Page 2
Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of such damages.
Contents List of Figures ..............................9 List of Tables ..............................13 Preface ................................15 Where to Find Web-based Product Information..................16 Contacting Allied Telesis..........................17 Online Support............................. 17 Email and Telephone Support ......................17 Warranty .............................. 17 Returning Products..........................17 Sales or Corporate Information ......................
Page 4
Contents SSL Settings............................... 56 Configuring SSL ........................... 56 System Log Configuration .......................... 58 Chapter 3 : Port Configuration ........................61 Overview..............................62 Display and Configure Ports........................63 Chapter 4 : Port Mirroring ..........................67 Overview..............................68 Port Mirroring Configuration ........................69 Disable Port Mirroring..........................
Page 5
AT-GS950/8 Web Interface User Guide Chapter 9 : Multiple Spanning Tree Protocol ....................131 Multiple Spanning Tree Configuration...................... 132 Head2 ..............................132 VLAN Mapping ............................135 Open MSTP VLAN Mapping Page ....................135 Create VLAN Mapping to MST Instance ................... 135 Modify MST Instance.........................
Page 6
Contents Port List ..............................195 Create Port List ..........................195 Modify Port List ..........................196 Delete Port List...........................197 Policy ................................198 Create Policy............................198 Modify Policy ............................200 Delete Policy ............................201 Policy Sequence............................203 Chapter 14 : Storm Control ..........................205 Overview..............................206 Ingress Rate Limiting .........................207 Egress Rate Limiting ..........................207 Configuration ............................208 Ingress Rate Limiting..........................210 Egress Rate Limiting ..........................212...
Page 7
AT-GS950/8 Web Interface User Guide Dial-in User - Local Authentication......................252 Overview............................252 Dial-in User Configuration ......................... 252 Destination MAC Filter ..........................255 Overview............................255 Destination MAC Filter Configuration ....................255 Delete Destination MAC Filter ......................256 Chapter 19 : LLDP ............................257 Overview ..............................
Page 8
Contents Chapter 22 : RMON .............................287 Overview..............................288 Enable and Disable RMON ........................289 Port Statistics............................290 Histories..............................291 Events...............................293 Alarms ..............................295 Chapter 23 : Network Statistics ........................299 Overview..............................300 Traffic Comparison Statistics........................301 Error Group Statistics ..........................304 Historical Status Charts ..........................306 Chapter 24 : Management Software Updates ....................309 Overview..............................310 Upgrade Firmware Image via HTTP......................311 Upgrade Firmware Image via TFTP ......................313...
List of Figures Figure 1. Entering a Switch’s IP Address in the URL Field....................20 Figure 2. Management Login Dialog Box .......................... 20 Figure 3. AT-GS950/8 Switch Information Page........................ 21 Figure 4. AT-GS950/8 Front Panel Page........................... 22 Figure 5. IP Setup Page ..............................26 Figure 6.
Page 10
Figures Figure 51. LACP Group Status Page..........................161 Figure 52. LACP Group Status Page with No Cables Connected ................... 162 Figure 53. LACP Group Status Page with Three Cables Connected ................163 Figure 54. AT-GS950/8 Port Priority Page........................164 Figure 55. CoS Page ............................... 171 Figure 56.
Page 11
AT-GS950/8 Web Interface User Guide Figure 111. Firmware Upgrade via TFTP Page....................... 313 Figure 112. Configuration Upload/Download via HTTP Page ..................315 Figure 113. File Download with HTTP ..........................316 Figure 114. Result Page ..............................317 Figure 115. Configuration Upload/Download via TFTP Page..................318 Figure 116.
The AT-S107 Management software has a web browser interface that you can access from any management workstation on your network that has a web browser application. This preface contains the following sections: “Where to Find Web-based Product Information” on page 16 “Contacting Allied Telesis” on page 17 ...
Preface Where to Find Web-based Product Information The product guides are available for all Allied Telesis products in portable document format (PDF) on our web site. Management software updates are also available. Go to www.alliedtelesis.com/support.
Select your country from the list Support displayed on the website. then select the appropriate menu tab. Warranty For hardware warranty information, refer to the Allied Telesis web site at www.alliedtelesis.com/support/warranty. Returning Products for return or repair must first be assigned a return materials authorization (RMA) number.
Chapter 1 Starting a Web Browser Session This chapter contains the procedures for starting, using, and quitting a web browser management session on the AT-GS950/8 switch. This chapter includes the following sections: “Establishing a Remote Connection to the Web Browser Interface” on ...
The AT-GS950/8 switch is shipped with a pre-assigned IP address of 192.168.1.1. After your initial login, Allied Telesis suggests that you assign a new IP address to your switch. To manually assign an IP address to the switch, refer to “Configuration of IP Address, Subnet Mask and Gateway Address”...
AT-GS950/8 Web Interface User Guide 3. Enter the AT-S107 management login user name and password. The default user name is “manager” and the default password is “friend.” The login name and password are case-sensitive. 4. Press OK. The AT-GS950/8 Switch Information page is displayed. See Figure 3. Note To change the user name and password, refer to “User Name and Password Configuration”...
Chapter 1: Starting a Web Browser Session Security LLDP Statistics Chart Tools Save Configuration 5. To see the front panel of the switch, select Front Panel from the main menu on the left side of the page. The AT-S107 Management software displays the front of the switch.
AT-GS950/8 Web Interface User Guide Web Browser Tools You can use the web browser tools to move around the management pages. Selecting Back on your browser’s toolbar returns you to the previous display. You can also use the browser’s Bookmark feature to save the link to the switch.
Chapter 2 Basic Switch Configuration This chapter provides procedures to configuring basic system parameters for the AT-GS950/8 switch and contains information for the following sections: “Configuration of IP Address, Subnet Mask and Gateway Address” on page 26 “IP Access List Configuration” on page 28 ...
Chapter 2: Basic Switch Configuration Configuration of IP Address, Subnet Mask and Gateway Address This procedure explains how to change the IP address, subnet mask, and gateway address of the switch. Before performing the procedure, note the following: A gateway address is only required if you want to remotely ...
Page 27
AT-GS950/8 Web Interface User Guide System Default Gateway - Displays the default gateway of the switch. To change the default gateway, enter a new gateway. When DHCP is enabled, you cannot change this parameter. DHCP Mode - For information about setting this parameter, refer to “DHCP Client Configuration”...
Chapter 2: Basic Switch Configuration IP Access List Configuration When the IP Access List feature is enabled, remote access to the AT-S107 management software is restricted to the IP addresses entered into the IP Access List. The procedures in this section describe how to enable or disable the IP Access List feature and how to add or remove IP addresses from the list.
Page 29
AT-GS950/8 Web Interface User Guide Note You can add up to 10 IP address to the IP Access List table.
Chapter 2: Basic Switch Configuration 5. From the IP Restriction Status field, select one of the following choices from the pull-down menu: Enable - This selection restricts the access to the AT-S107 management software to the IP addresses in the table listed under Accessible IP.
AT-GS950/8 Web Interface User Guide System Time The procedures in this section describe how to configure the system time by manually entering the time or through SNTP and how to configure the daylight savings time feature. See the following sections: “Manually Setting System Time”...
Chapter 2: Basic Switch Configuration 3. Use the pull down menu to set the Clock Mode parameter to Local time. 4. In the Local Time Settings section, set the Date Setting (YYYY:MM:DD) to the current date in the YYYY:MM:DD format. 5.
AT-GS950/8 Web Interface User Guide Setting Daylight If you want to configure the switch for daylight savings time, perform the following procedure: Savings Parameters 1. From the main menu on the left side of the page, click the System folder. The System folder expands.
Chapter 2: Basic Switch Configuration DHCP and ATI Web Discovery Tool The AT-GS950/8 Gigabit Ethernet Smart switch is managed through a web browser interface only. The factory default IP address is 192.168.1.1. The switch does not have a local console connector, which means that you cannot learn what the switch’s management IP address is on a web browser without first knowing what the address is.
AT-GS950/8 Web Interface User Guide DHCP Client Configuration This procedure explains how to activate and deactivate the DHCP client on the AT-GS950/8 switch. When the client is activated, the switch obtains its IP configuration including an IP address and subnet mask from a DHCP server on your network.
Page 36
Chapter 2: Basic Switch Configuration Note The ATI Web Discovery Tool is available for download on the AT- GS950/8 product page at alliedtelesis.com. 6. Follow the procedure to log on with the new IP address provided by the DHCP Server as described in “Establishing a Remote Connection to the Web Browser Interface”...
