Management Software AT-S101 User’s Guide For use with the AT-GS950/8POE Gigabit Ethernet WebSmart Switch Version 1.0.0 613-000985 Rev.
Copyright 2008 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis, Inc. Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. All other product names, company names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners. Allied Telesis, Inc.
Contents Preface ..................................................................................................................................................................................9 Document Conventions ........................................................................................................................................................10 Where to Find Web-based Guides ...........................................................................................................
Contents Chapter 5: Port Configuration ..........................................................................................................................................71 Overview ...............................................................................................................................................................................72 Displaying and Configuring Ports Using the Port Configuration Page ..............................................................................
AT-S101 Management Software User’s Guide Port Priority..................................................................................................................................................................136 Forwarding Delay and Topology Changes .........................................................................................................................138 Hello Time and Bridge Protocol Data Units (BPDU).................................................................................
Contents Displaying Error Group Statistics ........................................................................................................................................225 Displaying Historical Status Charts.....................................................................................................................................227 Appendix A: AT-S101 Management Software Default Settings ...................................................................................231 Index .......
Figures Figure 1: Entering a Switch’s IP Address in the URL Field...................................................................................................14 Figure 2: AT-S101 Login Dialog Box ....................................................................................................................................15 Figure 3: Switch Information Page........................................................................................................................................
Figures Figure 51: 802.1x Access Control Configuration Page .......................................................................................................165 Figure 52: RADIUS Page....................................................................................................................................................171 Figure 53: Destination MAC Filter Page .............................................................................................................................
Preface The AT-S101 Management Software is the operating system for the AT-GS950/8POE Gigabit Ethernet WebSmart Switch. This guide explains how to use the management software to control and monitor the operating parameters of the AT-GS950/8POE switch.
Preface Document Conventions This document uses the following conventions: Note Notes provide additional information. Caution Cautions inform you that performing or omitting a specific action may result in equipment damage or loss of data. Warning Warnings inform you that performing or omitting a specific action may result in bodily injury.
AT-101 Management Software User’s Guide Where to Find Web-based Guides The installation and user guides for all Allied Telesis products are available in portable document format (PDF) on our web site at www.alliedtelesis.com. You can view the documents online or download them onto a local workstation or server.
Preface Contacting Allied Telesis This section provides Allied Telesis contact information for technical support as well as sales and corporate information. Online Support You can request technical support online by accessing the Allied Telesis Knowledge Base: www.alliedtelesis.com/support/kb.aspx. You can use the Knowledge Base to submit questions to our technical support staff and review answers to previously asked questions.
Chapter 1 Starting a Web Browser Management Session This chapter contains the procedures for starting, using, and quitting a web browser management session on the AT-GS950/8POE switch.
Chapter 1: Starting a Web Browser Management Session Establishing a Remote Connection to the Web Browser Interface The AT-GS950/8POE switch is shipped with a pre-assigned IP address of 192.168.1.1. You must set your local PC on the same subnet as the preassigned IP address for your initial logon. After your initial login, you may want to assign a new IP address to your switch. To manually assign an IP address to the switch, refer to “Configuring an IP Address, Subnet Mask and Gateway Address” on page 22.
AT-S101 Management Software User’s Guide The AT-S101 Management Software displays the login dialog box, shown in Figure 2. Figure 2. AT-S101 Login Dialog Box 3. Enter the AT-S101 management login user name and password. The default user name is “manager” and the default password is “friend.” Then press OK. The login name and password are case-sensitive. The Switch Information Page is displayed. See Figure 3 on page 16.
Chapter 1: Starting a Web Browser Management Session To change the user name and password, refer to “Configuring System Management Information” on page 29. Figure 3. Switch Information Page The main menu is on the left side of the home page. It consists of the following folders and web pages: 16 Switch Info. Front Panel System Physical Interface Bridge SNMP Access Control Config.
AT-S101 Management Software User’s Guide Tools Save Configuration 4. To see the front panel of the switch, select Front Panel from the menu on the left side of the page. The AT-S101 Management Software displays the front of the switch. The window contains an image of the front of the switch. Ports that have a link to an end node are green. Ports without a link are grey. An example of a front panel is shown in Figure 4. Figure 4.
Chapter 1: Starting a Web Browser Management Session Web Browser Tools You can use the web browser tools to move around the management pages. Selecting Back on your browser’s toolbar returns you to the previous display. You can also use the browser’s bookmark feature to save the link to the switch.
AT-S101 Management Software User’s Guide Quitting a Web Browser Management Session To exit a web browser management session, close the web browser.
Chapter 1: Starting a Web Browser Management Session 20
Chapter 2 Basic Switch Parameters This chapter provides procedures to perform basic switch activities such as reassigning the IP address, enabling the DHCP Client, configuring new usernames and passwords, and rebooting the system.
Chapter 2: Basic Switch Parameters Configuring an IP Address, Subnet Mask and Gateway Address This procedure explains how to change the IP address, subnet mask, and gateway address to the switch. Before performing the procedure, note the following: A gateway address is only required if you want to remotely manage the device from a management station that is separated from the switch by a router.
AT-S101 Management Software User’s Guide 3. Change the IP configuration parameters by entering new information in the following fields: System MAC Address This parameter displays the MAC address of the switch. You cannot change this parameter. System IP Address Displays the current IP address of the switch. To change the IP address, enter a new IP address. System Subnet Mask Displays the current subnet mask of the switch. To change the subnet mask, enter a new subnet mask.
Chapter 2: Basic Switch Parameters Setting Up the IP Access List The IP Access List feature, when enabled, restricts remote access to management software by means of a user-configured list of IP addresses. It does not restrict the management ping response activity, only web access to the management software. Note By default, the IP Access List feature is disabled. The procedures in this section describe how to enable or disable the IP Access List feature and how to add or remove IP addresses from the list.
AT-S101 Management Software User’s Guide 3. To set the IP restriction status, select Disable or Enable in the pulldown menu next to the IP Restriction Status field. Then click Apply. By default, the IP Restriction Status field is set to Disable. 4. Enter an IP address that you want to prevent from accessing the switch in the xxx.xxx.xxx.xxxx format next to the IP Address field. Then click Add. The IP address is added to the IP Access List Table. 5.
Chapter 2: Basic Switch Parameters Deleting an IP Address To delete an IP address from the IP Access List, perform the following procedure: 1. From the menu on the left side of the page, click the System folder. The System folder expands. 2. From the System folder, select IP Access List. The IP Access List Page is displayed. See Figure 6 on page 24. 3. Select delete next to the IP address that you want to remove. The IP address is removed from the IP Access List Table. 4.
AT-S101 Management Software User’s Guide Enabling and Disabling the DHCP Client Since the AT-GS950/8POE switch is a web-only switch and does not have a local console connection, you must be careful when you change the IP address of the switch by enabling the DHCP client. To look up the IP address on a DHCP server, you must have the MAC address of the ATGS950/8POE switch.
Chapter 2: Basic Switch Parameters 3. From the pull-down menu next to the DHCP Mode field, select Enable or Disable. By default, this field is set to Disable. 4. Click Apply. If you enable the DHCP client, the web server connection to the switch is lost. If you disable the DHCP client, note the new System IP Address value that you assigned to the switch. Record this value for future use. Caution Enabling or disabling DHCP ends your management session.
AT-S101 Management Software User’s Guide Configuring System Management Information This section explains how to assign a name to the switch, as well as the location of the switch and the name of the switch’s administrator. Entering this information is optional. To set a switch’s administration information, perform the following procedure: 1. From the menu on the left side of the page, click the System folder. The System folder expands. 2. From the System folder, select Management.
Chapter 2: Basic Switch Parameters Note Allied Telesis recommends that you assign a name to the switch. A name can help you identify the switch when you manage it and can also help you avoid performing a configuration procedure on the wrong switch. System Location Specifies the location of the switch. The location is optional and may contain up to 50 characters. System Contact Specifies the name of the network administrator responsible for managing the switch.
AT-S101 Management Software User’s Guide Configuring System Administration Information This section explains how to enable password protection and create users in the web interface. See the following sections: Adding System Administration Information “Adding System Administration Information” on page 31 “Modifying Administration Information” on page 32 “Deleting Administration Information” on page 33 To set a switch’s administration information, perform the following procedure: 1.
Chapter 2: Basic Switch Parameters 4. To create an entry number, type 1 through 8 in the box next to the Entry number field. This value appears as the Index value in the Administration table at the bottom of the page. 5. To create a user name, enter a user name in the box next to the User Name field. You can enter a value of up to 12 alphanumeric characters. 6. To add a password for the above user name, enter a password of up to 12 alphanumeric characters in the box next to the Password field. 7.
AT-S101 Management Software User’s Guide The Modify Administration Page is displayed. See Figure 9. Figure 9. Modify Administration Page 4. To change a password, enter a password of up to 12 alphanumeric characters in the box next to the Password field. 5. To confirm the above password, retype the password in the box next to the Confirm Password field. 6. Click Apply to activate your changes on the switch. 7.
