Management Software AT-S63 ◆ Web Browser User’s Guide For Stand-alone AT-9400 Switches AT-S63 Version 2.2.0 for AT-9400 Layer 2+ Switches AT-S63 Version 3.2.
Copyright © 2008 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis, Inc. Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. Microsoft and Internet Explorer are registered trademarks of Microsoft Corporation. Netscape Navigator is a registered trademark of Netscape Communications Corporation.
Contents Preface ............................................................................................................................................................ 15 How This Guide is Organized........................................................................................................................... 16 Product Documentation .................................................................................................................................... 18 Where to Go First ....
Contents Chapter 5: MAC Address Table .................................................................................................................... 75 Displaying the MAC Address Table .................................................................................................................. 76 Adding Static Unicast and Multicast MAC Addresses....................................................................................... 79 Deleting Unicast and Multicast MAC Addresses..................
AT-S63 Management Software Web Browser User’s Guide Chapter 13: Class of Service ...................................................................................................................... 155 Configuring CoS ............................................................................................................................................. 156 Mapping CoS Priorities to Egress Queues .....................................................................................................
Contents Configuring the SNMPv3 Notify Table ............................................................................................................235 Creating a Notify Table Entry ...................................................................................................................235 Deleting a Notify Table Entry....................................................................................................................237 Modifying a Notify Table Entry..........................
AT-S63 Management Software Web Browser User’s Guide Section V: Virtual LANs ......................................................................................... 315 Chapter 20: Port-based and Tagged VLANs ............................................................................................. 317 Creating a New Port-Based or Tagged VLAN ................................................................................................ 318 Modifying a VLAN.............................................
Contents Chapter 27: Management Access Control List ..........................................................................................399 Enabling or Disabling the Management ACL ..................................................................................................400 Creating an ACE .............................................................................................................................................402 Modifying an ACE ............................................
Figures Figure 1: General Tab (Configuration).............................................................................................................. 28 Figure 2: System Time Tab .............................................................................................................................. 33 Figure 3: Ping Client Tab (Monitoring)..............................................................................................................
Figures Figure 47: Modify ACLs Page .........................................................................................................................151 Figure 48: ACL Tab (Monitoring) ....................................................................................................................153 Figure 49: View ACLs Page ............................................................................................................................154 Figure 50: CoS Tab (Configuration) .........
AT-S63 Management Software Web Browser User’s Guide Figure 102: SNMPv3 View Table Tab (Monitoring) ........................................................................................ 263 Figure 103: SNMPv3 Access Table Tab (Monitoring) .................................................................................... 264 Figure 104: SNMPv3 SecurityToGroup Table Tab (Monitoring)..................................................................... 265 Figure 105: SNMPv3 Notify Table Tab (Monitoring)..
Figures Figure 157: Secure Shell Tab (Monitoring) .....................................................................................................384 Figure 158: Server-based Authentication Tab (Configuration)........................................................................388 Figure 159: TACACS+ Client Configuration Page ..........................................................................................390 Figure 160: Server-Based Authentication Tab (Monitoring).........................
Tables Table 1: AT-S63 Software Modules ...................................................................................................................................123 Table 2: Event Severity Levels ..........................................................................................................................................125 Table 3: Default Syslog Facilities ................................................................................................................................
Tables 14
Preface This guide contains instructions on how to manage the AT-9400 Layer 2+ and Basic Layer 3 Gigabit Ethernet Switches from the web browser windows in the AT-S63 Management Software.
Preface How This Guide is Organized This guide has the following sections and chapters: Section I: Basic Operations Chapter 1, “Basic Switch Parameters” on page 27 Chapter 2, “Port Parameters” on page 43 Chapter 3, “Enhanced Stacking” on page 57 Chapter 4, “SNMPv1 and SNMPv2c” on page 65 Chapter 5, “MAC Address Table” on page 75 Chapter 6, “Static Port Trunks” on page 85 Chapter 7, “Port Mirroring” on page 95 Section II: Advanced Operations Chapter 8, “File System” on page 105 Chapter 9, “File Downl
AT-S63 Management Software Web Browser User’s Guide Section VI: Port Security Chapter 22, “MAC Address-based Port Security” on page 347 Chapter 23, “802.
Preface Product Documentation For overview information on the features of the AT-9400 Switch and the AT-S63 Management Software, refer to: AT-S63 Management Software Features Guide (PN 613-001022) For instructions on starting a local or remote management session on a stand-alone AT-9400 Switch or a stack, refer to: Starting an AT-S63 Management Session Guide (PN 613-001023) For instructions on installing or managing a stand-alone AT-9400 Switch, refer to: AT-9400 Gigabit Ethernet Switch Installa
AT-S63 Management Software Web Browser User’s Guide Where to Go First Allied Telesis recommends that you read Chapter 1, Overview, in the AT-S63 Management Software Features Guide before you begin to manage the switch for the first time. There you will find a variety of basic information about the unit and the management software, like the two levels of manager access levels and the different types of management sessions.
Preface Starting a Management Session For instructions on how to start a local or remote management session on the AT-9400 Switch, refer to the Starting an AT-S63 Management Session Guide.
AT-S63 Management Software Web Browser User’s Guide Document Conventions This document uses the following conventions: Note Notes provide additional information. Caution Cautions inform you that performing or omitting a specific action may result in equipment damage or loss of data. Warning Warnings inform you that performing or omitting a specific action may result in bodily injury.
Preface Where to Find Web-based Guides The installation and user guides for all Allied Telesis products are available in portable document format (PDF) on our web site at www.alliedtelesis.com. You can view the documents online or download them onto a local workstation or server.
AT-S63 Management Software Web Browser User’s Guide Contacting Allied Telesis This section provides Allied Telesis contact information for technical support and for sales and corporate information. Online Support You can request technical support online from the Allied Telesis Knowledge Base at www.alliedtelesis.com/support/kb.aspx. You can submit questions to our technical support staff from the Knowledge Base and review answers to previously asked questions.
Preface 24
Section I Basic Operations This section has the following chapters: Section I: Basic Operations Chapter 1, “Basic Switch Parameters” on page 27 Chapter 2, “Port Parameters” on page 43 Chapter 3, “Enhanced Stacking” on page 57 Chapter 4, “SNMPv1 and SNMPv2c” on page 65 Chapter 5, “MAC Address Table” on page 75 Chapter 6, “Static Port Trunks” on page 85 Chapter 7, “Port Mirroring” on page 95 25
Section I: Basic Operations
Chapter 1 Basic Switch Parameters This chapter contains the following sections: Section I: Basic Operations “Configuring the Switch’s Name, Location, and Contact” on page 28 “Changing the Manager and Operator Passwords” on page 30 “Setting the System Date and Time” on page 32 “Rebooting a Switch” on page 35 “Pinging a Remote System” on page 36 “Returning the AT-S63 Management Software to the Factory Default Values” on page 37 “Displaying the IP Address of the Local Interface”
Chapter 1: Basic Switch Parameters Configuring the Switch’s Name, Location, and Contact This procedure assigns a name to the switch. The name appears at the top of the web browser windows. Names can help you identify your switches when you manage them and avoid performing a configuration procedure on the wrong switch. This procedure also assigns the name of the administrator responsible for maintaining the unit and the location of the switch.
AT-S63 Management Software Web Browser User’s Guide Note This procedure describes the System Name, Administrator, and Comments parameters in the Administration section of the tab. The parameters in the IP Configuration section are described in “Displaying the IP Address of the Local Interface” on page 39. The Passwords section is described in “Changing the Manager and Operator Passwords” on page 30.
Chapter 1: Basic Switch Parameters Changing the Manager and Operator Passwords There are two levels of management access on the AT-9400 Switch: manager and operator. When you log in as a manager, you can view and configure all of a switch’s operating parameters. When you log in as an operator, you can only view the operating parameters; you cannot change any values. You log in as a manager or an operator by entering the appropriate username and password when you start an AT-S63 management session.
AT-S63 Management Software Web Browser User’s Guide Caution Do not use spaces or special characters, such as asterisks (*) and exclamation points (!), in a password if you are managing the switch from a web browser. Many web browsers cannot handle special characters in passwords. Note A change to a password is immediately activated on the switch. You must use the new password the next time you start a management session of the switch. 3. Click Apply to activate your change on the switch. 4.
Chapter 1: Basic Switch Parameters Setting the System Date and Time This procedure explains how to set the switch’s date and time. Setting the date and time is important if you plan to view the events in the switch’s event log or send the events to a syslog server. The correct date and time are also important if the management software will be sending traps to a management workstation or if you plan to create a self-signed SSL certificate.
AT-S63 Management Software Web Browser User’s Guide The System Time tab is shown in Figure 2. Figure 2. System Time Tab 3. To set the system time manually, do the following: a. In the System Time section of the tab, enter the time and date in the following format. hh:mm:ss dd-mm-yyyy b. Click Apply. 4.
Chapter 1: Basic Switch Parameters Daylight Savings Time (DST) Enables or disables the system’s adjustment for daylight savings time. The default is enabled. Note The switch does not set DST automatically. If the switch is in a locale that uses DST, you must remember to enable this in April when DST begins and disable it in October when DST ends. If the switch is in a locale that does not use DST, this option should be set to disabled all the time. Status Enables or disables the SNTP client on the switch.
AT-S63 Management Software Web Browser User’s Guide Rebooting a Switch Note All unsaved parameters changes are discarded when a system is reset. To save your parameter changes, click the Save Config option in the main menu. To reboot a switch, perform the following procedure: 1. From the home page, select Configuration. The System page is displayed with the General tab selected by default, as shown in Figure 1 on page 28. 2. Click Reset at the bottom of the tab. A confirmation prompt is displayed. 3.
Chapter 1: Basic Switch Parameters Pinging a Remote System This procedure instructs the switch to ping a node on your network. This can be useful in determining whether an active path exists between the switch and another network device. Note the following before performing this procedure: Note The switch must have a routing interface on the local subnet from where it is pinging the end node. The switch uses the IP address of the interface as its source address when pinging the device.
AT-S63 Management Software Web Browser User’s Guide Returning the AT-S63 Management Software to the Factory Default Values The procedure in this section returns all AT-S63 Management Software parameters to their default values. Note the following before performing this procedure: Returning the switch to its default parameter settings deletes all routing interfaces and port-based and tagged VLANs on the switch.
Chapter 1: Basic Switch Parameters 2. From the Configuration menu, select the Utilities option. The Utilities page is displayed with the System Utilities tab selected by default, as shown in Figure 4. Figure 4. System Utilities Tab (Configuration) 3. Click the Reboot Switch After Resetting to Defaults checkbox. 4. Click Apply. The web browser displays the following prompt: This page may no longer be available while the switch reboots. Do you want to continue? 5.
AT-S63 Management Software Web Browser User’s Guide Displaying the IP Address of the Local Interface This procedure displays the IP address and subnet mask of the local interface on the switch. The local interface is used for enhanced stacking and remote management of the switch with a Telnet or SSH client, or a web browser. You cannot configure the local interface from the web browser interface, For that, you must use the menus interface or the command line interface.
Chapter 1: Basic Switch Parameters Displaying System Information To view basic information about the switch, perform the following procedure: 1. From the Home page, select Monitoring. The Monitoring System page is displayed with the General tab selected by default, as shown in Figure 5. Figure 5.
AT-S63 Management Software Web Browser User’s Guide The System Information section displays the following information: MAC Address The MAC address of the switch. Model Name The model name of the switch. Serial Number The serial number of the switch. System Name The name of the switch. To set the name, refer to “Configuring the Switch’s Name, Location, and Contact” on page 28. Administrator The name of the network administrator responsible for managing the switch.
Chapter 1: Basic Switch Parameters System Up Time The length of time since the switch was last reset or power cycled. The Software Information section displays the following information: Application Software The version number and build date of the AT-S63 Management Software. Bootloader The version number and build date of the AT-S63 bootloader.
Chapter 2 Port Parameters This chapter explains how to view and change the parameter settings of the ports on the switch. Examples of the parameters include port speed, duplex mode, and packet filtering.
Chapter 2: Port Parameters Configuring Port Parameters To configure the parameter settings of a port on the switch, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Layer 1 option. The Layer 1 page is displayed with the Port Settings tab selected by default, as shown in Figure 6. Figure 6. Port Settings Tab (Configuration) The Port Settings tab displays an image of the front of the switch.
AT-S63 Management Software Web Browser User’s Guide The Port Configuration page is shown Figure 7. Figure 7. Port Configuration Page Note The Port Configuration page in the figure above is from a 10/100/ 1000 Mbps twisted pair port. The page for a fiber optic port will contain a subset of the parameters. If you are configuring multiple ports and the ports have different settings, the Port Configuration page displays the settings of the lowest numbered port.
Chapter 2: Port Parameters Description (Name) Use this selection to assign a name to a port, from 1 to 15 alphanumeric characters. Spaces are allowed, but do not use special characters, such as asterisks or exclamation points. (You cannot assign a name when you are configuring more than one port.) Status Use this selection to enable or disable a port. When disabled, a port does not accept or forward frames. You might disable a port if a problem occurs with the end node or cable.
AT-S63 Management Software Web Browser User’s Guide Possible settings are: Auto-Negotiate: The port autonegotiates both speed and duplex mode. This is the default. 10Mbps - Half Duplex 10Mbps - Full Duplex 100Mbps - Half Duplex 100Mbps - Full Duplex 1Gb - Full Duplex (Applies only to 1000Base SFP and GBIC modules. This selection should not be used. An SFP or GBIC module should use Auto-Negotiation to set its speed and duplex mode.
Chapter 2: Port Parameters Ingress Unknown Unicast Filter Use this parameter to configure a port to forward or discard unknown ingress unicast packets. The possible settings are: Enabled - The port discards unknown ingress unicast packets. Disabled - The port forwards unknown ingress unicast packets. This is the default setting. Egress Unknown Unicast Filter Use this parameter to configure a port to forward or discard unknown egress unicast packets.
AT-S63 Management Software Web Browser User’s Guide Disabled - Backpressure is disabled. This is the default. Flow Control/Back Pressure Limit Use this parameter to specify the threshold for flow control or backpressure. The threshold is specified in cells. A cell equals 128 bytes. The range is 1 to 7935. The default is 7935 cells. HOL Blocking HOL blocking sets a threshold on the utilization of a port’s egress queue.
Chapter 2: Port Parameters Multicast Rate Use this parameter to set the multicast rate limit in packets per second. The range is 0 to 262143. The default is 262143. 6. After entering the desired changes, click Apply. The switch activates the parameter changes on the port. 7. To permanently save your changes, select the Save Config option in the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Displaying Port Parameters To display the parameter settings of a port, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 1 option. The Layer 1 page is displayed with the Port Settings tab selected by default, as shown in Figure 8. Figure 8. Port Settings Tab (Monitoring) The Port Settings tab displays an image of the front of the switch.
Chapter 2: Port Parameters The Port Status page is shown in Figure 9. Figure 9. Port Status Page For descriptions of the parameters, refer to “Configuring Port Parameters” on page 44.
AT-S63 Management Software Web Browser User’s Guide Displaying Port Statistics To display the statistics of a port, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 1 option. The Layer 1 page is displayed with the Port Settings tab selected by default, as shown in Figure 8 on page 51. The Port Setting tab displays a image of the front of the switch. Ports with a valid link to an end node are green. 3. In the switch image, click a port.
Chapter 2: Port Parameters Frames Sent Number of frames transmitted from the port. Broadcast Frames Received Number of broadcast frames received on the port. Broadcast Frames Sent Number of broadcast frames transmitted from the port. Multicast Frames Received Number of multicast frames received on the port. Multicast Frames Sent Number of multicast frames transmitted from the port.
AT-S63 Management Software Web Browser User’s Guide 5. To clear all the counters for the port, click Clear. To clear the counters for all ports on the switch, click Clear All. (The Clear and Clear All buttons are only available when you log on as a manager. They are not available when you log on as an operator.
Chapter 2: Port Parameters Resetting a Port to the Default Settings To reset a port to the default settings, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Layer 1 option. The Layer 1 page is displayed with the Port Settings tab selected by default, as shown in Figure 6 on page 44. 3. In the switch image, click a port to be returned to the default settings. The selected port turns white. You can reset more than one port at a time.
Chapter 3 Enhanced Stacking This chapter contains the following procedures for setting up enhanced stacking: Section I: Basic Operations “Setting a Switch’s Enhanced Stacking Status” on page 58 “Selecting a Switch in an Enhanced Stack” on page 60 “Returning to the Master Switch” on page 62 “Displaying the Enhanced Stacking Status” on page 63 57
Chapter 3: Enhanced Stacking Setting a Switch’s Enhanced Stacking Status The enhanced stacking status of the switch can be master, slave, or unavailable. Each status is described below: Master - Starting a local or remote management session on a master switch of a stack allows you to easily transition to the other switches in the stack from the same management session. Slave - A slave switch can be remotely managed through a master switch or independently, such as through a local management session.