AT-GS950/8 Web Interface User Guide DHCP Auto Configuration If you need to automatically update the switch’s configuration files via a remote server, the DHCP Auto Configuration feature is available for this purpose via the DHCP server. Note You must enable the DHCP client so that this feature can operate with the DHCP server.
Entering this information is optional. Note Allied Telesis recommends that you assign a name to the switch. Naming each switch can help you identify the specific switch you want to manage among others. It can also help to avoid performing a configuration procedure on the wrong switch.
Page 39
AT-GS950/8 Web Interface User Guide System Name - Specifies a name for the switch, for example, Sales. The name is optional and may contain up to 15 characters. System Location - Specifies the location of the switch. The location is optional and may contain up to 30 characters. System Contact - Specifies the name of the network administrator responsible for managing the switch.
Chapter 2: Basic Switch Configuration User Name and Password Configuration Password protection is always enabled for access to the AT-S107 Management software. This section explains how to create new users names and passwords and how to modify or delete existing users for the web interface.
AT-GS950/8 Web Interface User Guide 4. To add a password that corresponds to the user name entered in step 3, enter a password of up to 12 alphanumeric characters in the box next to the Password field. The Password field is case sensitive. 5.
Chapter 2: Basic Switch Configuration Delete User Name To delete a user name that you have previously added, perform the following procedure. and Password 1. From the main menu on the left side of the page, click the System folder. The System folder expands.
AT-GS950/8 Web Interface User Guide User Interface Configuration This procedure explains how to enable and disable the user interfaces on the switch. With this procedure you can enable or disable the AT-GS950/8 SNMP Agent. For more information about SNMP, go to Chapter 20, “Simple Network Management Protocol SNMPv1 and v2c”...
Chapter 2: Basic Switch Configuration Note See Chapter 20, “Simple Network Management Protocol SNMPv1 and v2c” on page 263 and Chapter 21, “Simple Network Management Protocol SNMPv3” on page 273 to configure the remaining SNMP parameters. 4. Click Apply located under the Web Server Status Enable/Disable field.
AT-GS950/8 Web Interface User Guide System Information Display The Switch Information page is initially displayed when you first log into the AT-GS950/8 switch. It provides general information about the switch. To view this information, perform the following procedure: 1. From the main menu on the left side of the page, select Switch Info. The Switch Information Page is displayed.
Page 46
Chapter 2: Basic Switch Configuration Administration Information Section: Switch Name - This parameter displays the name assigned to the switch. To assign the switch a name, refer to “System Management Information” on page 38. Switch Location - This parameter displays the location of the switch.
AT-GS950/8 Web Interface User Guide Switch Reboot You can reboot the AT-GS950/8 switch by either pressing the front panel eco-friendly switch between 5 to 9 seconds or by using the Normal reboot function provided in the AT-S107 management software. In addition to rebooting the switch, you have the option to reset the AT-GS950/8 switch configuration parameters to the original factory default settings.
Allied Telesis has no knowledge of it. You are responsible for keeping the password in a safe place. If it is lost, Allied Telesis does not have a way to help you recover it. See “Disabling Factory Default Reset Feature” on page 51 for information about how to disable the factory default reset feature.
AT-GS950/8 Web Interface User Guide Figure 14. Factory Default Reset/Reboot Page 3. Go to the lower part of the page to the Reboot section. 4. In the Reboot Type field, select Normal from the pull-down menu. When the switch is rebooted with this selection, all configuration parameters that are saved in flash memory are loaded into the switch’s active memory.
Page 50
Chapter 2: Basic Switch Configuration To return the AT-S107 Management software to the default settings, perform the following procedure: Note See “AT-GS950/8 Default Parameters” on page 347 for the specific factory default values. 1. From the main menu on the left side of the page, select the Tools folder.
5. In the New Password field, enter a password of up to 12 characters in length. It is case-sensitive. There is not a default password for this field. Caution Since you define this password as part of the process of disabling this function, Allied Telesis has no knowledge of it. You are...
Chapter 2: Basic Switch Configuration responsible for keeping the password in a safe place. If it is lost, Allied Telesis does not have a way to help you recover it. 6. Re-enter the same password in the Confirm Password field.
AT-GS950/8 Web Interface User Guide Note If the Factory Default Reset field is already set to Enable, you do not need to continue with this procedure. 4. To enable the factory default reset feature, select Enable on the pull- down menu of the Factory Default Reset field. The Factory Default Reset/Reboot Page changes to include a Password field for entering a password.
Chapter 2: Basic Switch Configuration Pinging a Remote System This procedure instructs the AT-GS950/8 switch to ping a node on your network. This procedure is useful in determining whether an active link exists between the switch and another network device. Note The device you are pinging must be a member of the Default VLAN and within the same local area network as your switch.
AT-GS950/8 Web Interface User Guide 5. To view the ping results, click Show Ping Results. A sample Ping Test Results Page is displayed. See Figure 19. Figure 19. Ping Test Results Page The following information is displayed: Destination IP Address - Indicates the IP address of the unit that receives the ping.
Chapter 2: Basic Switch Configuration SSL Settings The AT-GS950/8 switch has a web browser server for remote management of the unit with a web browser application from management workstations on your network. By default, the server operates in a non-secure HTTP mode and can be configured to communicate in a secure HTTPS mode with SSL protocol.
Page 57
AT-GS950/8 Web Interface User Guide 4. Click Apply. The SSL setting that you have selected is now active. 5. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
Chapter 2: Basic Switch Configuration System Log Configuration The System log is designed to monitor the operation the AT-GS950/8 switch by recording the event messages it generates during normal operation. These events may provide vital information about system activity that can help in the identification and solutions of system problems.
Page 59
AT-GS950/8 Web Interface User Guide 3. From the Syslog Status field, select one of the following choices from the pull-down menu: Enable - The System log is active. Disable - The System log is inactive. 4. From the Time Stamp field, select one of the following choices from the pull-down menu: Enable - Each event message recorded in the log will have a time stamp recorded with it.
Chapter 3 Port Configuration This chapter provides a description of the physical characteristics of the ports and a procedure that explains how to view and change the port settings. This chapter includes the following sections: “Overview” on page 62 “Display and Configure Ports”...
Chapter 3: Port Configuration Overview This chapter describes how to display and modify the physical characteristics of an AT-GS950/8 switch. You can display and modify the settings of all the ports on one web page. The port characteristics that are displayed are: Trunk Group Number ...
AT-GS950/8 Web Interface User Guide Display and Configure Ports This procedure explains how to configure the ports on the AT-GS950/8 switch using the Port Configuration Page. This page allows you to view and configure the parameter settings of individual or all the switch ports at one time.
Page 64
Chapter 3: Port Configuration twisted-pair ports (1 through 6, 7R and 8R) and 100FX or 1000TX for the SFP ports (7 and 8) for copper or fiber SFP type. Link Status - This parameter indicates the status of the link between the port and the end node connected to the port.
Page 65
AT-GS950/8 Web Interface User Guide Mode -This parameter i Indicates the speed and duplex mode settings for the port. You can use this parameter to set the speed and duplex mode of a port. The possible settings are: Ignore -This parameter i Indicates that the All setting does not apply to the Mode field.
Page 66
Chapter 3: Port Configuration Ignore - This parameter indicates that the All setting does not apply to the Flow Control field. In other words, each port is set individually. Enabled - This parameter indicates that the port is permitted to use flow control.
Chapter 4 Port Mirroring This chapter describes the Port Mirroring feature and the procedure for setting up port mirroring. Port mirroring allows you to unobtrusively monitor the ingress and egress traffic on a port by having the traffic copied to another port.
Chapter 4: Port Mirroring Overview The port mirroring feature allows you to unobtrusively monitor the traffic received and transmitted on one or more ports by copying the traffic to another switch port. You can connect a data analyzer to the port where the traffic is copied and monitor the traffic on the other ports without impacting network performance or speed.
AT-GS950/8 Web Interface User Guide Port Mirroring Configuration To configure Port Mirroring, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select Mirroring. The Mirroring Page is displayed. See Figure 23. Figure 23.
Page 70
Chapter 4: Port Mirroring 7. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
AT-GS950/8 Web Interface User Guide Disable Port Mirroring To disable Port Mirroring, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select Mirroring. The Mirroring page is shown in Figure 23 on page 69. 3.
Chapter 5 Virtual LANs This chapter contains a description of Virtual Local Area Networks (VLANs) and the procedures for creating, modifying, and deleting both port-based and tagged VLANs. This chapter contains the following sections: “VLAN Overview” on page 74 “Assign Ports to a VLAN Mode”...
