User guide
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Section I
- Basic Operations
- Chapter 1
- Basic Switch Parameters
- Configuring the Switch’s Name, Location, and Contact
- Changing the Manager and Operator Passwords
- Setting the System Date and Time
- Rebooting a Switch
- Pinging a Remote System
- Returning the AT-S63 Management Software to the Factory Default Values
- Displaying the IP Address of the Local Interface
- Displaying System Information
- Chapter 2
- Port Parameters
- Chapter 3
- Enhanced Stacking
- Chapter 4
- SNMPv1 and SNMPv2c
- Chapter 5
- MAC Address Table
- Chapter 6
- Static Port Trunks
- Chapter 7
- Port Mirroring
- Section II
- Advanced Operations
- Chapter 8
- File System
- Chapter 9
- File Downloads and Uploads
- Chapter 10
- Event Logs and Syslog Client
- Chapter 11
- Classifiers
- Chapter 12
- Access Control Lists
- Chapter 13
- Class of Service
- Chapter 14
- Quality of Service
- Chapter 15
- Denial of Service Defenses
- Chapter 16
- IGMP Snooping
- Section III
- SNMPv3
- Chapter 17
- SNMPv3
- Configuring the SNMPv3 Protocol
- Enabling or Disabling SNMP Management
- Configuring the SNMPv3 User Table
- Configuring the SNMPv3 View Table
- Configuring the SNMPv3 Access Table
- Configuring the SNMPv3 SecurityToGroup Table
- Configuring the SNMPv3 Notify Table
- Configuring the SNMPv3 Target Address Table
- Configuring the SNMPv3 Target Parameters Table
- Configuring the SNMPv3 Community Table
- Displaying SNMPv3 Tables
- Section IV
- Spanning Tree Protocols
- Chapter 18
- Spanning Tree and Rapid Spanning Tree Protocols
- Chapter 19
- Multiple Spanning Tree Protocol
- Section V
- Virtual LANs
- Chapter 20
- Port-based and Tagged VLANs
- Chapter 21
- GARP VLAN Registration Protocol
- Section VI
- Port Security
- Chapter 22
- MAC Address-based Port Security
- Chapter 23
- 802.1x Port-based Network Access Control
- Section VII
- Management Security
- Chapter 24
- Encryption Keys, PKI, and SSL
- Chapter 25
- Secure Shell (SSH)
- Chapter 26
- TACACS+ and RADIUS Protocols
- Chapter 27
- Management Access Control List
- Index
Contents
4
Chapter 5: MAC Address Table .................................................................................................................... 75
Displaying the MAC Address Table .................................................................................................................. 76
Adding Static Unicast and Multicast MAC Addresses.......................................................................................79
Deleting Unicast and Multicast MAC Addresses...............................................................................................81
Deleting All Dynamic MAC Addresses ..............................................................................................................82
Changing the Aging Time ................................................................................................................................. 83
Chapter 6: Static Port Trunks .......................................................................................................................85
Creating a Static Port Trunk.............................................................................................................................. 86
Modifying a Static Port Trunk ............................................................................................................................90
Deleting a Port Trunk ........................................................................................................................................92
Displaying the Port Trunks ................................................................................................................................ 93
Chapter 7: Port Mirroring ..............................................................................................................................95
Creating a Port Mirror .......................................................................................................................................96
Modifying a Port Mirror...................................................................................................................................... 99
Disabling a Port Mirror .................................................................................................................................... 100
Deleting a Port Mirror ......................................................................................................................................101
Displaying the Port Mirror ...............................................................................................................................102
Section II: Advanced Operations ...........................................................................103
Chapter 8: File System ................................................................................................................................105
Listing the Files in Flash Memory or on a Compact Flash Card .....................................................................106
Selecting an Active Boot Configuration File.................................................................................................... 109
Chapter 9: File Downloads and Uploads ................................................................................................... 111
Downloading a File .........................................................................................................................................112
Uploading a File ..............................................................................................................................................116
Chapter 10: Event Logs and Syslog Client ................................................................................................119
Working with the Event Logs ..........................................................................................................................120
Enabling or Disabling the Event Logs.......................................................................................................120
Displaying Events .....................................................................................................................................122
Clearing an Event Log ..............................................................................................................................126
Modifying the Event Log Full Action .........................................................................................................127
Saving an Event Log to a File...................................................................................................................128
Working with Syslog Output Definitions ..........................................................................................................129
Configuring a Syslog Output Definition.....................................................................................................129
Viewing a Syslog Output Definition ..........................................................................................................132
Modifying a Syslog Output Definition........................................................................................................132
Deleting a Syslog Output Definition..........................................................................................................133
Chapter 11: Classifiers ................................................................................................................................135
Configuring a Classifier ...................................................................................................................................136
Modifying a Classifier ...................................................................................................................................... 142
Deleting a Classifier ........................................................................................................................................ 144
Displaying the Classifiers ................................................................................................................................ 145
Chapter 12: Access Control Lists ..............................................................................................................147
Configuring an Access Control List.................................................................................................................148
Modifying an Access Control List ....................................................................................................................151
Deleting an Access Control List ...................................................................................................................... 152
Displaying the Access Control Lists................................................................................................................153