AT-S63 Management Software Web Browser User’s Guide The Enhanced Stacking tab is shown in Figure 11. Figure 11. Enhanced Stacking Tab (Configuration) 4. Click the desired enhanced stacking status for the switch. The default is Slave. 5. Click Apply. The new setting for the enhanced stacking status is activated on the switch. 6. To permanently save your changes, select the Save Config option in the Configuration menu.
Chapter 3: Enhanced Stacking Selecting a Switch in an Enhanced Stack This procedure explains how to select a switch to manage in an enhanced stack. You can manage only one switch at a time. When you start a web browser management session on an enhanced stack, you are initially managing the master switch where you started the session. To select a switch in an enhanced stack to manage, perform the following procedure: 1. From the home page of the master switch, select Enhanced Stacking.
AT-S63 Management Software Web Browser User’s Guide Note The list does not include the master switch where you started the management session, nor any switches with an enhanced stacking status of Unavailable. You can sort the switches in the list by switch name or MAC address by clicking on the column headers. By default, the list is sorted by MAC address. To refresh the list, click Refresh. 2.
Chapter 3: Enhanced Stacking Returning to the Master Switch When you are finished managing the switch and want to manage another switch in the stack, select Disconnect from the main menu. This returns you to the Enhanced Stacking page (Figure 12 on page 60) of the master switch where you started the management session. At this point, you can do one of the following: 62 Manage the master switch. Select another switch in the list to manage. Select Logout to end your management session.
AT-S63 Management Software Web Browser User’s Guide Displaying the Enhanced Stacking Status To display the enhanced stacking status of the switch, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Mgmt. Protocols option. 3. Select the Enhanced Stacking tab. The Enhanced Stacking tab is shown Figure 13. Figure 13.
Chapter 3: Enhanced Stacking 64 Section I: Basic Operations
Chapter 4 SNMPv1 and SNMPv2c This chapter explains how to activate SNMP management on the switch and how to create, modify, and delete SNMPv1 and SNMPv2c community strings.
Chapter 4: SNMPv1 and SNMPv2c Enabling or Disabling SNMP Management To enable or disable SNMP management on the switch, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Protocols option. 3. Select the SNMP tab. The SNMP tab is shown in Figure 14. Figure 14. SNMP Tab (Configuration) 4. Click the Enable SNMP Access checkbox to enable or disable SNMP management.
AT-S63 Management Software Web Browser User’s Guide 5. If you want the switch to send authentication failure traps, click the Enable Authentication Failure Traps checkbox. A check in the box indicates the switch sends the trap. 6. Click Apply. A change to SNMP access is immediately activated on the switch. 7. To permanently save your changes, select the Save Config option in the Configuration menu.
Chapter 4: SNMPv1 and SNMPv2c Creating a New SNMPv1 and SNMPv2c Community To create a new SNMPv1 and SNMPv2c community, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Protocols option. 3. Select the SNMP tab. The SNMP tab is shown in Figure 14 on page 66. 4. In the SNMPv1 & SNMPv2c section, click Configure. The SNMPv1 & SNMPv2c Communities tab is shown in Figure 15. Figure 15.
AT-S63 Management Software Web Browser User’s Guide Manager Stations The IP addresses of management workstations permitted to use a string with a closed access status. Trap Receivers The IP addresses of trap receivers to receive traps from the switch. Open Status The access status of a community string. Yes means the string has an open status and that any management workstation can use it.
Chapter 4: SNMPv1 and SNMPv2c 6. Configure the following parameters: Community Name Enter the new community string. The name can be up to 32 alphanumeric characters. No spaces or special characters (such as /, #, or &) are allowed. Status Enable or disable the community string. A disabled community string cannot be used to access the switch. The default is enabled. Access Mode Specify the access mode for the SNMP community string.
AT-S63 Management Software Web Browser User’s Guide Modifying an SNMPv1 and SNMPv2c Community To modify an SNMPv1 and SNMPv2c community, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Protocols option. 3. Select the SNMP tab. The SNMP tab is shown in Figure 14 on page 66. 4. In the SNMPv1 & SNMPv2c section, click Configure. The SNMPv1 & SNMPv2c Communities tab is shown in Figure 15 on page 68. 5.
Chapter 4: SNMPv1 and SNMPv2c Deleting an SNMPv1 and SNMPv2c Community To delete an SNMPv1 and SNMPv2c community, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Protocols option. 3. Select the SNMP tab. The SNMP tab is shown in Figure 14 on page 66. 4. In the SNMPv1 & SNMPv2c section, click Configure. The SNMPv1 & SNMPv2c Communities tab is shown in Figure 15 on page 68. 5.
AT-S63 Management Software Web Browser User’s Guide Displaying the SNMPv1 and SNMPv2c Communities To display the SNMPv1 and SNMPv2c communities, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Mgmt. Protocols option. 3. Select the SNMP tab. The SNMP tab is shown in Figure 17. Figure 17.
Chapter 4: SNMPv1 and SNMPv2c 4. In the SNMPv1 & SNMPv2c section, click View. The SNMPv1 & SNMPv2c Communities tab is shown in Figure 18. Figure 18. SNMPv1 & SNMPv2c Communities Tab (Monitoring) The columns in the table are defined here: Community Name The name of a community string. Access Mode The access mode of a community string. A string with a Read Only access mode permits the viewing of the MIB objects on the switch.
Chapter 5 MAC Address Table This chapter contains instructions on how to view the MAC addresses in the MAC address table. It also explained how to add static addresses to the table.
Chapter 5: MAC Address Table Displaying the MAC Address Table To view the MAC address table, perform the following procedure: 1. From the Home page, select Monitoring or Configuration. 2. From the Monitoring or Configuration menu, select the Layer 2 option. The Layer 2 page is displayed with the MAC Address tab selected by default, as shown in Figure 19. Figure 19.
AT-S63 Management Software Web Browser User’s Guide The View Unicast MAC Addresses section and the View Multicast MAC Addresses section display unicast and multicast addresses, respectively. The options function the same in both sections. You can select only one option at a time. View All Displays all dynamic and static unicast or multicast addresses in the MAC address table. View Static Displays just the static unicast or multicast addresses assigned to the ports.
Chapter 5: MAC Address Table Figure 20 shows an example of viewing all unicast MAC addresses. Figure 20. View MAC Addresses Page The View MAC Addresses page displays a table that contains the following columns of information: VLAN ID The ID number of the VLAN where the port is a member. MAC Address The static or dynamic MAC address. Port(s) The port where the address was learned or assigned. The MAC address with port “CPU” is the address of the switch. Type The type of the address: static or dynamic.
AT-S63 Management Software Web Browser User’s Guide Adding Static Unicast and Multicast MAC Addresses This section contains the procedure for assigning a static unicast or multicast address to a port. A switch port can have up to 255 static MAC addresses. To add a static address to the MAC address table, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option.
Chapter 5: MAC Address Table multicast application is located results in the failure of the multicast packets to be properly forwarded to the host nodes. You can specify the ports individually (e.g., 1,4,5), as a range (e.g., 11-14) or both (e.g., 15-17,22,24). VLAN ID Specifies the VLAN ID where the port is a member. 5. Click Apply. 6. Repeat this procedure to add other static addresses to the switch. 7. To permanently save your changes, select the Save Config option in the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Deleting Unicast and Multicast MAC Addresses To delete a static or dynamic unicast or multicast MAC address from the switch, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. The Layer 2 page opens with the MAC Address tab selected by default, as shown in Figure 19 on page 76. 3. Display the MAC addresses on the switch by selecting one of the options.
Chapter 5: MAC Address Table Deleting All Dynamic MAC Addresses To delete all dynamic unicast and multicast MAC addresses from the MAC address table, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. The Layer 2 page opens with the MAC Address tab selected by default, as shown in Figure 19 on page 76. 3. In the Delete All Dynamic MAC Addresses section, click Delete.
AT-S63 Management Software Web Browser User’s Guide Changing the Aging Time This procedure changes the aging time of the MAC address table. The switch uses the aging time to delete inactive dynamic MAC addresses from the MAC address table. The switch deletes an address from the table if no packets are sent to or received from the address for the period of time specified in the timer. This prevents the table from becoming full of addresses of inactive nodes.
Chapter 5: MAC Address Table 84 Section I: Basic Operations
Chapter 6 Static Port Trunks This chapter contains the procedure for managing static port trunks. The sections in this chapter are: “Creating a Static Port Trunk” on page 86 “Modifying a Static Port Trunk” on page 90 “Deleting a Port Trunk” on page 92 “Displaying the Port Trunks” on page 93 Note LACP trunks are not supported from the web browser interface.
Chapter 6: Static Port Trunks Creating a Static Port Trunk Caution Do not connect the cables of a port trunk to the ports on the switch until after you have configured the ports on both the switch and the remote device. Connecting the cables prior to configuring the trunk can create a loop in your network topology. This can cause a broadcast storm and poor network performance.
AT-S63 Management Software Web Browser User’s Guide The Port Trunking tab is shown in Figure 22. Figure 22. Port Trunking Tab (Configuration) The tab displays the current static trunks in a table with the following columns of information: ID The ID number of the trunk. Name The name of the trunk. Type The load distribution method.
Chapter 6: Static Port Trunks 4. To create a new static trunk, click Add. The Add New Trunk page is shown in Figure 23. Figure 23. Add New Trunk Page 5. Click the Trunk Name field and enter a name for the static trunk. The name can be up to 16 alphanumeric characters. No spaces or special characters, such as asterisks and exclamation points, are allowed. Each trunk must have a unique name. 6. From the Trunk Method pull-down menu, select a load distribution method for the trunk.
AT-S63 Management Software Web Browser User’s Guide Note Allied Telesis does not recommend using paired twisted pair ports with GBIC or SFP slots in a port trunk. The operation of a port trunk may be unpredictable if a paired port were to transition to the redundant uplink status mode. 8. Click Apply. The new port trunk is now active on the switch. 9. To permanently save your changes, select the Save Config option in the Configuration menu. 10. Configure the ports on the remote device for port trunking.
Chapter 6: Static Port Trunks Modifying a Static Port Trunk This section contains the procedure for modifying a static port trunk on the switch. You can change the name and ports of a trunk from the web browser interface, but not the load distribute method.
AT-S63 Management Software Web Browser User’s Guide The Modify Trunk page is shown in Figure 24. Figure 24. Modify Trunk Page 5. To change the name of the trunk, click the Trunk Name field and enter the new name. The name can be up to 16 alphanumeric characters. No spaces or special characters, such as asterisks and exclamation points, are allowed. Each trunk must have a unique name. 6. To add or remove ports from a trunk, click the ports in the graphical image of the switch.
Chapter 6: Static Port Trunks Deleting a Port Trunk Caution Disconnect the cables from the port trunk on the switch before performing this procedure. Deleting the trunk without first disconnecting the cables can result in the formation of a loop in your network topology. This can cause a broadcast storm and poor network performance. To delete a port trunk from the switch, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Layer 1 option.
AT-S63 Management Software Web Browser User’s Guide Displaying the Port Trunks To display the port trunks, perform the following procedure: 1. From the home page, select Monitoring. 2. From the Monitoring menu, select the Layer 1 option. 3. Select the Port Trunking tab. The Port Trunking tab is shown in Figure 25. Figure 25. Port Trunking Tab (Monitoring) The Port Trunking tab displays a table with the following columns of information: ID The ID number of the trunk. Name The name of the trunk.
Chapter 6: Static Port Trunks SI/DI - Source IP address /destination IP address (Layer 3) Ports The ports of the trunk.
Chapter 7 Port Mirroring This chapter contains the procedures for managing the port mirroring feature.
Chapter 7: Port Mirroring Creating a Port Mirror To create a port mirror, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Layer 1 option. 3. Select the Port Mirroring tab. The Port Mirroring tab is shown in Figure 26. Figure 26. Port Mirroring Tab (Configuration) The tab displays a table with the following columns: Mirror to Port Specifies the destination port of the mirrored traffic. There can be only one destination port.
AT-S63 Management Software Web Browser User’s Guide 4. Click Modify. The Modify Mirror page is shown in Figure 27. Figure 27. Modify Mirror Page 5. Click the ports to be in the port mirror. Clicking a port toggles it through the following possible settings: The destination (mirror) port. There can be only one destination port. A source port. The port’s ingress traffic is mirrored to the destination port. A source port. The port’s egress traffic is mirrored to the destination port. A source port.
Chapter 7: Port Mirroring Figure 28 shows an example of the Modify Mirror page configured for a port mirror. The ingress and egress traffic on ports 1, 2, and 7 to 10 is being mirrored to the destination port 11. Figure 28. Example of a Modify Mirror Page 6. After selecting the destination and source ports, click the Enable Mirror check box. 7. Click Apply. The port mirror is now active on the switch. You can connect a data analyzer to the destination port to monitor the traffic on the source ports. 8.
AT-S63 Management Software Web Browser User’s Guide Modifying a Port Mirror To modify a port mirror, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Layer 1 option. 3. Select the Port Mirroring tab. The Port Mirroring tab is shown in Figure 26 on page 96. 4. Click Modify. The Modify Mirror page is shown in Figure 27 on page 97. 5. Change the ports of the port mirror, as needed.
Chapter 7: Port Mirroring Disabling a Port Mirror This procedure disables a port mirror. When disabled, a port mirror stops copying traffic from the source ports to the destination port. However, the destination port is still reserved for port mirroring. To delete the port mirror so that the destination port can be used for normal network operations, refer to “Deleting a Port Mirror” on page 101. To disable a port mirror, perform the following procedure: 1. From the home page, select Configuration. 2.
AT-S63 Management Software Web Browser User’s Guide Deleting a Port Mirror To delete a port mirror so that you can use the destination port for normal network operations, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Layer 1 option. 3. Select the Port Mirroring tab. The Port Mirroring tab is shown in Figure 26 on page 96. 4. Click Modify. The Modify Mirror page is shown in Figure 27 on page 97. 5.
Chapter 7: Port Mirroring Displaying the Port Mirror To display the port mirror, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 1 option. 3. Select the Port Mirroring tab. The Port Mirroring tab is shown in Figure 29. Figure 29. Port Mirroring Tab (Monitoring) The tab displays a table with the following columns: Mirror to Port The destination port where the traffic is copied and where the network analyzer is located.
Section II Advanced Operations This section has the following chapters: Section II: Advanced Operations Chapter 8, “File System” on page 105 Chapter 9, “File Downloads and Uploads” on page 111 Chapter 10, “Event Logs and Syslog Client” on page 119 Chapter 11, “Classifiers” on page 135 Chapter 12, “Access Control Lists” on page 147 Chapter 13, “Class of Service” on page 155 Chapter 14, “Quality of Service” on page 165 Chapter 15, “Denial of Service Defenses” on page 187
Section II: Advanced Operations
Chapter 8 File System This chapter contains the procedures for working with the switch’s file system.
Chapter 8: File System Listing the Files in Flash Memory or on a Compact Flash Card This procedure displays the files stored in the switch’s flash memory or on a compact flash card. (Not all AT-9400 Switches support a flash card slot.) Note You cannot copy, rename, or delete files from a web browser management session. Those tasks can be performed from the menus and command line interfaces.
AT-S63 Management Software Web Browser User’s Guide The information in the tab is defined below: Current Drives Specifies the location of the files displayed in the Current Files section of the tab. The Flash option represents the switch’s flash memory. This is the default selection. The Flash Card option only appears for those AT-9400 Switches that feature a flash card slot. Default Configuration File Specifies the filename of the active configuration file.
Chapter 8: File System 5. To view the contents of a file, such as a configuration file, click the file in the Current Files section of the tab and click View. You can view one file at a time. The contents of the configuration file are displayed in the Viewing File page. An example is shown in Figure 31. . Figure 31.
AT-S63 Management Software Web Browser User’s Guide Selecting an Active Boot Configuration File This procedure changes the active boot configuration file on the switch. The switch uses the active boot configuration file to configure its operating parameters whenever it is reset or power cycled. The switch also updates the active boot file whenever you select the Save Config option.
Chapter 8: File System Be sure to include the “.cfg” extension. Precede the name with “cflash:” if the file is stored on a flash card in the switch. 5. Click Apply. The switch searches the file system or flash memory card for the file. If it finds the file, it displays the file name in the Default Configuration File field along with the word “Exists.” The file is now the active boot configuration file on the switch.
Chapter 9 File Downloads and Uploads This chapter explains how to upload and download files, such as a new AT-S63 image file, onto the switch.
Chapter 9: File Downloads and Uploads Downloading a File This procedure explains how to download a file from a TFTP server on your network to the switch using the web browser interface. You can download any of the following files: AT-S63 image file Boot configuration file CA certificate Here are the general guidelines to follow when performing this procedure: You must use TFTP to download a file from a web browser management session.
