Management Software AT-S80 User’s Guide For use with the AT-FS750/16 and AT-FS750/24 Fast Ethernet Smart Switches Version 2.0.0 613-000213 Rev.
Copyright 2008 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis, Inc. Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. All other product names, company names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners. Allied Telesis, Inc.
Contents Preface ............................................................................................................................................................ 13 Where to Find Web-based Guides ................................................................................................................... 14 Document Conventions .................................................................................................................................... 15 Contacting Allied Telesis .
Contents Modifying a Port Trunk ...................................................................................................................................... 67 Enabling and Disabling a Port Trunk ................................................................................................................ 69 Chapter 6: IGMP Snooping ........................................................................................................................... 71 IGMP Snooping Overview...............
AT-S80 Management Software User’s Guide Trap Receivers......................................................................................................................................... 121 Default SNMP Community Strings ................................................................................................................. 123 Creating an SNMP Community ......................................................................................................................
Contents General Steps...........................................................................................................................................189 Port-based Network Access Control Guidelines.......................................................................................189 Guest VLANs ..................................................................................................................................................192 Configuring 802.
AT-S80 Management Software User’s Guide Chapter 27: Destination MAC Address Filter ............................................................................................ 265 Setting a Destination MAC Filter .................................................................................................................... 266 Removing a MAC Address .............................................................................................................................
Contents Appendix A: AT-S80 Software Default Settings ........................................................................................339 Index ..............................................................................................................................................................
Figures Figure 1. Connecting the Management Cable to the Console Port .....................................................................................26 Figure 2. Login Menu...........................................................................................................................................................27 Figure 3. Main Menu............................................................................................................................................................
Figures Figure 51. Figure 52. Figure 53. Figure 54. Figure 55. Figure 56. Figure 57. Figure 58. Figure 59. Figure 60. Figure 61. Figure 62. Figure 63. Figure 64. Figure 65. Figure 66. Figure 67. Figure 68. Figure 69. Figure 70. Figure 71. Figure 72. Figure 73. Figure 74. Figure 75. Figure 76. Figure 77. Figure 78. Figure 79. Figure 80. Figure 81. Figure 82. Figure 83. Figure 84. Figure 85. Figure 86. Figure 87. Figure 88. Figure 89. Figure 90. Figure 91. Figure 92. Figure 93. Figure 94. Figure 95.
Tables Table 1. Table 2. Table 3. Table 4. Table 5. Table 6. Table 7. Table 8. Menus Interface Operations .................................................................................................................................28 Default Mappings of IEEE 802.1p Priority Levels to Egress Port Priority Queues .............................................141 RSTP Auto-Detect Port Costs ....................................................................................................................
Tables 12
Preface This guide contains instructions on how to use the AT-S80 management software to monitor and manage the AT-FS750/16 and AT-FS750/24 Fast Ethernet Smart switches. The AT-S80 Management Software has two management interfaces: a menus interface and a web browser interface. You access the menus interface through the console port on the switch. You access the web browser interface from any management workstation on your network that has a web browser application.
Preface Where to Find Web-based Guides The installation and user guides for all Allied Telesis products are available in portable document format (PDF) on our web site at www.alliedtelesis.com. You can view the documents online or download them onto a local workstation or server. For information about installing the AT-FS750/16 and AT-FS750/24 switches, see the AT-FS750/16, AT-FS750/24 Fast Ethernet Smart Switches Installation Guide (P/N 613-000354).
AT-S80 Management Software User’s Guide Document Conventions This document uses the following conventions: Note Notes provide additional information. Caution Cautions inform you that performing or omitting a specific action may result in equipment damage or loss of data. Warning Warnings inform you that performing or omitting a specific action may result in bodily injury.
Preface Contacting Allied Telesis This section provides Allied Telesis contact information for technical support as well as sales and corporate information. Online Support You can request technical support online by accessing the Allied Telesis Knowledge Base: www.alliedtelesis.com/support. You can use the Knowledge Base to submit questions to our technical support staff and review answers to previously asked questions.
Chapter 1 Overview This chapter provides an overview of the AT-S80 Management Software for the AT-FS750/16 and AT-FS750/24 switches.
Chapter 1: Overview Management Overview The AT-S80 Management Software allows you to view and adjust the operating parameters of the AT-FS750/16 and AT-FS750/24 Fast Ethernet Switches. A few examples of the management functions are listed here: Enable and disable ports Configure a port’s speed and duplex mode Create port trunks Configure a port mirror Configure Quality of Service (QoS) Create port-based and tagged virtual LANs Configure 802.
AT-S80 Management Software User’s Guide Local Management Connection To establish a local management connection with an AT-FS750/16 or AT-FS750/24 Fast Ethernet Switch, you must connect a terminal or a PC with a terminal emulator program to the console port on the front of the switch using the management cable which is included with the unit. This type of connection is referred to as “local” because you must be physically close to the switch, such as in the wiring closet where the device is located.
Chapter 1: Overview Remote SNMP Management You can also remotely configure the switch using a Simple Network Management (SNMP) application such as AT-View. This management method requires an understanding of Management Information Base (MIB) objects. Note You must assign an IP address to the switch for remote SNMP management. For background information, see “Configuring the IP Address, Subnet Mask, and Gateway Address” on page 32.
AT-S80 Management Software User’s Guide Management Access Level The AT-S80 Management Software has one management access level: manager. When you log in as a manager, you can view and configure all of the switch’s operating parameters. You log in as a manager by entering the appropriate username and password when you start an AT-S80 management session. The default username is “manager” and the default password is “friend.
Chapter 1: Overview Ports 17 and 18 on the AT-FS750/16 Switch and Ports 25 and 26 on the AT-FS750/24 Switch Ports 17 and 18 on the AT-FS750/16 switch and ports 25 and 26 on the AT-FS750/24 switch are dual ports. Each has one 10/100/1000Base-T twisted pair port and one transceiver slot for an optional SFP transceiver. Note the following when configuring these dual ports: 22 By default, the twisted pair port of a dual port is the active port.
Section I Using the Menus Interface The chapters in this section explain how to manage the switch using the menus interface of the AT-S80 management software.
Section I: Using the Menus Interface
Chapter 2 Getting Started with the Menus Interface This chapter contains instructions on how to access the menus interface of the AT-S80 Management Software by starting a local management session.
Chapter 2: Getting Started with the Menus Interface Starting a Local Management Session You establish a local management session with the switch by connecting a terminal or personal computer with a terminal emulation program to the the Console port on the front panel of the switch. Note The switch does not need an IP address when managed from a local management session. To start a local management session, perform the following procedure: 1.
AT-S80 Management Software User’s Guide The Login Menu is shown in Figure 2. ====================================================== AT-FS750/16 Management System Local - Console Allied Telesis International Corp. Copyright 2008 ====================================================== Login Menu Login: Figure 2. Login Menu 4. Enter the manager login name and press Return. The default name is “manager.” You are prompted for a password. 5. Enter the manager password. The default password is “friend.
Chapter 2: Getting Started with the Menus Interface Using the Menus Interface If you are using a DEC VT00 or ANSI (the default) terminal configuration, refer to Table 1 for instructions on how to move through the menus and select menu options. Table 1. Menus Interface Operations When directed to You must Enter your selection Type the menu option letter. Enter information (for example, entering a port number) Type the information and press Enter.
AT-S80 Management Software User’s Guide Quitting from a Local Management Session To quit from a local management session, return to the Main Menu and type Q for Quit. Always be sure to exit from a management session when you are finished. This can protect the switch from unauthorized changes to its configuration should you leave your workstation unattended. Note A local management session automatically times out if there is no management activity during a timeout period.
Chapter 2: Getting Started with the Menus Interface 30 Section I: Using the Menus Interface
Chapter 3 Basic Switch Parameters This chapter contains the following sections: Section I: Using the Menus Interface “Configuring the IP Address, Subnet Mask, and Gateway Address” on page 32 “Enabling and Disabling the DHCP Client” on page 35 “Configuring System Administration Information” on page 36 “Setting the User Interface Configuration” on page 38 “Viewing Switch Information” on page 43 “Rebooting the Switch” on page 46 “Pinging a Remote System” on page 48 “Returning
Chapter 3: Basic Switch Parameters Configuring the IP Address, Subnet Mask, and Gateway Address This procedure explains how to manually assign an IP address, subnet mask, and gateway address to the switch. Note the following before performing the procedure: The switch does not need an IP address, subnet mask, or default gateway for normal network operations.
AT-S80 Management Software User’s Guide 2. From the Basic Switch Configuration Menu, type I to select System IP Configuration. The System IP Configuration Menu is shown in Figure 5. Basic Switch Configuration -> System IP Configuration Menu MAC Address: IP Address: Subnet Mask: Default Gateway: DHCP Mode: 00:06:5H:B2:65:84 0.0.0.0 0.0.0.0 0.0.0.
Chapter 3: Basic Switch Parameters b. Type the subnet mask for the switch and press Enter. 5. To set the switch’s gateway address, do the following: a. Type G to select Set Default Gateway. The following prompt is displayed: Enter new gateway IP address> b. Type the gateway IP address for the switch and press Enter. 6. Type Q to select Quit to previous menu and save your changes.
AT-S80 Management Software User’s Guide Enabling and Disabling the DHCP Client This procedure explains how to activate and deactivate the DHCP client on the switch. When the client is activated, the switch obtains its IP configuration from a DHCP server on your network. Note the following before performing the procedure: The switch does not need an IP address, subnet mask, or default gateway for normal network operations.
Chapter 3: Basic Switch Parameters Configuring System Administration Information This section explains how to assign a name to the switch. It also explains how to specify the location of the switch and the name of the switch’s administrator. Entering this information is optional. To set a switch’s administration information, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2.
AT-S80 Management Software User’s Guide b. Type a name for the switch (for example, Sales). The name is optional and can contain up to 50 characters. Note Allied Telesis recommends assigning a name to each switch. Names can make it easier for you to identify the various switches in your network and can also help you avoid performing a configuration procedure on the wrong switch. Note The Object ID field indicates the SNMP product ID or this switch. It is in the MIB object format.
Chapter 3: Basic Switch Parameters Setting the User Interface Configuration This procedure explains how to adjust the user interface and security features on the switch. With this procedure you can: Change the console timer, used to automatically end inactive local management sessions. Change the AT-S80 management login user name and password. Enable and disable the web server, used to manage the switch from a remote management station with a web browser.
AT-S80 Management Software User’s Guide The User Interface Configuration Menu is shown in Figure 7. Basic Switch Configuration -> User Interface Configuration Menu Console UI Idle Timeout: 5 Min. Password Protection: Enabled SNMP Agent: Enabled Web Server: Enabled Administrator List: No. Username Password ---------------1 manager ****** 3 5 7 No.
Chapter 3: Basic Switch Parameters This parameter applies to a local management session but not to a remote web management session. A web browser management session remains active so long as your web browser is open. Note If you select 0, you must always remember to properly log off from a local management session when you are finished to prevent blocking future management sessions with the switch. 4. To enable or disable the web server, do the following: a. Type W to select Enable/Disable Web Server.
AT-S80 Management Software User’s Guide d. Enter a password for the new user. You are prompted to reenter the password. The following prompt is displayed: Retype new password> e. Retype the password for the new user. 7. To delete a user name, do the following: a. Type D to select Delete Administrator. The following prompt is displayed: Enter entry number> b. Enter the number of the user name that you want to delete. After you enter it, the Administrator List is refreshed. 8.
Chapter 3: Basic Switch Parameters The following prompt is displayed: Retype new password. f. Enter the new password a second time. You must use the new login password the next time you start a local or web browser management session. g. To change both the user name and its corresponding password, type B. The following prompt is displayed: Enter new user name> h. Enter the name of the new user. The following prompt is displayed: Enter new password> i. Enter the new password.
AT-S80 Management Software User’s Guide Viewing Switch Information To view general information about the switch, perform the following procedure: 1. From the Main Menu, type G to select General Information. The General Information menu is shown in Figure 8. Main Menu -> General Information System up for: 24min(s), 36sec(s) Runtime Image: Version AT-S80 V2.0.0 [1.1.1.57] Boot Loader: Version 1.00.
Chapter 3: Basic Switch Parameters Hardware Information Section Version The hardware version number. Fixed Baud Rate The baud rate of the console port. DRAM Size The size of the DRAM, in megabytes. Flash Size The size of the flash memory, in megabytes. Administration Information Section Switch Name The name of the switch. To assign a name, refer to “Configuring System Administration Information” on page 36. Switch Location The location of the switch.
AT-S80 Management Software User’s Guide Automatic Network Features Section DHCP Mode The status of the DHCP client on the switch. For information about setting this parameter, refer to “Enabling and Disabling the DHCP Client” on page 35. 2. Press any key to return to the previous menu.
Chapter 3: Basic Switch Parameters Rebooting the Switch This procedure reboots the switch and reloads the AT-S80 management software from flash memory. You can reboot the device if you believe it is experiencing a problem. Rebooting the switch does not change any of the its parameter settings. Caution The switch does not forward network traffic during the reboot process. Some network traffic may be lost. To reboot the switch, perform the following procedure: 1.