Chapter 5: Virtual LANs VLAN Overview A virtual LAN or VLAN is a group of ports on an Ethernet switch that form a logical Ethernet segment via the AT-S107 Management software. The ports of a VLAN form an independent traffic domain where the traffic generated by the nodes of a VLAN remains within the VLAN.
AT-GS950/8 Web Interface User Guide With VLANS, you can reconfigure the LAN segment assignment of an end node connected to the AT-GS950/8 switch’s management software. Also, you can change the VLAN memberships without moving the workstations physically or change group memberships without moving cables from one port to another.
Chapter 5: Virtual LANs Each port of a port-based VLAN can belong to as many VLANs as needed. Therefore, traffic can be forwarded to the members of the groups to which the port is assigned. For example, port 1 and port 2 are members of group 1 and ports 1 and 3 are members of group 2.
Page 77
AT-GS950/8 Web Interface User Guide VLAN Name To create a tagged VLAN, you must give it a unique name. This name can reflect the function of the network devices that are VLAN members, such as Sales, Production, and Engineering. Tagged and Untagged Ports When you specify that a port is a member of a tagged VLAN, you need to specify that it is tagged or untagged.
Page 78
Chapter 5: Virtual LANs General Rules for Creating a Tagged VLAN Here is a summary of the rules to observe when you create a tagged VLAN: Assign a unique name to each tagged VLAN. Each tagged VLAN must be assigned a unique VLAN ID. If a ...
AT-GS950/8 Web Interface User Guide Assign Ports to a VLAN Mode The procedure described in this section allows you to assign ports to tagged or a port-based VLAN. In addition, it permits you to display the current VLAN assignment of ports. However, you can assign ports to a port-based VLAN only after you have created a port-based VLAN with the procedure described in “Port-Based VLAN Configuration”...
Page 80
Chapter 5: Virtual LANs 6. If you want to restore the port assignment before saving the configuration, click Restore. Note Once the VLAN assignment has been saved by clicking first on the Apply button and then saving the configuration, the Restore button will not be active for those port assignments.
AT-GS950/8 Web Interface User Guide Tagged VLAN Configuration On a port, the tag information within a frame is examined when it is received to determine if the frame is qualified as a member of a specific tagged VLAN. If it is, it is eligible to be switched to other member ports of the same VLAN.
Chapter 5: Virtual LANs 4. To assign a VLAN ID, type a VLAN ID in the VLAN ID field. The range for this field is 2 to 4,000. You can create a maximum of 255 tagged VLANs. 5. To assign a name to the VLAN, type a unique name in the VLAN Name field.
AT-GS950/8 Web Interface User Guide 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Tagged VLAN. An example of a tagged VLAN (VLAN2) is shown in the table at the bottom of Figure 26 on page 83. Figure 26.
Page 84
Chapter 5: Virtual LANs 6. To change the VLAN Name, type a new VLAN Name in the VLAN Name field. For more information about this field, refer to “VLAN Name” on page 75.
AT-GS950/8 Web Interface User Guide 7. To change the Management VLAN assignment, select one of the following choices from the pull-down menu: Enable - This parameter enables Management VLAN on this VLAN. The Management VLAN will be disabled on all other VLANs and only be operational on this VLAN.
Page 86
Chapter 5: Virtual LANs Note You cannot delete the Default VLAN which has a VID of 1. 6. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
AT-GS950/8 Web Interface User Guide Tagged VLAN Port Settings To configure a VLAN port that is a member of a Tagged VLAN, perform the following procedure: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands.
Page 88
Chapter 5: Virtual LANs Disable - This disables Ingress Filtering at the selected port. 6. Click Apply. The port configuration becomes effective. 7. If you need to configure other ports of the switch for the VLAN Port Settings, repeat steps 4 through 7. 8.
AT-GS950/8 Web Interface User Guide Port-Based VLAN Configuration A port-based VLAN is a group of ports on the switch that form a logical Ethernet segment. This type of VLAN is independent of the header information including VLAN tags in a frame. You can create and delete Port-Based VLANs by following the procedures in the following sections: “Create a Port-Based VLAN”...
Chapter 5: Virtual LANs 7. Click Apply. 8. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes. Modify a Port- To modify the name or port assignments of a port-based VLAN, perform the following procedure: Based VLAN 1.
Page 91
AT-GS950/8 Web Interface User Guide The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands. 3. From the VLAN folder, select Port-Based VLAN. The Port-Based VLAN Page is shown in Figure 29 on page 89. 4.
Chapter 6 GVRP This chapter contains the following sections: “Overview and Guidelines” on page 94 “General Configuration” on page 95 “Port Settings” on page 96 “Time Settings” on page 98 ...
The default port setting on the switch for GVRP is active, meaning that the ports participate in GVRP. Allied Telesis recommends disabling GVRP on those ports that are connected to GVRP- inactive devices, meaning devices that do not feature GVRP.
AT-GS950/8 Web Interface User Guide General Configuration Perform the following procedure to enable or disable GVRP: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select GVRP. The GVRP folder expands.
Chapter 6: GVRP Port Settings Perform the following procedure to configure the GVRP port settings: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select GVRP. The GVRP folder expands.
Page 97
AT-GS950/8 Web Interface User Guide Disable - The Restricted VLAN Registration is de-active for the port row selected. 5. Once you have configured the parameters, click Apply for the affected port. 6. If you want to configure GVRP for other ports, repeat steps 4 and 5. 7.
Chapter 6: GVRP Time Settings Perform the following procedure to configure the GVRP port settings: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select GVRP. The GVRP folder expands.
Page 99
AT-GS950/8 Web Interface User Guide equation: GARPLeaveAllTimer > (GARPLeaveTimer + 10) Note To ensure compatibility between network devices, you need to configure the same values for the GARP Join Timer, GARP Leave Timer, and GARP Leave All Timer on all participating GVRP devices in your network.
Chapter 7 Voice VLAN This chapter contains a description of the AT-GS950/8 switch’s Voice VLAN feature and the procedures to create, modify, and delete a voice VLAN configuration. This chapter contains the following sections: “Overview” on page 102 “General Guidelines” on page 105 ...
Chapter 7: Voice VLAN Overview The AT-GS950/8 Voice VLAN feature is specifically designed to maintain high quality, uninterrupted voice traffic through the switch. When talking on a voice over IP phone, a user expects to have no interruptions in the conversation and excellent voice quality.
AT-GS950/8 Web Interface User Guide When you are configuring the voice VLAN parameters, you must enter the complete MAC address of at least one of your IP phones. An “OUI Mask” is automatically generated and applied by the AT-S107 management software to yield the manufacturer’s OUI.
Page 104
Chapter 7: Voice VLAN One or more ports in your voice VLAN must be configured as Static tagged or untagged members. Static VLAN members are permanent member ports of the voice VLAN and there is no dependency on the configuration of the devices connected to the ports. These ports might be connected to other voice VLAN network nodes such as other Ethernet switches, a telephone switch, and/or a DHCP server.
AT-GS950/8 Web Interface User Guide General Guidelines Here is a summary of the rules to observe when you create a voice VLAN: One voice VLAN can be configured on the switch at any time. A voice VLAN is based on a pre-defined tagged VLAN. ...
Chapter 7: Voice VLAN Configuration Prior to configuring your voice VLAN, you must first configure a tagged VLAN. This VLAN will be used as a basis for your voice VLAN. Note See “Create a Tagged VLAN” on page 81 for more information about configuring a tagged VLAN with Not Member and Static tagged ports.
Page 107
AT-GS950/8 Web Interface User Guide 4. From the Voice VLAN field at the top of the page, select one of the following choices from the pull-down menu: Enable - The voice VLAN feature is active. The other parameter fields in the voice VLAN Global Settings section become active and are eligible for data to be entered.
Page 108
Chapter 7: Voice VLAN Note The voice VLAN Auto-Detection feature can only be enabled on “Not Member” ports of the voice VLAN. Member ports cannot have the voice VLAN Auto-Detection feature enabled. The Status column displays Static for the member ports. See “Dynamic Auto-Detection vs Static Ports”...
AT-GS950/8 Web Interface User Guide OUI Setting You can create and delete Voice VLAN OUI Settings by following the procedures in these sections: “Create OUI Setting” “Modify OUI Setting” on page 110 Create OUI To create a Voice OUI configuration, perform the following procedure: Setting 1.
Chapter 7: Voice VLAN Modify OUI To modify or delete an OUI, it must be first be deleted and then re-entered by following the procedure in “Create OUI Setting” on page 109. Setting Delete OUI To delete an OUI, perform the following procedure: Setting 1.