AT-S63 Management Software Web Browser User’s Guide with its DHCP or BOOTP client activated. The interface is given the interface number 0 and assigned to the preexisting management VLAN. Furthermore, the interface is designated as the local interface on the switch. This procedure gives you the option of downloading the image file into the switch’s application block or the file system.
Chapter 9: File Downloads and Uploads To download a file, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Utilities option. The Utilities page is displayed with the System Utilities tab selected by default, as shown in Figure 32. Figure 32. System Utilities Tab (Configuration) Note The top portion of the System Utilities tab returns the switch to its factory default settings.
AT-S63 Management Software Web Browser User’s Guide 6. In the TFTP Local Filename field, enter a name for the file. This is the name the switch uses to store the file in its file system. To download a new AT-S63 image file into the switch’s application block, enter “APPBLOCK” as the filename. 7.
Chapter 9: File Downloads and Uploads Uploading a File This procedure explains how to upload a file from the switch’s file system to a TFTP server on your network using the web browser interface. You can upload any of the following files: Boot configuration file Public encryption key CA enrollment request Event log file Note the following before performing this procedure: You must use TFTP to upload a file from a web browser management session.
AT-S63 Management Software Web Browser User’s Guide 5. In the TFTP Remote Filename field, enter a name for the file when it is stored on the TFTP server. 6. In the TFTP Local Filename field, enter the name of the file in the switch’s file system to be uploaded to the TFTP server. 7. In TFTP File Type, select File. Note If you select Image as the TFTP File Type, the switch uploads its active AT-S63 image file to the FTP server and stores it under the name specified in step 5.
Chapter 9: File Downloads and Uploads 118 Section II: Advanced Operations
Chapter 10 Event Logs and Syslog Client This chapter describes how to view switch activity by displaying and saving the contents of the event logs. It also explains how to send events to syslog servers on your network by creating syslog output definitions.
Chapter 10: Event Logs and Syslog Client Working with the Event Logs The event logs contain event messages generated by a switch. These events can provide vital information about the operation of the device and can help you identify and resolve network problems. The information includes the time and date when an event occurred, the event’s severity, the AT-S63 module that generated the event, and an event description. The AT-9400 Switch has two event logs. Both logs store the same event messages.
AT-S63 Management Software Web Browser User’s Guide The Event log tab is shown in Figure 33. Figure 33. Event Log Tab (Configuration) 4. In the Log Settings section, click Enabled for the Status to enable the event logs, or Disabled to disable the event logs and to stop the switch from sending events to syslog servers. The default setting is enabled. 5. Click Apply to activate the settings on the switch.
Chapter 10: Event Logs and Syslog Client Displaying Events This procedure explains how to display the events in an event log. You can view all or just specific events of a log. To view the events in an event log, perform the following procedure: 1. From the home page, select either Monitoring or Configuration. 2. From the Configuration menu, select the System option. 3. Select the Event Log tab. The Event log tab is shown in Figure 33 on page 121. 4.
AT-S63 Management Software Web Browser User’s Guide Display Order Controls the chronological order of the events in the display. Options are: Chronological - Lists the events starting with the oldest events. This is the default. Reverse Chronological - Lists the events starting with the most recent events. Mode Controls the format of the events in the display. Options are: Normal - Displays an event’s time of occurrence, module originator, severity, and description for each event.
Chapter 10: Event Logs and Syslog Client Table 1. AT-S63 Software Modules (Continued) Name 124 Description IP IP configuration LACP Link Aggregation Control Protocol MAC MAC address table MGMTACL Management access control list MLDSNOOP MLD snooping PACCESS 802.
AT-S63 Management Software Web Browser User’s Guide Figure 34 shows an example of an event log in Normal mode. Figure 34. Event Log Example Displayed in Normal Mode The columns in the table are defined here: Severity The event’s severity. The severity codes and their corresponding severity level and description are listed in Table 2. Table 2. Event Severity Levels Severity Code Severity Level E Error Switch operation is severely impaired.
Chapter 10: Event Logs and Syslog Client An example of the Full mode is shown in Figure 35. Figure 35. Event Log Example Displayed in Full Mode The additional information displayed in Full mode is defined here: Event ID A unique, random number assigned to each event. Filename:Line The originator of the event displayed as the name of the AT-S63 software source file and the line number. Clearing an Event Log To clear a log of all events, do the following: 1. From the home page, select Configuration. 2.
AT-S63 Management Software Web Browser User’s Guide Modifying the Event Log Full Action This procedure controls the action of an event log after reaching its maximum capacity of events. There are two possible actions. In the first action a log deletes the oldest entries as it adds new entries. In the second action the log stops adding entries to preserve the log contents. Note The switch continues to send events to syslog servers even when the logs are full.
Chapter 10: Event Logs and Syslog Client 7. Click Apply. 8. To permanently save the change, select the Save Config menu selection. Saving an Event Log to a File You can save the current contents of an event log as an ASCII file in the switch’s file system. You might save an event log to retain a history of the operation of the switch or to assist in resolving a network problem. The file can be viewed from the file system or uploaded to your management workstation using Xmodem or TFTP.
AT-S63 Management Software Web Browser User’s Guide Working with Syslog Output Definitions You can configure the switch to send its events to a syslog server, which can store the events of many network devices simultaneously. This can make managing your network easier since you need only go to one site, the syslog server, to see all the events of your network devices. Here are the guidelines to observe when using this feature: You can define up to 19 syslog servers.
Chapter 10: Event Logs and Syslog Client The Create Log Output page is shown in Figure 37. Figure 37. Create Event Log Output Page 5. Configure the following parameters as necessary: Output ID Specifies an identification number for the syslog output definition. Each definition must be given a unique number. The range is 2 to 20. The default is the next available number. Output Status Controls the status of the syslog output definition. The options are: Enabled - Enables the output definition.
AT-S63 Management Software Web Browser User’s Guide Error - Sends only error event messages. Error messages indicate that the switch operation is severely impaired. Warning - Sends only warning event messages. These messages indicate that an issue may require manager attention. Information - Sends only informational event messages. Informational messages display useful information that you can ignore during normal operation. Debug - Sends debug event messages.
Chapter 10: Event Logs and Syslog Client 7. To permanently save your changes, select the Save Config option in the Configuration menu. Viewing a Syslog Output Definition To view an existing syslog output definition, perform the following procedure: 1. From the home page, select either Monitoring or Configuration. 2. From the Configuration menu, select the System option. 3. Select the Event Log tab. The Event Log tab is shown in Figure 33 on page 121. 4.
AT-S63 Management Software Web Browser User’s Guide 4. In the Configure Log Outputs section of the tab, select the log output file to be modified and click Modify. The Modify Event Log Output page is shown in Figure 39. Figure 39. Modify Event Log Output Page 5. Modify the following parameters as necessary. For definitions of the parameters, refer to “Configuring a Syslog Output Definition” on page 129. 6. Click Apply to apply the changes or Close to close the page without making changes. 7.
Chapter 10: Event Logs and Syslog Client 134 Section II: Advanced Operations
Chapter 11 Classifiers A classifier defines a traffic flow. Classifiers are used with access control lists (ACLs) to filter ingress traffic on a port and with Quality of Service policies to regulate the traffic flows passing through a switch.
Chapter 11: Classifiers Configuring a Classifier To configure a classifier, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security or Services option. The Classifier tab is accessible from both menu selections. 3. Select the Classifier tab. The Classifier tab is shown in Figure 40. Figure 40. Classifier Tab (Configuration) The tab lists the current classifiers on the switch.
AT-S63 Management Software Web Browser User’s Guide No. of Active Associations The number of active ACLs and QoS policies where the classifier is currently assigned. An active ACL or QoS policy is assigned to at least one port. 4. Click Create. The Create Classifier page is shown in Figure 41. Figure 41.
Chapter 11: Classifiers Some of the variables and settings display additional selections. For example, selecting IP as the Protocol displays the selections shown in Figure 42. Figure 42. Create Classifier Page - IP Protocol 5. Configure the following parameters as desired: ID Specifies an ID number for the classifier. Every classifier on the switch must have a unique ID number. The range is 1 to 9999. This parameter is required. Description Specifies a description for the classifier.
AT-S63 Management Software Web Browser User’s Guide Ethernet Format Defines a traffic flow by the format of the Ethernet packets. Selections are: Untagged - Ethernet II untagged packets Tagged - Ethernet II tagged packets 802.2 untagged - Ethernet 802.2 untagged packets 802.2 tagged - Ethernet 802.2 tagged packets Priority Defines a traffic flow by the user priority level in tagged Ethernet frames. The range is 0 to 7. VLAN ID Defines a traffic flow of tagged packets by its VLAN ID number.
Chapter 11: Classifiers IP Protocol Defines a traffic flow by the following Layer 3 protocols: User Specified TCP UDP ICMP IGMP User Specified IP Protocol Defines a traffic flow of an Layer 3 protocol by its protocol number. To set this parameter, the IP Protocol parameter must be set to User Specified. The number can be entered in either decimal or hexadecimal format. If the latter, precede the number with “0x”. The range is 0 (0x0) to 255 (0xFF).
AT-S63 Management Software Web Browser User’s Guide TCP Flags Defines a traffic flow by TCP flag. To set this parameter, IP Protocol must be set to TCP. Options are URG - Urgent ACK - Acknowledgement RST - Reset PSH - Push SYN - Synchronization FIN - Finish UDP Source Port Defines a traffic flow by source UDP port. To set this parameter, IP Protocol must be set to UDP. UDP Destination Port Defines a traffic flow by a destination UDP port.
Chapter 11: Classifiers Modifying a Classifier This procedure explains how to modify a classifier. Note If the classifier to be modified is currently assigned to an ACL or QoS policy that has been assigned to a switch port, you must remove the port assignments from the ACL or policy before you can modify the classifier. After you have finished modifying the classifier, you can reassign the ports again to the ACL or QoS policy. To modify a classifier, perform the following procedure: 1.
AT-S63 Management Software Web Browser User’s Guide 6. When you are finished modifying the parameters, click Apply. The modifications are immediately implemented in the classifier. 7. To permanently save your changes, select the Save Config option in the Configuration menu.
Chapter 11: Classifiers Deleting a Classifier To delete a classifier, perform the following procedure: Note A classifier must be removed from all access control lists and QoS policies before it can be deleted. 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security or Services option. The Classifier tab is accessible from both menu selections. 3. Select the Classifier tab. The Classifier tab is shown in Figure 40 on page 136. 4.
AT-S63 Management Software Web Browser User’s Guide Displaying the Classifiers To display the classifiers, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Configuration menu, select the Network Security or Services option. The Classifier tab is accessible from both menu selections. 3. Select the Classifiers tab. The Classifiers tab is shown in Figure 44. Figure 44.
Chapter 11: Classifiers No. of Active Associations The number of active ACLs and QoS policies to which the classifier is currently assigned. An active ACL or QoS policy is assigned to at least one switch. 4. To display detailed information about a classifier, select the classifier and click View. For descriptions of the variables, refer to “Configuring a Classifier” on page 136. 5. Click Close to close the page.
Chapter 12 Access Control Lists An access control list (ACL) is a tool for managing network traffic.
Chapter 12: Access Control Lists Configuring an Access Control List This procedure explains how to create an ACL. Before starting this procedure, jot down on paper the ID number(s) of the classifier(s) to be assigned to the ACL. This information will make it easier for you to perform the procedure. To view the classifier ID numbers and specifications, refer to “Displaying the Classifiers” on page 145. To configure an access control list, perform the following procedure: 1.
AT-S63 Management Software Web Browser User’s Guide accepts the packets that meet the criteria of the classifiers assigned to the ACL. An action of Deny means the port discards the packets, unless the packets also match the criteria of a Permit ACL, in which case the packets are accepted by the port, because a Permit ACL overrides a Deny ACL. Active Whether or not the ACL is active. A status of Yes means that the ACL is assigned to at least one port on the switch.
Chapter 12: Access Control Lists Action Use this menu to specify the action of the ACL. An action of Permit means the port accepts the packets that meet the criteria of the classifiers assigned to the ACL. An action of Deny means the port discards the packets, unless the packets also match the criteria of a Permit ACL, in which case the packets are accepted by the port, because a Permit ACL overrides a Deny ACL. Description Use this field to enter a description for the ACL.
AT-S63 Management Software Web Browser User’s Guide Modifying an Access Control List To modify an access control list, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security option. 3. Select the ACL tab. The ACL tab is shown in Figure 45 on page 148. 4. Select the ACL to be modified and click Modify. The Modify ACLs page is displayed, as shown in Figure 47. Figure 47. Modify ACLs Page 5. Configure the parameters as needed.
Chapter 12: Access Control Lists Deleting an Access Control List To delete an access control list, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security option. 3. Select the ACL tab. The ACL tab is shown in Figure 45 on page 148. 4. Select the ACL to be deleted and click Delete. You can delete one access control list at a time. The ACL is immediately deleted from the switch. 5.
AT-S63 Management Software Web Browser User’s Guide Displaying the Access Control Lists To display the current ACLs, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select Network Security. 3. Select the ACL tab. The ACL tab is shown in Figure 48. Figure 48. ACL Tab (Monitoring) The ACL tab displays a table of the currently configured ACLs with the following columns of information: ID The ID number for the ACL. Description A description of the ACL.
Chapter 12: Access Control Lists is assigned to at least one port on the switch. A status of No means the ACL is not assigned to any ports and therefore is inactive. Classifier List The classifiers assigned to the ACL. Port List The port assignments of the ACL. 4. To view the same information for each ACL, select the ACL and click View. The View ACLs page opens, as shown in Figure 49. Figure 49. View ACLs Page 5. Click Close.
Chapter 13 Class of Service This chapter contains instructions on how to configure Class of Service (CoS).
Chapter 13: Class of Service Configuring CoS This procedure sets the Class of Service priority level for ingress untagged packets on a port. The priority level dictates which priority queue the packets are stored in on the egress port. In the default settings, ingress untagged packets on a port are assigned a priority level of 0 and are stored in egress queue Q1 on the egress port. This procedure also overrides the priority level in tagged ingress packets.
AT-S63 Management Software Web Browser User’s Guide The CoS Setting for Port page is shown in Figure 51. Figure 51. CoS Setting for Port Page 4. Use the Priority list to select a new Class of Service priority level for the port. The default is level 0. The new priority level will apply to all ingress untagged packets. (If you perform Step 5 and override the priority level in tagged packets, the new priority level will also apply to all ingress tagged packets.) 5.
Chapter 13: Class of Service Mapping CoS Priorities to Egress Queues This procedure explains how to change the default mappings of CoS priorities to egress priority queues. To change the mappings, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Services option. 3. Select the Queuing & Scheduling tab. The Queuing & Scheduling tab is shown in Figure 52. Figure 52.
AT-S63 Management Software Web Browser User’s Guide The default values are listed in Table 4. Table 4. Default Mappings of IEEE 802.1p Priority Levels to Egress Priority Queues IEEE 802.1p Priority Level Egress Port Priority Queue 0 Q1 1 Q0 2 Q2 3 Q3 4 Q4 5 Q5 6 Q6 7 Q7 4. In the Configure CoS Queues to Egress Queues section of the tab, click the list for a CoS priority whose queue assignment is to be changed and select the new queue.
Chapter 13: Class of Service Configuring Egress Scheduling This procedure explains how to select and configure a scheduling method for Class of Service. Scheduling determines the order in which the ports handle packets in their egress queues. For an explanation of the two scheduling methods, refer to the AT-S63 Management Software Features Guide. Scheduling is set at the switch level. You can not set this at the port level. To change scheduling, perform the following procedure: 1.
AT-S63 Management Software Web Browser User’s Guide Displaying the CoS Settings To display the CoS settings, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select Services. The Services page is displayed with the CoS tab selected by default, as shown in Figure 53. Figure 53. CoS Tab (Monitoring) 3. Click the port whose settings are to be displayed. You can select more than one port. A selected port turns white. (To deselect a port, click it again.
Chapter 13: Class of Service The CoS Setting for Port page displays a table that contains the following columns of information: Port The port number. VLAN ID The VLAN where the port is an untagged member. Default Priority The default priority level assigned to ingress untagged packets on this port. Override Priority Whether the priority level in tagged packets should be overridden. 5. Click Close.
AT-S63 Management Software Web Browser User’s Guide Displaying the QoS Schedule To display the QoS schedule, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Services option. 3. Select the Queuing and Scheduling tab. The Queuing and Scheduling tab is shown in Figure 55. Figure 55. QoS Scheduling Tab (Monitoring) The upper section displays the CoS priority to egress queue assignments. The lower section displays the egress weight settings.
Chapter 13: Class of Service 164 Section II: Advanced Operations
Chapter 14 Quality of Service This chapter contains instructions on how to configure Quality of Service (QoS).