AT-S80 Management Software User’s Guide The System Reboot Menu is shown in Figure 10. Main Menu -> System Reboot Menu Reboot Status: Reboot Type: Stop Normal ---------------------- ---------------------------Set Reboot [O]ption Start [R]eboot Process [Q]uit to previous menu Command> Figure 10. System Reboot Menu 3. From the System Reboot menu, type O to select Set Reboot Option. The following prompt is displayed: Select reboot option (F/I/N)> 4. Type N to select Normal.
Chapter 3: Basic Switch Parameters Pinging a Remote System This procedure instructs the switch to ping a node on your network. This procedure is useful in determining whether an active link exists between the switch and another network device. Note the following before performing the procedure: The switch must have an IP address and subnet mask. The device to be pinged by the switch must be a member of the Default VLAN.
AT-S80 Management Software User’s Guide 3. Type I to select Set Target IP Address. The following prompt is displayed: Enter new target IP address> 4. Type the IP address of the node the switch is to ping and press Enter. 5. Type N to select Set Number of Requests. The following prompt is displayed: Enter new number of requests> 6. Enter the number of ping requests you want the switch to perform. The range is 1 to 10. The default is 10. 7. Type T to select Set Timeout Value.
Chapter 3: Basic Switch Parameters Figure 12 shows an example of the results of a ping. Switch Tools Configuration -> Ping Execution Target IP Address: 149.35.8.33 Number of Requests: 4 Timeout Value (sec): 3 ================Result================= No. 1 20 ms No. 2 20 ms No. 3 20 ms No. 4 20 ms ----------------------- ----------------------------Set Target [I]P Address [E]xecute Ping Set [N]umber of Requests [S]top Ping Set [T]imeout Value [Q]uit to previous menu Command> Figure 12.
AT-S80 Management Software User’s Guide Returning the AT-S80 Management Software to the Factory Default Values This procedure returns all AT-S80 Management Software parameters to their default values. The default values are listed in Appendix A, ”AT-S80 Software Default Settings” on page 339. Caution This procedure reboots the switch. The device does not forward network traffic during the reboot process. Some network traffic may be lost.
Chapter 3: Basic Switch Parameters 5. Type R to select Start Reboot Process. The following prompt is displayed: Are you sure you want to reboot the system (Y/N)> 6. Type Y to start the reboot process. The switch returns its operating parameters to the default values and begins to reload the AT-S80 Management Software. This process takes approximately one minute to complete. You can not manage the device during the reboot.
Chapter 4 Port Configuration This chapter contains the procedures for viewing and adjusting the parameter settings for the ports on the switch.
Chapter 4: Port Configuration Displaying the Port Parameters To display the parameter settings for the ports on the switch, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2. From the Basic Switch Configuration Menu, type P to select Port Configuration. The Port Configuration Menu is shown in Figure 13.
AT-S80 Management Software User’s Guide Type The port type. The port type will be one of the following: 10/100BaseTX - Base ports. 1000TX - Uplink 10/100/1000Base-TX twisted pair ports. 1000BaseX - Optional fiber optic SFP module. Link The status of the link between the port and the end node connected to the port. The possible values are: Up - A link exists between the port and the end node. Down - The port has not established a link with an end node.
Chapter 4: Port Configuration Enabling and Disabling a Port This procedure allows you to enable or disable a port. A disabled port does not forward any ingress or egress packets. You may want to disable a port if a problem occurs with the node or cable connected to the port. After the problem is fixed, you can enable the port to resume normal operation. You can also disable an unused port to secure it from unauthorized connections. The default setting for a port is enabled.
AT-S80 Management Software User’s Guide Setting a Port’s Speed and Duplex Mode To change a port’s speed or duplex mode, perform the following procedure: 1. From the Main Menu, type B to select Basic Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32 2. From the Basic Switch Configuration Menu, type P to select Port Configuration. The Port Configuration Menu is shown in Figure 13 on page 54. 3. Type M to select Set Mode.
Chapter 4: Port Configuration mismatch if the end node is operating at a fixed duplex mode of full-duplex. To avoid this problem, disable Auto-Negotiation on the port and set the port’s speed and duplex mode manually when connecting an end node with a fixed duplex mode of full-duplex to a switch port. For 1000 Mbps operation on an uplink 10/100/1000Base-T twisted pair uplink port, Allied Telesis recommends using AutoNegotiation.
AT-S80 Management Software User’s Guide Changing the Flow Control Setting Flow control applies to ports operating in full-duplex mode. A switch port uses flow control to control the flow of ingress packets from its end node. A port using flow control issues a special frame, referred to as a PAUSE frame, as specified in the IEEE 802.3x standard, to stop the transmission of data from an end node. When a port needs to stop an end node from transmitting data, it issues this frame.
Chapter 4: Port Configuration 60 Section I: Using the Menus Interface
Chapter 5 Port Trunking This chapter provides information and procedures for creating a port trunk and contains the following sections: Section I: Using the Menus Interface “Port Trunking Overview” on page 62 “Creating a Port Trunk” on page 64 “Modifying a Port Trunk” on page 67 “Enabling and Disabling a Port Trunk” on page 69 61
Chapter 5: Port Trunking Port Trunking Overview Port trunking is an economical way for you to increase the bandwidth between two Ethernet switches. A port trunk is 2 to 8 ports that have been grouped together to function as one logical path. A port trunk increases the bandwidth between switches and is useful in situations where a single physical data link between switches is insufficient to handle the traffic load.
AT-S80 Management Software User’s Guide Section I: Using the Menus Interface Trunk 7 is reserved for the uplink ports 17 and 18 on the AT-FS750/16 switch and ports 25 and 26 on the AT-FS750/24 switch. You cannot add or remove ports from this trunk. To use the uplink ports as a port trunk, activate Trunk 7 as explained in “Enabling and Disabling a Port Trunk” on page 69.
Chapter 5: Port Trunking Creating a Port Trunk This procedure explains how to create a port trunk. Caution Do not connect the cables to the ports on the switches until after you have configured the trunk with the management software. Connecting the cables before configuring the software can create a loop in the network topology. A loop can cause a broadcast storm and poor network performance. To create a port trunk, perform the following procedure: 1.
AT-S80 Management Software User’s Guide The Trunk Configuration Menu is shown in Figure 15.
Chapter 5: Port Trunking The following prompt is displayed: Enable or Disable trunk group number n (E/D)> 8. Type E to enable the trunk. 9. Type Q to select Quit to previous menu and save your changes. The trunk is now operational on the switch. 10. Configure the port trunk on the other switch and connect the cables.
AT-S80 Management Software User’s Guide Modifying a Port Trunk This procedure adds and removes ports from a port trunk. Caution Disconnect the cables from the ports of the trunk before you modify the trunk. Leaving the cables connected can create a loop in the network topology. A loop can cause a broadcast storm and poor network performance. Note You cannot modify Trunk 7, which is reserved for the uplink ports.
Chapter 5: Port Trunking You can specify the ports individually separated by commas (for example, 1,2,5), as a range of ports separated by a hyphen (for example, 2-4), or both (for example, 4,6,11-14). 6. Type Q to select Quit to previous menu and save your changes. 7. Modify the port trunk on the other switch and reconnect the cables.
AT-S80 Management Software User’s Guide Enabling and Disabling a Port Trunk This procedure enables and disables a port trunk. Note the following before performing this procedure: Do not enable a port trunk until after you have configured the trunk on both switches. Do not connect the cables to the ports on the switches until after you have configured and enabled the trunk on both switches. The ports of a disabled trunk forward traffic as individual ports.
Chapter 5: Port Trunking 5. Type E to enable the trunk or D to disable it. 6. Type Q to select Quit to previous menu and save your changes.
Chapter 6 IGMP Snooping This chapter explains how to activate and configure the Internet Group Management Protocol (IGMP) snooping feature on the switch.
Chapter 6: IGMP Snooping IGMP Snooping Overview IGMP enables IPv4 routers to create lists of nodes that are members of multicast groups. (A multicast group is a group of end nodes that want to receive multicast packets from a multicast application.) The router creates a multicast membership list by periodically sending out queries to the local area networks connected to its ports. A node that wants to become a member of a multicast group responds to a query by sending a report.
AT-S80 Management Software User’s Guide Without IGMP snooping, a switch needs to flood multicast packets from all of its ports, except the port on which it received the packet. Such flooding of packets can negatively impact network performance. The AT-FS750 switches maintain a list of multicast groups through an adjustable timeout value, which controls how frequently it expects to see reports from end nodes that want to remain members of multicast groups, and by processing leave requests.
Chapter 6: IGMP Snooping Configuring IGMP Snooping The procedures in this section describe how to enable or disable IGMP snooping, set the age-out timer, and view group members. See the following procedures: Enabling or Disabling IGMP Snooping “Enabling or Disabling IGMP Snooping” on page 74 “Setting the Age-out Timer” on page 76 “Setting Group Members” on page 76 To activate or deactivate IGMP snooping on the switch, perform the following procedure: 1.
AT-S80 Management Software User’s Guide The IGMP Snooping Configuration Menu is shown in Figure 17. Advanced Switch Configuration -> IGMP Snooping Configuration Menu IGMP Snooping Status: IGMP Snooping Age-Out Timer: Disabled 280 seconds Multicast Group Address ----------------------- ------------------------------------------------------------[N}ext Page [E]nable/Disable IGMP Snooping [P]revious Page [S]et Age-Out Timer [V]iew Group Members [Q]uit to previous menu Command> Figure 17.
Chapter 6: IGMP Snooping Setting the Ageout Timer Use the following procedure to set the age-out timer. 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 16 on page 74. 2. From the Advanced Switch Configuration Menu, type I to select IGMP Snooping Configuration. The IGMP Configuration Menu is shown in Figure 17 on page 75. 3. From the SNMP Configuration Menu, type S to select Set Age-Out Timer.
AT-S80 Management Software User’s Guide The following prompt is displayed: Enter MAC Address (xx:xx:xx:xx:xx:xx)> 4. Enter a Multicast Group MAC address in the format xx:xx:xx:xx:xx. The range of the multicast MAC address is from 01:00:5E:00:01:00 to 01:00:5E:7F:FF:FF. The IGMP Configuration Menu is updated with the information. 5. Type Q to select Quit to previous menu and save your changes.
Chapter 6: IGMP Snooping 78 Section I: Using the Menus Interface
Chapter 7 Static Multicast Address This chapter explains how to assign static multicast addresses.
Chapter 7: Static Multicast Address Static Multicast Address Overview There are 4 ways to populate the database of a MAC address table: Static unicast addresses which can only be assigned to one port Static multicast addresses which can be assigned to multiple ports Broadcast addresses which are broadcast to all of the ports on a switch Dynamically learned MAC addresses If you want the MAC address table to act as a forwarding database, configure it with static multicast MAC addresses.
AT-S80 Management Software User’s Guide Creating a Static Multicast Address The procedures in this section describe how to create, delete, and modify static multicast addresses.
Chapter 7: Static Multicast Address The following prompt is displayed: Enter MAC address for multicast entry > 4. Type a multicast MAC address. Then press enter. The range of acceptable multicast MAC addresses is from 01:00:5E:00:01:00 to 01:00:5E:7F:FF:FF. The following prompt is displayed: Select group member > 5. Enter a group member in the range of 1 to 24. You can add more than one group member at a time.
AT-S80 Management Software User’s Guide You can add more than one group member at a time. You can specify the values individually (for example, 2,5,11), as a range (for example, 4-7), or both (for example, 2,5,11-15). 6. Type Q to select Quit to previous menu and save your changes. Deleting a Static Member Port To delete a group from a Group MAC address, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration.
Chapter 7: Static Multicast Address 84 Section I: Using the Menus Interface
Chapter 8 Port Mirroring This chapter provides a description of the Port Mirroring feature and contains procedures for setting up this feature. Port mirroring allows you to unobtrusively monitor the ingress and egress traffic on a port by copying the traffic to another port.
Chapter 8: Port Mirroring Port Mirroring Overview The port mirroring feature allows you to unobtrusively monitor the ingress and egress traffic on a port by copying the traffic to another port. You can connect a network analyzer to the port where the traffic is copied and monitor it without impacting performance or speed. The port whose traffic you want to mirror is called the mirrored port. The port where the traffic will be copied to is called the mirroring port.
AT-S80 Management Software User’s Guide Configuring Port Mirroring To set up port mirroring, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 16 on page 70. 2. From the Advanced Switch Configuration Menu, type M to select Port Mirroring Configuration. The Port Mirroring Menu is shown in Figure 19.
Chapter 8: Port Mirroring 7. Type E to select Enable/Disable Port Mirroring. The following prompt is displayed: Enable or Disable monitoring (E/D)> 8. Type E to enable port mirroring. You can now connect your data analyzer to the mirroring port. 9. Type Q to select Quit to previous menu and save your changes.
AT-S80 Management Software User’s Guide Enabling or Disabling Port Mirroring To enable or disable port mirroring on the switch, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type M to select Port Mirroring Configuration. The Port Mirroring Menu is shown in Figure 19 on page 87. 3. Type E to select Set Mirroring Status.