Chapter 2: Basic Switch Parameters Setting the User Interface Configuration This procedure explains how to adjust the user interface and security features on the switch. With this procedure you can: Enable an SNMP Agent. To configure the SNMP feature, see Chapter 8, “Simple Network Management Protocol (SNMP)” on page 99. Enable and disable the web server. To set the switch’s user interface configuration, perform the following procedure: 1.
AT-S101 Management Software User’s Guide 4. To enable or disable the web server, do the following: a. Click the Web Server parameter and choose Enable or Disable from the pull-down menu. The default is Enable. When you enable this parameter, you can use a web browser to manage the switch remotely. Note Disabling the web browser automatically ends your remote management session. If this occurs, press the Reset button to recycle the power to the switch. Then logon to the switch. b. Click Apply. 5.
Chapter 2: Basic Switch Parameters Viewing System Information To view general information about the switch, perform the following procedure: 1. From the menu on the left side of the page, click the System folder. The System folder expands. 2. Select Switch Info. The Switch Information Page is shown in Figure 11. Figure 11.
AT-S101 Management Software User’s Guide The Switch Information Page displays the following information: System Up For The number of days, hours, and minutes that the switch has been running since it was last rebooted. Runtime Image The version number and build date of the runtime firmware. Boot Loader The version number and build date of the bootloader firmware. Hardware Information Section: Version The hardware version number. DRAM Size The size of the DRAM, in megabytes.
Chapter 2: Basic Switch Parameters subnet mask or “Enabling and Disabling the DHCP Client” on page 27 to activate the DHCP client. Default Gateway Default gateway’s IP address. Refer to “Configuring an IP Address, Subnet Mask and Gateway Address” on page 22 to manually assign a gateway address or “Enabling and Disabling the DHCP Client” on page 27 to activate the DHCP client. Automatic Network Features Section: DHCP Mode The status of the DHCP client on the switch.
AT-S101 Management Software User’s Guide Rebooting a Switch This procedure reboots the switch and reloads the AT-S101 Management Software from flash memory. You may want to reboot the device if you believe it is experiencing a problem. Caution The switch does not forward network traffic during the reboot process. Some network traffic may be lost. To reboot a switch, perform the following procedure: 1. From the menu on the left side of the page, select the Tools folder. The Tools folder expands. 2.
Chapter 2: Basic Switch Parameters Note Two additional Reboot Type options, Factory Default and Reset to Factory Default Except IP Address, are described in “Returning the AT-S101 Management Software to the Factory Default Values” on page 44. 4. For the Reboot Status, use the pull-down menu to select Start to begin the reboot. 5. Click Apply. The switch immediately begins to reload the AT-S101 Management Software. This process takes approximately one minute to complete.
AT-S101 Management Software User’s Guide Pinging a Remote System This procedure instructs the switch to ping a node on your network. This procedure is useful in determining whether an active link exists between the switch and another network device. Note the following before performing the procedure: The device you are pinging must be a member of the Default VLAN.
Chapter 2: Basic Switch Parameters Timeout Value Specifies the length of time, in seconds, the switch waits for a response before assuming that a ping has failed. The default is 3 seconds. Number of Ping Requests Specifies the number of ping requests you want the switch to perform. The default is 10. 4. Click Start. 5. To view the ping results, click Show Ping Results. A sample Ping Test Results Page is displayed. See Figure 14. Figure 14.
AT-S101 Management Software User’s Guide Average Time Indicates the time, in milliseconds, the ping was received. 6. Click Back to Ping Test to return to the Ping Test Configuration Page. 7. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
Chapter 2: Basic Switch Parameters Returning the AT-S101 Management Software to the Factory Default Values This procedure returns all AT-S101 Management Software parameters to their default values and deletes all tagged and port-based VLANs on the switch. The AT-S101 Management Software default values are listed in Appendix A, “AT-S101 Management Software Default Settings” on page 231. Caution This procedure causes the switch to reboot. The switch does not forward network traffic during the reboot process.
Chapter 3 Virtual LANs This chapter contains a description of Virtual Local Area Networks (VLANs) and procedures for creating, modifying, and deleting port-based and tagged VLANs from a web browser management session.
Chapter 3: Virtual LANs VLAN Overview A VLAN is a group of ports on an Ethernet switch that form a logical Ethernet segment. The ports of a VLAN form an independent traffic domain where the traffic generated by the nodes of a VLAN remains within the VLAN. With VLANs, you can segment your network through the switch’s AT-S101 Management Software and group nodes with related functions into their own separate, logical LAN segments.
AT-S101 Management Software User’s Guide can change the VLAN memberships through the management software without moving the workstations physically or change group memberships without moving cables from one port to another. In addition, a virtual LAN can span more than one switch. This means that the end nodes of a VLAN do not need to be connected to the same switch and so are not restricted to being in the same physical location.
Chapter 3: Virtual LANs Each port of a port-based VLAN can belong to as many VLANs as needed. Therefore, traffic can be forwarded to the members of the groups which the port is assigned to. For example, port 1 and port 2 are members of group 1 and ports 1 and 3 are members of group 2. In this case, traffic from port 1 is forwarded to ports 2 and 3, traffic from port 2 is forwarded only to port 1, and traffic from port 3 is forwarded only to port 1.
AT-S101 Management Software User’s Guide Tagged and Untagged Ports When you specify that a port is a member of a tagged VLAN, you need to specify that it is tagged or untagged. You can have a combination of tagged and untagged ports in the same VLAN. Packet transmission from a tagged port differs from packet transmission from an untagged port. When a packet is transmitted from a tagged port, the tagged information within the packet is maintained when it is transmitted to the next network device.
Chapter 3: Virtual LANs Displaying Ports and Assigning Ports to a VLAN By default, all of the ports on the switch are assigned to the Tagged VLAN. The procedure described in this section allows you to display the current VLAN assignment of ports. In addition, it permits you to assign ports to tagged or a port-based VLAN. However, you can assign ports to a portbased VLAN only after you have created a port-based VLAN with the procedure described in “Creating a Port-Based VLAN” on page 56.
AT-S101 Management Software User’s Guide Creating a Tagged VLAN To create a tagged VLAN, perform the following procedure: 1. From the menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Tagged VLAN. The Tagged VLAN Page is shown in Figure 16 Figure 16. Tagged VLAN Page 4. To assign a VLAN ID, type in a VLAN ID in the VLAN ID field. Choose a value between 2 and 4,000.
Chapter 3: Virtual LANs For an example of Tagged VLANs, see Figure 17. Figure 17. Example of Tagged VLAN Page 7. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Modifying a Tagged VLAN To modify the name or port assignments of a tagged VLAN, perform the following procedure: 1. From the menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Tagged VLAN. An Example of a Tagged VLAN page is shown in Figure 17 on page 52. 4. In the VLAN Action column, click modify next to the VLAN that you want to change.
Chapter 3: Virtual LANs 6. To change the name of the VLAN, type in a name in the VLAN Name field. 7. To assign ports to the VLAN, click on the port numbers labeled either Static Tagged or Static Untagged. Then click Apply. 8. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Deleting a Tagged VLAN To delete a tagged VLAN, perform the following procedure: 1. From the menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Tagged VLAN. An example of the Tagged VLAN Page is shown in Figure 17 on page 52. 4. In the VLAN Action column, click delete next to the VLAN that you want to delete. A confirmation prompt is displayed.
Chapter 3: Virtual LANs Creating a Port-Based VLAN To create a port-based VLAN, perform the following procedure: 1. From the menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Port-Based VLAN. The Port-Based VLAN Page is shown in Figure 19. Figure 19. Port-Based VLAN Page 4. To assign a VLAN ID, type a VLAN ID in the VLAN ID field. Choose a value between 1 and 52. 5.
AT-S101 Management Software User’s Guide Modifying a Port-Based VLAN To modify the name or port assignments of a port-based VLAN, perform the following procedure: 1. From the menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Port-Based VLAN. The Port-Based VLAN Page is shown in Figure 19 on page 56. 4. In the VLAN Action column, click modify next to the VLAN that you want to change.
Chapter 3: Virtual LANs 7. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Deleting a Port-Based VLAN To delete a port-based VLAN, perform the following procedure: 1. From the menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Port-Based VLAN. The Port-Based VLAN Page is shown in Figure 19 on page 56. 4. In the VLAN Action column, click delete next to the VLAN that you want to delete.
Chapter 3: Virtual LANs 60
Chapter 4 Quality of Service (QoS) This chapter contains a description of the QoS feature and the procedures for configuring Quality of Service (QoS). This chapter includes the following sections: “Overview” on page 62 “Mapping CoS Priorities to Egress Queues” on page 65 “Configuring CoS” on page 67 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 4: Quality of Service (QoS) Overview When a port on an Ethernet switch becomes oversubscribed—its egress queues contain more packets than the port can handle in a timely manner—the port may be forced to delay the transmission of some packets, which delays packets from reaching their destinations.
AT-S101 Management Software User’s Guide Table 1. Default Mappings of IEEE 802.1p Priority Levels to Egress Port Priority Queues AT-GS950/8POE Egress Port Priority Queue IEEE 802.1p Traffic Class 0 0 1 0 2 0 3 1 4 2 5 2 6 3 7 3 For example, a tagged packet with a priority tag of 6 is placed in the egress port’s highest priority queue of 3, while a packet with a priority tag of 1 is placed in the lowest priority queue. Note QoS is disabled by default on the switch.