Chapter 14: Quality of Service Managing Flow Groups This section contains the following procedures: Configuring a Flow Group “Configuring a Flow Group,” next “Modifying a Flow Group” on page 169 “Deleting a Flow Group” on page 170 “Displaying the Flow Groups” on page 170 To configure a flow group, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Services option. 3. Select the Flow Group tab.
AT-S63 Management Software Web Browser User’s Guide inactive if it is not a part of any policies or if the policies are not assigned to any ports. Parent Traffic Class ID The traffic class where the flow group is assigned. Classifier List The classifiers of the flow group. 4. Click Create. The Create Flow Group page opens, as shown in Figure 57. Figure 57. Create Flow Group Page 5. Configure the following parameters as necessary: ID Specifies the ID number for this flow group.
Chapter 14: Quality of Service specified in a flow group overrides a DSCP value specified at the traffic class or policy level. Priority (802.1p) Specifies a new user priority value for the packets. The range is 0 to 7. You can specify a new priority value at both the flow group and traffic class levels. If you specify a new user priority value at both levels, the value in the flow group here overrides the value in Traffic Class.
AT-S63 Management Software Web Browser User’s Guide 7. To permanently save your changes, select the Save Config option in the Configuration menu. Modifying a Flow Group This procedure explains how to modify a flow group. If the flow group is already part of a QoS policy assigned to one or more switch ports, you must modify the policy by removing the port assignments before you can modify the flow group. You can reassign the ports back to the policy after modifying the flow group.
Chapter 14: Quality of Service The changes are applied to the flow group. 7. To permanently save your changes, select the Save Config menu selection. Deleting a Flow Group This procedure explains how to delete a flow group. If the flow group to be deleted is already part of a QoS policy assigned to one or more switch ports, you must modify the policy by removing the port assignments before you can delete the flow group. You can assign the ports back to the policy after you have deleted the flow group.
AT-S63 Management Software Web Browser User’s Guide The Flow Group tab is shown in Figure 59. Figure 59. Flow Group Tab (Monitoring) The Flow Group tab displays the currently configured flow groups in a table that contains the following columns of information: ID The ID number of the flow group. Description The flow group description. Active The active status of the flow group. A flow group is deemed active if it is part of a policy assigned to a switch port.
Chapter 14: Quality of Service Managing Traffic Classes This section contains the following procedures: Configuring a Traffic Class “Configuring a Traffic Class,” next “Modifying a Traffic Class” on page 176 “Deleting a Traffic Class” on page 178 “Displaying the Traffic Classes” on page 178 To configure a traffic class, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Services option. 3. Select the Traffic Class tab.
AT-S63 Management Software Web Browser User’s Guide Parent Policy ID The QoS policies to which the traffic class is assigned. Flow Group List The flow groups assigned to this traffic class. 4. To create a new traffic class, click Create. The Create Traffic Class page is shown in Figure 61. Figure 61. Create Traffic Class Page 5. Configure the following parameters: ID Specifies an ID number for the traffic class. Each traffic class on the switch must be assigned a unique number. The range is 0 to 511.
Chapter 14: Quality of Service Exceed Action Specifies the action to be taken if the traffic of the traffic class exceeds the maximum bandwidth. There are two possible exceed actions, drop and remark. If drop is selected, traffic exceeding the bandwidth is discarded. If remark is selected, the packets are forwarded after replacing the DSCP value with the new value specified in Exceed Remark Value. The default is drop.
AT-S63 Management Software Web Browser User’s Guide Burst Size Specifies the size of a token bucket for the traffic class. The range is 4 to 512 Kbps. The default is 512 Kbps. The token bucket is used in situations where you set a maximum bandwidth for a class, but where traffic activity may periodically exceed the maximum. A token bucket can provide a buffer for those periods where the maximum bandwidth is exceeded.
Chapter 14: Quality of Service Remark Priority Replaces the user priority value in the packets with the new value specified in the Priority parameter, if set to Yes. If set to No, which is the default, the packets retain their preexisting priority level when they leave the switch. ToS Specifies a replacement value to write into the Type of Service (ToS) field of IPv4 packets. The range is 0 to 7. A ToS value can be set at all three levels: flow group, traffic class, and policy.
AT-S63 Management Software Web Browser User’s Guide To modify a traffic class, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Services option. 3. Select the Traffic Class tab. The Traffic Class tab is shown in Figure 60 on page 172 4. Select the traffic class to be modified and click Modify. The Modify Traffic Class page is shown in Figure 62. Figure 62. Modify Traffic Class Page 5. Configure the parameters as necessary.
Chapter 14: Quality of Service Deleting a Traffic Class This procedure explains how to delete a traffic class. If the traffic class to be deleted is already part of a QoS policy assigned to one or more switch ports, you must first modify the policy by removing the port assignments before you can delete the traffic class. You can reassign the ports back to the policy after you have deleted the traffic class. To delete a traffic class, perform the following procedure: 1.
AT-S63 Management Software Web Browser User’s Guide The Traffic Class tab displays the currently configured flow groups in a table that contains the following columns of information: ID The ID of the traffic class. Description A description of the traffic class. Active Whether the traffic class is active on the switch. An active traffic class is part of a policy assigned to one or more switch ports.
Chapter 14: Quality of Service Managing Policies This section contains the following procedures: Configuring a Policy “Configuring a Policy,” next “Modifying a Policy” on page 183 “Deleting a Policy” on page 184 “Deleting all Flow Groups, Traffic Classes, and Policies” on page 185 “Displaying Policies” on page 185 To configure a policy, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Services option. 3.
AT-S63 Management Software Web Browser User’s Guide Active Whether this policy is active on the switch. An active policy is assigned to one or more switch ports. An inactive policy is not assigned to any switch ports. Traffic Class List The traffic classes assigned to the policy. Ingress Port List The ingress ports to which the policy is assigned. 4. Click Create. The Create Policy page opens, as shown in Figure 65. Figure 65. Create Policy Page 5.
Chapter 14: Quality of Service Remark DSCP Specifies whether the ingress DSCP value is overwritten. Select one of the following options from the list: None - Disables this function. All - All packets are remarked. DSCP Value Specifies a replacement value to write into the DSCP (TOS) field of the packets. The range is 0 to 63. A new DSCP value can be set at all three levels: flow group, traffic class, and policy.
AT-S63 Management Software Web Browser User’s Guide No Does not copy the traffic to a destination mirror port. This is the default. Traffic Class List Specifies the traffic class to be assigned to the policy. The traffic class must already exist. A policy can have more than one traffic class. To select more than one traffic class, hold down the Ctrl key when making your selections. Ingress Port List Specifies the ingress port to which the policy is to be assigned.
Chapter 14: Quality of Service The Modify Policy page is shown in Figure 66. Figure 66. Modify Policy Page 5. Modify the parameters as needed. For parameter definitions, refer to “Configuring a Policy” on page 180. 6. When you are finished configuring the parameters, click Apply. The changes are immediately implemented in the policy. 7. To permanently save your changes, select the Save Config option in the Configuration menu. Deleting a Policy To delete a policy, perform the following procedure: 1.
AT-S63 Management Software Web Browser User’s Guide 5. To permanently save your changes, select the Save Config option in the Configuration menu. Deleting all Flow Groups, Traffic Classes, and Policies To delete all flow groups, traffic classes, and policies from the switch, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Services option. 3. Select the Policies tab. The Policies tab is shown in Figure 64 on page 180. 4.
Chapter 14: Quality of Service ID The ID of the policy. Description A description of the policy. Active Whether this policy is active on the switch. An active policy is assigned to one or more switch ports. An inactive policy is not assigned to any switch ports. Traffic Class List The traffic classes of the policy. Ingress Port List The ingress ports of the policy. 4. To view the details of a specific policy, select the policy and click View.
Chapter 15 Denial of Service Defenses This chapter contains instructions on how to configure the Denial of Service defense feature on the switch.
Chapter 15: Denial of Service Defenses Configuring Denial of Service Defense To configure the ports on the switch for a Denial of Service attack defense, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security option. 3. Select the DoS tab. The DoS tab is shown in Figure 68. Figure 68. DoS Tab (Configuration) 4. If you are implementing the SMURF or Land defense, you must provide an IP address and mask for your LAN.
AT-S63 Management Software Web Browser User’s Guide 149.11.11.50. The mask would be 0.0.0.63. c. If you are activating the Land defense, in the DoS Uplink Port field enter the number of the port connected to the device (e.g., DSL router) that leads outside your network. You can specify only one uplink port. 5. Click the ports in the switch image where a defense mechanism is to be enabled or disabled. 6.
Chapter 15: Denial of Service Defenses 8. Configure the following parameters as necessary: Status Click Enable or Disable to enable or disable DoS on the selected ports. Mirror Port This option applies to the Land, Tear Drop, Ping of Death, and IP Options. Enabling this option mirrors the traffic examined by a defense mechanism to another port on the switch.
AT-S63 Management Software Web Browser User’s Guide Displaying the DoS Settings To display the DoS settings, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select Network Security. 3. Select the DoS tab. The DoS tab is shown in Figure 70. Figure 70. DoS Tab (Monitoring) 4. Click the port whose DoS settings are to be displayed. You can select more than one port at a time. 5.
Chapter 15: Denial of Service Defenses The DoS Monitor for Port page opens, as shown in Figure 71. Figure 71. DoS Monitor for Ports Page The page displays a table that contains the following columns of information: Port The port number. Status Whether DoS is enabled or disabled on the port. Type The type of DoS prevention. Mirror Port Whether the examined traffic is copied to a mirror port.
Chapter 16 IGMP Snooping This chapter describes how to configure the IGMP snooping feature on the switch.
Chapter 16: IGMP Snooping Configuring IGMP Snooping To configure IGMP snooping, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Multicast option. The Multicast page is displayed with the IGMP tab selected by default, as shown in Figure 72. Figure 72. IGMP Tab (Configuration) 3. Configure the following parameters as necessary. Enable IGMP Snooping Status Enables and disables IGMP snooping on the switch.
AT-S63 Management Software Web Browser User’s Guide The Multi-Host/Port (Intermediate) setting is appropriate if there is more than one host node connected to a switch port, such as when a port is connected to an Ethernet hub to which multiple host nodes are connected. With this setting selected the switch continues sending multicast packets out a port even after it receives a leave request from a host node on the port.
Chapter 16: IGMP Snooping Note The combined number of multicast address groups for IGMP and MLD snooping cannot exceed 255. 4. Click Apply. Changes to the IGMP snooping parameters are immediately implemented on the switch. 5. To permanently save your changes, select the Save Config option in the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Displaying a List of Host Nodes You can use the AT-S63 Management Software to display a list of the multicast groups on a switch, as well as the host nodes. You can also view the multicast routers. A multicast router is a router that is receiving multicast packets from a multicast application and transmitting the packets to host nodes. To view host nodes, perform the following procedure: 1. From the Home page, select Monitoring. 2.
Chapter 16: IGMP Snooping VLAN ID The VID of the VLAN where the port is an untagged member. Member Port/Trunk ID The port on the switch where the host node is connected. If the host node is connected to the switch through a trunk, the trunk ID number, not the port number, is displayed. Host IP The IP address of the host node connected to the port. Version The version of IGMP used by the host. Exp.
AT-S63 Management Software Web Browser User’s Guide Displaying a List of Multicast Routers To view multicast routers, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Multicast option. The Multicast page is displayed with the IGMP tab as shown in Figure 73 on page 197. 3. To view the multicast routers, click View Multicast Router List and then click View. The View Multicast Routers List is shown in Figure 74. Figure 74.
Chapter 16: IGMP Snooping 200 Section II: Advanced Operations
Section III SNMPv3 This section has the following chapter: Section III: SNMPv3 Chapter 17, “SNMPv3” on page 203 201
Section III: SNMPv3
Chapter 17 SNMPv3 This chapter provides the following procedures for configuring SNMPv3 parameters using a web browser management session: Section III: SNMPv3 “Configuring the SNMPv3 Protocol” on page 204 “Enabling or Disabling SNMP Management” on page 205 “Configuring the SNMPv3 User Table” on page 208 “Configuring the SNMPv3 View Table” on page 216 “Configuring the SNMPv3 Access Table” on page 222 “Configuring the SNMPv3 SecurityToGroup Table” on page 229 “Configuring the SN
Chapter 17: SNMPv3 Configuring the SNMPv3 Protocol To configure the SNMPv3 protocol, you need to first enable SNMP access on the switch. Then you configure the SNMPv3 tables.
AT-S63 Management Software Web Browser User’s Guide Enabling or Disabling SNMP Management In order to allow an SNMP manager or host to access the switch you need to enable SNMP access. In addition, to allow the switch to send a trap when it receives a login attempt from an unauthenticated user, you need to enable authentication failure traps. This section provides a procedure to accomplish both of these tasks. To enable SNMP access and authentication failure traps, perform the following procedure: 1.
Chapter 17: SNMPv3 The SNMP tab is shown in Figure 75. Figure 75. SNMP Tab (Configuration) 4. Click the Enable SNMP Access checkbox to enable or disable SNMP management. A check in the box indicates that the feature is enabled, meaning that the switch can be managed from an SNMP management station. No check indicates that the feature is disabled. The default is disabled. Use this parameter to enable the switch to be remotely managed with an SNMP application program.
AT-S63 Management Software Web Browser User’s Guide 7. To permanently save your changes, select the Save Config option in the Configuration menu.
Chapter 17: SNMPv3 Configuring the SNMPv3 User Table You can create, delete, and modify an SNMPv3 User Table entry. See the following procedures: “Creating a User Table Entry” on page 208 “Deleting a User Table Entry” on page 211 “Modifying a User Table Entry” on page 212 For reference information about the SNMPv3 User Table, see Chapter 21, “SNMPv3” in the AT-S63 Management Software Menus Interface User’s Guide.
AT-S63 Management Software Web Browser User’s Guide The SNMPv3 User Table tab is shown in Figure 76. Figure 76. SNMPv3 User Table Tab (Configuration) 4. Click Add. The Add New SNMPv3 User page is shown in Figure 77. Figure 77. Add New SNMPv3 User Page 5.
Chapter 17: SNMPv3 6. In the Authentication Protocol field, enter an authentication protocol. This is an optional parameter. Select one of the following: MD5 This value represents the MD5 authentication protocol. With this selection, users (SNMP entities) are authenticated with the MD5 authentication protocol after a message is received. This algorithm generates the message digest. The user is authenticated when the authentication protocol checks the message digest.
AT-S63 Management Software Web Browser User’s Guide privacy protocol for this User Table entry. With this selection, messages transmitted between the host and the switch are encrypted with the DES protocol. None Select this value if you do not want a privacy protocol for this User Table entry. With this selection, messages transmitted between the host and the switch are not encrypted. 10. In the Privacy Password field, enter a privacy password of up to 32 alphanumeric characters. 11.
Chapter 17: SNMPv3 3. In the SNMPv3 section, click the button next to Configure User Table and then click Configure. The SNMPv3 User Table tab is shown in Figure 76 on page 209. 4. Click the button next to the User Table entry to be deleted and click Remove. A warning message is displayed. 5. Click OK. 6. From the Configuration menu, select the Save Config option to permanently save your changes. (This option is not displayed if there are no changes to save.
AT-S63 Management Software Web Browser User’s Guide The Modify SNMPv3 User page is shown in Figure 78. Figure 78. Modify SNMPv3 User Page 5. In the Authentication Protocol field, enter an authentication protocol. This is an optional parameter. Select one of the following: MD5 This value represents the MD5 authentication protocol. With this selection, users (SNMP entities) are authenticated with the MD5 authentication protocol after a message is received. This algorithm generates the message digest.
Chapter 17: SNMPv3 Note You may want to assign NONE to a super user. 6. In the Authentication Password field, enter an authentication password of up to 32 alphanumeric characters. 7. In the Confirm Authentication Password field, re-enter the authentication password. Note If you have the nonencrypted version of the AT-S60 software, then the Privacy Protocol field is read-only. Note You can only configure the Privacy Protocol if you have configured the Authentication Protocol with the MD5 or SHA values. 8.
AT-S63 Management Software Web Browser User’s Guide entry with a NonVolatile storage type, the Save Config option is displayed on the Configuration menu. Allied Telesis recommends this storage type. Note The Row Status parameter is a read-only field in the web browser interface. The Active value indicates the SNMPv3 User Table entry takes effect immediately. 12. Click Apply to update the SNMPv3 User Table. 13. To permanently save your changes, select the Save Config option in the Configuration menu.
Chapter 17: SNMPv3 Configuring the SNMPv3 View Table You can create, delete, and modify an SNMPv3 View Table entry. See the following procedures: “Creating a View Table Entry” on page 216 “Deleting a View Table Entry” on page 219 “Modifying a View Table Entry” on page 219 For reference information about the SNMPv3 View Table, see Chapter 21, “SNMPv3” in the AT-S63 Management Software Menus Interface User’s Guide.