Chapter 8: Port Mirroring 90 Section I: Using the Menus Interface
Chapter 9 Dial-in User Configuration This chapter describes the Dial-in User feature and provides procedures for configuring this feature.
Chapter 9: Dial-in User Configuration Dial-in User Configuration Overview The Dial-in User Configuration feature allows you to add and delete, and modify dial-in users to the AT-FS750 switch. In addition, you must assign each dial-in user a password and a VLAN. See Chapter 10, “Virtual LANs” on page 97 for more information about VLANs and VIDs. To configure a system administrator or set user information for the switch, see Chapter 3, “Basic Switch Parameters” on page 31.
AT-S80 Management Software User’s Guide Configuring a Dial-in User The procedures in this section describe how to create, delete, and modify dial-in users. See the following procedures: Adding a Dial-in User “Adding a Dial-in User” on page 93 “Deleting a Dial-in User” on page 94 “Modifying a Dial-in User” on page 95 To add a dial-in user, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration.
Chapter 9: Dial-in User Configuration 3. Type A to select Add User. The following prompt is displayed: Enter dial-in user name > 4. Type a name of a dial-in user. Then press Enter. The following prompt is displayed: Enter dial-in user password > 5. Enter the password of the dial-in user. The following prompt is displayed: Enter dial-in user dynamic VLAN ID > 6. Assign the dial-in user to a VLAN by entering a VID. 7. Type Q to select Quit to previous menu and save your changes.
AT-S80 Management Software User’s Guide Modifying a Dial-in User To change the password or the VLAN assignment of a dial-in user, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type D to select Dial-in User Configuration. The Dial-in User Configuration Menu is shown in Figure 20 on page 93. 3. Type type M to select Modify User.
Chapter 9: Dial-in User Configuration 96 Section I: Using the Menus Interface
Chapter 10 Virtual LANs This chapter contains the procedures for creating, modifying, and deleting port-based and tagged Virtual Local Area Networks (VLANs).
Chapter 10: Virtual LANs VLAN Overview A VLAN is a group of ports on an Ethernet switch that form a logical Ethernet segment. The ports of a VLAN form an independent traffic domain where the traffic generated by the nodes of a VLAN remains within the VLAN. With VLANs, you can segment your network through the switch’s AT-S80 management software and so be able to group nodes with related functions into their own separate, logical LAN segments.
AT-S80 Management Software User’s Guide But with VLANS, you can change the LAN segment assignment of an end node connected to the switch through the switch’s AT-S80 management software. You can change the VLAN memberships through the management software without moving the workstations physically, or changing group memberships by moving cables from one switch port to another. In addition, a virtual LAN can span more than one switch.
Chapter 10: Virtual LANs Port-based VLAN Overview As explained in “VLAN Overview” on page 98, a VLAN consists of a group of ports on an Ethernet switch that form an independent traffic domain. Traffic generated by the end nodes of a VLAN remains within the VLAN and does not cross over to the end nodes of other VLANs unless there is an interconnection device, such as a router or Layer 3 switch. A port-based VLAN is a group of ports on an AT-FS750 Fast Ethernet Switch that form a logical Ethernet segment.
AT-S80 Management Software User’s Guide Tagged VLAN Overview The second type of VLAN supported by the AT-S80 management software is the tagged VLAN. VLAN membership in a tagged VLAN is determined by information within the frames that are received on a port and the VLAN configuration of each port. The VLAN information within an Ethernet frame is referred to as a tag or tagged header.
Chapter 10: Virtual LANs The IEEE 802.1Q standard describes how tagging information within a packet is used to forward or discard traffic throughout the switch. If the incoming packet has a VLAN tag that matches one of the Group IDs of which the port is a member, the packet is accepted and forwarded to the appropriate port(s) within that VLAN. If the incoming packet’s VLAN tag does not match one of the Group IDs assigned to the port, the packet is discarded.
AT-S80 Management Software User’s Guide Creating a VLAN This section contains the procedure for creating a new port-based or tagged VLAN. This procedure assigns the VLAN a name, a VID number, and the untagged and tagged member ports. After you have performed this procedure, you must configure the untagged ports of the VLAN by adjusting their PVID values to match the virtual LAN’s VID number.
Chapter 10: Virtual LANs 3. Type V to select 802.1Q VLAN. The Tagged-based VLAN Configuration Menu is shown in Figure 22.
AT-S80 Management Software User’s Guide The VLAN Creation Menu is shown in Figure 23. VLAN Management -> VLAN Creation Menu VLAN ID: VLAN Name: Port Member ---------------------------------------------------------------------Tagged: UnTagged: ------------------------- ---------------------------------Set VLAN [I]D/[I]ndex [S]elect Port Member Set VLAN [N]ame [A]pply [Q]uit to Previous Menu Command> Figure 23. VLAN Creation Menu 6. Type I to select Set VLAN ID/Index.
Chapter 10: Virtual LANs 10. Type T to indicate a tagged port or U to indicate an untagged port. 11. When the VLAN is complete, type A to select Apply and apply the VLAN settings. The Tagged-based VLAN Configuration Menu is displayed again with information about the VLAN you just created. The VLAN is now active on the switch. 12.
AT-S80 Management Software User’s Guide Configuring the PVID of Untagged Ports This procedure adjusts a port’s VID value. The PVID value determines the VLAN in which the port is an untagged member. A port can be an untagged member of only one VLAN at a time. A port is an untagged member of the VLAN whose VID value matches its PVID. The ports of a new VLAN are initially designated as tagged ports by the software. Their PVID values retain their previous settings when you assign them to a new VLAN.
Chapter 10: Virtual LANs The Port-Based VLAN Configuration Menu is shown in Figure 24. VLAN Management -> Port-Based VLAN Configuration Menu Index ------3 4 Group Name ------------Sales Marketing Group Member --------------------------3-6 7,9-11 ------------------------- ---------------------------------[N]ext Page [A]dd Member Port [C]hange VLAN Group Name [P]revious Page [D]elete Member Port [Q]uit to Previous Menu Command> Figure 24. Port-Based VLAN Configuration Menu 4.
AT-S80 Management Software User’s Guide 9. Type the name of the VLAN group. The VLAN name can contain up to 32 characters including spaces. Then press Enter. 10. Type Q to select Quit to previous menu and save your changes. Changing the PVID To change the value of a VLAN’s PVID, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2.
Chapter 10: Virtual LANs Changing Port VLAN Type To change the of ports that are assigned to a port-based VLAN on the VLAN Management Menu, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type V to select VLAN Management. The VLAN Management Menu is shown in Figure 21 on page 103. 3. Type C to select Change Port VLAN Type.
AT-S80 Management Software User’s Guide Displaying the VLANs To display a list of the port-based and tagged VLANs on the switch, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type V to select VLAN Management. The VLAN Management Menu is shown in Figure 21 on page 103. 3. Type V to select 802.1Q VLAN.
Chapter 10: Virtual LANs The Config VLAN Member Menu is shown in Figure 25. VLAN Management -> Config VLAN Member VLAN ID: 3 VLAN Name: Marketing Port Tagging ---------------------------------------------------------------------4 No 5 No 6 No 7 No 8 No 24 Yes ----------------------- -----------------------------------[N]ext Page [C]hange VLAN Name [A]dd VLAN Member [P]revious page [R]emove VLAN Member [Q]uit to Previous Menu Command> Figure 25.
AT-S80 Management Software User’s Guide Resetting a VLAN to the Default Value To delete all of the Port-based and Tagged VLANs on the switch and restore the default VLAN with a value of 1, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type V to select VLAN Management. The VLAN Management Menu is shown in Figure 21 on page 103. 3.
Chapter 10: Virtual LANs Modifying a VLAN This procedure allows you to perform the following functions: Change the name of a VLAN. Add or remove tagged ports from a VLAN. Before performing this procedure, note the following: You cannot change the VID of a VLAN. You cannot add an untagged port to a VLAN with this procedure.
AT-S80 Management Software User’s Guide 6. To change the VLAN’s name, do the following: a. Type C to select Change VLAN Name. The following prompt is displayed: Enter new VLAN name> b. Type the new name for the VLAN and press Enter. A VLAN name can be up to 32 characters and can include spaces. 7. To add a tagged port to the VLAN, do the following: a. Type A for Add Member and press Enter. The following prompt is displayed: Add member->Enter port number > b. Enter the number of the port and press Enter.
Chapter 10: Virtual LANs Deleting a VLAN There are two separate procedures for deleting a VLAN depending on whether it is a Tagged or Port-based VLAN. See the following sections. Deleting a Portbased VLAN To delete a port from a Port-based VLAN, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type V to select VLAN Management.
AT-S80 Management Software User’s Guide Deleting a Tagged VLAN To delete a Tagged VLAN, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type V to select VLAN Management. The VLAN Management Menu is shown in Figure 21 on page 103. 3. Type V to select 802.1Q VLAN.
Chapter 10: Virtual LANs 118 Section I: Using the Menus Interface
Chapter 11 Simple Network Management Protocol (SNMP) This chapter explains how to activate SNMP management on the switch and how to create, modify, and delete SNMPv1 and SNMPv2c community strings.
Chapter 11: Simple Network Management Protocol (SNMP) SNMP Overview You can manage a switch by viewing and changing the management information base (MIB) objects on the device with the Simple Network Management Program (SNMP). The AT-S80 Management Software supports SNMPv1 and SNMPv2c. To manage a switch using an SNMP application program, you must do the following: Activate SNMP management on the switch. The default setting for SNMP management is disabled.
AT-S80 Management Software User’s Guide Community String Attributes A community string has attributes for controlling who can use the string and what the string will allow a network management to do on the switch. The community string attributes are defined below: Community String Name A community string must have a name of one to eight alphanumeric characters. Spaces are allowed. Access Mode This attribute defines the permissions of a community string. There are two access modes: Read and Read/Write.
Chapter 11: Simple Network Management Protocol (SNMP) Trap receivers are the devices, typically management workstations or servers, that you want to receive the traps sent by the switch. You specify the trap receivers by their IP addresses. You assign the IP addresses to the community strings. Each community string can have up to eight trap IP addresses. It does not matter which community strings you assign your trap receivers.
AT-S80 Management Software User’s Guide Default SNMP Community Strings The AT-S80 Management Software provides two default community strings: public and private. The public string has an access mode of ReadOnly and the private string has an access mode of Read/Write. If you activate SNMP management on the switch, you should delete or disable the private community string, which is a standard community string in the industry.
Chapter 11: Simple Network Management Protocol (SNMP) Creating an SNMP Community The procedures in this section describe how to create, delete, and modify an SNMP community. See the following procedures: Adding an SNMP Community “Adding an SNMP Community” on page 124 “Deleting an SNMP Community” on page 126 “Modifying an SNMP Community” on page 127 To create an SNMP community, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration.
AT-S80 Management Software User’s Guide The SNMP Configuration Menu is shown in Figure 27. Basic Switch Configuration -> SNMP Configuration Menu [C]ommunity Configuration [H]ost Configuration [T]rap Receiver Configuration [Q]uit to previous menu Command> Figure 27. SNMP Configuration Menu 3. From the SNMP Configuration Menu, type C to select Community Configuration. The Community Configuration Menu is displayed as show in Figure 28. SNMP Configuration Menu -> Community Configuration Menu No.
Chapter 11: Simple Network Management Protocol (SNMP) 4. To add a new community, type A to select Add New Community Entry. The following prompt is displayed: Enter entry number> a. Type an available entry number from 1 through 8. The following prompt is displayed: Enter community name> b. Type the name of the new SNMP community. The following prompt is displayed: Enter community access (R/W)> c. Enter R to indicate Read-Only access and W to indicate Read-Write access. 5.
AT-S80 Management Software User’s Guide Modifying an SNMP Community Use the following procedure to modify an existing SNMP community. 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 26 on page 124. 2. From the Basic Switch Configuration Menu, type N to select SNMP Configuration. The SNMP Configuration Menu is shown in Figure 27 on page 125. 3. Type M to select Modify Community Entry.
Chapter 11: Simple Network Management Protocol (SNMP) The following prompt is displayed: Enter community name> b. Enter the new name of the SNMP community. You can enter a name of up to 20 characters in length. Special characters such as *, $, and @ are permitted. The Community Configuration Menu is updated with the new SNMP community name. c. Select B to modify both the name and access of a community. The following prompt is displayed: Enter community name> d.
AT-S80 Management Software User’s Guide Creating an SNMP Host This procedures in this section adds, removes, and modifies SNMP hosts. Adding an SNMP Host To add or remove ports from a trunk, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 26 on page 124. 2. From the Basic Switch Configuration Menu, type N to select SNMP Configuration. The SNMP Configuration Menu is shown in Figure 27 on page 125.
Chapter 11: Simple Network Management Protocol (SNMP) 4. Type A to select Add New Host Entry. The following prompt is displayed: Enter entry number> a. Enter a value between 1 and 10. Then press Enter. The following prompt is displayed: Enter IP address for host> b. Enter an IP address for an SNMP community that you previously defined in the Community Configuration menu. The IP address format must be in the xxx.xxx.xxx.xxx format. See “Creating an SNMP Community” on page 124.