Chapter 4: Quality of Service (QoS) One last thing to note is that the CoS feature does not change the priority level in a tagged packet. The packet leaves the switch with the same priority it had when it entered. This is true even if you change the default priority-to-egress queue mappings. The default setting for the Quality of Service feature is disabled. When the feature is disabled, all tagged packets are stored in the lowest priority queue of a port.
AT-S101 Management Software User’s Guide Mapping CoS Priorities to Egress Queues This procedure explains how to change the default mappings of CoS priorities to egress priority queues, as shown in Table 1 on page 63. This is set at the switch level. You cannot set these mappings on a per-port level. You can also use this procedure to enable and disable QoS on the switch.
Chapter 4: Quality of Service (QoS) For example, to direct all tagged traffic with a traffic class of 4 to egress queue 3 on the ports, click the dialog circle for queue 3 in the traffic class 4 row. 5. Click Apply. Note The switch does not alter the original priority level in tagged frames. Frames leave the switch with the same priority level they had when they entered the switch. 6. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Configuring CoS As explained in “Overview” on page 62, a packet received by a port is placed it into one of four priority queues on the egress port according to the switch’s mapping of 802.1p priority levels to egress priority queues. The default mappings are shown in Table 1 on page 63. You can override the mappings at the port level by assigning a new default egress queue to a port.
Chapter 4: Quality of Service (QoS) The columns in the menu display the following information: Port Index Displays the port number. The All value refers to ports 1 through 8 on the switch. Trunk Displays the trunk number if the port is a member of a trunk. PVID Displays the Port VLAN identifier (PVID) of the port. For more information about this field, see “Port VLAN Identifier” on page 49. Queue Displays the number of the queue where untagged packets received on the port are stored on the egress queue.
AT-S101 Management Software User’s Guide Note The tagged information in a frame is not changed as the frame traverses the switch. A tagged frame leaves a switch with the same priority level that it had when it entered. 6. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
Chapter 4: Quality of Service (QoS) 70
Chapter 5 Port Configuration This chapter provides a description of the physical characteristics of the ports and a procedure that explains how to view and change the port settings. This chapter includes the following sections: “Overview” on page 72 “Displaying and Configuring Ports Using the Port Configuration Page” on page 73 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 5: Port Configuration Overview This chapter describes how to display and modify the physical characteristics of an AT-GS950/8POE switch. You can display and modify the settings of all the ports on one web page.
AT-S101 Management Software User’s Guide Displaying and Configuring Ports Using the Port Configuration Page This procedure explains how to configure the ports on the switch using the Port Configuration Page. This page allows you to view and configure the parameter settings of all the switch ports at one time. To configure the ports, perform the following procedure: 1. From the menu on the left side of the page, select Physical Interface which is located underneath the System folder.
Chapter 5: Port Configuration that the port has been added to a trunk. For information about configuring a trunk, refer to Chapter 6, “Port Trunking” on page 77. Type Indicates the port type. The port type is 1000TX for 10/100/1000BaseT twisted-pair ports and 1000X for the optional SFP fiber ports. Link Status Indicates the status of the link between the port and the end node connected to the port. The possible values are: Up - Indicates a valid link exists between the port and the end node.
AT-S101 Management Software User’s Guide 10/Full - 10 Mbps in full-duplex mode 100/Half - 100 Mbps in half-duplex mode 10/Half - 10 Mbps in half-duplex mode When selecting a setting, note the following: When a twisted-pair port is set to Auto-Negotiation, the default setting, the end node should also be set to Auto-Negotiation to prevent a duplex mode mismatch. A switch port using AutoNegotiation defaults to half-duplex if it detects that the end node is not using Auto-Negotiation.
Chapter 5: Port Configuration 76
Chapter 6 Port Trunking This chapter contains the following procedures for working with port trunking: “Port Trunking Overview” on page 78 “Creating a Port Trunk” on page 80 “Modifying a Port Trunk” on page 82 “Disabling a Port Trunk” on page 84 Note For information about Link Aggregation Control Protocol (LACP) port trunking, see Chapter 7, “LACP Port Trunks” on page 85. Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 6: Port Trunking Port Trunking Overview A port trunk is an economical way for you to increase the bandwidth between the Ethernet switch and another networking device, such as a network server, router, workstation, or another Ethernet switch. A port trunk is a group of ports that have been grouped together to function as one logical path.
AT-S101 Management Software User’s Guide manufacturer. For this reason static trunks are typically employed only between devices from the same vendor. That is not to say that an Allied Telesis Layer 2 managed switch cannot form a static trunk with a device from another manufacturer; however, there is the possibility that the implementations of static trunking on the two devices may be incompatible. Also, note that a static trunk does not provide for redundancy or link backup.
Chapter 6: Port Trunking Creating a Port Trunk This procedure explains how to create a port trunk. Caution Do not connect the cables of a port trunk to the ports on the switch until you have configured the ports on both the switch and the end node. Connecting the cables prior to configuring the ports can create loops in your network topology. Loops can result in broadcast storms which can adversely affect the operation of your network. To create a port trunk, perform the following procedure: 1.
AT-S101 Management Software User’s Guide 4. Click the dialog boxes of the ports that will make up the port trunk. A check in a box indicates the port is a member of the trunk. No check means the port is not a member. A port trunk can contain up to eight ports. 5. Change the status of the trunk from Disable to one of the following: Active The aggregator will broadcast and respond to LACPDU (LACP Data Unit) packets. Passive The aggregator will not broadcast LACPDU packets, but it will respond to them.
Chapter 6: Port Trunking Modifying a Port Trunk This procedure explains how to change the status of a port trunk and add or remove ports from a port trunk. Caution Before you modify a port trunk, disconnect the cables from the ports of the trunk. Adding or removing ports from a trunk without first disconnecting the cables can create loops in your network topology, which can cause broadcast storms and poor network performance. To add or remove ports from a trunk, perform the following procedure: 1.
AT-S101 Management Software User’s Guide 7. Click Apply. 8. Modify the port trunk on the other switch and reconnect the cables. 9. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
Chapter 6: Port Trunking Disabling a Port Trunk This procedure explains how to disable a port trunk. Note Before you disable a port trunk, disconnect all of the cables from the ports of the trunk. Leaving the cables connected can create loops in your network topology because the ports of a disabled port trunk function as normal network ports, forwarding individual network traffic. To enable or disable a port trunk, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2.
Chapter 7 LACP Port Trunks This chapter contains overview information about LACP port trunks and the procedures for setting this feature.
Chapter 7: LACP Port Trunks LACP Overview LACP (Link Aggregation Control Protocol) port trunks perform the same function as static trunks. They increase the bandwidth between network devices by distributing the traffic load over multiple physical links. The advantage of an LACP trunk over a static port trunk is its flexibility. While implementations of static trunking tend to be vendor specific, the AT-S101 software implementation of LACP is compliant with the IEEE 802.
AT-S101 Management Software User’s Guide If there will be more than one aggregate trunk on a switch, each trunk may require a separate aggregator or it may be possible to combine them into a common aggregator. The determining factor is whether the trunks are going to the same device or different devices. If the trunks are going to the same device, each must have its own aggregator. If they are going to different devices, the trunks can be members of a common aggregator.
Chapter 7: LACP Port Trunks Here is how the example looks in a table format. Aggregator Description Aggregator Ports Aggregate Trunk Ports Aggregator 1 1-3 1-3 Aggregator 2 6-8 6-8 Caution The example cited here illustrates a loop in a network. Avoid network loops to prevent broadcast storms. If the aggregate trunks go to different devices, you can create one aggregator and the AT-GS950/8POE switch forms the trunks automatically.
AT-S101 Management Software User’s Guide Here is how this example looks in table format. Aggregator Description Aggregator Ports Aggregate Trunk Ports Aggregator 1 1-3, 6-8 1-3 6-8 You could, if you wanted, create separate aggregators for the different aggregate trunks in the example above. But letting the switch make the determination for you whenever possible saves time later if you physically reassign ports to a different trunk connected to another device.
Chapter 7: LACP Port Trunks LACP System Priority It is possible for two devices interconnected by an aggregate trunk to encounter a conflict when they form the trunk. For example, the two devices might not support the same number of active ports in an aggregate trunk or might not agree on which ports are active and which are in standby mode. If a conflict does occur, the two devices need a mechanism for resolving the problem and deciding whose LACP settings take precedence.
AT-S101 Management Software User’s Guide The selection of the active links in an aggregate trunk is dynamic and changes as links are added, removed, lost, or reestablished. For example, if an active port loses its link and is replaced by another port in the standby mode, the reestablishment of the link on the originally active port causes the port to return to the active state by virtue of having a higher priority value than the replacement port, which returns to the standby mode.
Chapter 7: LACP Port Trunks Guidelines The following guidelines apply to creating aggregators: 92 LACP must be activated on both the switch and the other device. The other device must be 802.3ad-compliant. An aggregator can consist of any number of ports. The AT-S101 Management Software supports up to four active ports in an aggregate trunk at a time.