Chapter 8 STP and RSTP This chapter provides background information about the Spanning Tree Protocol (STP) and the Rapid Spanning Tree Protocol (RSTP). In addition, there are procedures to configure STP and RSTP. The sections in the chapter include: “Overview” on page 112 ...
Chapter 8: STP and RSTP Overview The performance of a Ethernet network can be negatively impacted by the formation of a data loop in the network topology. A data loop exists when two or more nodes on a network can transmit data to each other over more than one data path.
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide Bridge Priority The first task that bridges perform when a spanning tree protocol is activated on a network is the selection of a root bridge. A root bridge and the Root distributes network topology information to the other network bridges and Bridge is used by the other bridges to determine if there are redundant paths in...
Chapter 8: STP and RSTP Path Costs and Port Costs After the root bridge has been selected, the bridges determine if the network contains redundant paths and, if one is found, select a preferred path while placing the redundant paths in a backup or blocking state. Where there is only one path between a bridge and the root bridge, the bridge is referred to as the designated bridge and the port through which the bridge is communicating with the root bridge is referred to as the root...
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide Table 2. Valid Port Priority Values Port Step Priority Forwarding If there is a change in the network topology due to a failure, removal, or addition of any active components, the active topology also changes. This Delay and may trigger a change in the state of some blocked ports.
Page 116
Chapter 8: STP and RSTP The forwarding delay value is adjustable in the AT-S107 Management software. The appropriate value for this parameter depends on a number of variables; the size of your network is a primary factor. For large networks, you should specify a value large enough to allow the root bridge sufficient time to propagate a topology change throughout the entire network.
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide Figure 36. Point-to-Point Ports A port operates as an edge port when it is connected to a network terminal device such as a workstation or a server. An edge port on a bridge should not have any STP or RSTP devices connected to it either directly or through another device connected to that port.
RSTP Networks network can operate together to create a single spanning tree domain. If you decide to activate spanning tree on the switch, Allied Telesis recommends RSTP instead of STP even when all of other switches in the network are running STP. The AT-GS950/8 switch can combine RSTP with the STP of the other switches.
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide Figure 38. STP and VLAN Fragmentation with Untagged Ports You can avoid this problem by connecting the switches using tagged instead of untagged ports when you plan to have STP or RSTP enabled on your network.
Chapter 8: STP and RSTP Figure 39. STP and VLAN Compatibility with Tagged Ports Note For information about tagged and untagged ports, refer to Chapter 5, “VLAN Overview” on page 74.
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide Basic STP and RSTP Configuration To configure the basic STP and RSTP settings, perform the following procedure: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands.
Page 122
Chapter 8: STP and RSTP The RSTP Configuration page allows you to configure basic STP (STP-Compatible) or RSTP protocols as well as to view current settings of the feature. In the upper portion of the page, you can set the following ...
Page 123
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide The following parameters refer to the designated root bridge. You cannot change these fields. Designated Root - This parameter includes two fields: the root bridge priority and the MAC address of the root bridge. For example, 1000 00C08F1211BB shows the root bridge priority as 1000, and 00C08F1211BB as the MAC address.
Chapter 8: STP and RSTP Configure RSTP Port Settings This section contains the following topics: “Configure the Basic RSTP Port Settings” “Configure the Advanced RSTP Port Settings” on page 126 Configure the To configure the basic RSTP port settings, perform the following procedure: Basic RSTP Port Settings...
Page 125
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide sent or received on a the port except for BPDU data. A port with a higher path cost to the root bridge than another on the switch will cause a switching loop and is placed in the blocking state by the Spanning Tree algorithm.
Chapter 8: STP and RSTP STP Status - Indicates if spanning tree protocol (either RSTP or STP-Compatible) is active or not on the port. Select one of the following choices from the pull-down menu: Enable - The spanning tree protocol (both RSTP or STP- Compatible) is enabled on the port.
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide Figure 42. AT-GS950/8 RSTP Advanced Port Configuration Page This page displays the following information about the ports: Port - Indicates ports 1 through 8 on the AT-GS950/8 switch. Use the All row to apply the same settings to the STP Status, Priority, and Path Cost fields to all the ports on your switch.
Page 128
Chapter 8: STP and RSTP Disabled - The Disabled Port role is assigned if the port is not operational or is excluded from the active topology by management or it is a network access port (IEEE Std 802.1X) and it is Unauthorized, or its Administrative Bridge Port state is Disabled.
AlliedWare Plus Version 2.1.2 Management Software Web Browser User’s Guide Spanning Tree Topology To view the current spanning tree topology, perform the following procedure: 1. From the main menu on the left side of the page, select Bridge. This folder expands. 2.
Chapter 9 Multiple Spanning Tree Protocol This chapter provides the procedures for configuring Multiple Spanning Tree Protocol (MSTP). You can find an overview and configuration guidelines for this feature in “MSTP Overview” on page 327. When you configure MSTP, the information should be entered in order on the following web pages: “Multiple Spanning Tree Configuration”...
Chapter 9: Multiple Spanning Tree Protocol Multiple Spanning Tree Configuration Head2 Head3 To configure the MSTP settings, perform the following procedure: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select the Spanning Tree folder. The Spanning Tree folder expands.
Page 133
AT-GS950/8 Web Interface User Guide Global MSTP Status - Set this field to Enable or Disable the MSTP feature on the switch. The Global MSTP Status must be set to Enable before the other MSTP configuration parameters can be set. Note Both RSTP and BPDU Passthrough must be disabled before you enable MSTP.
Page 134
Chapter 9: Multiple Spanning Tree Protocol bridge spends in the listening and learning states. Its range is 4 - 30 seconds. Maximum Hop Count - The Maximum Hop Count is a parameter set in a BPDU packet when it originates. It is decremented by 1 each time it is retransmitted by the next bridge.
AT-GS950/8 Web Interface User Guide VLAN Mapping You can create, modify and delete MSTP settings with the procedures in the following sections: ”Open MSTP VLAN Mapping Page” ”Create VLAN Mapping to MST Instance”. “Modify MST Instance” on page 136. ...
Chapter 9: Multiple Spanning Tree Protocol Modify MST If you wish to modify a MST Instance, you must first delete the instance and then redefine it. Refer to “Create VLAN Mapping to MST Instance” on Instance page 135 for more information. Delete MST 1.
AT-GS950/8 Web Interface User Guide Port Configuration To configure the MSTP parameters for each of the ports, perform the following procedure: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select the Spanning Tree folder. The Spanning Tree folder expands.
Page 138
Chapter 9: Multiple Spanning Tree Protocol network topology. ForcedFalse - The port is not connected to a network device in the network topology. Auto - The switch will automatically determine the port type. Edge Port - Indicates if a port is connected to an edge device in the network topology or not.
Page 139
AT-GS950/8 Web Interface User Guide True - The port cannot process receive/transmit TCN BPDUs. False - The port can process receive/transmit TCN BPDU packets. 5. Once you have configured the parameters, click Apply in the Action column. 6. If you choose to change the MSTP port configuration for other ports, repeat steps 4 and 5.
Chapter 9: Multiple Spanning Tree Protocol Port Settings To configure the MSTP port settings, perform the following procedure: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select the Spanning Tree folder. The Spanning Tree folder expands.
Page 141
AT-GS950/8 Web Interface User Guide 6. If you choose to change the MSTP port settings for other ports, repeat steps 4 and 5. 7. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
Chapter 9: Multiple Spanning Tree Protocol Topology Information To configure the MSTP port settings, perform the following procedure: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select the Spanning Tree folder. The Spanning Tree folder expands.
Page 143
AT-GS950/8 Web Interface User Guide Regional Root Priority - The priority of the regional root port. Regional Path Cost - The path cost from the regional root port to the regional root bridge. Type - This specifies the regional port type which can be either a point-to-point or an edge type port.
Page 144
Chapter 9: Multiple Spanning Tree Protocol...
Chapter 10 Static Port Trunking This chapter contains a description of port trunking and the procedures for creating, modifying, and deleting a static port trunk. The following topics are discussed: “Overview” on page 146 “Create a Port Trunk” on page 149 ...
Chapter 10: Static Port Trunking Overview A port trunk is an economical way for you to increase the bandwidth between the Ethernet switch and another networking device, such as a network server, router, workstation, or another Ethernet switch. A port trunk is a group of ports that have been grouped together to function as one logical path.
Page 147
General Guidelines Following are the guidelines for creating a static trunk: Allied Telesis recommends setting static port trunks between Allied Telesis networking devices to ensure compatibility. A static trunk can contain up to eight ports.