AT-S80 Management Software User’s Guide The Host Configuration Menu is updated. 5. Type Q to select Quit to previous menu and save your changes. Modifying an Host Entry To modify an entry from the Host Community Menu, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 26 on page 124. 2. From the Basic Switch Configuration Menu, type N to select SNMP Configuration.
Chapter 11: Simple Network Management Protocol (SNMP) The following prompt is displayed: Enter community name> e. Enter the new community name followed by Enter. f. Select B to change both the IP address and Community. The following prompt is displayed: Enter IP address for host> g. Type the IP address for the host in the format xxx.xxx.xxx.xxx. Then press Enter. The following prompt is displayed: Enter community name> h. Enter the new community name followed by Enter. 5.
AT-S80 Management Software User’s Guide Enabling and Disabling SNMP Traps The procedures in this section describe how to enable, disable, and modify traps. See the following procedures: Enabling an SNMP Trap “Enabling an SNMP Trap” on page 133 “Deleting a Trap Receiver” on page 135 “Modifying a Trap Receiver” on page 135 To enable an SMNP trap, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration.
Chapter 11: Simple Network Management Protocol (SNMP) The Trap Receiver Configuration Menu is displayed in Figure 29. SNMP Configuration Menu -> Trap Receiver Configuration Menu Authentication Trap:Enabled No. Version IP Address Community ----------------------------------1 V1 167.114.71.1 Tech Com 2 V2c 167.114.71.2 Tech Com 3 V2c 167.114.71.
AT-S80 Management Software User’s Guide d. Enter a previously defined community name followed by Enter. See “Adding an SNMP Community” on page 124. The Trap Receiver Configuration Menu is redrawn with the new trap displayed. 5. Type Q to select Quit to previous menu and save your changes. Deleting a Trap Receiver To delete a trap receiver, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration.
Chapter 11: Simple Network Management Protocol (SNMP) The Trap Receiver Configuration Menu is displayed in Figure 29 on page 129. 4. Type M to select Modify Trap Receiver Entry. The following prompt is displayed: Enter entry number> a. Enter a trap number between 1 and 10. Then press Enter.
AT-S80 Management Software User’s Guide h. Enter a previously defined community name followed by Enter. See “Adding an SNMP Community” on page 124. i. Type A to change the trap version, IP address, and community name. Then press Enter. The following prompt is displayed: Enter trap version (1/2) > j. Type the trap version and then press Enter. Select 1 for SNMP version 1 or select 2 for SNMP version 2vc. The following prompt is displayed: Enter IP address for host > k. Enter an IP address in the xxx.
Chapter 11: Simple Network Management Protocol (SNMP) a. Enter E to enable all configured traps. Or, enter D to disable all configured traps. Note You can only enable or disable all traps. You may not enable or disable traps individually. 5. Type Q to select Quit to previous menu and save your changes.
Chapter 12 Quality of Service (QoS) This chapter contains the procedures for configuring Quality of Service (QoS).
Chapter 12: Quality of Service (QoS) QoS Overview When a port on an Ethernet switch becomes oversubscribed—its egress queues contain more packets than the port can handle in a timely manner—the port may be forced to delay the transmission of some packets, resulting in the delay of packets from reaching their destinations.
AT-S80 Management Software User’s Guide Table 2. Default Mappings of IEEE 802.1p Priority Levels to Egress Port Priority Queues AT-FS750 Switch Egress Port Priority Queue IEEE 802.1p Traffic Class 0 0 1 0 2 0 3 1 4 2 5 2 6 3 7 3 For example, a tagged packet with a priority tag of 6 is placed in the egress port’s highest priority queue of 3, while a packet with a priority tag of 1 is placed in the lowest priority queue. Note QoS is disabled by default on the switch.
Chapter 12: Quality of Service (QoS) The default setting for Quality of Service is disabled. When the feature is disabled, all tagged packets are stored in the lowest priority egress queue of a port.
AT-S80 Management Software User’s Guide Mapping CoS Priorities to Egress Queues This procedure changes the mappings of CoS priority levels to egress priority queues. The default mappings are shown in Table 2 on page 141. This is set at the switch level and applies to all ports. This procedure also enables and disables QoS. To change the mappings or to activate or deactivate QoS, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration.
Chapter 12: Quality of Service (QoS) The Traffic Class Configuration Menu is shown in Figure 32. Quality of Service Configuration -> Traffic Class Configuration Menu QoS Status: Disabled Traffic Class ------------0 1 2 3 4 5 6 7 Queue ----0 0 0 1 2 2 3 3 3: Highest 0: Lowest ----------------------- -----------------------------------Set [S]tatus Set [P]riority Queue [Q]uit to previous Page Command> Figure 32. Traffic Class Configuration Menu 4. To enable or disable QoS, do the following: a.
AT-S80 Management Software User’s Guide The following prompt is displayed: Enter queue for traffic class n > c. Enter the new egress queue number for the traffic class. The range is 0 to 3 where 0 is the lowest priority queue and 3 is the highest. You can specify only one egress queue. 6. Type Q to select Quit to previous menu and save your changes.
Chapter 12: Quality of Service (QoS) Changing the Temporary Priority Level of Untagged Traffic This procedure explains how to change the temporary priority level of untagged packets that enter a port, and so change the egress queue where the packets are stored. For example, you could assign a temporary priority value of 5 to the untagged packets received on a port so that the packets are stored in queue 2 on the egress port. The default priority level for untagged packets is 0.
AT-S80 Management Software User’s Guide The Port Priority Configuration Menu is shown in Figure 33.
Chapter 12: Quality of Service (QoS) packets received on the port are stored in queue 0 on the egress port. If this field is set to Enable, all untagged packets received on the port are stored in the egress queue specified in the table. 4. To configure a port that is not a member of a trunk, type R to select Set Traffic Class. To configure the ports of a port trunk, type T to select Set Trunk Traffic Class.
Chapter 13 Rapid Spanning Tree Protocol (RSTP) This chapter describes how to configure the Rapid Spanning Tree Protocol (RSTP) on the switch and includes the following sections: Section II: Menus Interface “RSTP Overview” on page 150 “Enabling or Disabling RSTP” on page 157 “Configuring the RSTP Bridge Settings” on page 160 “Configuring STP Compatibility” on page 162 “Configuring RSTP Port Settings” on page 163 “Displaying the RSTP Topology” on page 168 149
Chapter 13: Rapid Spanning Tree Protocol (RSTP) RSTP Overview The performance of a Ethernet network can be negatively impacted by the formation of a data loop in the network topology. A data loop exists when two or more nodes on a network can transmit data to each other over more than one data path.
AT-S80 Management Software User’s Guide You can designate which switch on your network you want as the root bridge by giving it the lowest bridge priority number. You might also consider which bridge should function as the backup root bridge in the event you need to take the primary root bridge offline, and assign that bridge the second lowest bridge identifier number. You can change the bridge priority number for the switch.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) Table 3 lists the RSTP port costs with Auto-Detect. Table 3. RSTP Auto-Detect Port Costs Port Speed Port Cost 10 Mbps 2,000,000 100 Mbps 200,000 1000 Mbps 20,000 Table 4 lists the RSTP port costs with Auto-Detect when the port is part of a port trunk. Table 4. RSTP Auto-Detect Port Trunk Costs Port Speed No.
AT-S80 Management Software User’s Guide Table 5 lists the values. The default value is 0. Table 5. Port Priority Value Increments Port Priority Port Priority 0 128 16 144 32 160 48 176 64 192 80 208 96 224 112 240 If two paths have the same port cost and the same priority, then the ports with the lowest port MAC addresses become the root ports of their respective bridges.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) There are two possible selections: Point-to-point port Edge port The default setting for the RSTP port point-to-point status is automatic. With the automatic setting, the point-to-point status is True of the port is operating in full-duplex mode. If the port is operating in half-duplex mode, then the point-to-point status is False. Figure 34 illustrates two AT-FS750/24 switches that have been connected with one data link.
AT-S80 Management Software User’s Guide AT-FS750/24 1 3 5 24-Port 10/100Mbps + 2 SFP/1000T Combo WebSmart Switch 7 9 11 13 15 17 19 21 23 SPEED LINK/ACT 1000M 100M SPEED LINK/ACT 2 POWER 4 6 8 10 12 14 16 18 20 22 24 LINK/ACT 25 26 834 Edge Port Hub 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Figure 35. Edge Port A port can be both a point-to-point and an edge port at the same time. Figure 36 illustrates a port functioning as both a point-to-point and edge port.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) compatible mode, the ports can receive either RSTP or STP BPDU packets. Rapid Spanning Tree and VLANs The spanning tree implementation in the AT-S80 Management Software is a single-instance spanning tree. The switch supports just one spanning tree. You cannot define multiple spanning trees. The single spanning tree encompasses all ports on the switch. If the ports are divided into different VLANs, the spanning tree crosses the VLAN boundaries.
AT-S80 Management Software User’s Guide Enabling or Disabling RSTP To enable or disable RSTP, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2. From the Basic Switch Configuration Menu, type S to select Rapid Spanning Tree Configuration. The Rapid Spanning Tree Configuration Menu is shown in Figure 38.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) Root Path Cost The sum of all the root port costs of all the bridges between the switch’s root port and the root bridge including the switch’s root port cost. Time Since Topology Change The time in seconds since the last topology change took place. When RSTP detects a change to the LAN’s topology or when the switch is rebooted, this parameter is reset to 0 seconds and begins incrementing until the next topology change is detected.
AT-S80 Management Software User’s Guide Bridge Forward Delay This is the time interval between generating and sending configuration messages by the bridge. 3. Type E to select Enable/Disable Global RSTP. The following prompt is displayed: Enable or Disable Global RSTP (E/D)> 4. Type E to enable RSTP or D to disable RSTP.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) Configuring the RSTP Bridge Settings To configure the RSTP bridge settings, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2. From the Basic Switch Configuration Menu, type S to select Rapid Spanning Tree Configuration. The Rapid Spanning Tree Configuration Menu is shown in Figure 38 on page 157. 3. Type P to select Set Bridge Priority.
AT-S80 Management Software User’s Guide The following prompt is displayed: Enter bridge maximum age> Indicates the length of time after which stored bridge protocol data units (BPDUs) are deleted by the bridge. All of the bridges in a bridged LAN use this aging time to test the age of stored configuration messages called bridge protocol data units (BPDUs). For example, if you use the default value 20, all bridges delete current configuration messages after 20 seconds.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) Configuring STP Compatibility Choosing an RSTP protocol version allows you to determine if the switch ports will operate in RSTP-only mode or are STP-compatible. This setting applies to all of the ports; you cannot set this on a per-port basis. To configure the STP compatibility, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2.
AT-S80 Management Software User’s Guide Configuring RSTP Port Settings This section contains the following topics: Configuring the Basic RSTP Port Settings “Configuring the Basic RSTP Port Settings,” next “Configuring the Advanced RSTP Port Settings” on page 165 To configure the basic RSTP port settings, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) 4. Type I to select Set Port Priority. The following prompt is displayed: Select port number to be changed> Port number is in range from 1 to 9, 0 to set all ports 5. Enter the number of the port you want to change, or type 0 (zero) to apply the settings to all ports on the switch.
AT-S80 Management Software User’s Guide Select port number to be changed> Port number is in range from 1 to 9, 0 to set all ports This parameter enables or disables RSTP on a specified port or a group of ports in a trunk. 11. Enter the number of the port you want to change, or type 0 (zero) to apply the settings to all ports on the switch. The following prompt is displayed: Enable or Disable STP for port n (E/D)> 12. Type E to enable or D to disable STP on the port.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) The RSTP Advanced Port Configuration menu is shown in Figure 39. Rapid Spanning Tree Configuration -> RSTP Advanced Port Configuration Port Trunk Link State Role Admin/OperEdge Admin/OperPtoP Migrat ---- ----- ---- ---------- --------- -------------------------------------1 --Down Forwarding Disabled False/False Auto/False Init. 2 --Down Forwarding Disabled False/False Auto/False Init. 3 --Down Forwarding Disabled False/False Auto/False Init.
AT-S80 Management Software User’s Guide The following prompt is displayed: Select port number to be changed> Port number is in range from 1 to 9, 0 to set all ports 8. Enter the number of the port you want to change, or type 0 (zero) to apply the settings to all ports on the switch. The following prompt is displayed: Set point-to-point for port n >(A/T/F) This parameter defines whether the port is functioning as a point-topoint port. The possible settings are Auto, True, and False.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) Displaying the RSTP Topology To display the RSTP topology, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2. From the Basic Switch Configuration Menu, type S to select Rapid Spanning Tree Configuration. The Rapid Spanning Tree Configuration Menu is shown in Figure 38 on page 157. 3.
AT-S80 Management Software User’s Guide Link Whether the link on the port is up or down. Desig. Root The designated root bridge is the switch that is directly connected to the local switch. The MAC address of the designated root bridge is displayed. In the network topology, the designated bridge is located between the local switch and the root bridge. Desig. Cost The sum of all the root port costs on all bridges, including the switch, between the switch and the root bridge. Desig.
Chapter 13: Rapid Spanning Tree Protocol (RSTP) 170 Section II: Menus Interface
Chapter 14 Bandwidth Control This chapter explains how to activate and configure the Internet Group Management Protocol (IGMP) snooping feature on the switch.