AT-S101 Management Software User’s Guide a higher system LACP priority than the AT-GS950/8POE switch. This can help avoid a conflict between the devices if some ports are placed in the standby mode when the devices create the trunk. For background information, refer to “LACP System Priority” on page 90. LACPDU packets are transmitted as untagged packets.
Chapter 7: LACP Port Trunks Displaying LACP Group Status To display the LACP Group Status, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select the Trunk Config. folder. The Trunk Config. folder expands. 3. From the Trunk Config. folder, select LACP Group Status. The LACP Group Status Page is displayed. See Figure 28 for an example of the default display. Figure 28.
AT-S101 Management Software User’s Guide The System ID is a MAC address value assigned to the switch. You cannot change this value. Key 1 - Key 4 Indicates the ID number of the trunk (aggregation group). See “Key Parameter” on page 90 for more information. 4. If you use the Trunking Page to configure port trunk ID 1, the LACP Group Status Page is updated. An example of these updates is shown in Figure 29. Figure 29.
Chapter 7: LACP Port Trunks Selecting Port Priority To select port priority, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select the Trunk Config. folder. The Trunk Config. folder expands. 3. From the Trunk Config. folder, select Port Priority. The Port Priority Page is displayed. See Figure 30. Figure 30. Port Priority Page The System Priority is a preassigned value that you cannot alter. This value applies to the switch.
AT-S101 Management Software User’s Guide 4. To set the port priority, select a value from 0 to 255 in the Priority column for the port you want to alter. For more information, see “LACP Port Priority Value” on page 90 5. Select Apply. 6. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
Chapter 7: LACP Port Trunks 98
Chapter 8 Simple Network Management Protocol (SNMP) This chapter contains a description of SNMP and procedures for working with this protocol.
Chapter 8: Simple Network Management Protocol (SNMP) SNMP Overview You can manage a switch by viewing and changing the management information base (MIB) objects on the device with the Simple Network Management Program (SNMP). The AT-S101 Management Software supports SNMPv1 and SNMPv2c. To manage a switch using an SNMP application program, you must do the following: Activate SNMP management on the switch. The default setting for SNMP management is disabled.
AT-S101 Management Software User’s Guide Community String Attributes A community string has attributes for controlling who can use the string and what the string will allow a network management to do on the switch. The community string attributes are defined below. Community String Name A community string must have a name of one to eight alphanumeric characters. Spaces are allowed. Access Mode This attribute defines the permissions of a community string. There are two access modes: Read and Read/Write.
Chapter 8: Simple Network Management Protocol (SNMP) Trap receivers are the devices, typically management workstations or servers, that you want to receive the traps sent by the switch. You specify the trap receivers by their IP addresses. You assign the IP addresses to the community strings. Each community string can have up to eight trap IP addresses. It does not matter which community strings you assign to the trap receivers.
AT-S101 Management Software User’s Guide Default SNMP Community Strings The AT-S101 Management Software provides two default community strings: public and private. The public string has an access mode of ReadOnly and the private string has an access mode of Read/Write. If you activate SNMP management on the switch, you should delete or disable the private community string, which is a standard community string in the industry.
Chapter 8: Simple Network Management Protocol (SNMP) Creating an SNMP Community This procedure explains how to create an SNMP community. To create an SNMP community, perform the following procedure: 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Community Table. The Community Table Page is shown in Figure 31. Figure 31. Community Table Page 3. Type an available entry number from 1 through 8 next to the Entry number field. 4.
AT-S101 Management Software User’s Guide Modifying an SNMP Community Use the following procedure to modify the access level or a community name of an SNMP community in the Community Table. 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Community Table. The Community Table Page is shown in Figure 31 on page 104. 3.
Chapter 8: Simple Network Management Protocol (SNMP) Deleting an SNMP Community Use the following procedure to delete an existing SNMP community in the Community Table. 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Community Table. The Community Table page is shown in Figure 31 on page 104. 3. To delete a community, select delete in the Community Table next to the community that you want to remove.
AT-S101 Management Software User’s Guide Creating a Host Table Use the following procedure to create a Host Table. 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Host Table. The Host Table Page is shown in Figure 32. Figure 32. Host Table Page 3. To specify an entry number, type a value between 1 and 10 in the Entry number field. 4.
Chapter 8: Simple Network Management Protocol (SNMP) Modifying a Host Table Entry To modify the IP address or community name of an entry in the Host Table, use the following procedure: 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Host Table. The Host Table Page is shown in Figure 32 on page 107. 3. To change an IP Address in the table, replace the old IP address with a new one. 4.
AT-S101 Management Software User’s Guide Deleting a Host Table Entry Use the following procedure to delete a Host Table entry. 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Host Table. The Host Table Page is shown in Figure 32 on page 107. 3. To delete an entry in the host table, click delete next to the entry in the table that you want to remove. The Host Table entry is removed from the table.
Chapter 8: Simple Network Management Protocol (SNMP) Enabling or Disabling Traps To enable or disable a trap for an SNMP community, perform the following procedure: 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Trap Setting. The Trap Setting Page is shown in Figure 33. Figure 33. Trap Setting Page 3. Type a trap number between 1 and 10 in the Entry number field. 4.
AT-S101 Management Software User’s Guide Modifying Traps To modify the SNMP version, IP address, or community name of a trap, perform the following procedure: 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Trap Setting. The Trap Setting Page is shown in Figure 33 on page 110. 3. Within the Trap Setting table, select a pull-down menu in the Version column to the change the SNMP version of a trap that you want to modify.
Chapter 8: Simple Network Management Protocol (SNMP) Deleting Traps To delete a trap from an SNMP community, perform the following procedure: 1. From the menu on the left side of the page, select the SNMP folder. The SNMP folder expands. 2. From the SNMP folder, select Trap Setting. The Trap Setting Page is shown in Figure 33 on page 110. 3. In the Trap table, click delete next to the trap you want to delete from the table. The trap is removed from the Trap Setting Page. A warning message is not displayed.
Chapter 9 IGMP Snooping This chapter contains the following procedures for working with IGMP Snooping in the web interface. Sections in the chapter include: “Overview” on page 114 “Configuring IGMP Snooping” on page 116 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 9: IGMP Snooping Overview IGMP enables IPv4 routers to create lists of nodes that are members of multicast groups. (A multicast group is a group of end nodes that want to receive multicast packets from a multicast application.) The router creates a multicast membership list by periodically sending out queries to the local area networks connected to its ports.
AT-S101 Management Software User’s Guide Without IGMP snooping, a switch would have to flood multicast packets from all of its ports, except the port on which it received the packet. Such flooding of packets can negatively impact network performance. The AT-GS950/8POE switches maintain a list of multicast groups through an adjustable timeout value, which controls how frequently it expects to see reports from end nodes that want to remain members of multicast groups, and by processing leave requests.
Chapter 9: IGMP Snooping Configuring IGMP Snooping This procedure explains how to set IGMP snooping on the switch and set the IGMP Snooping age-out timer. To configure IGMP snooping, perform the following procedure: 1. From the menu on the left side of the page, select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select IGMP Snooping. The IGMP Snooping Page is shown in Figure 34. Figure 34. IGMP Snooping Page 3.
AT-S101 Management Software User’s Guide Note The Multicast Group Address table contains MAC addresses of nodes that are members of multicast groups. To set a Multicast Group Address, see “Setting a Static Multicast Address” on page 129. 5. After you have configured a Group MAC Address on the Static Multicast Address Page, the IGMP Snooping Page is updated with the Multicast Group address. See Figure 35. Figure 35. IGMP Snooping Page with MAC Address 6.
Chapter 9: IGMP Snooping 7. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
Chapter 10 Bandwidth Control This chapter contains a description of the bandwidth features and the procedure for configuring them. This chapter includes the following sections: “Overview” on page 120 “Setting Bandwidth Control” on page 121 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 10: Bandwidth Control Overview The bandwidth control feature allows you regulate the reception rate of broadcast, multicast, and destination lookup failure packets. The AT-S101 software allows you to set separate limits for each port beyond which each of the different packet types are discarded. Each setting can be configured on individual ports or on all of the ports of the AT-GS950/8POE switch. Traffic is measured in packets per second.
AT-S101 Management Software User’s Guide Setting Bandwidth Control This procedure explains how to set DLF, broadcast, multicast, and threshold levels for each port on the AT-GS950/8POE switch. To change the default settings, perform the following procedure: 1. From the menu on the left side of the page, select the Bridge folder. The Bridge folder expands to display several folders including the Trunk Config. folder. 2. From the Trunk Config. folder, select Bandwidth Control.
Chapter 10: Bandwidth Control The default is Disable. You can use the option next to the ALL row to set all of the ports to the same setting. 5. To enable or disable ingress and egress Multicast packets, select Enable or Disable from the Multicast pull-down menu next to the port that you want to change. Then click Apply. The default is Disable. You can use the option next to the ALL row to set all of the ports to the same setting. 6.