Page 148
Chapter 10: Static Port Trunking more than one VLAN. The ports of a static trunk can be either untagged or untagged members of the same VLAN. The switch selects a port in the trunk to handle broadcast packets and packets of unknown destination.
AT-GS950/8 Web Interface User Guide Create a Port Trunk This procedure explains how to create a static port trunk. Caution Do not connect the cables of a port trunk to the ports on the switch until you have configured the ports on both the switch and the end nodes.
Page 150
Chapter 10: Static Port Trunking A check in a box indicates the port is a member of the trunk. No check means the port is not a member. A port trunk can contain up to eight ports. 5. Change the Trunk Status from Disable to another setting. The choice in the status field are the following: Active - The specific aggregator will broadcast and respond to LACPDU (LACP Data Unit) packets.
AT-GS950/8 Web Interface User Guide Modify a Port Trunk This procedure explains how to change the status of a port trunk and add or remove ports from a port trunk. Caution Before you disable or modify a port trunk, disconnect all of the cables from the ports of the trunk.
Page 152
Chapter 10: Static Port Trunking 9. Configure the port trunk on the other switch with the same parameters. 10. Connect the Ethernet cables between trunk ports on the AT-GS950/8 switch and the trunk ports on the other switch.
AT-GS950/8 Web Interface User Guide Disable a Port Trunk This procedure explains how to disable a port trunk. Caution Before you disable or modify a port trunk, disconnect all of the cables from the ports of the trunk. Leaving the cables connected during the reconfiguration of a trunk can create loops in your network topology.
AT-GS950/8 Web Interface User Guide Chapter 11 LACP Port Trunks This chapter contains overview information about LACP port trunks and the procedures for setting this feature. This chapter contains the following sections: “System Priority” on page 157 “Port Priority Value” on page 157 ...
802.3ad standard, making it interoperable with equipment from other vendors that also comply with the standard. Therefore, you can create an LACP trunk between an Allied Telesis device and network devices from other manufacturers. Another advantage is that ports in an LACP trunk can function in a standby mode.
AT-GS950/8 Web Interface User Guide System Priority It is possible for two devices interconnected by an aggregate trunk to encounter a conflict when they form the trunk. For example, the two devices might not support the same number of active ports in an aggregate trunk or might not agree on which ports are active and which are in standby mode.
Page 158
Chapter 11: LACP Port Trunks Two conditions must be met for a port in an aggregate trunk to function in the standby mode. First, the number of ports in the trunk must exceed the highest allowed number of active ports and, second, the port must be receiving LACPDU packets from the other device.
The port with the highest priority in an aggregate trunk carries broadcast packets and packets with an unknown destination. Prior to creating an aggregate trunk between an Allied Telesis device and another vendor’s device, refer to the vendor’s documentation to determine the maximum number of active ports the device can support in a trunk.
Page 160
Chapter 11: LACP Port Trunks the maximum number for the AT-GS950/8 switch, you should assign the other vendor’s device a higher system LACP priority than your AT-GS950/8 switch. This can help avoid a conflict between the devices if some ports are placed in the standby mode when the devices create the trunk.
AT-GS950/8 Web Interface User Guide Group Status To display the LACP Group Status, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select the Trunk Config folder. The Trunk Config folder expands. 3.
Chapter 11: LACP Port Trunks The System Priority is a preassigned value that you cannot alter. This value applies to the switch. See “System Priority” on page 157. The System ID is a MAC address value assigned to the individual switch.
AT-GS950/8 Web Interface User Guide Figure 53. LACP Group Status Page with Three Cables Connected You can now see that each port has been grouped under a single aggregator since the ports are now in a Link-Up status.
Chapter 11: LACP Port Trunks Port Priority Configuration To select a priority for an LACP port, perform the following procedure: 1. Select the Bridge folder. The Bridge folder expands. 2. From the Bridge folder, select the Trunk Config folder. The Trunk Config folder expands. 3.
Chapter 12 Quality of Service (CoS) This chapter contains the following topics: “Overview” on page 166 “Associate Ports to CoS Priorities” on page 173 “Associate DSCP Classes to Egress Queues” on page 174 “Queue Scheduling Algorithm” on page 175 ...
Chapter 12: Quality of Service (CoS) Overview When a port on an Ethernet switch becomes oversubscribed, its egress queues contain more packets than the port can handle in a timely manner. In this situation, the port may be forced to delay the transmission of some packets, resulting in the delay of packets reaching their destinations.
AT-GS950/8 Web Interface User Guide Egress Queue vs Each switch port has four egress queues, labeled Q0, Q1, Q2, and Q3. Q0 is the lowest priority queue and Q3 is the highest. A packet in a high Packet Priority priority egress queue is typically transmitted sooner than a packet in a low Mapping priority queue.Table 3 lists the default mappings between the eight CoS priority levels and the four egress queues of a switch port.
Chapter 12: Quality of Service (CoS) The procedure for changing the default mappings is found in “Associate Ports to CoS Priorities” on page 173. Note that because all ports must use the same priority-to-egress queue mappings, these mappings are applied at the switch level.
Page 169
AT-GS950/8 Web Interface User Guide have time to process the packets waiting in the lower priority queues.
Chapter 12: Quality of Service (CoS) Weighted Round Robin Priority Scheduling The weighted round robin (WRR) scheduling method functions as its name implies. The port transmits a set number of packets from each queue, in a round robin fashion, so that each has a chance to transmit traffic.Normally, the higher the queue’s priority the more packets are transmitted in as the algorithm cycles through the queues in turn.
AT-GS950/8 Web Interface User Guide Mapping CoS Priorities to Egress Queues Before mapping the CoS priorities and the egress queues, you must disable the Jumbo frame parameter on each port. See the Jumbo parameter definition in “Display and Configure Ports” on page 63. Note When Jumbo frames are enabled, COS can not be enabled.
Page 172
Chapter 12: Quality of Service (CoS) 4. For each Traffic Class whose queue you want to change, click on the Queue (0, 1, 2, or 3) radio button that applies to your configuration. 5. After you have completed this mapping process, select Enable in the QoS Status field, 6.
AT-GS950/8 Web Interface User Guide Associate Ports to CoS Priorities The Port Priority values is assigned to an untagged frame at ingress for internal processing in the switch. This procedure explains how to change the default mappings of port priorities to the User Priority. This is set at the switch level.
Chapter 12: Quality of Service (CoS) Associate DSCP Classes to Egress Queues If you choose to use the DSCP tags in your Access Control policy configuration, each DSCP value (0-63) that is relevant to your configuration needs to be mapped to one of the four egress queues (0-3).
AT-GS950/8 Web Interface User Guide Queue Scheduling Algorithm To change the scheduling algorithm for the egress queues, perform the following procedure. 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select QoS. The QoS folder expands.
Chapter 13 Access Control Configuration Access Control configuration allows you to control different aspects of the Ethernet traffic as it enters the switch ports and is process through the switch. You can specify what traffic is permitted or denied to flow through the switch by setting up specific filter criteria at an ingress port.
Chapter 13: Access Control Configuration Classifier The Create Classifier page allows you to specify packet settings for filtering Ethernet traffic. You can create, modify or delete a Classifier by following the procedures in the following sections: “Create Classifier,” next “Modify Classifier”...
Page 179
AT-GS950/8 Web Interface User Guide 3. Enter a number in the Classifier Index field. The Classifier Index must be a unique number within the range of 1 - 65535. Note The Classifier Index is a required parameter when you create a Policy.
Chapter 13: Access Control Configuration 5. Click ADD. The classifier entry is displayed in the table at the bottom of the page. If you do not see you new entry, you may need to navigate to another page of the table with the First Page, Previous Page, Next Page, and Last Page buttons located below the table.
AT-GS950/8 Web Interface User Guide 3. From the Create Classifier page, identify which classifier that want to modify and click the modify link in the Action column. The Modify Classifier page is displayed in Figure 61. Figure 61. Modify Classifier Page 4.
Page 182
Chapter 13: Access Control Configuration 3. From the Create Classifier page, identify which classifier table entry that want to delete and click the Delete button in the Action column. You will be prompted with a message saying, “Do you want to delete classifier xxxx?”...
AT-GS950/8 Web Interface User Guide Profile Action The Create Profile Action page defines the priority parameters for policing on DSCP (layer 3) and/or class of service (layer 2). Note You must enter a Profile Index on this page even if you do not define the Policed-DHCP and Policed-CoS parameters because the Profile Index is a required parameter for creating both the In-Profile and Out-Profile Actions.