Chapter 14: Bandwidth Control Bandwidth Control Overview If the performance of your network is affected by heavy traffic, you can use bandwidth control to set the rate of various types of packets that a port receives. You can control ingress packet types, including broadcast, multicast, and DLF packets or a combination of all three types, and limit their rates. (DLF packets are unicast packets that are broadcast because of a destination address lookup failure.
AT-S80 Management Software User’s Guide Configuring Bandwidth Control The procedures in this section describe how to set bandwidth control options on the switch and on the ports.
Chapter 14: Bandwidth Control 3. From the Advanced Switch Configuration Menu, type M to select Set Ingress Mode. The following prompt is displayed: Set Bandwidth Control-> Enter port number> 4. Type a port number. Then press Enter. The following prompt is displayed for port 12: Enter Ingress Mode for port 12 (B/M) > 5. Type B to select broadcast or M to select multicast. 6. Type Q to select Quit to previous menu and save your changes.
AT-S80 Management Software User’s Guide 3. Type I to select Set Ingress. The following prompt is displayed: Set Bandwidth Control-> Enter port number> 4. Type a port number. Then press Enter. The following prompt is displayed if you select port 12: Enable or Disable Ingress Bandwidth Control for port 12 (E/D)> 5. Type E to enable ingress or D to disable ingress on a port. 6. Type Q to select Quit to previous menu and save your changes.
Chapter 14: Bandwidth Control 176 Section I: Using the Menus Interface
Chapter 15 IP Access List This chapter explains how to activate and configure the IP Access List feature on the switch.
Chapter 15: IP Access List IP Access List Overview The IP Access List feature, when enabled, restricts remote (web) access to the management software by means of a user-configured list of IP addresses. It does not restrict the management ping response activity. Note By default, the IP Access List feature is disabled.
AT-S80 Management Software User’s Guide Configuring IP Access List The procedures in this section describe how to enable or disable the IP Access List Restriction feature and how to add or remove IP addresses from the list. See the following sections: Enabling or Disabling IP Access List Restriction “Enabling or Disabling IP Access List Restriction” on page 179 “Adding or Removing IP Addresses” on page 180 To enable or disable the IP Access List feature, perform the following procedure: 1.
Chapter 15: IP Access List 3. To enable the IP Access List feature, type S to select Set IP Restriction Status. The following prompt is displayed: Enable or Disable IP Restriction (E/D) > 4. Type E to enable the IP Restriction feature or D to disable the IP Restriction feature. By default, IP Restriction feature is disabled. 5. Type Q to select Quit to previous menu and save your changes.
Chapter 16 Destination MAC Filter This chapter explains how to activate the Destination MAC filter on the switch.
Chapter 16: Destination MAC Filter Destination MAC Filtering Overview Destination MAC Filtering is a security feature that prevents AT-FS750/16 or AT-FS750/24 switches from receiving packets from a particular device which is specified by its MAC address. After you add a MAC address of a device to the list of Destination MAC Filtering, then the AT-FS750 switch drops or discards packets sent from this device.
AT-S80 Management Software User’s Guide Configuring Destination MAC Filtering The procedures in this section describe how to add or remove MAC addresses from the Destination MAC filtering addresses. See the following procedures: Setting Destination MAC Filtering “Setting Destination MAC Filtering” on page 183 “Removing Destination MAC Filtering Addresses” on page 184 To add a MAC address to the destination MAC filtering addresses on the switch, perform the following procedure: 1.
Chapter 16: Destination MAC Filter 4. Enter a MAC address in the following format: xx:xx:xx:xx:xx:xx The MAC address is displayed in the Destination MAC Filter menu. 5. Type Q to select Quit to previous menu and save your changes. Removing Destination MAC Filtering Addresses To remove a destination MAC filtering address on the switch, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2.
Chapter 17 802.1x Port-based Network Access Control This chapter contains information about and the procedure for configuring 802.1x Port-based Network Access Control. It includes the following sections: Section I: Using the Menus Interface “802.1x Port-based Network Access Control Overview” on page 186 “Guest VLANs” on page 192 “Configuring 802.
Chapter 17: 802.1x Port-based Network Access Control 802.1x Port-based Network Access Control Overview 802.1x Port-based Network Access Control (IEEE 802.1x) is used to control who can send traffic through and receive traffic from a switch port. With this feature, the switch does not allow an end node to send or receive traffic through a port until the user of the node logs on by entering a username and password.
AT-S80 Management Software User’s Guide Authentication Process Authenticator Ports Below is a brief overview of the authentication process that occurs between a supplicant, authenticator, and authentication server. For further details, refer to the IEEE 802.1x standard. Either the authenticator (that is, a switch port) or the supplicant can initiate an authentication prompt exchange.
Chapter 17: 802.1x Port-based Network Access Control server. Each client that attempts to access the network is uniquely identified by the switch using the client's MAC address. Force-unauthorized - Places the port in the unauthorized state, ignoring all attempts by the client to authenticate. This port control setting blocks all users from accessing the network through the port and is similar to disabling a port and can be used to secure a port from use.
AT-S80 Management Software User’s Guide As mentioned earlier, the switch itself does not authenticate the user names and passwords from the clients. That is the responsibility of the authentication server, which contains the RADIUS server software. Instead, a switch acts as an intermediary for the authentication server by denying access to the network by the client until the client has provided a valid username and password, which the authentication server validates.
Chapter 17: 802.1x Port-based Network Access Control Note Connecting multiple supplicants to a switch port set to the Auto setting does not conform to the IEEE 802.1x standard. This can introduce security risks and can result in undesirable switch behavior. To avoid this, Allied Telesis recommends use the Forceauthorized setting of the Port Control feature on ports that are connected to more than one end node, such as a port connected to another switch or to a hub.
AT-S80 Management Software User’s Guide Ports used to interconnect switches should be set to the port control setting of Force-authorized. This is illustrated in Figure 46. Switch A Port 22: 802.1x Port Control Setting: Force-authorized Port 6: 802.1x Port Control Setting: Force-authorized RADIUS Authentication Server Port 15: 802.1x Port Control Setting: Force-authorized Switch B Ports 1 to 12: 802.1x Port Control Setting: Auto Supplicants with 802.1x Client Software Figure 46.
Chapter 17: 802.1x Port-based Network Access Control Guest VLANs An authenticator port in the unauthorized state typically accepts and transmits only 802.1x packets while waiting to authenticate a supplicant. However, you can configure an authenticator port to be a member of a Guest VLAN when no supplicant is logged on. Any client using the port is not required to log on and has full access to the resources of the Guest VLAN. If the switch receives 802.
AT-S80 Management Software User’s Guide Configuring 802.1x Port-based Network Access Control Feature To configure 802.1x Port-based Network Access Control feature, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type X to select 802.1x Port Based Access Control Configuration.
Chapter 17: 802.1x Port-based Network Access Control 3. Type P to select Port No. The following prompt is displayed: Enter port number> 4. Enter the number of the port on the switch you want to configure. You can configure only one port at a time. The Port Based Access Control Configuration Menu is updated with the current settings of the selected port. 5. Configure the 802.1x settings for the port. A change to a parameter takes affect immediately on the port. The settings are described here: NAS ID.
AT-S80 Management Software User’s Guide Maximum Request. Sets the maximum number of times that the switch retransmits an EAP Request packet to the client before it times out the authentication session. The default value for this parameter is 2 retransmissions. The range is 1 to 10 retransmissions. Quiet Period. Sets the number of seconds that the port remains in the quiet state following a failed authentication exchange with the client. The default value is 60 seconds. The range is 0 to 65,535 seconds.
Chapter 17: 802.1x Port-based Network Access Control 8. To select between port-base or MAC address based authentication, type M to select Auth Mode. The following prompt is displayed: Select the Port based or MAC based auth mode (P/M) > a. Select P and the menu is redrawn. b. Select M and the MAC Based Access Control Configuration Menu is displayed. Authentication Method Select an authentication method that is enabled on the switch either R (RADIUS) or L (local). 9.
AT-S80 Management Software User’s Guide Configuring MAC Based Access Control Feature To configure the MAC Based Access Control feature, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64. 2. From the Advanced Switch Configuration Menu, type X to select 802.1x Port Based Access Control Configuration. The Port Based Access Control Configuration Menu is shown in Figure 47 on page 193.
Chapter 17: 802.1x Port-based Network Access Control The MAC Based Access Control Configuration Menu is displayed. See Figure 48.
AT-S80 Management Software User’s Guide Port Control Sets the 802.1x port control setting. The possible settings are: A (Auto) - Enables 802.1x port-based authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port changes or the port receives an EAPOL-Start packet from a supplicant.
Chapter 17: 802.1x Port-based Network Access Control 8. To permit a guest VLAN ID, type G. The following prompt is displayed: Enter guest VLAN ID > a. Type a VLAN ID and then press Enter. The MAC Based Access Control Configuration Menu is updated with the new guest VLAN ID. 9. If the port control setting is Auto and you want to return the EAPOL machine state on the port to the initialized state, do the following: a. Type I to select Initialize Port.
Chapter 18 RADIUS Authentication Protocol This chapter describes how to configure the RADIUS client software on the switch. You can use the RADIUS client with 802.1x port-based network access control to control who can forward packets through the switch.
Chapter 18: RADIUS Authentication Protocol RADIUS Overview RADIUS (Remote Authentication Dial In User Services) is an authentication protocol for enhancing the security of your network. The protocol transfers the task of authenticating network access from a network device to an authentication protocol server. The AT-S80 management software comes with RADIUS client software. You can use the client software together with 802.
AT-S80 Management Software User’s Guide Configuring the RADIUS Client To configure the RADIUS client, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2. From the Basic Switch Configuration Menu, type U to select User Interface Configuration. The User Interface Configuration Menu is shown in Figure 7 on page 39. 3. Type R to select RADIUS Server Configuration.
Chapter 18: RADIUS Authentication Protocol 7. Enter the port number that you want to assign to UDP. You may only assign one port number to this parameter. The default value is 1812. 8. Type C to select Shared Secret. The following prompt is displayed: Enter secret string for server> 9. Enter the encryption key of the RADIUS server and press Enter. 10. Type Q to select Quit to previous menu and save your changes.
AT-S80 Management Software User’s Guide Displaying the RADIUS Client Settings To display the RADIUS client status and settings, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2. From the Basic Switch Configuration Menu, type U to select User Interface Configuration. The User Interface Configuration Menu is shown in Figure 7 on page 39. 3. Type R to select RADIUS Server Configuration.
Chapter 18: RADIUS Authentication Protocol 206 Section I: Using the Menus Interface
Chapter 19 Management Software Updates This chapter explains how to download a new version of the AT-S80 Management Software onto the switch. The procedure is: “Downloading a New Management Software Image Using TFTP” on page 208 Note For information on how to obtain new releases of the AT-S80 Management Software, refer to “Management Software Updates” on page 16.
Chapter 19: Management Software Updates Downloading a New Management Software Image Using TFTP Before downloading a new version of the AT-S80 management software onto the switch, note the following: Both models of the AT-FS750 Series use the same AT-S80 management software image. The current configuration of a switch is retained when a new AT-S80 software image is installed.
AT-S80 Management Software User’s Guide The Software Upgrade Menu is shown in Figure 50. Switch Tools Configuration -> Software Upgrade Menu [T]FTP Software Upgrade [Q]uit to previous menu Command> Figure 50. Software Upgrade Menu (1 of 2) 3. Type T to select TFTP Upgrade. The Software Upgrade Menu (2 of 2) is shown in Figure 51. Main Menu -> Software Upgrade Menu Image Version/Date: TFTP Server IP: Image File Name: Retry Count: AT-S80 V2.0.0 [1.1.1.57/Dec 6 2007 14:39:48 0.0.0.
Chapter 19: Management Software Updates 5. Type the IP address of the TFTP server and press Enter. 6. Type F to select Set Image File Name. The following prompt is displayed: Enter file name > 7. Enter the file name of the AT-S80 image file on the TFTP server and press Enter. 8. Type R to select Set Retry Count. The following prompt is displayed: Enter retry count > 9. Enter the number of times you want the switch to retry in the event a problem occurs during the download process. The range is 1 to 20.
Section II Using the Web Browser Interface The chapters in this section provide information and procedures for using the web browser interface of the AT-S80 Management Software.
Section II: Using the Web Browser Interface
Chapter 20 Starting a Web Browser Management Session This chapter contains the procedures for starting, using, and quitting a web browser management session on the AT-FS750/16 and AT-FS750/24 switches.
Chapter 20: Starting a Web Browser Management Session Establishing a Remote Connection to Use the Web Browser Interface To manage an AT-FS750/16 or AT-FS7950/24 switch using the web browser interface, you must assign an IP address and a subnet mask to the switch. To manually assign an IP address, refer to “Configuring the IP Address, Subnet Mask, and Gateway Address” on page 32.
AT-S80 Management Software User’s Guide The AT-S80 Management Software displays the login dialog box, shown in Figure 53. Figure 53. AT-S80 Login Dialog Box 3. Enter the AT-S80 management login user name and password. The default user name is “manager” and the password is “friend.” The login name and password are case-sensitive. To change the user name and password, refer to “Configuring System Management Information” on page 226.