AT-S63 Management Software Web Browser User’s Guide The SNMPv3 View Table tab is shown in Figure 79. Figure 79. SNMPv3 View Table Tab (Configuration) 4. Click Add. The Add New SNMPv3 View page is shown in Figure 80. Figure 80. Add New SNMPv3 View Page 5. In the View Name field, enter a descriptive name for this view. Assign a name that reflects the subtree OID, for example, “internet.” Enter a unique name of up to 32 alphanumeric characters.
Chapter 17: SNMPv3 Note The “defaultViewAll” value is the default entry for the SNMPv1 and SNMPv2c configuration. You cannot use the default value for an SNMPv3 View Table entry. 6. In the Subtree OID field, enter a subtree that this view will or will not be permitted to display. You can enter either a numeric value in hex format or the equivalent text name. For example, the OID hex format for TCP/IP is: 1.3.6.1.2.1.6 The text format is for TCP/IP is: tcp 7.
AT-S63 Management Software Web Browser User’s Guide NonVolatile Select this storage type if you want the ability to save an entry in the View Table. After making changes to a View Table entry with a NonVolatile storage type, the Save Config option is displayed on the Configuration menu. Allied Telesis recommends this storage type. Note The Row Status parameter is a read-only field in the web browser interface. The Active value indicates the SNMPv3 View Table entry takes effect immediately. 10.
Chapter 17: SNMPv3 2. Select the SNMP tab. The SNMP tab is shown in Figure 75 on page 206. 3. In the SNMPv3 section, click the button next to Configure View Table and then click Configure at the bottom of the tab. The SNMPv3 View Table tab is shown in Figure 79 on page 217. 4. Click the button next to the SNMPv3 View Table entry to be changed and then click Modify. The Modify SNMPv3 View page is shown in Figure 81. Figure 81. Modify SNMPv3 View Page 5.
AT-S63 Management Software Web Browser User’s Guide Included Enter this value to permit the View Name to see the subtree specified above. Excluded Enter this value to not permit the View Name to see the subtree specified above. 7. In the Storage Type field, enter a storage type for this table entry: Volatile Select this storage type if you do not want the ability to save an entry in the Target Parameters Table.
Chapter 17: SNMPv3 Configuring the SNMPv3 Access Table You can create, delete, and modify an SNMPv3 Access Table entry. See the following procedures: “Creating an Access Table” on page 222 “Deleting an Access Table Entry” on page 225 “Modifying an Access Table Entry” on page 226 For information about the SNMPv3 Access Table, see Chapter 21, “SNMPv3” in the AT-S63 Management Software Menus Interface User’s Guide.
AT-S63 Management Software Web Browser User’s Guide 4. To create an SNMPv3 Access Table entry, click Add. The Add New SNMPv3 Access page is shown in Figure 83. Figure 83. Add New SNMPv3 Access Page 5. In the Group Name field, enter a descriptive name of the group. The Group Name can consist of up to 32 alphanumeric characters. You are not required to enter a unique value here because the SNMPv3 Access Table entry is indexed with the Group Name, Security Model, and Security Level parameter values.
Chapter 17: SNMPv3 This parameter allows the users assigned to this Group Name to view the information specified by the View Table entry. This value does not need to be unique. 7. In the Write View Name field, enter a value that you configured with the View Name parameter in the SNMPv3 View Table. This parameter allows the users assigned to this Security Group to write, or modify, the information in the specified View Table. This value does not need to be unique. 8.
AT-S63 Management Software Web Browser User’s Guide protocol. Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security Model parameter with the SNMPv3 protocol. Privacy This option represents authentication and the privacy protocol. Select this security level to allow authentication and encryption. This level provides the greatest level of security.
Chapter 17: SNMPv3 2. Select the SNMP tab. The SNMP tab is shown in Figure 75 on page 206. 3. In the SNMPv3 section, click the button next to Configure Access Table and then click Configure at the bottom of the tab. The SNMPv3 Access Table tab is shown in Figure 82 on page 222. 4. Click Next or Previous to display the Access Table entry to be deleted. 5. Click Remove. A warning message is displayed. Click OK to remove the Access Table entry. 6.
AT-S63 Management Software Web Browser User’s Guide Figure 84. Modify SNMPv3 Access Page Note The Context Prefix field is a read-only field. The Context Prefix field is always set to null. 6. In the Read View Name field, enter a value that you configured with the View Name parameter in the View Table. This parameter allows the users assigned to this Group Name to view the information specified by the View Table entry. This value does not need to be unique. 7.
Chapter 17: SNMPv3 Note The Context Match field is a read only field. The Context Match field is always set to Exact. 9. In the Storage Type field, select one of the following storage types for this table entry: Volatile Select this storage type if you do not want the ability to save an entry in the Access Table. After making changes to an Access Table entry with a Volatile storage type, the Save Config option is not displayed on the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Configuring the SNMPv3 SecurityToGroup Table You can create, delete, and modify an SNMPv3 SecurityToGroup Table entry.
Chapter 17: SNMPv3 The SNMPv3 SecurityToGroup Table tab is shown in Figure 85. Figure 85. SNMPv3 SecurityToGroup Table Tab (Configuration) 4. To create an SNMPv3 SecurityToGroup Table entry, click Add. The Add New SNMPv3 SecurityToGroup page is shown in Figure 86. Figure 86. Add New SNMPv3 SecurityToGroup Page 5. In the Security Model field, select the SNMP protocol that was configured for this User Name.
AT-S63 Management Software Web Browser User’s Guide v2c Select this value to associate the Group Name with the SNMPv2c protocol. v3 Select this value to associate the Group Name with the SNMPv3 protocol. 6. In the Security Name field, enter the User Name to be associated with a group. Enter a User Name that you configured in “Creating a User Table Entry” on page 208. 7. In the Group Name field, enter a Group Name that you configured in the Access Table. See “Creating an Access Table” on page 222.
Chapter 17: SNMPv3 10. To permanently save your changes, select the Save Config option in the Configuration menu. Deleting a SecurityToGroup Table Entry To delete an entry SNMPv3 SecurityToGroup Table, perform the following procedure: 1. From the home page, select Configuration. The Configuration System page is displayed with the General tab selected by default, as shown in Figure 1 on page 28. 2. Select the SNMP tab. The SNMP tab is shown in Figure 75 on page 206. 3.
AT-S63 Management Software Web Browser User’s Guide 4. Click the button next to the SecurityToGroup Table entry to be changed, and then click Modify. The Modify SNMPv3 SecurityToGroup page is shown in Figure 87. Figure 87. Modify SNMPv3 SecurityToGroup Page 5. In the Group Name field, enter a Group Name that you configured in the SNMPv3 Access Table. See “Creating an Access Table” on page 222.
Chapter 17: SNMPv3 Note The Row Status parameter is a read-only field in the web browser interface. The Active value indicates the SNMPv3 SecurityToGroup Table entry takes effect immediately. 7. Click Apply to update the SNMPv3 SecurityToGroup Table. 8. To permanently save your changes, select the Save Config option in the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Configuring the SNMPv3 Notify Table You can create, delete, and modify an SNMPv3 Notify Table entry. See the following procedures: “Creating a Notify Table Entry” on page 235 “Deleting a Notify Table Entry” on page 237 “Modifying a Notify Table Entry” on page 238 For reference information about the SNMPv3 Notify Table, see Chapter 21, “SNMPv3” in the AT-S63 Management Software Menus Interface User’s Guide.
Chapter 17: SNMPv3 The SNMPv3 Notify Table tab is shown in Figure 88. Figure 88. SNMPv3 Notify Table Tab (Configuration) 4. Click Add. The Add New SNMPv3 Notify page is shown in Figure 89. Figure 89. Add New SNMPv3 Notify Page 5. In the Notify Name field, enter the name associated with this trap message. Enter a descriptive name of up to 32 alphanumeric characters.
AT-S63 Management Software Web Browser User’s Guide Enter a name of up to 32 alphanumeric characters. 7. In the Notify Type field, enter one of the following message types: Trap Indicates this notify table is used to send traps. With this message type, the switch does not expects a response from the host. Inform Indicates this notify table is used to send inform messages. With this message type, the switch expects a response from the host. 8.
Chapter 17: SNMPv3 4. Click the button next to the Notify Table entry to be deleted, and then click Remove. A warning message is displayed. 5. Click OK. 6. To permanently save your changes, select the Save Config option in the Configuration menu. Modifying a Notify Table Entry To modify an entry in the SNMPv3 Notify Table, perform the following procedure: 1. From the home page, select Configuration.
AT-S63 Management Software Web Browser User’s Guide 6. In the Notify Type field, enter one of the following message types: Trap Indicates this notify table is used to send traps. With this message type, the switch does not expects a response from the host. Inform Indicates this notify table is used to send inform messages. With this message type, the switch expects a response from the host. 7.
Chapter 17: SNMPv3 Configuring the SNMPv3 Target Address Table You can create, delete, and modify an SNMPv3 Target Address Table entry. See the following procedures: “Creating a Target Address Table Entry” on page 240 “Deleting a Target Address Table Entry” on page 243 “Modifying Target Address Table Entry” on page 244 For reference information about the SNMPv3 Target Address Table, see Chapter 21, “SNMPv3” in the AT-S63 Management Software Menus Interface User’s Guide.
AT-S63 Management Software Web Browser User’s Guide The SNMPv3 Target Address Table tab is shown in Figure 91. Figure 91. SNMPv3 Target Address Table Tab (Configuration) 4. Click Add. The Add New SNMPv3 Target Address page is shown in Figure 92. Figure 92. Add New SNMPv3 Target Address Page 5. In the Target Address Name field, enter the name of the SNMP manager, or host, that manages the SNMP activity on your switch.
Chapter 17: SNMPv3 You can enter a name of up to 32 alphanumeric characters. 6. In the IP Address field, enter the IP address of the host. Use the following format for an IP address: XXX.XXX.XXX.XXX 7. In the UDP Port Number field, enter a UDP port number. You can enter a UDP port in the range of 0 to 65,535. The default UDP port is 162. 8. In the Timeout field, enter a timeout value in milliseconds. When an Inform message is generated, it requires a response from the switch.
AT-S63 Management Software Web Browser User’s Guide NonVolatile Select this storage type if you want the ability to save an entry in the Target Address Table. After making changes to a Target Address Table entry with a NonVolatile storage type, the Save Config option is displayed on the Configuration menu. Allied Telesis recommends this storage type. Note The Row Status parameter is a read-only field in the web browser interface.
Chapter 17: SNMPv3 Modifying Target Address Table Entry To modify an entry in the SNMPv3 Target Address Table, perform the following procedure: 1. From the home page, select Configuration. The Configuration System page is displayed with the General tab selected by default, as shown in Figure 1 on page 28. 2. Select the SNMP tab. The SNMP tab is shown in Figure 75 on page 206. 3.
AT-S63 Management Software Web Browser User’s Guide 7. In the UDP Port Number field, enter a UDP port number. You can enter a UDP port in the range of 0 to 65,535. The default UDP port is 162. 8. In the Timeout field, enter a timeout value in milliseconds. When an Inform message is generated, it requires a response from the switch. The timeout value determines how long the switch considers the Inform message an active message. This parameter applies to Inform messages only.
Chapter 17: SNMPv3 13. Click Apply to update the SNMPv3 Target Address Table. 14. To permanently save your changes, select the Save Config option in the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Configuring the SNMPv3 Target Parameters Table You can create, delete, and modify an SNMPv3 Target Parameters Table entry.
Chapter 17: SNMPv3 4. Click Add. The Add New SNMPv3 Target Parameter page is shown in Figure 95. Figure 95. Add New SNMPv3 Target Parameters Page 5. In the Target Parameters Name field, enter a name of the SNMP manager or host. Enter a value of up to 32 alphanumeric characters. Note Enter a value for the Message Processing Model parameter only if you select SNMPv1 or SNMPv2c as the Security Model.
AT-S63 Management Software Web Browser User’s Guide v1 Select this value to associate the Security Name, or User Name, with the SNMPv1 protocol. v2c Select this value to associate the Security Name, or User Name, with the SNMPv2c protocol. v3 Select this value to associate the Security Name, or User Name, with the SNMPv3 protocol. 8. In the Security Name field, enter a User Name that you previously configured with the SNMPv3 User Table. See “Creating a User Table Entry” on page 208. 9.
Chapter 17: SNMPv3 10. In the Storage Type parameter, select one of the following storage types for this table entry: Volatile Select this storage type if you do not want the ability to save an entry in the Target Parameters Table. After making changes to a Target Parameters Table entry with a Volatile storage type, the Save Config option is not displayed on the Configuration menu. NonVolatile Select this storage type if you want the ability to save an entry in the Target Parameters Table.
AT-S63 Management Software Web Browser User’s Guide 6. To permanently save your changes, select the Save Config option in the Configuration menu. Modifying a Target Parameters Table Entry To modify an entry in the SNMPv3 Target Parameters Table, perform the following procedure: 1. From the home page, select Configuration. The Configuration System page is displayed with the General tab selected by default, as shown in Figure 1 on page 28. 2. Select the SNMP tab.
Chapter 17: SNMPv3 Note Enter a value for the Message Processing Model field only if you select SNMPv1 or SNMPv2c as the Security Model. If you select the SNMPv3 protocol as the Security Model, then the switch automatically assigns the Message Processing Model to SNMPv3. 5. In the Message Processing Model field, enter a Security Model that is used to process messages. Select one of the following SNMP protocols: v1 Select this value to process messages with the SNMPv1 protocol.
AT-S63 Management Software Web Browser User’s Guide Select this security level if you do not want to authenticate SNMP entities and you do not want to encrypt messages using a privacy protocol. This security level provides the least security. Note If you have selected SNMPv1 or SNMPv2c as the Security Model, you must select No Authentication/Privacy as the Security Level. Authentication This option represents authentication, but no privacy protocol.
Chapter 17: SNMPv3 Configuring the SNMPv3 Community Table You can create, delete, and modify an SNMPv3 Community Table entry. See the following procedures: “Creating an SNMPv3 Community Table Entry” on page 254 “Deleting an SNMPv3 Community Table Entry” on page 257 “Modifying an SNMPv3 Community Table Entry” on page 257 For reference information about the SNMPv3 Community Table, see Chapter 21, “SNMPv3” in the AT-S63 Management Software Menus Interface User’s Guide.
AT-S63 Management Software Web Browser User’s Guide The SNMPv3 Community Table tab is shown in Figure 97. Figure 97. SNMPv3 Community Table Tab (Configuration) 4. Click Add. The Add New SNMPv3 Community page is shown in Figure 98. Figure 98. Add New SNMPv3 Community Page 5. In the Community Index field, enter a numerical value for this Community. This parameter is used to index the other parameters in an SNMPv3 Community Table entry. Enter a value of up to 32- alphanumeric characters. 6.
Chapter 17: SNMPv3 The value of the Community Name parameter acts as a password for the SNMPv3 Community Table entry. This parameter is case sensitive. Note Allied Telesis recommends that you select SNMP Community Names carefully to ensure these names are known only to authorized personnel. 7. In the Security Name field, enter a name of an SNMPv1 and SNMPv2c user. This name must be unique. Enter a value of up to 32 alphanumeric characters.
AT-S63 Management Software Web Browser User’s Guide Note The Row Status parameter is a read-only field in the web browser interface. The Active value indicates the SNMPv3 Community Table entry takes effect immediately. 10. Click Apply. 11. To permanently save your changes, select the Save Config option in the Configuration menu. Deleting an SNMPv3 Community Table Entry To delete an entry in the SNMPv3 Community Table, perform the following procedure: 1. From the home page, select Configuration.
Chapter 17: SNMPv3 3. In the SNMPv3 section, click the button next to Configure Community Table, and then click Configure at the bottom of the tab. The SNMPv3 Community Table tab is shown in Figure 97 on page 255. 4. Click the button next to the SNMPv3 Community Table entry to be changed and then click Modify. The Modify SNMPv3 Community page is shown in Figure 99. Figure 99. Modify SNMPv3 Community Page 5. In the Community Name field, enter a Community Name of up to 64alphanumeric characters.
AT-S63 Management Software Web Browser User’s Guide Note Do not use a value configured with the User Name parameter in the SNMPv3 User Table. 7. In the Transport Tag field, enter a name of up to 32 alphanumeric characters. The Transport Tag parameter links an SNMPv3 Community Table entry with an SNMPv3 Target Address Table entry. Add the value you configure for the Transport Tag parameter to the Tag List parameter in the Target Address Table as desired.
Chapter 17: SNMPv3 Displaying SNMPv3 Tables This section contains procedures to display the SNMPv3 Tables.