Chapter 13: Access Control Configuration 3. Enter a number in the Profile Action Index field. The Index must be a unique number ranging from 1 to 72. 4. Enter a number in the Policed DSCP field within the range of 0 to 63. This field indicates the DSCP level of interest.
AT-GS950/8 Web Interface User Guide 2. From the Access Control Config folder, select Profile Action. An example of the Create Profile Action page with a Profile Action table entry is shown in Figure 64 on page 185. 3. Select the table entry that you want to modify and click the modify link in the Action column.
Page 186
Chapter 13: Access Control Configuration 4. Click on the OK button. The profile action entry is deleted from the profile action table. 5. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
AT-GS950/8 Web Interface User Guide In-Profile Action The Create In-Profile Action page allows you to specify a Profile Action’s Permit or Deny privilege for packets in the ingress queue. Note A Profile Action Index is required to create an In-Profile Action. See “Create Profile Action”...
Chapter 13: Access Control Configuration 4. Enter a number in the Profile Action ID field ranging from 0 to 72. This field is mandatory. Note This field must be pre-defined on the Create Profile page - see “Create Profile Action” on page 183 for more information. 5.
AT-GS950/8 Web Interface User Guide Modify In-Profile To modify a In-Profile action entry, perform the following procedure: Action Note You must first enter a In-Profile action before you can modify it. See “Create In-Profile Action” on page 187 for more information. 1.
Chapter 13: Access Control Configuration Delete In-Profile To delete a In-Profile action entry, perform the following procedure: Action 1. From the main menu on the left side of the page, select the Access Control Config folder. The Access Control Config folder expands. 2.
AT-GS950/8 Web Interface User Guide Out-Profile Action The Create Out-Profile Action page allows you to specify a Profile Action’s Permit or Deny privilege and bandwidth restrictions for packets in the egress queue. You can create, modify or delete an Out-Profile Action by following the procedures in the following sections: “Create Out-Profile Action,”...
Chapter 13: Access Control Configuration 4. Enter a number in the Profile Action ID field ranging from 0 to 72. This field is mandatory. Note This field must be pre-defined on the Create Profile page - see “Create Profile Action” on page 183 for more information. 5.
AT-GS950/8 Web Interface User Guide Modify Out- To modify a Out-Profile action entry, perform the following procedure: Profile Action Note Before you can modify an entry, you must first enter a Out-Profile action - see “Create In-Profile Action” on page 187. 1.
Chapter 13: Access Control Configuration Delete Out- To delete a Out-Profile action entry, perform the following procedure: Profile Action 1. From the main menu on the left side of the page, select the Access Control Config folder. The Access Control Config folder expands. 2.
AT-GS950/8 Web Interface User Guide Port List The Create Port List page allows you to specify a list of ports that will be used as part of the policy specification. You can create, modify or delete a Port List by following the procedures in the following sections: “Create Port List,”...
Chapter 13: Access Control Configuration 5. Click Add. The Out-Profile Action entry is added to the status table. If the Page field located below the table displays a page number and you do not see your new entry, then there are multiple pages of the table that you can navigate.
AT-GS950/8 Web Interface User Guide Figure 73. Modify Port List Page 4. Change the parameters as required. Note See “Create Port List” on page 195 for the definitions of each parameters. 5. Click Apply. The modified Port List entry is displayed in the table at the bottom of the page of the Create Port List page.
Chapter 13: Access Control Configuration Policy The Create Policy page allows you to specify the filtering criteria for one policy. Before creating a policy, you must pre-define the following indexes: Classifier Index - See “Create Classifier” on page 178 for more information.
Page 199
AT-GS950/8 Web Interface User Guide 3. Enter a number in the Policy Index field. The Policy Index is a unique number within the range of 1 - 65535 which identifies the policy. This field is mandatory. 4. Enter data in the remaining parameters. All parameters listed below must be entered to form the policy: Classifier Index - The Classifier Index is a unique number within the range of 1 - 65535.
Chapter 13: Access Control Configuration Figure 75. Example of Policy Entry 6. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes. Modify Policy To modify a Policy entry, perform the following procedure: Note Before you can modify an entry, you must first enter a Policy - see “Create Policy”...
AT-GS950/8 Web Interface User Guide Figure 76. Modify Policy Page 4. Change the parameters as required. Note See “Create Policy” on page 198 for the definitions of each parameters. 5. Click Apply. The modified Policy entry is displayed in the table at the bottom of the page of the Create Policy page.
Page 202
Chapter 13: Access Control Configuration 2. From the Access Control Config folder, select Policy. An example of the Create Policy page with a Policy table entry is shown in Figure 75 on page 200. 3. From the Create Policy page, identify which Policy table entry that want to delete and click the Delete button in the Action column.
AT-GS950/8 Web Interface User Guide Policy Sequence The Policy Sequence page displays the order that policies are applied to each port. You can order the display by Policy Index or by Policy Sequence number. To display the policy sequence, perform the following procedure: 1.
Page 204
Chapter 13: Access Control Configuration...
Chapter 14 Storm Control This chapter contains a description and configuration procedures for the Storm Control (bandwidth) feature. The following topics are discussed: “Overview” on page 206 “Configuration” on page 208 “Ingress Rate Limiting” on page 210 “Egress Rate Limiting”...
Chapter 14: Storm Control Overview The features available in the AT-S107 Management software allow you to limit Ethernet traffic within your switch based on specific criteria. You can use Storm Control to limit the bandwidth of various types of Ethernet packets.
AT-GS950/8 Web Interface User Guide Ingress Rate The Ingress Rate Limiting feature restricts the traffic to a pre-configured data rate that can flow into a port. This data rate limit can be configured in Limiting 64 Kbps increments within a range from 64 Kbps to 1000 Mbps. The formula for calculating the bandwidth limit is as follows: Bandwidth = 64Kbps x rate limit The rate limit parameter is an integer ranging from 1 to 15625.
Chapter 14: Storm Control Configuration This procedure explains how to set DLF, broadcast, multicast, and threshold levels for each port on the AT-GS950/8 switch. To change the settings of the storm control feature, perform the following procedure: 1. From the main menu on the left side of the page, select the Bridge folder.
Page 209
AT-GS950/8 Web Interface User Guide Note For more information, see the Broadcast setting definition in“Overview” on page 206. 7. Click Apply. 8. To enable or disable ingress and egress Multicast packets, select Enable or Disable from the Multicast pull-down menu next to the port that you want to change.
Chapter 14: Storm Control Ingress Rate Limiting This procedure explains how to set Bandwidth levels and Status for Ingress Rate Limiting on each port of the AT-GS950/8 switch. To change the settings of the ingress rate limiting feature, perform the following procedure: 1.
Page 211
AT-GS950/8 Web Interface User Guide 7. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
Chapter 14: Storm Control Egress Rate Limiting This procedure explains how to set Bandwidth levels and Status for Egress Rate Limiting on each port of the AT-GS950/8 switch. To change the settings of the egress rate limiting feature, perform the following procedure: 1.
Chapter 15 MAC Address Table This chapter contains a description of the static multicast MAC address feature and the procedure for configuring it. This chapter includes the following sections: “Overview” on page 214 “Static Unicast MAC Address Configuration” on page 216 ...
Chapter 15: MAC Address Table Overview The AT-GS950/8 switch has a MAC address table with a storage capacity of up to 8,000 entries. The table stores the MAC addresses of the network nodes connected to its ports and the port number where each address is learned.
Page 215
AT-GS950/8 Web Interface User Guide allows the multicast stream to be forwarded immediately to those predefined ports entered in the MAC table without any configuration delays or loss of data.
Chapter 15: MAC Address Table Static Unicast MAC Address Configuration This procedure explains how to set the static multicast feature for each port on the AT-GS950/8 switch. To add a static MAC address to the switch, perform the following procedure: 1.
Page 217
AT-GS950/8 Web Interface User Guide 4. In the Group MAC Address field, enter a unicast MAC address. 5. Assign the MAC address a Port Member (or members) by selecting the check box beside each port number. Note You can assign a maximum limit of 256 static unicast addresses on the switch.
Chapter 15: MAC Address Table Modify Static Unicast Address To modify the port assignment of a unicast MAC address in the MAC address table, perform the following procedure: 1. From the main menu on the left side of the page, select the Bridge folder.
AT-GS950/8 Web Interface User Guide Delete Static Unicast Address To delete a unicast MAC address from the MAC address table, perform the following procedure: 1. From the main menu on the left side of the page, select the Bridge folder. 2.
Chapter 15: MAC Address Table Static Multicast Address Configuration This procedure explains how to set the static multicast feature for each port on the AT-GS950/8 switch. To add a static MAC address to the switch, perform the following procedure: 1. From the main menu on the left side of the page, select the Bridge folder.