Chapter 20: Starting a Web Browser Management Session The AT-S80 management software displays the home page which is called the Switch Information Page. See Figure 54. For more information about the Switch Information Page, see “Viewing System Information” on page 233. Figure 54. Home Page for the AT-FS750/24 Switch The main menu is on the sidebar of the home page.
AT-S80 Management Software User’s Guide Web Browser Tools You can use the web browser tools to move around the management pages. Selecting Back on your browser’s toolbar returns you to the previous display. You can also use the browser’s bookmark feature to save the link to the switch.
Chapter 20: Starting a Web Browser Management Session Quitting a Web Browser Management Session To exit a web browser management session, close the web browser.
Chapter 21 Basic Switch Parameters This chapter contains the following sections: “Configuring an IP Address, Subnet Mask and Gateway Address” on page 220 “Setting Up the IP Access List” on page 222 “Enabling and Disabling the DHCP Client” on page 225 “Configuring System Management Information” on page 226 “Configuring System Administration Information” on page 228 “Setting the User Interface Configuration” on page 231 “Viewing System Information” on page 233 “Rebooting a Swi
Chapter 21: Basic Switch Parameters Configuring an IP Address, Subnet Mask and Gateway Address This procedure explains how to change the IP address, subnet mask, and gateway address to the switch. Before performing the procedure, note the following: The switch needs an IP address, subnet mask, or default gateway if you plan to manage the device remotely with a web browser from a management workstation on your network.
AT-S80 Management Software User’s Guide 3. Change the IP configuration parameters by entering new information in the fields: System MAC Address This parameter displays the MAC address of the switch. You cannot change this parameter. System IP Address Enter the IP address for the switch. System Subnet Mask Enter the subnet mask for the switch. System Default Gateway Enter the default gateway’s IP address.
Chapter 21: Basic Switch Parameters Setting Up the IP Access List The procedures in this section describe how to enable or disable the IP Access List feature on the switch and how to add or remove IP addresses from the list. See the following sections: “Creating an IP Access List” on page 222 “Deleting an IP Address” on page 224 For background information regarding the IP Access List feature, see Chapter 15, “IP Access List” on page 183.
AT-S80 Management Software User’s Guide 4. Enter an IP address that you want to prevent from accessing the switch in the xxx.xxx.xxx.xxxx format next to the IP Address field. Then click Add. The IP address is added to the IP Access List Table.
Chapter 21: Basic Switch Parameters Deleting an IP Address To delete an IP address from the IP Access List, perform the following procedure: To create a list of restricted IP addresses, perform the following procedure: 1. From the book marks on the left side of the page, select System. The System folder expands. 2. From the System folder, select IP Access List. 3. Select delete next to the IP address that you want to remove. The IP address is removed from the IP Access List Table.
AT-S80 Management Software User’s Guide Enabling and Disabling the DHCP Client This procedure explains how to activate and deactivate the DHCP client on the switch. When the client is activated, the switch obtains its IP configuration, such as its IP address and subnet mask, from a DHCP server on your network.
Chapter 21: Basic Switch Parameters Configuring System Management Information This section explains how to assign a name to the switch, as well as the location of the switch and the name of the switch’s administrator. Entering this information is optional. To set a switch’s administration information, perform the following procedure: 1. From the book marks on the left side of the page, select System. The System folder expands. 2. From the System folder, select Management.
AT-S80 Management Software User’s Guide Note Allied Telesis recommends assigning a name to each switch. Names can make it easier for you to identify the various switches in your network and can also help you avoid performing a configuration procedure on the wrong switch. System Location Specifies the location of the switch. The location is optional and may contain up to 50 characters. System Contact Specifies the name of the network administrator responsible for managing the switch.
Chapter 21: Basic Switch Parameters Configuring System Administration Information This section explains how to enable password protection and create users in the web interface. See the following sections: Adding System Administration Information “Adding System Administration Information” on page 228 “Modifying Administration Information” on page 229 “Deleting Administration Information” on page 230 To set a switch’s administration information, perform the following procedure: 1.
AT-S80 Management Software User’s Guide This value appears as the Index value in the Administration table. 5. To create a user name, enter a user name in the box next to the User Name field. You can enter a value of up to 12 alphanumeric characters. 6. To add a password to the above user name, enter a password of up to 12 alphanumeric characters in the box next to the Password field. 7. To confirm the above password, retype the password in the box next to the Confirm Password field. 8.
Chapter 21: Basic Switch Parameters Deleting Administration Information To delete a user name, perform the following procedure. 1. From the book marks on the left side of the page, select System. The System folder expands. 2. From the System folder, select Administration. The Administration Page is shown in Figure 58 on page 228. 3. Select the user name that you want to delete and click delete. The user name is removed from the Administration Table. 4. Click Add to activate your changes on the switch.
AT-S80 Management Software User’s Guide Setting the User Interface Configuration This procedure explains how to adjust the user interface and security features on the switch. With this procedure you can: Change the console timer, used to automatically end inactive local management sessions. Change the AT-S80 management login user name and password. Enable and disable the web server, used to manage the switch from a remote management station with a web browser.
Chapter 21: Basic Switch Parameters 3. To configure the console idle time out parameter, do the following: a. Click the Console UI Time Out field and enter a new value. The range is 0 to 60 minutes. The default is 5 minutes. A timeout value to 0 causes the console connection to never time out. The console idle time out parameter specifies the length of time a local management session can be inactive before the management software automatically ends it.
AT-S80 Management Software User’s Guide Viewing System Information To view general information about the switch, perform the following procedure: 1. The Switch Information Page is the page that appears after you log on to the web interface. The Switch Information Page is shown in Figure 61. Figure 61. Switch Information Page The Switch Information page displays the following information: System Up For The number of days, hours, and minutes that the switch has been running since it was last rebooted.
Chapter 21: Basic Switch Parameters Boot Loader The version number and build date of the bootloader firmware. Hardware Information Section: Revision The hardware version number. DRAM Size The size of the DRAM, in megabytes. Flash Size The size of the flash memory, in megabytes. Console Baud Rate The baud rate of the console port. Administration Information Section: Switch Name The name assigned to the switch. To give the switch a name, refer to “Configuring System Management Information” on page 226.
AT-S80 Management Software User’s Guide a gateway address or “Enabling and Disabling the DHCP Client” on page 225 to activate the DHCP client. DHCP Mode The status of the DHCP client on the switch. For information about setting this parameter, refer to “Enabling and Disabling the DHCP Client” on page 225.
Chapter 21: Basic Switch Parameters Rebooting a Switch This procedure reboots the switch and reloads the AT-S80 management software from flash memory. You can reboot the device if you believe it is experiencing a problem. Rebooting the switch does not change any of its parameter settings. Caution The switch does not forward network traffic during the reboot process. Some network traffic may be lost. To reboot a switch, perform the following procedure: 1. From the Tools folder, select Reboot.
AT-S80 Management Software User’s Guide 4. Click Apply. The switch immediately begins to reload the AT-S80 management software. This process takes approximately one minute to complete. You can not manage the device during the reboot. After the reboot is finished, you can log in again if you want to continue to manage the device.
Chapter 21: Basic Switch Parameters Pinging a Remote System This procedure instructs the switch to ping a node on your network. This procedure is useful in determining whether an active link exists between the switch and another network device. Note the following before performing the procedure: The switch must have an IP address and subnet mask. The device to be pinged by the switch must be a member of the Default VLAN.
AT-S80 Management Software User’s Guide 3. Click Start. 4. To view the ping results, click Show Ping Results. A sample Ping Test Results page is shown in Figure 64. Figure 64. Ping Test Results Page 5. Click Back to Ping Test to return to the Ping Test Configuration page.
Chapter 21: Basic Switch Parameters Returning the AT-S80 Management Software to the Factory Default Values This procedure returns all AT-S80 Management Software parameters to their default values. The default values are listed in Appendix A, “AT-S80 Software Default Settings” on page 339. Caution This procedure causes the switch to reboot. The switch does not forward network traffic during the reboot process. Some network traffic may be lost.
Chapter 22 Port Configuration The section in this chapter explains how to view and change the parameter settings of the individual ports on the switch: Section II: Using the Web Browser Interface “Viewing and Configuring Ports Using the Physical Configuration Page” on page 242 241
Chapter 22: Port Configuration Viewing and Configuring Ports Using the Physical Configuration Page This procedure explains how to configure the ports on the switch using the Physical Interface Page. This page allows you to view and configure the parameter settings of all the switch ports at one time. To configure the ports, perform the following procedure: 1. From the book marks on the left side of the page, select Physical Interface. The Physical Interface Page is shown in Figure 65.
AT-S80 Management Software User’s Guide 2. Adjust the port settings as needed. Not all parameters are adjustable. The parameters are defined here: Port Index The port number. You cannot change this parameter. Trunk The trunk group number. A number in this column indicates that the port has been added to a trunk. For information about configuring a trunk, refer to Chapter 23, “Port Trunking” on page 245. Type The port type. The port type will be one of the following: 10/100BaseTX - Base ports.
Chapter 22: Port Configuration 100M/Full - 100 Mbps in full-duplex mode 10M/Full - 10 Mbps in full-duplex mode 100M/Half - 100 Mbps in half-duplex mode 10M/Half - 10 Mbps in half-duplex mode When selecting a setting, note the following: When a twisted pair port is set to Auto-Negotiation, the default setting, the end node should also be using Auto-Negotiation to prevent a duplex mode mismatch.
Chapter 23 Port Trunking This chapter contains the following procedures for working with port trunking: “Creating a Port Trunk” on page 246 “Modifying a Port Trunk” on page 248 “Enabling and Disabling a Port Trunk” on page 249 Note For background information on this feature, refer to “Port Trunking Overview” on page 62.
Chapter 23: Port Trunking Creating a Port Trunk This procedure explains how to create a port trunk. Caution Do not connect the cables to the ports on the switches until after you have configured the trunk with the management software. Connecting the cables before configuring the software can create a loop in the network topology. A loop can cause a broadcast storm and poor network performance. To create a port trunk, perform the following procedure: 1. From the Bridge folder, select Spanning Tree.
AT-S80 Management Software User’s Guide If the switch does not contain a port trunk, all of the ports on the switch are unchecked. If there is a port trunk, the ports in the trunk are checked. Note Trunk 7 is reserved for ports 17 and 18 on the AT-FS750/16 and ports 25 and 26 on the AT-FS750/24. 3. In any one of the unused Trunk ID rows, click the dialog boxes of the ports that will make up the port trunk. A check in a box indicates the port is a member of the trunk.
Chapter 23: Port Trunking Modifying a Port Trunk This procedure adds and removes ports from a port trunk. Caution Disconnect the cables from the ports of the trunk before you modify the trunk. Leaving the cables connected can create a loop in the network topology which, in turn, can cause a broadcast storm and poor network performance. Note You cannot modify Trunk 7, which is reserved for the uplink ports.
AT-S80 Management Software User’s Guide Enabling and Disabling a Port Trunk This procedure enables and disables a port trunk. Note the following before performing this procedure: Do not enable a port trunk until after you have configured the trunk on both switches. Do not connect the cables to the ports on the switches until after you have configured and enabled the trunk on both switches. The ports of a disabled trunk forward traffic as individual ports.
Chapter 23: Port Trunking 250 Section II: Using the Web Browser Interface
Chapter 24 Port Mirroring This chapter contains the procedure for setting up port mirroring. Port mirroring allows you to unobtrusively monitor the ingress and egress traffic on a port by having the traffic copied to another port. This chapter contains the following sections: “Configuring Port Mirroring” on page 252 “Disabling Port Mirroring” on page 253 Note For background information on this feature, refer to “Port Mirroring Overview” on page 86.
Chapter 24: Port Mirroring Configuring Port Mirroring To set up port mirroring, perform the following procedure: 1. From the Bridge folder, select Spanning Tree. The Spanning Tree folder expands. 2. From the Spanning Tree folder, select Mirroring. The Mirroring Page is shown in Figure 67. Figure 67. Mirroring Page 3. In the Mirroring Port field, select the port where the network analyzer is connected from the pull-down menu. 4.
AT-S80 Management Software User’s Guide Disabling Port Mirroring To disable port mirroring, perform the following procedure: 1. From the Bridge folder, select Spanning Tree. The Spanning Tree folder expands. 2. From the Spanning Tree folder, select Mirroring. The Mirroring Page is shown in Figure 67 on page 252. 3. From the Status field, select Disable from the pull-down menu. Then click Apply. Port mirroring is disabled on the switch immediately.
Chapter 24: Port Mirroring 254 Section II: Using the Web Browser Interface
Chapter 25 Static Multicast Address Table This chapter contains the following procedures for setting group MAC addresses in the web interface: “Configuring Static Multicast Address Table” on page 256 “Modifying a Static Multicast Address Table” on page 258 “Deleting a Group MAC Address” on page 259 Note For background information, refer to Chapter 7, “Static Multicast Address” on page 79.
