Owner manual
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Section I
- Basic Operations
- Chapter 1
- Overview
- Chapter 2
- Enhanced Stacking
- Chapter 3
- SNMPv1 and SNMPv2c
- Chapter 4
- MAC Address Table
- Chapter 5
- Static Port Trunks
- Chapter 6
- LACP Port Trunks
- Chapter 7
- Port Mirror
- Section II
- Advanced Operations
- Chapter 8
- File System
- Chapter 9
- Event Logs and the Syslog Client
- Chapter 10
- Classifiers
- Chapter 11
- Access Control Lists
- Chapter 12
- Class of Service
- Chapter 13
- Quality of Service
- Chapter 14
- Denial of Service Defenses
- Chapter 15
- Power Over Ethernet
- Section III
- Snooping Protocols
- Chapter 16
- IGMP Snooping
- Chapter 17
- MLD Snooping
- Chapter 18
- RRP Snooping
- Chapter 19
- Ethernet Protection Switching Ring Snooping
- Section IV
- SNMPv3
- Chapter 20
- SNMPv3
- Section V
- Spanning Tree Protocols
- Chapter 21
- Spanning Tree and Rapid Spanning Tree Protocols
- Chapter 22
- Multiple Spanning Tree Protocol
- Section VI
- Virtual LANs
- Chapter 23
- Port-based and Tagged VLANs
- Chapter 24
- GARP VLAN Registration Protocol
- Chapter 25
- Multiple VLAN Modes
- Chapter 26
- Protected Ports VLANs
- Chapter 27
- MAC Address-based VLANs
- Section VII
- Routing
- Chapter 28
- Internet Protocol Version 4 Packet Routing
- Supported Platforms
- Overview
- Routing Interfaces
- Interface Names
- Static Routes
- Routing Information Protocol (RIP)
- Default Routes
- Equal-cost Multi-path (ECMP) Routing
- Routing Table
- Address Resolution Protocol (ARP) Table
- Internet Control Message Protocol (ICMP)
- Routing Interfaces and Management Features
- Local Interface
- AT-9408LC/SP AT-9424T/GB, and AT-9424T/SP Switches
- Routing Command Example
- Non-routing Command Example
- Upgrading from AT-S63 Version 1.3.0 or Earlier
- Chapter 29
- BOOTP Relay Agent
- Chapter 30
- Virtual Router Redundancy Protocol
- Section VIII
- Port Security
- Chapter 31
- MAC Address-based Port Security
- Chapter 32
- 802.1x Port-based Network Access Control
- Section IX
- Management Security
- Chapter 33
- Web Server
- Chapter 34
- Encryption Keys
- Chapter 35
- PKI Certificates and SSL
- Chapter 36
- Secure Shell (SSH)
- Chapter 37
- TACACS+ and RADIUS Protocols
- Chapter 38
- Management Access Control List
- Appendix A
- AT-S63 Management Software Default Settings
- Address Resolution Protocol Cache
- Boot Configuration File
- BOOTP Relay Agent
- Class of Service
- Denial of Service Defenses
- 802.1x Port-Based Network Access Control
- Enhanced Stacking
- Ethernet Protection Switching Ring (EPSR) Snooping
- Event Logs
- GVRP
- IGMP Snooping
- Internet Protocol Version 4 Packet Routing
- MAC Address-based Port Security
- MAC Address Table
- Management Access Control List
- Manager and Operator Account
- Multicast Listener Discovery Snooping
- Public Key Infrastructure
- Port Settings
- RJ-45 Serial Terminal Port
- Router Redundancy Protocol Snooping
- Server-based Authentication (RADIUS and TACACS+)
- Simple Network Management Protocol
- Simple Network Time Protocol
- Spanning Tree Protocols (STP, RSTP, and MSTP)
- Secure Shell Server
- Secure Sockets Layer
- System Name, Administrator, and Comments Settings
- Telnet Server
- Virtual Router Redundancy Protocol
- VLANs
- Web Server
- Appendix B
- SNMPv3 Configuration Examples
- Appendix C
- Features and Standards
- 10/100/1000Base-T Twisted Pair Ports
- Denial of Service Defenses
- Ethernet Protection Switching Ring Snooping
- Fiber Optic Ports (AT-9408LC/SP Switch)
- File System
- DHCP and BOOTP Clients
- Internet Protocol Multicasting
- Internet Protocol Version 4 Routing
- MAC Address Table
- Management Access and Security
- Management Access Methods
- Management Interfaces
- Management MIBs
- Port Security
- Port Trunking and Mirroring
- Spanning Tree Protocols
- System Monitoring
- Traffic Control
- Virtual LANs
- Virtual Router Redundancy Protocol
- Appendix D
- MIB Objects
- Index

13
Figure 1: Static Port Trunk Example.....................................................................................................................................81
Figure 2: User Priority and VLAN Fields within an Ethernet Frame....................................................................................114
Figure 3: ToS field in an IP Header ....................................................................................................................................115
Figure 4: ACL Example 1 ...................................................................................................................................................125
Figure 5: ACL Example 2 ...................................................................................................................................................126
Figure 6: ACL Example 3 ...................................................................................................................................................127
Figure 7: ACL Example 4 ...................................................................................................................................................128
Figure 8: ACL Example 5 ...................................................................................................................................................128
Figure 9: ACL Example 6 ...................................................................................................................................................129