AT-S63 Management Software Web Browser User’s Guide The SNMP tab is shown in Figure 100. Figure 100. SNMP Tab (Monitoring) 4. In the SNMPv3 section, click the button next to View User Table and then click View at the bottom of the tab.
Chapter 17: SNMPv3 The SNMPv3 User Table tab is shown in Figure 101. Figure 101. SNMPv3 User Table Tab (Monitoring) Displaying View Table Entries To display entries in the SNMPv3 View Table, perform the following procedure: 1. From the Home page, select Monitoring. The Monitoring System page is displayed with the General tab selected by default, as shown in Figure 5 on page 40. 2. Select the SNMP tab. The SNMP tab is shown in Figure 100 on page 261. 3.
AT-S63 Management Software Web Browser User’s Guide The SNMPv3 View Table tab is shown in Figure 102. Figure 102. SNMPv3 View Table Tab (Monitoring) Displaying Access Table Entries To display entries in the SNMPv3 Access Table, perform the following procedure: 1. From the Home page, select Monitoring. The Monitoring System page is displayed with the General tab selected by default, as shown in Figure 5 on page 40. 2. Select the SNMP tab. The SNMP tab is shown in Figure 100 on page 261. 3.
Chapter 17: SNMPv3 The SNMPv3 Access Table tab is shown in Figure 103. Figure 103. SNMPv3 Access Table Tab (Monitoring) Displaying SecurityToGroup Table Entries To display entries in the SNMPv3 SecurityToGroup Table, perform the following procedure: 1. From the Home page, select Monitoring. The Monitoring System page is displayed with the General tab selected by default, as shown in Figure 5 on page 40. 2. Select the SNMP tab. The SNMP tab is shown in Figure 100 on page 261. 3.
AT-S63 Management Software Web Browser User’s Guide The SNMPv3 SecurityToGroup Table tab is shown in Figure 104. Figure 104. SNMPv3 SecurityToGroup Table Tab (Monitoring) Displaying Notify Table Entries To display entries in the SNMPv3 Notify Table, perform the following procedure: 1. From the Home page, select Monitoring. The Monitoring System page is displayed with the General tab selected by default, as shown in Figure 5 on page 40. 2. Select the SNMP tab.
Chapter 17: SNMPv3 The SNMPv3 Notify Table tab is shown in Figure 105. Figure 105. SNMPv3 Notify Table Tab (Monitoring) Displaying Target Address Table Entries To display entries in the SNMPv3 Target Address Table, perform the following procedure: 1. From the Home page, select Monitoring. The Monitoring System page is displayed with the General tab selected by default, as shown in Figure 5 on page 40. 2. Select the SNMP Tab. The SNMP tab is shown in Figure 100 on page 261. 3.
AT-S63 Management Software Web Browser User’s Guide The SNMPv3 Target Address Table tab is shown in Figure 106. Figure 106. SNMPv3 Target Address Table Tab (Monitoring) Displaying Target Parameters Table Entries To display entries in the SNMPv3 Target Parameters Table, perform the following procedure: 1. From the Home page, select Monitoring. The Monitoring System page is displayed with the General tab selected by default, as shown in Figure 5 on page 40. 2. Select the SNMP tab.
Chapter 17: SNMPv3 The SNMPv3 Target Parameters Table tab is shown in Figure 107. Figure 107. SNMPv3 Target Parameters Table Tab (Monitoring) Displaying SNMPv3 Community Table Entries To display entries in the SNMPv3 Community Table, perform the following procedure: 1. From the Home page, select Monitoring. The Monitoring System page is displayed with the General tab selected by default, as shown in Figure 5 on page 40. 2. Select the SNMP tab. The SNMP tab is shown in Figure 100 on page 261. 3.
AT-S63 Management Software Web Browser User’s Guide The SNMPv3 Community Table tab is shown in Figure 108. Figure 108.
Chapter 17: SNMPv3 270 Section III: SNMPv3
Section IV Spanning Tree Protocols This section has the following chapters: Section IV: Spanning Tree Protocols Chapter 18, “Spanning Tree and Rapid Spanning Tree Protocols” on page 273 Chapter 19, “Multiple Spanning Tree Protocol” on page 293 271
Section IV: Spanning Tree Protocols
Chapter 18 Spanning Tree and Rapid Spanning Tree Protocols This chapter explains how to configure the STP and RSTP parameters on an AT-9400 Series switch.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols Enabling or Disabling a Spanning Tree Protocol To enable or disable spanning tree on the switch or to select the active spanning tree protocol, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. 3. Select the Spanning Tree tab. The Spanning Tree tab is shown in Figure 109. Figure 109. Spanning Tree Tab (Configuration) 4.
AT-S63 Management Software Web Browser User’s Guide 7. To permanently save your changes, select the Save Config option in the Configuration menu. 8. If you activated STP, go to “Configuring STP” on page 276. If you activated RSTP go to Step “Configuring RSTP” on page 284. If you activated MSTP, go to Chapter 19, ”Multiple Spanning Tree Protocol” on page 293.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols Configuring STP This section contains the following procedures: ”Configuring STP Bridge Settings”, next “Configuring STP Port Settings” on page 279 “Displaying the STP Settings” on page 280 “Resetting STP to the Default Settings” on page 282 Caution The bridge provides default STP parameters that are adequate for most networks.
AT-S63 Management Software Web Browser User’s Guide The Configure STP Parameters tab is shown in Figure 110. Figure 110. Configure STP Parameters Tab (Configuration) Note The Defaults button returns all STP settings to the default settings. 5. Configure the following parameters as necessary. Bridge Priority The priority number for the bridge. This number is used in determining the root bridge for STP. The bridge with the lowest priority number is selected as the root bridge.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols Table 5. Bridge Priority Value Increments Bridge Priority Increment Bridge Priority Increment 0 0 8 32768 1 4096 9 36864 2 8192 10 40960 3 12288 11 45056 4 16384 12 49152 5 20480 13 53248 6 24576 14 57344 7 28672 15 61440 Bridge Hello Time The time interval between generating and sending configuration messages by the bridge. This parameter can be from 1 to 10 seconds. The default is 2 seconds.
AT-S63 Management Software Web Browser User’s Guide Bridge Identifier The MAC address of the bridge. The bridge identifier is used as a tie breaker in the selection of the root bridge when two or more bridges have the same bridge priority value. This value cannot be changed. Root Bridge The MAC address of the root bridge of the spanning tree domain. This value cannot be changed and is only displayed when STP is activated on the switch.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols Table 6. Port Priority Value Increments Bridge Priority Increment Increment Bridge Priority 0 0 8 128 1 16 9 144 2 32 10 160 3 48 11 176 4 64 12 192 5 80 13 208 6 96 14 224 7 112 15 240 Port Cost The spanning tree algorithm uses the cost parameter to decide which port provides the lowest cost path to the root bridge for that LAN. The range is 0 to 65,535.
AT-S63 Management Software Web Browser User’s Guide The Spanning Tree tabs is shown in Figure 112. Figure 112. Spanning Tree Tab (Monitoring) 4. Click View. The Monitor STP Parameters tab is shown in Figure 113. Figure 113.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols 5. To view port settings, click a port in the switch and click Status or Settings. The STP Settings page is shown in Figure 114. Figure 114. STP Settings Page The STP Settings page displays a table that contains the following columns of information: Port The port number. State Current state of a port. The possible states are Listening, Learning, Forwarding, or Blocking when spanning tree is enabled on the switch.
AT-S63 Management Software Web Browser User’s Guide 5. Click Configure. The Configure STP Parameters tab is shown in Figure 110 on page 277. 6. Click Defaults. The STP settings are returned to their default values. 7. To permanently save your changes, select the Save Config option in the Configuration menu.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols Configuring RSTP This section contains the following procedures: ”Configuring RSTP Bridge Settings”, next “Configuring RSTP Port Settings” on page 287 “Displaying RSTP Settings” on page 288 “Resetting RSTP to the Default Settings” on page 291 Caution The bridge provides default RSTP parameters that are adequate for most networks.
AT-S63 Management Software Web Browser User’s Guide The Configure RSTP Bridge Parameters tab is shown in Figure 115. Figure 115. Configure RSTP Parameters Tab (Configuration) 5. Configure the following parameters as necessary. Force Version This selection determines whether the bridge operates with RSTP or in an STP-compatible mode. If you select RSTP, the bridge operates all ports in RSTP, except for those ports that receive STP BPDU packets.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols Bridge Hello Time The time interval between generating and sending configuration messages by the bridge. This parameter can be from 1 to 10 seconds. The default is 2 seconds. Bridge Forwarding The waiting period before a bridge changes to a new state, for example, becomes the new root bridge after the topology changes. If the bridge transitions too soon, not all links may have yet adapted to the change, possibly resulting in a network loop.
AT-S63 Management Software Web Browser User’s Guide Configuring RSTP Port Settings To configure RSTP port parameters, perform the following procedure: 1. Perform steps 1 to 4 in “Configuring RSTP Bridge Settings” on page 284 to display the Spanning Tree tab. 2. To configure RSTP port settings, click on the port in the switch image and click Modify. You can select more than one port at a time. The RSTP Settings - Port(s) page is shown in Figure 116. Figure 116. RSTP Settings - Port(s) Page 3.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols Point-to-Point This parameter defines whether the port is functioning as a point-topoint port. The possible settings are Yes, No, and Auto-Detect. For an explanation of this parameter, refer to “Point-to-Point and Edge Ports” in Chapter 22, “Spanning Tree and Rapid Spanning Tree Protocols” in the AT-S63 Management Software Features Guide. Edge Port This parameter defines whether the port is functioning as an edge port.
AT-S63 Management Software Web Browser User’s Guide The Monitor RSTP Parameters tab is shown in Figure 117. Figure 117. Monitor RSTP Parameters Tab (Monitoring) 5. To view port settings, click a port in the switch image and click Status or Settings. You can select more than one port. An example of the RSTP Status page is shown in Figure 119. Figure 118. RSTP Port Status Page The RSTP Port Status page displays a table that contains the following columns of information: Port The port number.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols The possible states for a port connected to a device running STP are Listening, Learning, Forwarding, and Blocking. The possible states for a port not being used or where spanning tree is not activated is Disabled. Role The RSTP role of the port. Possible roles are: Root - The port that is connected to the root switch, directly or through other switches, with the least path cost.
AT-S63 Management Software Web Browser User’s Guide Edge-Port Whether or not the port is operating as an edge port. The possible settings are Yes and No. Point-to-Point Whether or not the port is functioning as a point-to-point port. The possible settings are Yes, No, and Auto Detect. Cost Port cost of the port. The default is Auto Update. Priority The number used as a tie-breaker when two or more ports have equal costs to the root bridge. 6. Click OK to close the page.
Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols 292 Section IV: Spanning Tree Protocols
Chapter 19 Multiple Spanning Tree Protocol This chapter explains how to configure multiple spanning tree protocol (MSTP) parameters on the AT-9400 Switch using a web browser management session.
Chapter 19: Multiple Spanning Tree Protocol Enabling MSTP The AT-9400 Switch can support the three spanning tree protocols STP, RSTP, and MSTP. However, only one spanning tree protocol can be active on the switch at a time. So before you can enable a spanning tree protocol, you must first select it as the active spanning tree protocol. After you select it, you can then enable or disable it.
AT-S63 Management Software Web Browser User’s Guide 4. To change the active spanning tree protocol on the switch, click STP, RSTP, or MSTP in the Active Protocol Version section of the tab. The default is RSTP. Note Only one spanning tree protocol can be active on the switch at a time. 5. To enable or disable the active spanning tree protocol on the switch, click the Enable Spanning Tree check box. A check indicates that the spanning tree is enabled while no check indicates that spanning tree is disabled.
Chapter 19: Multiple Spanning Tree Protocol Configuring MSTP This section contains the following procedures: “Configuring MSTP Parameters,” next “Configuring the CIST Priority” on page 299 “Managing MSTIs” on page 300 “Configuring MSTP Port Parameters” on page 304 Note MSTP must be selected as the active spanning tree protocol on the switch before you can configure it. For instructions on selecting the active spanning tree, refer to “Enabling MSTP” on page 294.
AT-S63 Management Software Web Browser User’s Guide Figure 121. Configure MSTP Parameters Tab (Configuration) Note This procedure explains the Configure MSTP Parameters section of the page. The CIST/MSTI Table is explained in “Creating an MSTI” on page 300, “Modifying an MSTI” on page 301, and “Deleting an MSTI” on page 302. The graphic image of the switch is described in “Configuring MSTP Port Parameters” on page 304.
Chapter 19: Multiple Spanning Tree Protocol Configure the following parameters as necessary. Force Version This selection determines whether the bridge operates with MSTP or in an STP-compatible mode. If you select MSTP, the bridge operates all ports in MSTP, except those ports that receive STP or RSTP BPDU packets. If you select Force STP Compatible, the bridge uses its MSTP parameter settings, but sends only STP BPDU packets from the ports. The default is MSTP.
AT-S63 Management Software Web Browser User’s Guide Bridge Max Hops MSTP regions use this parameter to discard BPDUs. The Max Hop counter in a BPDU is decremented every time the BPDU crosses an MSTP region boundary. After the counter reaches zero, the BPDU is deleted. Revision Level The revision level of an MSTP region. This is an arbitrary number that you assign to a region. The revision level must be the same on all bridges in a region. Different regions can have the same revision level without conflict.
Chapter 19: Multiple Spanning Tree Protocol Managing MSTIs This section contains the following procedures: Creating an MSTI “Creating an MSTI” on page 300 “Modifying an MSTI” on page 301 “Deleting an MSTI” on page 302 To create an MSTI, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. 3. Select the Spanning Tree tab. The Spanning Tree tab is shown in Figure 109 on page 274. 4. Click Configure.
AT-S63 Management Software Web Browser User’s Guide 7. In the Priority field, enter an MSTI Priority value. This parameter is used in selecting a regional root for the MSTI. The range is 0 (zero) to 61,440 in increments of 4,096, with 0 being the highest priority. This parameter is used in selecting a regional root for the MSTI. For a list of the increments, refer to Table 5, “Bridge Priority Value Increments” on page 278. The default is 0. 8.
Chapter 19: Multiple Spanning Tree Protocol The Modify MSTI page is shown in Figure 123. Figure 123. Modify MSTI Page 7. To change the MSTI’s priority value, enter a value in the Priority field. This parameter is used in selecting a regional root for the MSTI. The range is 0 (zero) to 61,440 in increments of 4,096, with 0 being the highest priority. For a list of the increments, refer toTable 5, “Bridge Priority Value Increments” on page 278. The default is 0. 8.
AT-S63 Management Software Web Browser User’s Guide 7. A confirmation prompt is displayed. 8. Click OK to delete the MSTI or Cancel to cancel the procedure. If you select OK, the MSTI is deleted and VLANs associated with it are returned to CIST, which has an ID of 0. 9. Repeat steps 5 to 8 to delete additional MSTIs. 10. To permanently save your changes, select the Save Config option in the Configuration menu.
Chapter 19: Multiple Spanning Tree Protocol Configuring MSTP Port Parameters To configure MSTP port parameters, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. 3. Select the Spanning Tree tab. The Spanning Tree tab is shown in Figure 120 on page 294. 4. Click Configure. The expanded MSTP Spanning Tree tab is shown in Figure 121 on page 297. 5.
AT-S63 Management Software Web Browser User’s Guide Point-to-point port Edge port An MSTI-specific parameter can be set on a per MSTI basis. This means that you can assign a different value to a MSTI-specific parameter for each spanning tree instance where a port is a member. These parameters are: Internal path cost Port priority When setting an MSTI-specific parameter, use the MSTI List in the window to select the intended MSTI.
Chapter 19: Multiple Spanning Tree Protocol Table 8. MSTP Auto Update Port Trunk Internal Path Costs Port Speed 1000 Mbps Port Cost 2,000 MSTI List The MSTIs defined on the switch. You can use this list when setting the port priority and port internal path cost parameters to assign different values to a port for each MSTI when the port is a member. Before setting priority or internal path cost, select the appropriate MSTI where you want the new setting to be applied on the port.
AT-S63 Management Software Web Browser User’s Guide Table 10 lists the MSTP port costs with the Auto setting when the port is part of a port trunk. Table 10. MSTP Auto External Path Trunk Costs Port Speed Port Cost 10 Mbps 20,000 100 Mbps 20,000 1000 Mbps 2,000 Edge Port This parameter defines whether the port is functioning as an edge port. The possible settings are Yes and No.
Chapter 19: Multiple Spanning Tree Protocol Displaying the MSTP Configuration To display the MSTP configuration, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 2 option. 3. Select the Spanning Tree tab. The Spanning Tree tab is shown in Figure 109 on page 274. This tab displays information on whether spanning tree is enable or disabled and which protocol version, STP, RSTP, or MSTP is active. 4. Click View.