Chapter 11 Port Mirroring This chapter contains the procedure for setting up port mirroring. Port mirroring allows you to unobtrusively monitor the ingress and egress traffic on a port by having the traffic copied to another port. This chapter contains the following sections: “Overview” on page 124 “Configuring Port Mirroring” on page 125 “Disabling Port Mirroring” on page 126 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 11: Port Mirroring Overview The port mirroring feature allows you to unobtrusively monitor the traffic received and transmitted on one or more ports by copying the traffic to another switch port. You can connect a network analyzer to the port where the traffic is copied and monitor the traffic on the other ports without impacting network performance or speed. A port mirror has two component ports. The port or ports whose traffic you want to mirror is called the source port(s).
AT-S101 Management Software User’s Guide Configuring Port Mirroring To set up port mirroring, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select Mirroring. The Mirroring Page is shown in Figure 38. Figure 38. Mirroring Page 3. Click Mirroring Port and from the pull-down menu select the port where the network analyzer is connected. 4.
Chapter 11: Port Mirroring Disabling Port Mirroring To disable port mirroring, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select Mirroring. The Mirroring page is shown in Figure 38 on page 125. 3. From the Mirroring Status list, select Disable and click Apply. Port mirroring is immediately disabled on the switch. You can now use the mirroring port for regular network operations. 4.
Chapter 12 Static Multicast MAC Address This chapter contains a description of the static multicast MAC address feature and the procedure for configuring it. This chapter includes the following sections: “Overview” on page 128 “Setting a Static Multicast Address” on page 129 “Modifying a Static Multicast Address” on page 131 “Deleting a Static Multicast Address” on page 132 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 12: Static Multicast MAC Address Overview The AT-GS950/8POE switch has a MAC address table with a storage capacity of 8,000 entries. The table stores the MAC addresses of the network nodes connected to its ports and the port number where each address was learned. There are two types of MAC addresses—dynamic and static. Dynamic MAC addresses are addresses that the switch learns by examining the source MAC addresses of the frames received by the ports.
AT-S101 Management Software User’s Guide Setting a Static Multicast Address This procedure explains how to set the static multicast feature for each port on the AT-GS950/8POE switch. To add a static MAC address to the switch, perform the following procedure: 1. From the menu on the left side of the page, select the Bridge folder. The Bridge folder expands to display several folders including the Trunk Config. folder. 2. From the Trunk Config. folder, select Static Multicast.
Chapter 12: Static Multicast MAC Address Note The Group MAC Address values that you enter on the Static Multicast Address Table Page are also displayed on the IGMP Snooping Page. For more information, see “Configuring IGMP Snooping” on page 116. 5. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Modifying a Static Multicast Address To modify the port assignment of a multicast MAC address in the MAC address table, perform the following procedure: 1. From the menu on the left side of the page, select the Bridge folder. The Bridge folder expands to display several folders including the Trunk Config. folder. 2. From the Trunk Config. folder, select Static Multicast. The Static Multicast Address Table Page is displayed. See Figure 39 on page 129. 3.
Chapter 12: Static Multicast MAC Address Deleting a Static Multicast Address To delete a multicast MAC address from the MAC address table, perform the following procedure: 1. From the menu on the left side of the page, select the Bridge folder. The Bridge folder expands to display several folders including the Trunk Config. folder. 2. From the Trunk Config. folder, select Static Multicast. The Static Multicast Address Table Page is displayed. See Figure 39 on page 129. 3.
Chapter 13 Spanning Tree and Rapid Spanning Tree Protocols This chapter provides background information about the Spanning Tree Protocol (STP) and the Rapid Spanning Tree Protocol (RSTP). In addition, there are procedures to configure STP and RSTP.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols Overview The performance of a Ethernet network can be negatively impacted by the formation of a data loop in the network topology. A data loop exists when two or more nodes on a network can transmit data to each other over more than one data path.
AT-S101 Management Software User’s Guide Bridge Priority and the Root Bridge The first task that bridges perform when a spanning tree protocol is activated on a network is the selection of a root bridge. A root bridge distributes network topology information to the other network bridges and is used by the other bridges to determine if there are redundant paths in the network.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols Path Costs and Port Costs After the root bridge has been selected, the bridges determine if the network contains redundant paths and, if one is found, select a preferred path while placing the redundant paths in a backup or blocking state.
AT-S101 Management Software User’s Guide Table 3.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols Forwarding Delay and Topology Changes If there is a change in the network topology due to a failure, removal, or addition of any active components, the active topology also changes. This may trigger a change in the state of some blocked ports. However, a change in a port state is not activated immediately. It may take time for the root bridge to notify all bridges that a topology change has occurred, especially if it is a large network.
AT-S101 Management Software User’s Guide seconds and the default is two seconds. Consequently, if the AT-GS950/ 8POE switch is selected as the root bridge of a spanning tree domain, it transmits a BPDU every two seconds. Point-to-Point and Edge Ports Note This section applies only to RSTP. Part of the task of configuring RSTP is defining the port types on the bridge. This relates to the device(s) connected to the port.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols switch. The port is connected to an Ethernet hub, which in turn is connected to a series of Ethernet workstations. This is an edge port because it is connected to a device operating at half-duplex mode and there are no participating STP or RSTP devices connected to it.
AT-S101 Management Software User’s Guide AT-GS950/8POE 8 Port 10/100/1000Mbps + 2 SFP Combo WebSmart Switch PORT ACTIVITY CLASS 1 LASER PRODUCT POE 1 2 3 4 5 6 7R 8R 100/1000Base-X ACT 7 8 SFP SFP SFP RESET POWER 1 2 3 4 5 6 7R 8R 7 8 1000 LINK ACT 100 LINK ACT 1368 Point-to-Point and Edge Port Workstation (Full-duplex Mode) Figure 43. Point-to-Point and Edge Port Determining whether a bridge port is point-to-point, edge, or both, can be a bit confusing.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols Mixed STP and RSTP Networks RSTP IEEE 802.1w is fully compliant with STP IEEE 802.1d. Your network can consist of bridges running both protocols. STP and RSTP in the same network can operate together to create a single spanning tree domain. If you decide to activate spanning tree on the switch, Allied Telesis recommends RSTP instead of STP even when all of other switches in the network are running STP.
AT-S101 Management Software User’s Guide Spanning Tree and VLANs The spanning tree implementation in the AT-S101 Management Software is a single-instance spanning tree. The switch supports just one spanning tree. You cannot define multiple spanning trees. The single spanning tree encompasses all ports on the switch. If the ports are divided into different VLANs, the spanning tree crosses the VLAN boundaries.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols You can avoid this problem by not activating spanning tree or by connecting VLANs using tagged instead of untagged ports. (For information on tagged and untagged ports, refer to Chapter 22, “Portbased and Tagged VLANs” on page 247.
AT-S101 Management Software User’s Guide Basic STP and RSTP Configuration To configure the basic STP and RSTP settings, perform the following procedure: 1. From the menu on the left side of the page, select Bridge. The Spanning Tree folder is displayed. 2. From the Bridge folder, select the Spanning tree folder. 3. From the Spanning tree folder, select RSTP. The Rapid Spanning Tree Configuration Page is shown in Figure 45. Figure 45.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols The RSTP Configuration page allows you to configure RSTP as well as to view the current settings. In the upper portion of the page, you can set the following parameters: Global RSTP Status Set this field to enable to activate RSTP on the switch. The default is disable. Protocol Version Set this field to enable to activate RSTP or STP on the switch. This field is greyed out until you set the Global RSTP Status to enable.
AT-S101 Management Software User’s Guide Maximum Age The maximum amount of time that BPDUs are stored before being deleted on the root bridge. Forward Delay The time interval between generating and sending configuration messages by the root bridge. The bottom section of the web page provides information about the bridge. The following parameters appear in the bottom third of the web page: Bridge ID The MAC address of the bridge.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols Configuring RSTP Port Settings This section contains the following topics: Configuring the Basic RSTP Port Settings “Configuring the Basic RSTP Port Settings,” next “Configuring the Advanced RSTP Port Settings” on page 150 To configure the basic RSTP port settings, perform the following procedure: From the menu on the left side of the page, select Bridge. The Bridge folder expands. 5.
AT-S101 Management Software User’s Guide Link Status Indicates if the port is connected to (Up) or disconnected from (Down) another network device. Port State Indicates one of the following port states: Blocking— A port that would cause a switching loop. In this state, no user data is sent or received by the port. The port may go into the forwarding state if the other links in use failed and the spanning tree algorithm determines the port may transition to the forwarding state.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols 8. In the Priority column for the port you want to configure, type a number for the port priority. Port priority is described in “Port Priority” on page 136. 9. In the Path Cost column for the port you want to configure, type a number for the Path Cost. For STP, the range is from 0 to 65,535. For RSTP, the range is from 0 to 20,000,000. For both protocols, the default value is 128.
AT-S101 Management Software User’s Guide The RSTP Advanced Port Configuration Page is shown in Figure 47. Figure 47. RSTP Advanced Port Configuration Page This page displays the following information about the ports: Port Indicates ports 1 through 8. Use the All row to apply the same settings to the STP Status, Priority, and Path Cost fields to ports 1 through 8. Trunk Indicates the trunk assignment of a port.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols incoming BPDUs that indicate the port should return to the blocking state to prevent a loop. Disabled—This state is not strictly part of STP. However, a network administrator can manually disable a port. Role Indicates one of the following port roles: Disabled—The Disabled Port role is assigned if the port is not operational or is excluded from the active topology by management or it is a network access port (IEEE Std 802.