Figure 10: DiffServ Domain Example .................................................................................................................................151
Figure 11: QoS Voice Application Example........................................................................................................................154
Figure 12: QoS Video Application Example........................................................................................................................156
Figure 13: QoS Critical Database Example ........................................................................................................................157
Figure 14: Policy Component Hierarchy Example..............................................................................................................159
Figure 15: Double Fault Condition in EPSR Snooping .......................................................................................................198
Figure 16: MIB Tree............................................................................................................................................................208
Figure 17: SNMPv3 User Configuration Process ...............................................................................................................212
Figure 18: SNMPv3 Message Notification Process ............................................................................................................213
Figure 19: Point-to-Point Ports ...........................................................................................................................................227
Figure 20: Edge Port ..........................................................................................................................................................228
Figure 21: Point-to-Point and Edge Port.............................................................................................................................228
Figure 22: VLAN Fragmentation.........................................................................................................................................230
Figure 23: VLAN Fragmentation with STP or RSTP...........................................................................................................235
Figure 24: MSTP Example of Two Spanning Tree Instances ............................................................................................236
Figure 25: Multiple VLANs in a MSTI..................................................................................................................................237
Figure 26: Multiple Spanning Tree Region .........................................................................................................................242
Figure 27: CIST and VLAN Guideline - Example 1.............................................................................................................247
Figure 28: CIST and VLAN Guideline - Example 2.............................................................................................................248
Figure 29: Spanning Regions - Example 1 .........................................................................................................................249
Figure 30: Port-based VLAN - Example 1 ..........................................................................................................................260
Figure 31: Port-based VLAN - Example 2 ..........................................................................................................................261
Figure 32: Example of a Tagged VLAN ..............................................................................................................................265
Figure 33: GVRP Example .................................................................................................................................................270
Figure 34: GARP Architecture ............................................................................................................................................276
Figure 35: GID Architecture................................................................................................................................................277
Figure 36: Example of a MAC Address-based VLAN Spanning Switches .........................................................................297
Figure 37: Example of the Supplicant Role ......................................................................................
..................................368
Figure 38: Authenticator Port in Single Operating Mode with a Single Client.....................................................................370
Figure 39: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 1 ................................371
Figure 40: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 2 ................................372
Figure 41: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 3 ................................373
Figure 42: Authenticator Port in Multiple Operating Mode - Example 1..............................................................................374
Figure 43: Authenticator Port in Multiple Operating Mode - Example 2..............................................................................375
Figure 44: SSH Remote Management of a Slave Switch ...................................................................................................425
Figures