AT-S63 Management Software Web Browser User’s Guide The MSTP Parameters tab is shown in Figure 125. Figure 125. Monitor MSTP Parameters Tab (Monitoring) The Monitor MSTP Parameters section displays the current MSTP parameter settings and the settings for the same parameters from the root bridge of the spanning tree domain. For definitions of the parameters, refer to “Configuring MSTP Parameters” on page 296. 5. To view MSTP port settings or status, click a port. You can select more than one port.
Chapter 19: Multiple Spanning Tree Protocol 6. In the CIST/MSTI field, specify the MSTI where the port is a member through its VLAN assignment. You can specify only one value. The default is 0 for CIST. 7. Click Settings or Status. The MSTP Settings - Port (s) page is shown in Figure 126. Figure 126. MSTP Settings - Port(s) Page The MSTP Settings page displays a table that contains the following columns of information: Port The port number. Edge-Port Whether the port is functioning as an edge port.
AT-S63 Management Software Web Browser User’s Guide The MSTP Port Status - Port(s) page is shown in Figure 127. Figure 127. MSTP Port Status - Port(s) Page The MSTP Port Status page displays a table with the following columns of information: Port The port number. State The MSTP state of the port. The possible states are: Discarding - The port is discarding received packets and is not submitting forwarded packets for transmission. Learning - The port is enabled for receiving, but not forwarding packets.
Chapter 19: Multiple Spanning Tree Protocol P2P Whether or not the port is functioning as a point-to-point port. The possible settings are Yes, No, and Auto-Detect. Version Whether the port is operating in MSTP mode or STP-compatible mode. Internal Port Cost The port cost when the port is connected to a bridge in the same MSTP region. 8. Click OK to close the page.
AT-S63 Management Software Web Browser User’s Guide Resetting MSTP to the Default Settings To reset MSTP to the factory default settings, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. 3. Select the Spanning Tree tab. The Spanning Tree tab is shown in Figure 120 on page 294. 4. Click Configure. The expanded MSTP Spanning Tree tab is shown in Figure 121 on page 297. 5. Click Defaults.
Chapter 19: Multiple Spanning Tree Protocol 314 Section IV: Spanning Tree Protocols
Section V Virtual LANs This section has the following chapters: Section V: VLANs Chapter 20, “Port-based and Tagged VLANs” on page 317 Chapter 21, “GARP VLAN Registration Protocol” on page 331 315
Section V: VLANs
Chapter 20 Port-based and Tagged VLANs This chapter explains how to create, modify, and delete port-based and tagged VLANs. This chapter also explains how to select a multiple VLAN mode.
Chapter 20: Port-based and Tagged VLANs Creating a New Port-Based or Tagged VLAN To create a new port-based or tagged VLAN, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. 3. Select the VLAN tab. The VLAN tab is shown in Figure 128. Figure 128. VLAN Tab (Configuration) Note The Modify and Remove buttons are not shown in the tab if the only VLAN on the switch is the Default_VLAN.
AT-S63 Management Software Web Browser User’s Guide The VLAN List section displays the current VLANs on the switch and contains the following columns of information: VID ID The VLAN ID. (Client) Name The name of the VLAN. Uplink Port This column contains “NA,” meaning Not Applicable, for tagged, portbased, and MAC address-based VLANs. For a protected ports VLAN, this column contains the uplink port(s) for a port group. Tagged uplink ports are designated with “T” and untagged uplink ports with “U.
Chapter 20: Port-based and Tagged VLANs untagged ports of the VLAN. For example, if a particular port is listed as a Configured member of a VLAN, but not as an Actual member, that would mean either the port is currently a part of a Guest VLAN or the supplicant who logged on the port was associated with a VLAN assignment on the authentication server. 4. To add a new VLAN, click Add. The Add New VLAN page is shown in Figure 129. Figure 129. Add New VLAN Page 5.
AT-S63 Management Software Web Browser User’s Guide use VIDs 2 through 24, the default VID value for the first VLAN created on the switch is still VID 2, even though that number is already being used. To prevent inadvertently using the same VID for two different VLANs, you should keep a list of all your network VLANs and their VID values. Name Specify a name for the new VLAN. The name can be from one to fifteen alphanumeric characters in length.
Chapter 20: Port-based and Tagged VLANs 8. To permanently save your changes, select the Save Config option in the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Modifying a VLAN This procedure explains how to add or remove ports from a tagged or untagged VLAN. When modifying a VLAN, note the following: You cannot change the VID of a VLAN. You cannot change the name of a VLAN using the web browser interface, but you can from the menus or command line interface. You cannot modify VLANs when the switch is operating in one of the multiple VLAN modes.
Chapter 20: Port-based and Tagged VLANs Note Untagged ports added to a VLAN are automatically removed from their current untagged VLAN assignment. Untagged ports removed from a VLAN are returned to the Default_VLAN. Removing an untagged port from the Default_VLAN without assigning it to another VLAN leaves the port as an untagged member of no VLAN. The modified VLAN is now ready for network operations. 8. To permanently save your changes, select the Save Config option in the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Deleting a VLAN This procedure deletes port-based and tagged VLANs from the switch. Note the following before performing this procedure: You cannot delete the Default_VLAN. You cannot delete a VLAN if it has a routing interface. You must delete the routing interface first. Deleting an interface is not supported from the web browser interface. That management function must be performed from the menus or command line interface.
Chapter 20: Port-based and Tagged VLANs Selecting a VLAN Mode The AT-S63 Management Software features three VLAN modes: Port-based and tagged VLAN Mode (default mode) IEEE 802.1Q-compliant Multiple VLAN Mode Non-IEEE 802.1Q compliant Multiple VLAN Mode For background information, refer to the AT-S63 Management Software Features Guide.
AT-S63 Management Software Web Browser User’s Guide Displaying VLANs To display the current VLANs on a switch, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 2 option. 3. Select the VLAN tab. The VLAN tab is shown in Figure 130. Figure 130. VLAN Tab (Monitoring) The upper part of the tab displays the following information: VLAN Mode The VLAN mode of the switch.
Chapter 20: Port-based and Tagged VLANs Uplink Port This item only applies when the switch is operating in the IEEE 802.1Q-compliant multiple VLAN mode or the non-IEEE 802.1Qcompliant multiple VLAN modes. It displays the uplink port for the VLANs. The lower part of the tab displays a table that contains the following columns of information: VLAN ID The VID number of the VLAN. (Client) Name The name of the VLAN.
AT-S63 Management Software Web Browser User’s Guide Actual: The current untagged ports of the VLAN. If you are not using 802.1x Port-based Network Access Control, both the Configured and Actual untagged ports of a VLAN will always be the same. If you are using 802.1x and you assigned a Guest VLAN to an authenticator port or you associated an 802.1x supplicant to a VLAN on the authentication server, a port can be in different VLAN than the virtual LAN where it was originally assigned as an untagged port.
Chapter 20: Port-based and Tagged VLANs Untagged Ports The untagged ports members of the VLAN. Uplink Ports The uplink port(s) for this group of ports. Name The VLAN name. Protocol Not used. Tagged Ports The tagged ports members of the VLAN. The Protected VLAN Groups section displays the following information: Group Number The number assigned to the group. Port List The ports of the group.
Chapter 21 GARP VLAN Registration Protocol This chapter contains instructions on how to configure GARP VLAN Registration Protocol (GVRP).
Chapter 21: GARP VLAN Registration Protocol Configuring GVRP To configure GVRP, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. 3. Select the GVRP tab. The GVRP tab is shown in Figure 132. Figure 132. GVRP Tab (Configuration) 4. In the GVRP Parameters section, configure the following parameters as necessary. Note The settings for the three timers must be the same on all GVRPactive network devices.
AT-S63 Management Software Web Browser User’s Guide Leave Time Use this parameter to specify the leave time. The range is 30 to 80 centiseconds and the default is 60 centiseconds. Join Time Use this parameter to specify the join time. The range is 10 to 60 centiseconds and the default is 20 centiseconds.
Chapter 21: GARP VLAN Registration Protocol Enabling or Disabling GVRP on a Port To enable or disable GVRP on a port, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Layer 2 option. 3. Select the GVRP tab. The GVRP tab is shown in Figure 132 on page 332. 4. In the GVRP Port Configuration section, click the ports to be to configured. 5. Click Modify. The GVRP Port Configuration page is shown in Figure 133. Figure 133.
AT-S63 Management Software Web Browser User’s Guide Displaying the GVRP Configuration To display the GVRP configuration, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 2 option. 3. Select the GVRP tab. The GVRP tab is shown in Figure 134. Figure 134. GVRP Tab (Monitoring) The GVRP Parameters section provides the following information: GVRP The GVRP status, Enabled or Disabled.
Chapter 21: GARP VLAN Registration Protocol Displaying the GVRP Port Configuration To display the GVRP port configuration, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 2 option. 3. Select the GVRP tab. The GVRP tab is shown in Figure 134 on page 335. 4. In the View GVRP Parameters section, click View Port Configuration. 5. Click View. The GVRP Port Configuration page is shown in Figure 135. Figure 135.
AT-S63 Management Software Web Browser User’s Guide Displaying the GVRP Database To display the GVRP database, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 2 option. 3. Select the GVRP tab. The GVRP tab is shown in Figure 134 on page 335. 4. In the View GVRP Parameters section, click View GVRP Database. 5. Click View. The GVRP Database page is shown in Figure 136. Figure 136.
Chapter 21: GARP VLAN Registration Protocol Displaying the GVRP State Machine To display the GVRP state machine, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 2 option. 3. Select the GVRP tab. The GVRP tab is shown in Figure 134 on page 335. 4. In the View GVRP Parameters section, click View GVRP State Machine for VLAN and enter the VLAN number in the box. 5. Click View. The GVRP State Machine for VLAN page is shown in Figure 137.
AT-S63 Management Software Web Browser User’s Guide Table 11. GVRP State Machine Parameters (Continued) Parameter App Meaning Applicant state machine for the GID index on that particular port.
Chapter 21: GARP VLAN Registration Protocol Table 11. GVRP State Machine Parameters (Continued) Parameter Reg Meaning Registrar state machine for the GID index on that particular port. One of: “Mt” Empty “Lv3” Leaving substate 3 (final Leaving substate) “Lv2” Leaving substate 2 “Lv1” Leaving substate 1 “Lv” Leaving substate (initial Leaving substate) “In” In “Fix” Registration Fixed “For” Registration Forbidden The initialized state for the Registrar is Mt.
AT-S63 Management Software Web Browser User’s Guide Displaying the GVRP Counters To display the GVRP counters, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 2 option. 3. Select the GVRP tab. The GVRP tab is shown in Figure 134 on page 335. 4. In the View GVRP Parameters section, click View GVRP Counters. 5. Click View. The GVRP Counters page is shown in Figure 138. Figure 138.
Chapter 21: GARP VLAN Registration Protocol Table 12. GVRP Counters (Continued) Parameter Meaning Transmit: Total GARP Packets Total number of GARP PDUs transmitted by this GARP application. Receive: Invalid GARP Number of invalid GARP PDUs received by this Packets GARP application. 342 Receive Discarded: GARP Disabled Number of received GARP PDUs discarded because the GARP application was disabled.
AT-S63 Management Software Web Browser User’s Guide Table 12. GVRP Counters (Continued) Parameter Section V: Virtual LANs Meaning Transmit GARP Messages: JoinEmpty Total number of GARP JoinEmpty messages transmitted for all attributes in the GARP application. Receive GARP Messages: JoinIn Total number of GARP JoinIn messages received for all attributes in the GARP application. Transmit GARP Messages: JoinIn Total number of GARP JoinIn messages transmitted for all attributes in the GARP application.
Chapter 21: GARP VLAN Registration Protocol Displaying the GIP Connected Ports Ring To display the GIP connected ports ring, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Layer 2 option. 3. Select the GVRP tab. The GVRP tab is shown in Figure 134 on page 335. 4. In the View GVRP Parameters section, click View GIP Connected Ports Ring. 5. Click View. The GIP Connected Ports Ring page is shown in Figure 139. Figure 139.
Section VI Port Security This section has the following chapters: Section VI: Port Security Chapter 22, “MAC Address-based Port Security” on page 347 Chapter 23, “802.
Section VI: Port Security
Chapter 22 MAC Address-based Port Security This chapter explains how to configure and display the MAC addressbased security levels on the ports on the switch.
Chapter 22: MAC Address-based Port Security Configuring Port Security To configure security for the ports, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security option. The Network Security page opens with the Port Security tab selected by default, as shown in Figure 140. Figure 140. Port Security Tab (Configuration) 3. In the image of the switch, click the port to be configured and click Modify.
AT-S63 Management Software Web Browser User’s Guide 4. From the Security Mode pull-down menu, select the desired port security level for the port. Options are: Automatic Disables MAC address-based port security on a port. This is the default setting. Limited Allows you to specify a maximum number of dynamic source MAC addresses a port can learn. After learning its maximum number of addresses, a port discards all ingress frames with source MAC addresses not already learned.
Chapter 22: MAC Address-based Port Security You can continue to add new static MAC addresses to a port operating under this security level. 5. If you select the Limited security level, additional options are displayed in the window for you to configure. They are defined here: Intrusion Action Specifies what the switch should do if a port receives an invalid frame. Options are Discard - Discards the invalid frame. Trap - Discards the invalid frame and sends an SNMP trap.
AT-S63 Management Software Web Browser User’s Guide Displaying Port Security Levels To display the MAC address-based security level of a port, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select Network Security. The Network Security page is displayed with the Port Security tab selected by default, as shown in Figure 142. Figure 142. Port Security Tab (Monitoring) 3. Click the port whose port security level is to be displayed.
Chapter 22: MAC Address-based Port Security The Security for Ports page displays a table that contains the following columns of information: Port The number of the port. Security Mode The active security mode on the port. The possible settings are Automatic, Limited, Secured, and Locked. Intruder Action The column specifies the action taken by the switch if a port receives an invalid packet. The possible settings are: Discard - The port discards invalid packets. This is the default.
Chapter 23 802.1x Port-based Network Access Control This chapter contains instructions on how to configure the 802.1x Portbased Network Access Control feature on the switch. The chapter contains the following sections: Section VI: Port Security “Setting Port Roles” on page 354 “Enabling or Disabling 802.
Chapter 23: 802.1x Port-based Network Access Control Setting Port Roles To set port roles for port-based network access control, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security option. 3. Select the 802.1x Port Access tab. The 802.1x Port Access tab is shown in Figure 144. Figure 144. 802.1x Port Access Tab (Configuration) The image of the switch displays the roles of the ports.
AT-S63 Management Software Web Browser User’s Guide 5. Click Port Role. The Port Role Configuration page is shown in Figure 145. Figure 145. Port Role Configuration Page 6. Select the desired role for the port. A port can have only one port role at a time. The possible settings are: None The port does not participate in 802.1x port-based access control. This is the default setting. Authenticator The port functions as an authenticator.
Chapter 23: 802.1x Port-based Network Access Control Enabling or Disabling 802.1x Port-based Network Access Control To enable or disable 802.1x Port-based Network Access Control, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security option. 3. Select the 802.1x Port Access tab. The 802.1x Port Access tab is shown in Figure 144 on page 354. 4. Click the Enable Port Access check box.
AT-S63 Management Software Web Browser User’s Guide Configuring Authenticator Port Parameters To configure authenticator port parameters, perform the following procedure: Note The role of a port must be set to authenticator before the parameters can be configured. For instructions, refer to “Setting Port Roles” on page 354. 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security option. 3. Select the 802.1x Port Access tab. The 802.
Chapter 23: 802.1x Port-based Network Access Control The Authenticator Parameters page is shown in Figure 146. Figure 146. Authenticator Parameters Page 6. Configure the following parameters as needed: Authenticator Mode Sets the authenticator mode of an authenticator port. This parameter can take the following values: 358 802.1x: Specifies 802.1x username and password authentication.
AT-S63 Management Software Web Browser User’s Guide Supplicant Mode Sets the supplicant mode of an authenticator port. The possible settings are: Single: Configures the authenticator port to accept only one authentication. This mode should be used together with the piggyback mode. When an authenticator port is set to the Single mode and the piggy-back mode is disabled, only the one client who is authenticated can use the port. Packets from or to other clients on the port are discarded.
Chapter 23: 802.1x Port-based Network Access Control TX Period Sets the number of seconds that the switch waits for a response to an EAP-request/identity frame from the client before retransmitting the request. The default value is 30 seconds. The range is 1 to 65,535 seconds. Quiet Period Sets the number of seconds that the port remains in the quiet state following a failed authentication exchange with the client. The default value is 60 seconds. The range is 0 to 65,535 seconds.