AT-S101 Management Software User’s Guide 8. To configure all of the ports to the same settings, in the All row, configure one, two, or all of the following settings: Admin/OperEdge, Admin/OperPtoP, and Migration. Then click Apply. 9. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols Viewing the Spanning Tree Topology To view the current spanning tree topology, perform the following procedure: 1. From the menu on the left side of the page, select Bridge. This folder expands. 2. From the Bridge folder, select the Spanning tree folder. 3. From the Spanning tree folder, select Topology Info. The Designated Topology Information Page is shown in Figure 48. Figure 48.
AT-S101 Management Software User’s Guide Designated Bridge An adjacent bridge to which the root port of the switch is actively connected. Designated Port The root bridge to which the root port of the switch is actively connected. 4. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
Chapter 13: Spanning Tree and Rapid Spanning Tree Protocols 156
Chapter 14 802.1x Port-based Network Access Control This chapter contains information about the 802.1x Port-based Network Access Control feature. This chapter includes the following sections: “Overview” on page 158 “Guest VLANs” on page 164 “Configuring 802.1x Port-based Network Access Control” on page 165 Note To activate 802.1x port authentication, you must also configure the RADIUS feature. See Chapter 15, “RADIUS Authentication Protocol” on page 169.
Chapter 14: 802.1x Port-based Network Access Control Overview 802.1x Port-based Network Access Control (IEEE 802.1x) is used to control who can send traffic through and receive traffic from a switch port. With this feature, the switch does not allow an end node to send or receive traffic through a port until the user of the node logs on by entering a username and password.
AT-S101 Management Software User’s Guide Authentication Process Authenticator Ports Below is a brief overview of the authentication process that occurs between a supplicant, authenticator, and authentication server. For further details, refer to the IEEE 802.1x standard. Either the authenticator (that is, a switch port) or the supplicant can initiate an authentication prompt exchange.
Chapter 14: 802.1x Port-based Network Access Control Force-unauthorized - Places the port in the unauthorized state, ignoring all attempts by the client to authenticate. This port control setting blocks all users from accessing the network through the port and is similar to disabling a port and can be used to secure a port from use. The port continues to forward EAPOL packets, but discards all other packets, including multicast and broadcast packets. Force-authorized - Disables IEEE 802.
AT-S101 Management Software User’s Guide node is the RADIUS authentication server. Since the server cannot authenticate itself, its port must be set to Force-authorized in order for it to pass traffic through the port. Port 8 is set to Force-unauthorized to prevent anyone from using the port. As mentioned earlier, the switch does not authenticate the user names and passwords from the clients. That is the responsibility of the authentication server, which contains the RADIUS server software.
Chapter 14: 802.1x Port-based Network Access Control The authentication server must be a member of the Default VLAN by communicating with the switch through a port that is an untagged member of the Default VLAN. Allied Telesis does not support connecting more than one supplicant to an authenticator port on the switch. The switch allows only one supplicant to log on per port. Note Connecting multiple supplicants to a port set to the Auto setting does not conform to the IEEE 802.1x standard.
AT-S101 Management Software User’s Guide Port 8: 802.1x Port Control Setting: Force-authorized Port 6: 802.1x Port Control Setting: Force-authorized AT-GS950/8POE 8 Port 10/100/1000Mbps + 2 SFP Combo WebSmart Switch PORT ACTIVITY 2 Switch A CLASS 1 LASER PRODUCT POE 1 3 4 5 6 7R 8R 100/1000Base-X ACT 7 8 SFP SFP SFP RESET POWER 1 2 3 4 5 6 7R 8R 7 8 1000 LINK ACT 100 LINK ACT 1371 RADIUS Authentication Server Port 7: 802.
Chapter 14: 802.1x Port-based Network Access Control Guest VLANs An authenticator port in the unauthorized state typically accepts and transmits only 802.1x packets while waiting to authenticate a supplicant. However, you can configure an authenticator port to be a member of a Guest VLAN when no supplicant is logged on. Any client using the port is not required to log on and has full access to the resources of the Guest VLAN. If the switch receives 802.
AT-S101 Management Software User’s Guide Configuring 802.1x Port-based Network Access Control To configure 802.1x port-based network access control, perform the following procedure: 1. Select the Security folder from the menu on the left side of the page. The Security folder expands. 2. From the Security folder, select Port Access Control. The 802.1x Access Control Configuration Page is shown in Figure 51. Figure 51. 802.1x Access Control Configuration Page 3.
Chapter 14: 802.1x Port-based Network Access Control 4. Configure the following parameters as needed. The parameters are defined here: NAS ID This parameter assigns an 802.1x identifier to the switch that applies to all ports. The NAS ID can be up to sixteen characters. Valid characters are 0 to 9, a to z, and A to Z. Spaces are allowed. Specifying an NAS ID is optional. Authentication Method This parameter indicates the authentication method used by the switch. The options are RADIUS or local.
AT-S101 Management Software User’s Guide Quiet Period Sets the number of seconds that the port remains in the quiet state following a failed authentication exchange with the client. The default value is 60 seconds. The range is 0 to 65,535 seconds. Maximum Request Sets the maximum number of times that the switch retransmits an EAP Request packet to the client before it times out the authentication session. The default value for this parameter is 2 retransmissions. The range is 1 to 10 retransmissions.
Chapter 14: 802.1x Port-based Network Access Control authentication port in the single operating mode. Choose a value between 0 and 4,000. Then click Apply. There is no default value. For more information, see “Guest VLANs” on page 164. 5. When you are finished configuring the parameters, click Apply at the bottom of the 802.1x Configuration page. 6.
Chapter 15 RADIUS Authentication Protocol This chapter explains how to configure the RADIUS client on the switch. You can use the RADIUS client with 802.1x port-based network access control to control who can forward packets through the switch. This chapter contains the following sections: “Overview” on page 170 “Configuring the RADIUS Client” on page 171 Note To activate the RADIUS feature, you must also configure the 802.1x port-network access control feature. See Chapter 14, “802.
Chapter 15: RADIUS Authentication Protocol Overview RADIUS (Remote Authentication Dial In User Services) is an authentication protocol for enhancing the security of your network. The protocol transfers the task of authenticating network access from a network device to an authentication protocol server. The AT-S101 Management Software comes with RADIUS client software. You can use the client software together with 802.1x port-based network access control. See Chapter 17, “802.
AT-S101 Management Software User’s Guide Configuring the RADIUS Client To configure the RADIUS client, perform the following procedure: 1. From the menu on the left side of the page, select the Security folder. The Security folder expands. 2. From the Security folder, select RADIUS. The RADIUS Page is shown in Figure 52. Figure 52. RADIUS Page 3. To enter the RADIUS server’s IP address, enter the address in the Server IP Address field. 4.
Chapter 15: RADIUS Authentication Protocol 172
Chapter 16 Destination MAC Filter This chapter contains an explanation of the Destination MAC Filter feature as well a procedure for configuring it. This chapter includes the following sections: “Overview” on page 174 “Configuring a Destination MAC Filter” on page 175 “Deleting a Destination MAC Filter” on page 177 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 16: Destination MAC Filter Overview The Destination MAC Filter feature prevents the AT-GS950/8POE switch from forwarding packets to a specified device. On the Destination MAC Filter Page of the AT-S101 software, you enter the MAC address of the device that you want to filter. After the switch receives a packet, it examines the destination MAC address of the packet. If the destination MAC address matches a MAC address set in the filter, then the software prevents the switch from forwarding it.
AT-S101 Management Software User’s Guide Configuring a Destination MAC Filter To set MAC address in the Destination MAC Filter, perform the following procedure: 1. From the menu on the left side of the page, select the Security folder. The Security folder expands. 2. From the Security folder, select Destination MAC Filter. The Destination MAC Filter Page is shown in Figure 53. Figure 53. Destination MAC Filter Page 3.
Chapter 16: Destination MAC Filter 4. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Deleting a Destination MAC Filter To delete a MAC address from the Destination MAC Filter, perform the following procedure: 1. From the menu on the left side of the page, select the Security folder. The Security folder expands. 2. From the Security folder, select Destination MAC Filter. The Destination MAC Filter Page is shown in Figure 53 on page 175 3. Select delete next to the MAC address that you want to delete.
Chapter 16: Destination MAC Filter 178
Chapter 17 Power over Ethernet (PoE) This chapter contains a description of the Power over Ethernet (PoE) feature and the procedure for configuring it. This chapter includes the following sections: “Overview” on page 180 “Setting Power over Ethernet” on page 182 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 17: Power over Ethernet (PoE) Overview The four of the twisted pair ports on the AT-GS950/8POE switch feature Power over Ethernet (PoE) which is a mechanism for supplying power to network devices over the same twisted pair cables used to carry network traffic. This feature can simplify network installation and maintenance by allowing you to use the switch as a central power source for other network devices. A device that receives its power over an Ethernet cable is called a powered device.
