideSection I: Basic Features 87To enable SNMPv1 and SNMPv2 as well as authentication trap messages, perform the fo
Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 88When this parameter is enabled, the switch sends authentication failure traps u
AT-S60 Management Software User’s GuideSection I: Basic Features 89The Configure SNMPv1 and SNMPv2c Community menu is shown in Figure 23.Figure 23 Co
AT-S60 Management Software User’s Guide9Section VSecurity Features ...
Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 909. Enter an open access status for the SNMP community. Choose one of the follow
AT-S60 Management Software User’s GuideSection I: Basic Features 91Deleting anSNMPv1 andSNMPv2CommunityTo delete an SNMPv1 and SNMPv2c community, perf
Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 92ModifyingSNMPv1 andSNMPv2CommunityAttributesFor each SNMPv1 and SNMPv2c communi
AT-S60 Management Software User’s GuideSection I: Basic Features 93The Modify SNMPv1 and SNMPv2c Community Menu is shown in Figure 24.Figure 24 Modif
Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 9411. After making changes, type R until you return to the Main Menu. Then type S
AT-S60 Management Software User’s GuideSection I: Basic Features 959. Enter an IP address that you want to delete. Or, to skip this prompt, press Retu
Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 96The Configure System Software Menu is shown in Figure 12 on page 60.4. From the
AT-S60 Management Software User’s GuideSection I: Basic Features 97Changing the Community StatusYou may want to change the status of a community to te
Chapter 5: SNMPv1 and SNMPv2c ConfigurationSection I: Basic Features 98D - Select D to disable the SNMP Community.The following prompt is displayed:Do
AT-S60 Management Software User’s GuideSection I: Basic Features 998. Enter a community name from the list at the top of the Modify SNMPv1 & SNMPv
Commentaires sur ces manuels