Chapter 25: Static Multicast Address Table Configuring Static Multicast Address Table This procedure explains how to add group MAC addresses to the Static Multicast Address Table. To configure the Static Multicast Address Table, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Spanning Tree folder expands. 2. From the Spanning Tree folder, select Static Multicast. The Static Multicast Address Table Page is shown in Figure 68. Figure 68.
AT-S80 Management Software User’s Guide Figure 69.
Chapter 25: Static Multicast Address Table Modifying a Static Multicast Address Table This procedure explains how to change the group number of the Static Multicast Address Table. To modify the group number in the Static Multicast Address Table, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Spanning Tree folder expands. 2. From the Spanning Tree folder, select Static Multicast.
AT-S80 Management Software User’s Guide Deleting a Group MAC Address To delete a Group MAC Address from the Static Multicast Address Table, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Spanning Tree folder expands. 2. From the Spanning Tree folder, select Static Multicast. The Static Multicast Address Table Page is shown in Figure 68 on page 256. 3. Click delete next to the group number that you want to remove.
Chapter 25: Static Multicast Address Table 260 Section II: Using the Web Browser Interface
Chapter 26 IGMP Snooping This chapter contains the following procedures for working with IGMP Snooping in the web interface. Sections in the chapter include: “Configuring IGMP Snooping” on page 262 Note For background information, refer to “IGMP Snooping Overview” on page 72.
Chapter 26: IGMP Snooping Configuring IGMP Snooping This procedure explains how to set IGMP snooping and the IGMP Snooping age-out timer on the switch. To configure IGMP snooping, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Spanning Tree folder expands. 2. From the Spanning Tree folder, select IGMP Snooping. The IGMP Snooping Page is shown in Figure 71. Figure 71. IGMP Snooping Page 3.
AT-S80 Management Software User’s Guide Note The Multicast Group Address field contains MAC addresses of nodes that are members of multicast groups. To set a Multicast Group Address, see “Setting Group Members” on page 76. You cannot configure this field in the web interface.
Chapter 26: IGMP Snooping 264 Section II: Using the Web Browser Interface
Chapter 27 Destination MAC Address Filter This chapter contains the following procedures for setting MAC addresses in the Destination MAC Filter in the web interface: “Setting a Destination MAC Filter” on page 266 “Removing a MAC Address” on page 268 Note For background information, refer to “Destination MAC Filtering Overview” on page 182.
Chapter 27: Destination MAC Address Filter Setting a Destination MAC Filter This procedure explains how to set a Destination MAC Filter on the switch. To add a MAC address from a Destination MAC Filter list, perform the following procedure: 1. From the bookmarks on the left side of the page, select Security. The Security folder expands. 2. From the Security folder, select Destination MAC Filter. The Destination MAC Filter Page is shown in Figure 72. Figure 72. Destination MAC Filter Page 3.
AT-S80 Management Software User’s Guide The Destination MAC Filter table is updated with the new MAC address. See Figure 73 for an example. Figure 73.
Chapter 27: Destination MAC Address Filter Removing a MAC Address To remove a MAC address from a Destination MAC Filter list, perform the following procedure: 1. From the bookmarks on the left side of the page, select Security. The Security folder expands. 2. From the Security folder, select Destination MAC Filter. The Destination MAC Filter Page is shown in Figure 73 on page 267 3. To remove a device, click delete next to the MAC address you want to remove. The Destination MAC Filter table is updated.
Chapter 28 Bandwidth Control This chapter contains the following procedures for working with Bandwidth Control in the web interface. Sections in the chapter include: “Configuring Bandwidth Control” on page 270 Note For background information, refer to “Bandwidth Control Overview” on page 172.
Chapter 28: Bandwidth Control Configuring Bandwidth Control This procedure explains how to set Bandwidth Control on a port. To configure Bandwidth Control, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The options under the Bridge folder expand to include Spanning Tree. 2. From the Spanning Tree folder, select Bandwidth Control. The Bandwidth Control Page is shown in Figure 74. Figure 74.
AT-S80 Management Software User’s Guide 3. To change the status of the packet threshold for all the ports on the switch, select the pull-down menu next to the Broad/Multicast Packet Threshold field. Choose Low, Medium, and High from the pull-down menu. Then press Apply. By default, the packet threshold is set to Low. 4. To set the DLF Ingress Packet Status for all the ports on the switch, select the pull-down menu next to the DLF Ingress Packet Status field. Choose Enable or Disable. Then press Apply.
Chapter 28: Bandwidth Control 272 Section II: Using the Web Browser Interface
Chapter 29 Virtual LANs This chapter contains the procedures for creating, modifying, and deleting port-based and tagged Virtual Local Area Networks (VLANs) from a web browser management session.
Chapter 29: Virtual LANs Assigning Ports to a VLAN To assign ports to a tagged or port-based VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select VLAN Mode. The VLAN Mode Page is shown in Figure 75. Figure 75. VLAN Mode Page 4. To add ports to a Tagged or Port-Based VLAN, select the ports and then click Apply.
AT-S80 Management Software User’s Guide Creating a Tagged VLAN To create a tagged VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Tagged VLAN. The Tagged VLAN Page is shown in Figure 76 Figure 76. Tagged VLAN Page 4. To assign a VLAN ID, type in a VLAN ID in the VLAN ID field. Choose a value between 2 and 4,000. 5.
Chapter 29: Virtual LANs For an example of Tagged VLANs, see Figure 77. Figure 77.
AT-S80 Management Software User’s Guide Modifying a Tagged VLAN To modify a tagged VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Tagged VLAN. An Example of a Tagged VLAN page is shown in Figure 77 on page 276. 4. In the VLAN Action column, click modify next to the VLAN that you want to change.
Chapter 29: Virtual LANs 6. To change the name of the VLAN, type in a name in the VLAN Name field. 7. To assign ports to the VLAN, click on the port numbers labeled either Static Tagged or Static Untagged. Then click Apply.
AT-S80 Management Software User’s Guide Deleting a Tagged VLAN To delete a tagged VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Tagged VLAN. An example of the Tagged VLAN page is shown in Figure 77 on page 276. 4. In the VLAN Action column, click delete next to the VLAN that you want to delete.
Chapter 29: Virtual LANs Creating a Port-Based VLAN To create a port-based VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Port-Based VLAN. The Port-Based VLAN Page is shown in Figure 79. Figure 79. Port-Based VLAN Page 4. To assign a VLAN ID, type a VLAN ID in the VLAN ID field. You can choose a value between 2 and 4,000. 5.
AT-S80 Management Software User’s Guide Modifying a Port-Based VLAN To modify a port-based VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Port-Based VLAN. The Port-Based VLAN Page is shown in Figure 79 on page 280. 4. In the VLAN Action column, click modify next to the VLAN that you want to change.
Chapter 29: Virtual LANs 6. To change the name of the VLAN, type in a name in the VLAN Name field. 7. To assign ports to the VLAN, click on the port numbers labeled either Static Tagged or Static Untagged. Then click Apply.
AT-S80 Management Software User’s Guide Deleting a Port-Based VLAN To delete a port-based VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Port-Based VLAN. The Port-Based VLAN Page is shown in Figure 79 on page 280. 4. In the VLAN Action column, click delete next to the VLAN that you want to delete.
Chapter 29: Virtual LANs 284 Section II: Using the Web Browser Interface
Chapter 30 Simple Network Management Protocol (SNMP) This chapter contains the following procedures for working with SNMP: “Creating an SNMP Community” on page 286 “Modifying an SNMP Community” on page 287 “Deleting an SNMP Community” on page 288 “Creating a Host Table” on page 289 “Modifying a Host Table Entry” on page 290 “Deleting a Host Table Entry” on page 291 “Enabling or Disabling Traps” on page 292 “Modifying Traps” on page 293 “Deleting Traps” on page 294 Note Fo
Chapter 30: Simple Network Management Protocol (SNMP) Creating an SNMP Community This procedure explains how to create an SNMP community with the web interface. To create an SNMP community, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Community Table. The Community Table Page is shown in Figure 81. Figure 81. Community Table Page 3.
AT-S80 Management Software User’s Guide Modifying an SNMP Community Use the following procedure to modify the name and the access level of an existing SNMP community. You cannot change the Index entry. To change the name and access level of a community, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Community Table. The Community Table Page is shown in Figure 81 on page 286. 3.
Chapter 30: Simple Network Management Protocol (SNMP) Deleting an SNMP Community Use the following procedure to delete an SNMP community in the Community Table. 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Community Table. The Community Table Page is shown in Figure 81 on page 286. 3. To delete a community, select delete in the Community Table next to the community that you want to remove. The Community Table Page is updated.
AT-S80 Management Software User’s Guide Creating a Host Table Use the following procedure to create a Host Table. 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Host Table. The Host Table Page is shown in Figure 82. Figure 82. Host Table Page 3. To specify an entry number, type a value between 1 and 10 in the Entry number field. 4. Enter an IP address for an SNMP community that you previously defined in the Community Table Page.
Chapter 30: Simple Network Management Protocol (SNMP) Modifying a Host Table Entry Use the following procedure to modify the community name assignment or the IP address of an entry in the Host Table. To modify an entry in the Host Table, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Host Table. The Host Table Page is shown in Figure 82 on page 289. 3.
AT-S80 Management Software User’s Guide Deleting a Host Table Entry Use the following procedure to delete a Host Table entry. 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Host Table. The Host Table Page is shown in Figure 82 on page 289. 3. To delete an entry in the host table, click delete next to the entry in the table that you want to remove.
Chapter 30: Simple Network Management Protocol (SNMP) Enabling or Disabling Traps This procedure enables or disables traps for an SNMP community that was previously defined. For more information, see “Creating an SNMP Community” on page 286. To enable or disable a trap, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Trap Setting. The Trap Setting Page is displayed in Figure 83. Figure 83.
AT-S80 Management Software User’s Guide Modifying Traps Use this procedure to modify the IP address and the SNMP version of a trap for an SNMP community. To modify a trap, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Trap Setting. The Trap Setting Page is shown in Figure 83 on page 292. 3.
Chapter 30: Simple Network Management Protocol (SNMP) Deleting Traps Use this procedure to delete traps from an SNMP community. To delete a trap, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Trap Setting. The Trap Setting Page is shown in Figure 83 on page 292. 3. In the Trap table, click delete next to the trap you want to delete from the table. The Trap Setting Page is updated.
Chapter 31 Quality of Service (QoS) This chapter contains the procedure for configuring Quality of Service (QoS).
Chapter 31: Quality of Service (QoS) Mapping CoS Priorities to Egress Queues This procedure explains how to change the default mappings of CoS priorities to egress priority queues, as shown in Table 2 on page 141. This is set at the switch level. You cannot set this at the per-port level. This procedure also enables and disables QoS. To change the default mappings of CoS priorities to egress priority queues or to enable or disable QoS, perform the following procedure: 1.
AT-S80 Management Software User’s Guide 4. To change the egress priority queue assignment of an 802.1p priority class, click the dialog circle of the queue for the corresponding priority. For example, to direct all tagged traffic with a priority of 4 to egress queue 3 on the ports, click the dialog circle for queue 3 in the priority 4 row. 5. Click Apply. Note The switch does not alter the original priority level in tagged frames.
Chapter 31: Quality of Service (QoS) Configuring CoS As explained in “QoS Overview” on page 140, a packet received on a port is placed it into one of four priority queues on the egress port according to the switch’s mapping of 802.1p priority levels to egress priority queues. The default mappings are shown in Table 2 on page 141. You can override the mappings at the port level by assigning a new default egress queue to a port.
AT-S80 Management Software User’s Guide The Default Port VLAN & CoS Page is shown in Figure 85. Figure 85. Default Port VLAN &CoS Page The columns in the menu display the following information: Port Index Displays the port number. Trunk Displays the trunk number if the port is a member of a trunk. Traffic Class Displays the traffic class whose egress priority queue you want to change. The range is 0 to 7. You can specify only one traffic class at a time.
Chapter 31: Quality of Service (QoS) Queue Displays the number of the queue where untagged packets received on the port are stored on the egress queue. In this field, 0 is the lowest value and 3 is the highest value. Override Displays whether the priority level in ingress tagged frames is being used or not. If No, the override is deactivated and the port is using the priority levels contained within the frames to determine the egress queue.
Chapter 32 Rapid Spanning Tree Protocol (RSTP) This chapter contains the following procedures for working with the Remote Spanning Tree Protocol (RSTP): “Basic RSTP Configuration” on page 302 “Configuring RSTP Port Settings” on page 305 “Viewing the RSTP Topology” on page 309 Note For background information on RSTP, refer to “RSTP Overview” on page 150.
Chapter 32: Rapid Spanning Tree Protocol (RSTP) Basic RSTP Configuration To configure the RSTP settings, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select Spanning Tree. 3. From the Spanning Tree folder, select RSTP. The Rapid Spanning Tree Configuration Page is shown in Figure 86. Figure 86.
AT-S80 Management Software User’s Guide Protocol Version Set this field to enable to activate RSTP on the switch. This field is greyed out until you set the Global RSTP Status to enable. To activate this field click Apply. This page contains the following items of information in the middle portion of the page. You cannot change these fields. Root Port The active port on the switch that is communicating with the root bridge.