AT-S101 Management Software User’s Guide Power Budgeting The AT-GS950/8POE switch provides a maximum of 15.4 W of power per port on four of the eight ports for a total power consumption of 62 W, while at the same time furnishing standard 10/100 Mbps Ethernet functionality. The switch power management functionality supports any combination of Ethernet ports (1-4) that supply power for IEEE 802.3af Class 0, 1, 2, or 3 powered devices up to a maximum of 62 watts, as described in Table 5.
Chapter 17: Power over Ethernet (PoE) Setting Power over Ethernet This procedure explains how to set the POE feature on the AT-GS950/ 8POE switch. To set the POE feature, perform the following procedure: 1. From the menu on the left side of the page, select the Power Over Ethernet Page. The Power Over Ethernet Configuration Page is shown in Figure 55. Figure 55. Power Over Ethernet Configuration Page 2. To change the setting of the Admin field, select the pull-down menu next to ports 1 through 4.
AT-S101 Management Software User’s Guide 3. To change the setting of the Priority field, use the pull-down menu to select one of the following power priority values: Low - Indicates the power priority of the PoE port is low. This is the default value. High - Indicates the power priority of the PoE port is high. Critical - Indicates the power priority of the PoE port is critical. Then click Apply. You can use the option next to the ALL row to set all of the ports to the same setting.
Chapter 17: Power over Ethernet (PoE) 184
Chapter 18 Classifiers This chapter explains the concepts of classifiers which are used to describe traffic flow for Access Control Policies. A procedure for configuring classifiers is also provided. This chapter contains the following sections: “Overview” on page 186 “Classifier Criteria” on page 187 “Guidelines” on page 191 “Creating Classifiers” on page 192 Note For information about Access Control Policies, see Chapter 19, “Access Control Policies” on page 195.
Chapter 18: Classifiers Overview A classifier defines a traffic flow which consists of packets that share one or more characteristics. You can define a traffic flow can broadly or narrowly. An example of the a broad definition is all IP traffic while an example of a narrow definition is packets with specified source and destination MAC addresses. A classifier contains a set of criteria for defining a traffic flow.
AT-S101 Management Software Features Guide Classifier Criteria The components of a classifier are defined in the following subsections. Source MAC Address Destination MAC Address You can identify a traffic flow by specifying a source and/or destination MAC address. For instance, you might create a classifier for a traffic flow destined to a particular destination node, or from a specific source node to a specific destination node, all identified by their MAC addresses.
Chapter 18: Classifiers Preamble Destination Address Source Address Type/ Length 64 bits 48 bits 48 bits 16 bits Tag Protocol Identifier User Priority CFI 3 bits 16 bits 1 bit Frame Data CRC 368 to 12000 bits 32 bits VLAN Identifier 12 bits Figure 56. User Priority and VLAN Fields within an Ethernet Frame You can identify a traffic flow of tagged packets using the user priority value.
AT-S101 Management Software Features Guide Observe the following guidelines when using this variable: When selecting a Layer 4 variable, this variable must be left blank or set to IP. If you choose to specify a protocol by its number, you can enter the value in decimal or hexadecimal format. If you choose the latter, precede the number with the prefix “0x.” The range for the protocol number is from 1536 (0x600) to 65535 (0xFFFF).
Chapter 18: Classifiers IGMP IP protocol number If you choose to specify the protocol by its number, you can enter the value in decimal or hexadecimal format. It the latter, include the prefix “0x.” The range for the protocol number is 0 (0x0) to 255 (0xFF). Source IP Addresses (Layer 3) Source IP Mask (Layer 3) You can define a traffic flow by the source IP address contained in IP packets. The address can be of a subnet or a specific end node.
AT-S101 Management Software Features Guide Guidelines Follow these guidelines when creating a classifier: Each classifier represents a separate traffic flow. The variables within a classifier are linked by AND. The more variables defined within a classifier, the more specific it becomes in terms of the flow it defines.
Chapter 18: Classifiers Creating Classifiers To create a classifier, perform the following procedure: 1. From the menu on the left side of the page, select the Access Control Configuration folder. The Access Control Configuration folder expands. 2. From the Access Control Configuration folder, select Classifier. The Create Classifier Page is displayed. See Figure 58 Figure 58.
AT-S101 Management Software Features Guide 3. Input the following fields: Classifier Index Indicates the identification number of the classifier. You must assign each classifier a unique index. Source MAC Address Indicates the source MAC address of the classifier. Source MAC Mask Length Indicates the source MAC mask length of the classifier. Destination MAC Address Indicates the destination MAC address of the classifier.
Chapter 18: Classifiers Source Layer 4 Port Specify a source port number in TCP or UDP to filter. See “Source Ports (Layer 4) Destination Ports (Layer 4)” on page 190. Destination Layer 4 Port Specify a filter destination port number in TCP or UDP to filter. “Source Ports (Layer 4) Destination Ports (Layer 4)” on page 190. 4. Click Apply to activate your changes. 5. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
Chapter 19 Access Control Policies This chapter describes access control policies (ACP) and how they can improve network security and performance.
Chapter 19: Access Control Policies Overview An access control policy is a filter that controls the ingress traffic on a port. It defines a category of traffic and the action of the port when it receives packets of the category. The action is either to accept the defined packets or discard them. You can use this feature to increase network security by restricting access to certain areas or subnets or to enhance switch performance by forming network links dedicated to carrying specified types of traffic.
AT-S101 Management Software User’s Guide ACP Components In order to create a policy, you must define the ACP components. A policy must contain a classifier which defines the traffic flow and a port list. For information about defining a classifier, see Chapter 18, “Classifiers” on page 185. To define a port list, see “Creating an Access Control Port List” on page 205. In addition, you must define either a in-profile action or an out-profile action for each policy.
Chapter 19: Access Control Policies Guidelines Here are guidelines for creating ACPs: 198 A port can have multiple permit and deny ACPs. An ACP must have at least one classifier. You can assign an ACP to more than one port. An ACP filters ingress traffic, but not egress traffic. The action of a ACP can be either permit or deny. If a deny ACP has a lower sequence number than a permit ACP, then the deny ACP overrides the permit ACP.
AT-S101 Management Software User’s Guide Creating Profile Action The procedure in this section allows you to create a profile action for DSCP and CoS. This is an optional task. For more information about these parameters, see “ACP Components” on page 197. To create a profile action, perform the following procedure: 1. From the menu on the left side of the page, select the Access Control Configuration folder. The Access Control Configuration folder expands. 2.
Chapter 19: Access Control Policies 5. To set the policied CoS value for this profile, select a value between 0 and 7 in the Policied-CoS field. 6. Click Apply to activate your changes. 7. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Creating an In-profile Action The In-profile Action Page allows you to assign an action to a policy. For more information about these parameters, see “ACP Components” on page 197. To create an In-profile action, perform the following procedure: 1. From the menu on the left side of the page, select the Access Control Configuration folder. The Access Control Configuration folder expands. 2. From the Access Control Configuration folder, select In-Profile Action.
Chapter 19: Access Control Policies 6. Then click Apply to activate your changes. The In-profile Action table is updated. 7. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Creating an Out-Profile Action The Out-profile Action Page allows you to assign a classifier index to a profile action ID as well as a committed rate and a burst size. For information about how to create a profile action ID, see “Creating Profile Action” on page 199. To create an Out-profile action, perform the following procedure: 1. From the menu on the left side of the page, select the Access Control Configuration folder.
Chapter 19: Access Control Policies 5. Enter a committed rate between 1 and 1,000 Megabits per second. 6. Enter a burst size which is the maximum amount of data, in bytes, that the switch agrees to transfer during a specified time interval by enter a value in the Burst Size field. Choose from the following values: – 4K – 8K – 16K – 32K – 64K 7. To set an profile action ID, enter a value between 1 and 72 in the Profile Action ID field that was configured on the Create Profile Page.
AT-S101 Management Software User’s Guide Creating an Access Control Port List This section provides a procedure to assign an index to a list of ports. To create a port list, perform the following procedure: 1. From the menu on the left side of the home page, select the Access Control Configuration folder. The Access Control Configuration folder expands. 2. From the Access Control Configuration folder, select Port List. The Port List Page is displayed. See Figure 62. Figure 62. Create Port List Page 3.
Chapter 19: Access Control Policies Creating a Policy This section provides a procedure to create a policy. For information about classifiers, see “Creating Classifiers” on page 192. For procedures to create profile actions, see “Creating Profile Action” on page 199, “Creating an In-profile Action” on page 201, and “Creating an Out-Profile Action” on page 203. To create a port list, see “Creating an Access Control Port List” on page 205. To create a policy, perform the following procedure: 1.
AT-S101 Management Software User’s Guide Classifier Index Specific the identification number of a classifier. You must assign a classifier that you created on the Classifier Page. Policy Sequence Specify the priority of the policy where the lowest number of the policy sequence has the highest priority. Enter a value between 1 (highest priority) and 64 (lowest priority). Note If a deny ACP has a lower sequence number than a permit ACP, then the deny ACP overrides the permit ACP.
Chapter 19: Access Control Policies Displaying a Policy Sequence To create a policy sequence, perform the following procedure: 1. From the menu on the left side of the home page, select the Access Control Configuration folder. The Access Control Configuration folder expands. 2. From the Access Control Configuration folder, select Policy Sequence. The Policy Sequence Page is displayed. See Figure 64. Figure 64. Policy Sequence Page 3. Select a port with the pull-down menu next to the Select Port field. 4.