AT-S63 Management Software Web Browser User’s Guide client logs in. This is the default. Piggyback Mode Controls who can use the switch port in cases where there are multiple clients (e.g., the port is connected to an Ethernet hub). If set to enabled, the port allows all clients on the port to piggy-back onto the initial client’s authentication. The port forwards all packets, regardless of the client, after one client has been authenticated.
Chapter 23: 802.1x Port-based Network Access Control Changes to the authenticator settings are immediately implemented on a port. 8. To permanently save your changes, select the Save Config option in the Configuration menu.
AT-S63 Management Software Web Browser User’s Guide Configuring Supplicant Port Parameters To configure supplicant port parameters, perform the following procedure: Note The role of a port must be set to supplicant before the parameters can be configured. For instructions, refer to “Setting Port Roles” on page 354. 1. From the home page, select Configuration. 2. From the Configuration menu, select the Network Security option. 3. Select the 802.1x Port Access tab. The 802.
Chapter 23: 802.1x Port-based Network Access Control Held Period Specifies the amount of time in seconds the supplicant is to refrain from retrying to re-contact the authenticator in the event the end user provides an invalid username and/or password. After the time period has expired, the supplicant can attempt to log on again. The range is 0 to 65,535 seconds. The default value is 60 seconds.
AT-S63 Management Software Web Browser User’s Guide Displaying the Port-based Network Access Control Parameters You can display information about the port-based network access control status and settings of the ports on the switch. This section contains the following procedures: Displaying the Port Status ”Displaying the Port Status” (next) “Displaying the Port Settings” on page 367 To display the port-based network access control port status, perform the following procedure: 1.
Chapter 23: 802.1x Port-based Network Access Control 4. To see the status of the port, click the port and click Status. You can display the status of more than one port at a time. The Port Access Port Status page is shown in Figure 149. Figure 149. Port Access Port Status Page The Port Access Port Status page displays a table that contains the following columns of information: Port Port number. Port Role Port access role configured for the port.
AT-S63 Management Software Web Browser User’s Guide Additional Info This field displays the MAC address of an authenticated node for authenticator ports with a status of Authenticated. Displaying the Port Settings To display the port settings for port-based network access control, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select Network Security. 3. Select the 802.1x Port Access tab. The 802.
Chapter 23: 802.1x Port-based Network Access Control If you selected more than one authenticator port, the page includes a Next button. Use the button to scroll the page to view the settings of the other ports. For definitions of the authenticator port settings, refer to “Configuring Authenticator Port Parameters” on page 357. The Supplicant Port Parameters Page is displayed for supplicant ports, as shown in Figure 151. Figure 151.
AT-S63 Management Software Web Browser User’s Guide RADIUS Accounting The AT-S63 Management Software supports RADIUS accounting for ports operating in the Authenticator role. The accounting information sent by the switch to a RADIUS server includes the date and time when clients log on and log off, as well as the number of packets sent and received by a switch port during a client session. For background information, refer to the AT-S63 Management Software Features Guide.
Chapter 23: 802.1x Port-based Network Access Control Update Interval Specifies the intervals at which the switch sends interim accounting updates to the RADIUS server. The range is 30 to 300 seconds. The default is 60 seconds. 5. Click Apply. Changes to the accounting settings are immediately implemented on the switch. 6. To permanently save your changes, select the Save Config option in the Configuration menu.
Section VII Management Security This section has the following chapters: Section VII: Management Security Chapter 24, “Encryption Keys, PKI, and SSL” on page 373 Chapter 25, “Secure Shell (SSH)” on page 381 Chapter 26, “TACACS+ and RADIUS Protocols” on page 387 Chapter 27, “Management Access Control List” on page 399 371
Section VII: Management Security
Chapter 24 Encryption Keys, PKI, and SSL This chapter explains how to view the encryption keys, PKI-based certificates, and SSL settings and includes the following sections: “Displaying the Encryption Keys” on page 374 “Displaying the PKI Settings and Certificates” on page 376 “Displaying the SSL Settings” on page 379 Note You must use the menus or command line interface to configure encryption keys, PKI, and SSL.
Chapter 24: Encryption Keys, PKI, and SSL Displaying the Encryption Keys To configure the encryption keys, you must use the AT-S63 menus or command line interface. For more information about encryption keys, refer to the AT-S63 Management Software Menus Interface User’s Guide. To display the encryption keys, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Mgmt. Security option. 3. Select the Keys tab. The Keys tab is shown in Figure 152.
AT-S63 Management Software Web Browser User’s Guide Description The key’s description. You use these keys when you configure Secure Sockets Layer (SSL) or Secure Shell (SSH). To configure SSL you must use the AT-S63 menus or CLI interface. To configure SSH, refer to Chapter 25, ”Secure Shell (SSH)” on page 381.
Chapter 24: Encryption Keys, PKI, and SSL Displaying the PKI Settings and Certificates You can view the current PKI settings and certificates on the switch. To configure the PKI settings and certificates, you must use the AT-S63 menus or command line interface. For more information about PKI, refer to the AT-S63 Management Software Menus Interface User’s Guide. To display the PKI settings and certificates, perform the following procedure: 1. From the Home page, select Monitoring. 2.
AT-S63 Management Software Web Browser User’s Guide Trusted - The certificate is from a trusted CA. Untrusted - The certificate is from an untrusted CA. MTrust (Manually Trusted) The certificate has been manually verified that it is from a trusted or untrusted authority. Type The certificate type, one of the following: EE - The certificate was issued by a CA. CA - The certificate belongs to a CA. Self - A self-signed certificate. Source The certificate was created on the switch. 4.
Chapter 24: Encryption Keys, PKI, and SSL Manually Trusted Whether the certificate was manually trusted. Type The type of the certificate. The options are EE, SELF, and CA. Source The source of the certificate. The source for a self-signed certificate created by the switch is COMMAND. Version The version of X.509 that the certificate complies with. Serial Number The certificate’s serial number. Signature Algorithm The algorithm used to sign the certificate.
AT-S63 Management Software Web Browser User’s Guide Displaying the SSL Settings To configure the SSL settings, you must use the AT-S63 menus or command line interface. For instructions, refer to the AT-S63 Management Software Menus Interface User’s Guide and the AT-S63 Management Software Command Line Interface User’s Guide. To display the SSL settings, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Monitoring menu, select the Mgmt. Protocols option. 3.
Chapter 24: Encryption Keys, PKI, and SSL 380 Section VII: Management Security
Chapter 25 Secure Shell (SSH) This chapter explains how to configure the Secure Shell (SSH) protocol and contains the following sections: Section VII: Management Security “Configuring SSH” on page 382 “Displaying the SSH Settings” on page 384 381
Chapter 25: Secure Shell (SSH) Configuring SSH To configure SSH, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Protocols option. 3. Select the Secure Shell tab. The Secure Shell tab is shown in Figure 156. Figure 156. Secure Shell Tab (Configuration) 4. Configure the following parameters as necessary: Status Enables and disables the SSH server. The default is Disabled.
AT-S63 Management Software Web Browser User’s Guide Note You cannot create encryption keys from the web browser interface, but you can from the menus and command line interfaces. Server Key ID Specifies the ID number of the encryption key for the SSH server. The key must already exist on the switch. The default is Not Defined. Server Expiry Time Sets the time, in hours, for a server key to expire. This timer determines how often a server key is regenerated for security purposes.
Chapter 25: Secure Shell (SSH) Displaying the SSH Settings To view the Secure Shell settings, perform the following procedure: 1. From the Home page, select Monitoring. 2. From the Configuration menu, select the Mgmt. Protocols option. 3. Select the Secure Shell tab. The Secure Shell tab is shown in Figure 157. Figure 157. Secure Shell Tab (Monitoring) The Secure Shell tab provides the following information: SSH Versions Supported The versions of SSH supported by the AT-S63 Management Software.
AT-S63 Management Software Web Browser User’s Guide Server Key ID The encryption key ID of the server key. Server Key Expiry Time Length of time, in hours, until the server key is regenerated. The default is 0 hours which means the server key is not regenerated. Login Timeout Time, in seconds, until a SSH server is released from an incomplete connection with a SSH client. Authentication Available Authentication method available. Currently, password authentication is the only supported method.
Chapter 25: Secure Shell (SSH) 386 Section VII: Management Security
Chapter 26 TACACS+ and RADIUS Protocols This chapter contains instructions on how to configure the authentication protocols.
Chapter 26: TACACS+ and RADIUS Protocols Enabling or Disabling TACACS+ or RADIUS To enable or disable server-based authentication or to select a different authentication protocol, perform the following procedure: 1. From the Home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Protocols option. The Mgmt. Protocols page is displayed with the Server-based Authentication tab selected by default, as shown in Figure 158. Figure 158.
AT-S63 Management Software Web Browser User’s Guide Note The Enable Server-based Authentication check box only applies to new TACACS+ or RADIUS manager accounts. If you are only using RADIUS for 802.1x port-based access control and not manager accounts, leave the check box empty. The switch can still access the RADIUS configuration information for 802.1x port-based access control. 5. Click Apply. 6. To permanently save your changes, select the Save Config option in the Configuration menu.
Chapter 26: TACACS+ and RADIUS Protocols Configuring the TACACS+ Client Settings To configure the TACACS+ client, perform the following procedure: 1. From the home page, select Configuration. 2. Select the Mgmt. Protocols option. The Mgmt. Protocols tab is displayed with the Server-based Authentication tab selected by default, as shown in Figure 158 on page 388. 3. In lower section of the Server-based Authentication tab, click TACACS+ Configuration and click Configure.
AT-S63 Management Software Web Browser User’s Guide there are no more servers, the switch defaults to the standard Manager and Operator accounts. The default is 30 seconds. The range is 1 to 30 seconds. IP Address and Encryption Key Specify the IP addresses and encryption secrets of up to three TACACS+ servers. You can leave an encryption field blank if you entered the server’s secret in the Global Secret field. The maximum length is 39 characters. 5. Click Apply. 6.
Chapter 26: TACACS+ and RADIUS Protocols Displaying the TACACS+ Client Settings To display the TACACS+ client settings on the switch, perform the following procedure: 1. From the Home page, select Monitoring. 2. Select the Mgmt. Protocols option. The Mgmt. Protocols tab is displayed with the Server-based Authentication tab selected by default, as shown in Figure 160. Figure 160.
AT-S63 Management Software Web Browser User’s Guide The TACACS+ client configuration page is shown in Figure 161. Figure 161. TACACS+ Client Configuration Page The upper portion of the page provides the following information: Global Secret The TACACS+ server encryption secret. Global Server Timeout The maximum amount of time the switch waits for a response from a TACACS+ server.
Chapter 26: TACACS+ and RADIUS Protocols Configuring the RADIUS Client Settings To configure the RADIUS client, perform the following procedure: 1. From the home page, select Configuration. 2. Select the Mgmt. Protocols option. The Mgmt. Protocols tab is displayed with the Server-based Authentication tab selected by default, as shown in Figure 158 on page 388. 3. In lower section of the Server-based Authentication tab, click RADIUS Configuration and click Configure.
AT-S63 Management Software Web Browser User’s Guide there are no more servers, the switch defaults to the standard Manager and Operator accounts. The default is 30 seconds. The range is 1 to 30 seconds. IP Address, Port #, and Encryption Key Specify the IP address, UDP port number, and encryption key of each RADIUS server. You can specify up to three servers. You can leave the encryption field blank for a server if you entered the server’s key in the Global Encryption Key field.
Chapter 26: TACACS+ and RADIUS Protocols Displaying the RADIUS Client Settings To display the RADIUS client settings on the switch, perform the following procedure: 1. From the Home page, select Monitoring. 2. Select the Mgmt. Protocols option. The Mgmt. Protocols tab is displayed with the Server-based Authentication tab selected by default, as shown in Figure 160 on page 392. The upper part of the page shows whether server-based authentication is enabled or disabled and the authentication method.
AT-S63 Management Software Web Browser User’s Guide Global Server Timeout Specifies the maximum amount of time the switch waits for a response from a RADIUS server. The lower portion of the page displays a table that contains the following columns of information: Server # Specifies the server number, one of three. IP Address Specifies the IP address of the RADIUS server. Port Specifies the port of the RADIUS server. Encryption Key Specifies the encryption key for that server.
Chapter 26: TACACS+ and RADIUS Protocols 398 Section VII: Management Security
Chapter 27 Management Access Control List The management access control list (ACL) enhances security of the switch by restricting Telnet and web browser management access.
Chapter 27: Management Access Control List Enabling or Disabling the Management ACL This procedure enables and disables the management ACL. When the management ACL is enabled, remote Telnet and web browser management of the switch is restricted to just those management stations specified by the access control entries in the ACL. When the feature is disabled, any remote management workstation can access the switch.
AT-S63 Management Software Web Browser User’s Guide The table in the Management ACL List lists the existing ACEs on the switch. The bottom portion is used to add entries, as explained in “Creating an ACE” on page 402. 4. Click either Enable MGMT. ACL or Disable MGMT. ACL. The default setting is disabled. 5. Click Apply. The new status of the management ACL is immediately activated on the switch.
Chapter 27: Management Access Control List Creating an ACE To add a new ACE to the management ACL, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Security option. 3. Select the Mgmt. ACL tab. The tab is shown in Figure 164 on page 400. 4. To add a new ACE, click Add. The Add New MACL page is shown in Figure 165. Figure 165. Add New MACL Page 5.
AT-S63 Management Software Web Browser User’s Guide Mgmt. ACL Entry IP Mask Specifies a mask that indicates the parts of the IP address the switch should filter on. A binary “1” indicates the switch should filter on the corresponding bit of the address, while a “0” indicates that it should not. If you are filtering on a specific IP address, use the mask 255.255.255.255. If you are filtering on a subnet, the mask will depend on the address.
Chapter 27: Management Access Control List Modifying an ACE To modify an ACE, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Security option. 3. Select the Mgmt. ACL tab. The tab is shown in Figure 164 on page 400. 4. Select the ACE to be modified from the Management ACL List section in the tab and click Modify. The Modify MACL page is shown in Figure 166. Figure 166. Modify MACL Page 5.
AT-S63 Management Software Web Browser User’s Guide Deleting an ACE To delete an ACE from the Management ACL, perform the following procedure: 1. From the home page, select Configuration. 2. From the Configuration menu, select the Mgmt. Security option. 3. Select the Mgmt. ACL tab. The tab is shown in Figure 164 on page 400. 4. Select the ACE to be deleted from the Management ACL List section in the tab and click Remove. The ACE is deleted from the switch. 5.
Chapter 27: Management Access Control List Displaying the Management Access Control List To display the management access control list and its access control entries, perform the following procedure: 1. From the home page, select Monitoring. 2. From the Monitoring menu, select the Mgmt. Security option. 3. Select the Mgmt ACL tab. The Mgmt. ACL tab is shown in Figure 167. Figure 167. Mgmt. ACL Tab (Monitoring) The top section of the tab displays the status of the Management ACL as enabled or disabled.
Index Numerics C 802.
Index F L factory defaults resetting switch 37 flash memory, displaying files in 106 flow control configuring 48 flow group configuring 166 deleting 170 displaying 170 modifying 169 force version Multiple Spanning Tree Protocol (MSTP) 298 Rapid Spanning Tree Protocol (RSTP) 285 limited port security level 349 local interface displaying IP address 39 locked port security level 349 login timeout parameter 383 G GARP VLAN Registration Protocol (GVRP) configuration, displaying 335 configuring 332 counters,
AT-S63 Management Software Web Browser User’s Guide Multiple Spanning Tree Protocol (MSTP) bridge forwarding delay 298 bridge hello time 298 bridge max age 298 bridge settings, configuring 296 configuration name 298 configuring 296 disabling 294 edge port 307 enabling 294 force version 298 max hops 299 parameters, configuring 296 point-to-point port 306 port external path cost 306 port internal path cost 305 port parameters configuring 304 displaying 308 port priority 305 port status, displaying 308 resett
Index Rapid Spanning Tree Protocol (RSTP) bridge forwarding delay 286 bridge hello time 286 bridge identifier 286 bridge max age 286 bridge priority 285 bridge settings, configuring 284 disabling 274, 294 edge port, configuring 288 enabling 274, 294 force version 285 MCHECK 287, 306 point-to-point port, configuring 288 port cost 287 port priority 287 port settings, displaying 288 resetting to defaults 291 reauth period, configuring 360 reg (registrar state machine) parameter 340 RSTP.
AT-S63 Management Software Web Browser User’s Guide software information 40 switch name, configuring 28 switch, rebooting 35 system date setting 32 system file downloading 112 uploading 116 system name configuring 29 system time setting 32 T TACACS+ configuring 390 disabling 388 displaying settings 392 enabling 388 server timeout configuring 394 tagged VLAN creating 318 deleting 325 displaying 327 modifying 323 threshold 350 traffic class configuring 172 deleting 178 displaying 178 modifying 177 tx period
Index 412