Page 221
AT-GS950/8 Web Interface User Guide Note An error message is generated when you enter a VLAN ID or VLAN Index which is not been defined or when you enter a VLAN ID or VLAN Index without also clicking on the respective radio button.
Chapter 15: MAC Address Table Modify Static Multicast Address To modify the port assignment of a multicast MAC address in the MAC address table, perform the following procedure: 1. From the main menu on the left side of the page, select the Bridge folder.
AT-GS950/8 Web Interface User Guide Delete Static Multicast Address To delete a multicast MAC address from the MAC address table, perform the following procedure: 1. From the main menu on the left side of the page, select the Bridge folder. 1.
Chapter 16 DHCP Snooping This chapter contains a description of the AT-GS950/8 switch’s DHCP Snooping feature and the procedures for creating, modifying, and deleting the DHCP Snooping configuration. This chapter contains the following sections: “Overview” on page 226 “Trusted Ports” on page 226 ...
Chapter 16: DHCP Snooping Overview The DHCP Snooping feature provides security by inspecting ingress packets for the correct IP and MAC address information. The DHCP Snooping feature defines the AT-GS950/8 ports as either trusted or untrusted. With DHCP Snooping enabled, two network security issues are addressed: All ingress DHCP packets are examined on the untrusted ports ...
AT-GS950/8 Web Interface User Guide first DHCPOFFER packet from the server that it receives. This packet contains the DHCP server’s IP address and mask. If the unauthorized DHCP server responds first, then the network device will use the information from the unintended DHCP server for the default gateway or DNS server.
Chapter 16: DHCP Snooping General Guidelines Here is a summary of the rules to observe when you configure DHCP Snooping: A trusted port is connect to one of the following: – Directly to the legitimate trusted DHCP Server. – A network device relaying DHCP messages to and from a trusted server.
AT-GS950/8 Web Interface User Guide General Configuration The following procedure describes how to configure the DHCP Snooping feature on the AT-GS950/8 switch: 1. From the main menu on the left side of the page, select DHCP Snooping. The DHCP Snooping folder expands. 2.
Page 230
Chapter 16: DHCP Snooping through the switch without regard to the IP and MAC Address information in the packet header. 6. From the Backup Database field, select one of the following choices from the pull-down menu: Enable - The AT-S107 Management software saves a backup copy of the Binding Table to flash at a specified interval (Database Update Interval) of time.
AT-GS950/8 Web Interface User Guide VLAN Setting You can create and delete DHCP Snooping VLAN settings by following the procedures in these sections: "Create VLAN Setting" “Modify VLAN Setting” on page 232 “Delete VLAN Setting” on page 232 ...
Chapter 16: DHCP Snooping Modify VLAN To modify or delete a VLAN ID, it must first be deleted and then re-entered by following the procedure outline in “Create VLAN Setting” on page 231. Setting Delete VLAN To delete a VLAN ID, perform the following procedure: Setting 1.
AT-GS950/8 Web Interface User Guide Trusted and Untrusted Port Configuration The following procedure describes how to configure the DHCP Snooping trusted interfaces on the AT-GS950/8 switch: 1. From the main menu on the left side of the page, select DHCP Snooping.
Chapter 16: DHCP Snooping Binding Database The Binding Database displays learned and statically assigned MAC Address and IP Address information for each host on the local area network. Dynamically assigned IP addresses from the DHCP server will automatically populate the table on the Binding Database page as they are assigned by the server.
AT-GS950/8 Web Interface User Guide Type - Because the IP Address being entered is static, you must select Static. Lease Time - Enter the time that IP address assignment is valid. The range is 10 to 4294967295 seconds. 2. Click Add. The static address information is entered into the Binding Database.
Chapter 17 IGMP Snooping This chapter contains a description of the IGMP Snooping procedure as well as procedures for working with IGMP Snooping in the web interface. The following topics are discussed: “Overview” on page 238 “IGMP Snooping Configuration” on page 240 ...
Chapter 17: IGMP Snooping Overview IGMP enables IPv4 routers to create lists of nodes that are members of multicast groups. (A group of end nodes that receive multicast packets from a multicast application is defined as a multicast group.) The router creates a multicast membership list by periodically sending out queries to the local area networks connected to its ports.
Page 239
AT-GS950/8 Web Interface User Guide Without IGMP snooping, a switch floods multicast packets from all of its ports, except the port on which it received the packet. Such flooding of packets can negatively impact network performance. The AT-GS950/8 switch maintains a list of multicast groups through an adjustable time out value, which controls how frequently it expects to see reports from end nodes that want to remain members of multicast groups, and by processing leave requests.
Chapter 17: IGMP Snooping IGMP Snooping Configuration This procedure explains how to set IGMP snooping on the switch and set the IGMP Snooping (V1) age-out timer. To configure IGMP snooping, perform the following procedure: 1. From the main menu on the left side of the page, select the Bridge folder.
AT-GS950/8 Web Interface User Guide 6. The IGMP Snooping Page is updated with active Multicast Group address(s). See Figure 88. Note The Multicast Group Address table contains MAC addresses of nodes that are active members of multicast groups. To set a static Multicast Group Address, see “Static Multicast Address Configuration”...
Chapter 18 Security This Chapter contains information about the Port-based security features and the procedures for setting this feature. This chapter includes the following sections: “Port Access Control” on page 244 “RADIUS Client” on page 249 “Dial-in User - Local Authentication” on page 252 ...
Chapter 18: Security Port Access Control This section contains information and configuration procedures for the Port-based Access Control. This section includes the following sections: “Overview” on page 244 “Port Access Control Configuration” on page 245 Note After configuring the Port-based Network Access Control, you can choose to use either the local authentication server in the AT-S107 for 802.1x authentication or a remote RADIUS server for 802.1x authentication.
AT-GS950/8 Web Interface User Guide Port Access To configure port-based access control, perform the following procedure: Control 1. Select the Security folder from the main menu on the left side of the Configuration page. The Security folder expands. 2. From the Security folder, select Port Access Control. The Port Access Control Configuration Page is displayed.
Page 246
Chapter 18: Security Port - This parameter specifies the port being configured for authentication. Authentication Mode - This parameter specifies the port-based authentication mode. The pull-down menu choices are as follows: 802.1x - 802.1x is specified as the authentication mode. This setting applies to configuration for either RADIUS or Dial-In User authentication.
Page 247
AT-GS950/8 Web Interface User Guide Supplicant Mode - This parameter specifies if one or more supplicants can be authenticated on a port. Single - The port is set to permit only one supplicant to log on and forwards only the traffic of that supplicant. After one supplicant has logged on, the port discards packets from any other supplicant.
Page 248
Chapter 18: Security Maximum Request - Specifies the maximum number of times authenticator ports transmit EAP Request packets to clients before timing out authentication sessions. The range is 1 to 10. Re-authentication Period - Specifies the time interval for reauthentication of clients on an authenticator port. The range is 1 to 65535 seconds Server Timeout - Sets the length of time the switch waits for a response from the authentication server.
You must install RADIUS server software on a network server or management station. Authentication protocol server software is not available from Allied Telesis. The RADIUS server must communicate with the switch through a port that is an untagged member of the Default VLAN and is configured for Forced-Authorized (802.1x) port control.
Chapter 18: Security You need to specify the user name and password combinations when configuring the RADIUS server software on the authentication server. Note This manual does not explain how to configure RADIUS server software. Refer to the documentation that comes with the RADIUS server software for instructions.
Page 251
AT-GS950/8 Web Interface User Guide 7. Click Apply to save your changes. 8. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
Chapter 18: Security Dial-in User - Local Authentication Dial-in User feature provides the local authentication server for port security when a remote (RADIUS) server is not available. This section includes the following: “Overview” on page 252 “Dial-in User Configuration” on page 252 ...
AT-GS950/8 Web Interface User Guide Figure 91. Dial-In User Page 3. In the User Name field, type a name for the user. 4. In the Password field, type a password for the user. 5. In the Dynamic VLAN field, enter the VID of the VLAN which you will allow the user to access.
Page 254
Chapter 18: Security Delete a Dial-in User To delete a dial-in user, perform the following procedure: 1. From the main menu on the left side of the page, select the Security folder. The Security folder expands. 2. From the Security folder, Dial-in User. The Dial-in User page is displayed.
AT-GS950/8 Web Interface User Guide Destination MAC Filter This chapter contains an explanation of the Destination MAC Filter feature as well a procedure for configuring it. This chapter includes the following sections: “Overview” on page 255 “Destination MAC Filter Configuration” on page 255 ...