Chapter 32: Rapid Spanning Tree Protocol (RSTP) Bridge ID The MAC address of the bridge. The bridge identifier is use as a tie breaker in the selection of the root bridge when two or more bridges have the same bridge priority. You cannot change this setting. Bridge Priority The priority number for the bridge, in hexadecimal format. This number is used to determine the root bridge for RSTP. The bridge with the lowest priority number is selected as the root bridge.
AT-S80 Management Software User’s Guide Configuring RSTP Port Settings This section contains the following topics: Configuring the Basic RSTP Port Settings “Configuring the Basic RSTP Port Settings,” next “Configuring the Advanced RSTP Port Settings” on page 307 To configure the basic RSTP port settings, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select Spanning Tree.
Chapter 32: Rapid Spanning Tree Protocol (RSTP) The RSTP Basic Port Configuration Page is shown in Figure 87. Figure 87. RSTP Basic Port Configuration Page 4. In the STP Status column for the port you want to configure, select the STP status from the list, either Enable or Disable. 5. In the Priority column for the port you want to configure, type a number for the port priority. Port priority is described in “Port Priority” on page 152.
AT-S80 Management Software User’s Guide 6. In the Path Cost column for the port you want to configure, type a number for the Path Cost. Path cost is described in “Path Costs and Port Costs” on page 151. 7. Click Apply. 8. To configure all of the ports to the same settings, in the All row, configure one, two, or all of the following settings: STP Status, Priority, and Path Cost. Then click Apply.
Chapter 32: Rapid Spanning Tree Protocol (RSTP) The RSTP Advanced Port Configuration Page is shown in Figure 88. Figure 88. RSTP Advanced Port Configuration Page 4. In the Admin/OperEdge column for the port you want to configure, choose True or False to set whether or not the port will operate as an edge port. 5. In the Admin/OperPtoP column for the port you want to configure, choose a setting based on the information in Table 6 on page 167. 6.
AT-S80 Management Software User’s Guide Viewing the RSTP Topology To view the current RSTP topology, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select Spanning Tree. The Spanning Tree folder expands. 3. From the Spanning Tree folder, select Topology Info. The Designated Topology Information Page is shown in Figure 89. Figure 89.
Chapter 32: Rapid Spanning Tree Protocol (RSTP) Link Status Indicates the whether the link on the port is up or down. Designated Root Indicates the designated root bridge to which the switch’s root port is actively connected. Designated Cost Indicates the sum of all the root port costs on all bridges, including the switch, between the switch and the root bridge. Designated Bridge Indicates the an adjacent bridge to which the root port of the switch is actively connected.
Chapter 33 802.1x Port-based Network Access Control Feature This chapter contains the procedure for configuring 802.1x Port-based Network Access Control: “Configuring 802.1x Port-based Network Access Control Feature” on page 312 Note For background information, refer to “802.1x Port-based Network Access Control Overview” on page 186.
Chapter 33: 802.1x Port-based Network Access Control Feature Configuring 802.1x Port-based Network Access Control Feature To configure the 802.1x Port-based Network Access Control feature, perform the following procedure: 1. From the bookmarks on the left side of the page, click Security. The Security folder expands. 2. From the Security folder, select Port Access Control. The 802.1x Access Control Configuration Page is shown in Figure 90. Figure 90. 802.
AT-S80 Management Software User’s Guide 4. Configure the following parameters as needed. The parameters are defined here: NAS ID This parameter assigns an 802.1x identifier to the switch that applies to all ports. The NAS ID can be up to sixteen characters. Valid characters are 0 to 9, a to z, and A to Z. Spaces are allowed. Specifying an NAS ID is optional. Click Apply. Authentication Method Displays the current authentication method setting.
Chapter 33: 802.1x Port-based Network Access Control Feature Force-unauthorized - Places the port in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface. Force-authorized - Disables IEEE 802.1x port-based authentication and causes the port to transition to the authorized state without any authentication exchange required. The port transmits and receives normal traffic without 802.
AT-S80 Management Software User’s Guide 5. When you are finished configuring the parameters, click Apply at the bottom of the 802.1x Access Control Configuration Page. 6. If the port control setting is Auto and you want to return the EAPOL machine state on the port to the initialized state, select Yes for the Initialize parameter and click Apply. 7.
Chapter 33: 802.
Chapter 34 Dial-in User This chapter contains the following procedure for setting the Dial-in User feature in the web interface. “Adding a Dial-in User” on page 318 “Modifying a Dial-in User” on page 319 “Deleting a Dial-in User” on page 320 Note For background information, refer to “Dial-in User Configuration Overview” on page 92.
Chapter 34: Dial-in User Adding a Dial-in User This procedure explains how to add a Dial-in User on the switch. For each user, you must assign an user name, password, and a VLAN. To configure a Dial-in User, perform the following procedure: 1. From the bookmarks on the left side of the page, select Security. The Security folder expands. 2. From the Security folder, select Dial-in User. The Dial-in User Page is shown in Figure 91. Figure 91. Dial-in User Page 3.
AT-S80 Management Software User’s Guide Modifying a Dial-in User This procedure explains how to modify an existing Dial-in User on the switch. For each user, you may change the password and the VLAN assignment. However, you cannot change the user name. To modify a Dial-in user, perform the following procedure: 1. From the bookmarks on the left side of the page, select Security. The Security folder expands. 2. From the Security folder, select Dial-in User.
Chapter 34: Dial-in User Deleting a Dial-in User This procedure explains how to delete an existing Dial-in User on the switch. To delete a Dial-in user, perform the following procedure: 1. From the bookmarks on the left side of the page, select Security. The Security folder expands. 2. From the Security folder, select Dial-in User. The Dial-in User Page is shown in Figure 91 on page 318. 3.
Chapter 35 RADIUS Authentication Protocol This chapter explains how to configure the RADIUS client on the switch. You can use the RADIUS client with 802.1x Port-based Network Access Control feature to control who can forward packets through the switch. The chapter contains the following section: “Configuring the RADIUS Client” on page 322 Note For background information on this feature, refer to “802.1x Portbased Network Access Control Overview” on page 186 and “RADIUS Overview” on page 202.
Chapter 35: RADIUS Authentication Protocol Configuring the RADIUS Client To configure the RADIUS client, perform the following procedure: 1. From the book marks on the left side of the page, select Security. The Security folder expands. 2. From the Security folder, select RADIUS. The RADIUS Page is shown in Figure 92. Figure 92. RADIUS Page 3. To enter the RADIUS server’s IP address, enter the address in the Server IP Address field in the xxx.xxx.xxx.xxx format. 4.
Chapter 36 Management Software Updates The procedures in this chapter explain how to download a new version of the AT-S80 Management Software update onto the switch. The procedures are: “Upgrading a Firmware Image With TFTP” on page 324 “Upgrading a Firmware Image With HTTP” on page 326 Note For information on how to obtain new releases of the AT-S80 Management Software, refer to “Management Software Updates” on page 16.
Chapter 36: Management Software Updates Upgrading a Firmware Image With TFTP Before downloading a new version of the AT-S80 Management Software onto the switch using TFTP, note the following: Both models of the AT-FS750 switch use the same AT-S80 software image. The current configuration of a switch is retained when a new AT-S80 software image is installed.
AT-S80 Management Software User’s Guide The Firmware Upgrade via TFTP Page is shown in Figure 93. Figure 93. Firmware Upgrade via TFTP Page 4. Change the following parameters as necessary: Image/Version Date Displays the current version and date of software installed on the switch. This field cannot be changed. Download Server IP The IP address of the TFTP server from which you are downloading the new software. Download File Name The name of the AT-S80 file you are downloading.
Chapter 36: Management Software Updates Upgrading a Firmware Image With HTTP Before downloading a new version of the AT-S80 Management Software onto the switch with HTTP, note the following: The current configuration of a switch is retained when a new AT-S80 software image is installed. To return a switch to its default configuration values, refer to “AT-S80 Software Default Settings” on page 339. Assign an IP address and subnet mask to the switch that you are downloading the new image file to.
AT-S80 Management Software User’s Guide The Firmware Upgrade via HTTP Page is shown in Figure 94. Figure 94. Firmware Upgrade via HTTP Page 4. Change the following parameters as necessary: Image/Version Date Displays the current version and date of software installed on the switch. This field cannot be changed. Firmware File: Enter the path of the firmware file or click the Browse button and select the filename. 5. Click Apply. The software immediately begins to download onto the switch.
Chapter 36: Management Software Updates 328 Section II: Using the Web Browser Interface
Chapter 37 Statistics This chapter provides procedures to display traffic, error, and history statistics.
Chapter 37: Statistics Displaying Switch Statistics Statistics provide important information for troubleshooting switch problems at the port level. The AT-S80 Management Software provides a versatile set of statistical charts that you can customize for your needs, including (depending upon the chart) the ports whose statistics you want to view and the color to use in drawing the statistics in the chart.
AT-S80 Management Software User’s Guide The Traffic Comparison Chart Page opens as shown in Figure 95. Figure 95. Traffic Comparison Chart Page 3. To view traffic statistics, click on the arrow next to “Statistics” and select one of the options in Table 7. Table 7 Traffic Comparison Options Option Definition Inbound Octet Rate (Bytes/s) Measures the rate of inbound octet bits in bytes per second. Inbound Unicast Packet Rate (Pkts/s) Measures the rate of inbound unicast packets in packets per second.
Chapter 37: Statistics Table 7 Traffic Comparison Options (Continued) Option Definition Inbound Discard Rate (Pkts/s) Measures the rate of inbound discarded packets in packets per second. Inbound Error Rate (Pkts/s) Measures the number of inbound errors in packets per second. Outbound Octet Rate (Bytes/s) Measures the number of outbound octet bits in bytes per second. Outbound Unicast Packet Rate (Pkts/s) Measures the number of outbound unicast packets in packets per second.
AT-S80 Management Software User’s Guide Table 7 Traffic Comparison Options (Continued) Option Definition Outbound Non-unicast Packets (Pkts) Measures the number of outbound non-unicast (such as broadcast and multicast packets) packets. Outbound Discards (Pkts) Measures the number of outbound discarded packets. Outbound Errors (Pkts/s) Measures the number of outbound error packets. Ethernet Undersize Packets (Pkts) Measures the number of undersized Ethernet packets.
Chapter 37: Statistics – Light Yellow – Light Gray 6. To create the traffic comparison graph, select Draw.
AT-S80 Management Software User’s Guide Displaying Error Group Statistics To display error group statistics for a port, perform the following procedure: 1. From the book marks on the left side of the page, select the Statistics Chart folder. The Statistics Chart folder expands. 2. From the Statistics Chart folder, select Error Group. The Error Group Chart Page is displayed in Table 96. Figure 96. Error Group Chart Page 3. Select a port number from the pull down menu next to Port. 4.
Chapter 37: Statistics – 15 seconds – 30 seconds 5. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: – Green (This is the default.) – Blue – Red – Purple – Yellow – Orange – Gray – Light Red – Light Blue – Light Green – Light Yellow – Light Gray 6. To create the Error Group Chart, select Draw.
AT-S80 Management Software User’s Guide Displaying Historical Status Charts To display historical status charts statistics for a port, perform the following procedure: 1. From the book marks on the left side of the page, select the Statistics Chart folder. The Statistics Chart folder expands. 2. From the Statistics Chart folder, select Historical Status. The Historical Status Chart Page is displayed in Table 97. Figure 97.
Chapter 37: Statistics 3. To select the amount of time before the screen is refreshed, click Auto Refresh. Choose from the following options: – 5 seconds – 10 seconds – 15 seconds – 30 seconds 4. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: – Green (This is the default.) – Blue – Red – Purple – Yellow – Orange – Gray – Light Red – Light Blue – Light Green – Light Yellow – Light Gray 5.
Appendix A AT-S80 Software Default Settings Table 8 lists the factory default settings for the management software. Table 8. AT-S80 Management Software Default Settings Parameter Default Setting IP Configuration IP Address 0.0.0.0 Subnet Mask 0.0.0.0 Default Gateway Address 0.0.0.
Appendix A: AT-S80 Software Default Settings Table 8.
AT-S80 Management Software User’s Guide Table 8. AT-S80 Management Software Default Settings (Continued) Parameter Default Setting IP Access List IP Restriction Disabled 802.
Appendix A: AT-S80 Software Default Settings 342
Index Numerics F 802.
Index port duplex mode, configuring 57, 242 port mirroring configuring 87, 252 described 86 disabling 89, 253 port priority, described 152 port speed, configuring 57, 242 port statistics error group statistics 335 historical status charts 337 traffic comparison 330 port statistics, displaying 330, 335, 337 port status, enabling or disabling 56, 242 port trunk configuring 64, 93, 124 creating 246 description 62 disabling 69, 249 enabling 69, 249 guidelines 62 modifying 67, 248 port VLAN identifier (PVID) co
AT-S80 Management Software User’s Guide deleting 117 displaying 111 modifying 114 overview 98 port-based, defined 100 tagged, defined 101 VLAN ID, described 100 VLAN name, described 100 W web browser management session explained 19 quitting 218 starting 214 web browser tools 217 web server, configuring 38, 231 345
Index 346