Chapter 20 Management Software Updates This chapter explains the methods for upgrading the AT-S101 Management Software on the switch and saving configuration files.
Chapter 20: Management Software Updates Overview You can use the Management Software Updates features to upgrade the AT-S101 Management Software to a new version, upload a configuration file from the AT-GS950/8POE switch onto an a PC, or download an image or configuration file from the switch onto an a PC.
AT-S101 Management Software User’s Guide Upgrading a Firmware Image Using HTTP This section describes how to upgrade an firmware image of the AT-S101 software using HTTP on an Internet server. Before downloading a new version of the AT-S101 Management Software onto the switch with HTTP, note the following: The current configuration of a switch is retained when a new AT-S101 software image is installed.
Chapter 20: Management Software Updates The Firmware Upgrade via HTTP Page is displayed. See Figure 65. Figure 65. Firmware Upgrade via HTTP Page 3. Change the following parameter as necessary: Firmware File: Enter the path of the firmware file or click the Browse button and select the filename. 4. Click Apply. The software begins to download onto the switch immediately. This process takes a few minutes. After the software download is complete, the switch initializes the software and reboots.
AT-S101 Management Software User’s Guide Upgrading a Firmware Image Using TFTP This section describes how to upgrade an firmware image of the AT-S101 software using TFTP on an TFTP server. Before downloading a new version of the AT-S101 software onto the switch, note the following: The current configuration of a switch is retained when a new AT-S101 software image is installed.
Chapter 20: Management Software Updates The Firmware Upgrade via TFTP page is shown in Figure 66. Figure 66. Firmware Upgrade via TFTP Page The Image/Version Date shows the current version and date of software installed on the switch. 3. Change the following parameters as necessary: TFTP Server IP The IP address of the TFTP server from which you are downloading the new software. Image File Name The name of the AT-S101 file you are downloading.
AT-S101 Management Software User’s Guide Downloading or Uploading a Configuration File via HTTP This section describes how to download or upload a configuration file using HTTP on an Internet server. Before you upload or download a configuration file via HTTP, note the following: You must be able to access the new AT-S101 image file from your PC. On the switch that you are downloading the new image file to, assign an IP address and subnet mask.
Chapter 20: Management Software Updates 4. Change the following parameters as necessary: Select File: Enter the path of the firmware file or click the Browse button and select the filename. 5. Select one of the following: Upload Select this button to upload a configuration file onto the switch. The software immediately begins to upload from or download onto the switch. Download Select this button to download a configuration file from the switch onto your PC. The following window is displayed.
AT-S101 Management Software User’s Guide Downloading or Uploading a Configuration File via TFTP This section describes how to download or upload a configuration file using TFTP on an TFTP server. Before uploading or downloading a configuration file onto the switch using TFTP, note the following: The current configuration of a switch is retained when a new AT-S101 software image is installed.
Chapter 20: Management Software Updates 4. Change the following parameters as necessary: Enter the IP address of the TFTP server in the field next to the TFTP Server IP parameter. Enter the name of the configuration file in the field next to the Config File Name parameter. 5. Select one of the following: Upload Select this button to upload a configuration file onto the switch. Download Select this button to download a configuration file from the switch onto your PC.
Chapter 21 Statistics The sections in this chapter explain how to display traffic, error, and history statistics about the AT-GS950/8POE switch and its ports. This chapter includes the following sections: “Overview” on page 220 “Displaying Traffic Comparison Statistics” on page 221 “Displaying Error Group Statistics” on page 225 “Displaying Historical Status Charts” on page 227 Note To save your changes, select Save Configuration to Flash from the menu on the left side of the page.
Chapter 21: Statistics Overview Statistics provide important information for troubleshooting switch problems at the port level. The AT-S101 Management Software provides a versatile set of statistics charts that you can customize for your needs, including (depending upon the chart) the ports whose statistics you want to view and the color used to draw the chart. There are three types of statistics charts: 220 Traffic Comparison.
AT-S101 Management Software User’s Guide Displaying Traffic Comparison Statistics To display traffic comparison statistics, perform the following procedure: 1. Select the Statistics Chart folder. The Statistics Chart folder expands. 2. From the Statistics Chart folder, select Traffic Comparison. The Traffic Comparison Page opens as shown in Figure 70. Figure 70.
Chapter 21: Statistics 3. To view traffic statistics, click on the arrow next to “Statistics” and select one of the options in Table 6. Table 6 Traffic Comparison Options Option Definition Inbound Octet Rate (Bytes/s) Measures the rate of inbound octet bits in bytes per second. Inbound Unicast Packet Rate (Pkts/s) Measures the rate of inbound unicast packets in packets per second.
AT-S101 Management Software User’s Guide Table 6 Traffic Comparison Options (Continued) Option Definition Inbound Non-unicast Packets (Pkts) Measures the number of inbound non-unicast packets (such as broadcast and multicast packets) in packets per second. Inbound Discards (Pkts) Measures the number of inbound discarded packets in packets per second. Inbound Errors (Pkts/s) Measures the number of inbound errors in packets per second.
Chapter 21: Statistics – Yellow – Orange – Gray – Light Red – Light Blue – Light Green – Light Yellow – Light Gray 6. To create the traffic comparison graph, select Draw. 7. From the menu on the left side of the page, select Save Configuration to Flash to save your changes.
AT-S101 Management Software User’s Guide Displaying Error Group Statistics To display error group statistics for a port, perform the following procedure: 1. Select the Statistics Chart folder. The Statistics Chart folder expands. 2. From the Statistics Chart folder, select Error Group. The Error Group Chart Page is displayed in Table 71. Figure 71. Error Group Chart Page 3. Select a port number from the pull down menu next to Port.
Chapter 21: Statistics 4. To select the amount of time before the screen is refreshed, click Auto Refresh. Choose from the following options: – 5 seconds – 10 seconds – 15 seconds – 30 seconds 5. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: – Green (This is the default.) – Blue – Red – Purple – Yellow – Orange – Gray – Light Red – Light Blue – Light Green – Light Yellow – Light Gray 6.
AT-S101 Management Software User’s Guide Displaying Historical Status Charts To display historical status charts statistics for a port, perform the following procedure: 1. Select the Statistics Chart folder. The Statistics Chart folder expands. 2. From the Statistics Chart folder, select Historical Status. The Historical Status Chart Page is displayed in Table 72. Figure 72.
Chapter 21: Statistics 3. To view historical statistics, click on the arrow next to “Statistics” and select one of the options in Table 7. Table 7 Historical Status Options Option Definition Inbound Octet Rate (Bytes) Measures the rate of inbound octet bits in bytes per second. Inbound Unicast Packet Rate (Pkts) Measures the rate of inbound unicast packets in packets per second.
AT-S101 Management Software User’s Guide – 15 seconds – 30 seconds 5. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: – Green (This is the default.) – Blue – Red – Purple – Yellow – Orange – Gray – Light Red – Light Blue – Light Green – Light Yellow – Light Gray 6. To create the history group chart, select Add. Then click Draw. 7. To draw the historical group chart, select Draw. 8.
Chapter 21: Statistics 230
Appendix A AT-S101 Management Software Default Settings Table 8 lists the factory default settings for the management software. Table 8. AT-S101 Default Settings Parameter Default Setting IP Configuration IP Address 0.0.0.0 Subnet Mask 0.0.0.0 Default Gateway Address 0.0.0.
Appendix A: AT-S101 Management Software Default Settings Table 8.
AT-S101 Management Software User’s Guide Table 8. AT-S101 Default Settings (Continued) Parameter Default Setting Hello Time 2 seconds Maximum Age 20 seconds Forward Delay 15 seconds Bridge Hello Time 2 seconds Bridge Maximum Age 20 seconds Bridge Forward Delay 20 seconds Bandwidth Control DLF Ingress Packet Status Disabled Broadcast/Multicast Packet Threshold Low Packet Threshold Mode Broadcast/Multicast IP Access List IP Restriction Disabled 802.
Appendix A: AT-S101 Management Software Default Settings Table 8. AT-S101 Default Settings (Continued) Parameter Default Setting Power over Ethernet Power budget 65 W Priority Low Limit (mW) 15400 Access Control Policies Burst Size (Bytes) 4K Upgrade Configuration TFTP Server IP Address 0.0.0.
Index Numerics 802.1p priority level in classifiers 187 802.
Index H hardware information 36 I IEEE 802.1D standard 133 IEEE 802.1p standard 62 IGMP snooping configuring 116 described 114 Internet Group Management Protocol (IGMP).
AT-S101 Management Software User’s Guide topology 154 rebooting the switch 39 remote management session quitting 19 starting 14 root bridge 135 S SNMP creating a community 104 creating a host table 107 deleting a community 106 deleting a host table entry 109 deleting traps 112 disabling traps 110 enabling traps 110, 111 modifying a community 105 modifying a host table entry 108 modifying traps 111 SNMP community strings access mode 101 closed access status 101 default 103 name 101 open access status 101 o
Index 238