Chapter 18: Security Figure 92. Destination MAC Filter Page 3. To enter the MAC address that you want filtered, enter the MAC address into the MAC Address field. 4. Click Add to save your entry. 5. After you have configured a destination MAC address, the Destination MAC Filter Page is updated with the MAC address.
Chapter 19 LLDP Link Layer Discovery Protocol (LLDP) allows Ethernet network devices such as switches and routers to receive and/or transmit device-related information to directly connected devices on the network that are also using the protocols, and to store the information that is learned about other devices.
Chapter 19: LLDP Overview The data sent and received by LLDP are useful for many reasons. The switch can discover other devices directly connected to it. Neighboring devices can use LLDP to advertise some parts of their Layer 2 configuration to each other, which may highlight inconsistencies in the neighboring device’s configuration which can then be corrected.
AT-GS950/8 Web Interface User Guide Global Configuration Perform the following procedures to configure the Global parameters for LLDP: “Enable/Disable LLDP” “System Information” on page 260 “Port States” on page 261 Enable/Disable To enable or disable the LLDP feature, perform the following procedure: LLDP 1.
Chapter 19: LLDP 3. From the LLDP parameter, select one of the following radio button choices: Enable - The LLDP feature is active. Note The LLDP feature is not dependent on the DHCP feature. Therefore the DHCP feature can be either Enabled or Disabled without affecting LLDP.
AT-GS950/8 Web Interface User Guide For more information, see “System Management Information” on page 38 System Description - This parameter describes the switch’s title that is advertised. You cannot change this parameter. Port States Each port on the switch can be assigned a LLDP states as follows: 1.
Chapter 19: LLDP Neighbors Information To view the information received from the neighboring network devices, perform the following procedure: 1. From the main menu on the left side of the page, click the LLDP folder. The LLDP folder expands. 2. From the LLDP folder, select LLDP Neighbors Information. The LLDP Neighbors Information Page is displayed.
Chapter 20 Simple Network Management Protocol SNMPv1 and v2c This chapter contains a description of SNMPv1 and SMNMPv2c and the procedures for configuring with these protocols. This chapter contains the following sections: “SNMPv1 and SNMPv2c Overview” on page 264 “Trap Receiver Attributes”...
Configure the SNMP interface parameters in the AT-S107 Management software. Note The MIB file is available from the Allied Telesis web site at www.alliedtelesis.com/support/software. Enter your hardware product model in the Search by Product Name field; for example, enter AT-GS950/8. Links for the latest product software and documentation are displayed.
AT-GS950/8 Web Interface User Guide Attributes Trap Receiver A trap is a message sent by the agent to one or more managers to indicate the occurrence of a particular event on the device. There are numerous events that can trigger a trap. For instance, when the switch reboots or when the Spanning Tree Root Bridge changes.
Chapter 20: Simple Network Management Protocol SNMPv1 and v2c Activate SNMP Interface The SNMP interface is activated by default. If you want to de-activate it or re-activate it, go to “User Interface Configuration” on page 43.
AT-GS950/8 Web Interface User Guide SNMPv1/v2 User and Group Names A v1/v2 User Name and Group Name definition is the basis for creating SNMPv1/v2 communities. You can create and delete User and Group Names with the procedures in the following sections: “Create SNMP v1/v2 User and Group Names”...
Chapter 20: Simple Network Management Protocol SNMPv1 and v2c Note If you choose to use the default User and Group Names (ReadOnly and ReadWrite) that are already displayed in the table, proceed to step 7 below. 3. Type a new User Name. Enter a name up to 31 characters in length.
AT-GS950/8 Web Interface User Guide SNMPv1/v2 Community Strings A community string has attributes for controlling who can use the string and what the string will allow a network management station to do on the switch. The AT-S107 Management software does NOT provide any default community strings.
Chapter 20: Simple Network Management Protocol SNMPv1 and v2c 5. Click Add. The new Community Name and User Name are displayed. 6. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes. Modify SNMPv1/ If you need to modify a Community Table entry, you must first delete the entry by using the procedure below and then re-enter it with the...
AT-GS950/8 Web Interface User Guide SNMP Traps A Host IP address is used to specify a management device that needs to receive SNMP traps sent by the switch. This IP address is associated with the SNMP Version and a valid Community Name in the Host table of the switch.
Chapter 20: Simple Network Management Protocol SNMPv1 and v2c 6. Click Add. The new host is added to the table. 7. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes. Modify Trap If you need to modify an SNMP Trap entry, you must first delete the entry by using the procedure below and then re-enter it with the modification by...
Chapter 21 Simple Network Management Protocol SNMPv3 This chapter contains a description of SNMPv3 and the procedures for configuring this protocol. This chapter contains the following sections: “SNMPv3 Overview” on page 274 “SNMPv3 Authentication Protocols” on page 274 “SNMPv3 Privacy Protocol”...
Chapter 21: Simple Network Management Protocol SNMPv3 SNMPv3 Overview The SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c protocol implementation which is described in Chapter 20 on page 263. In SNMPv3, User-based Security Model (USM) authentication is implemented along with encryption, allowing you to configure a secure SNMP environment.
AT-GS950/8 Web Interface User Guide In addition, you have the option of assigning no user authentication. In this case, no authentication is performed for this user. You may want to make this configuration for someone with super-user capabilities. SNMPv3 Privacy After you have configured an authentication protocol, you have the option of assigning a privacy protocol if you have the encrypted version of the AT- Protocol...
Chapter 21: Simple Network Management Protocol SNMPv3 The AT-S107 Management software supports the MIB tree, starting with the Internet MIBs, as defined by 1.3.6.1. There are two ways to specify a MIB view. You can enter the OID number of the MIB view or its equivalent text name.
AT-GS950/8 Web Interface User Guide Note The Community Strings do not have a default value defined and are initially blank. 5. Finally, the traps can be defined on the Trap Management page based on the Community or User Name. See Figure 99 for an illustration of how the user configuration tables are linked.
Chapter 21: Simple Network Management Protocol SNMPv3 SNMPv3 User and Group Names A v3 User Name and Group Name definition is the basis for all the other SNMPv3 tables. You can create and delete View Names by following the procedures in the following sections: “Create SNMPv3 User and Group Names”...
AT-GS950/8 Web Interface User Guide 9. Select one of the following choices for the Priv-Protocol field: DES - The DES encryption scrambles the SNMP data so that outside observers are prevented from seeing the data content. none - No encryption is selected for the SNMP data. Note If you specify a privacy password, the privacy protocol is set to DES and you must also specify an authentication protocol and password.
Chapter 21: Simple Network Management Protocol SNMPv3 SNMPv3 View Names The SNMPv3 View names are defined in the SNMP Group Access table and are based on the User and Group Names. You can create and delete View Names by following the procedures in the following sections: “Create SNMPv3 View Names”...
AT-GS950/8 Web Interface User Guide 5. Enter the Write View Name. This name is an optional field. It can be up to 31 characters in length. 6. Enter the Notify View Name. This name is an optional field. It can be up to 31 characters in length. 7.
Page 282
Chapter 21: Simple Network Management Protocol SNMPv3 4. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
AT-GS950/8 Web Interface User Guide View Table The SNMP v3 View table specifies the MIB object access criteria for each View Name. If the View Name is not specified on this page, then it has access to all MIB objects. You can specify specific areas of the MIB that can be accessed or denied based on the entries in this table.
Chapter 21: Simple Network Management Protocol SNMPv3 5. Enter “1” for the OID Mask. 6. Enter the View Type. This can be one of two choices: Included - This selection allows the specified MIB object to be included in the view. Excluded - This selection blocks the view of the specified MIB object.
AT-GS950/8 Web Interface User Guide SNMPv3 Traps The creation, modification and deletion of traps for SNMPv3 is identical to the procedure for SNMPv1/v2. See “SNMP Traps” on page 271.
Chapter 22 RMON This chapter contains the following sections: “Overview” on page 288 “Enable and Disable RMON” on page 289 “Port Statistics” on page 290 “Histories” on page 291 “Events” on page 293 “Alarms” on page 295 ...
Chapter 22: RMON Overview The RMON (Remote MONitoring) MIB is used with SNMP applications to monitor the operations of network devices. The switch supports the four RMON MIB groups listed here: Statistic group. This group is used to view port statistics remotely ...
AT-GS950/8 Web Interface User Guide Enable and Disable RMON You can now use your SNMP Network Management System (NMS) software and the RMON section of the MIB tree to view the RMON statistics, history and alarms associated with specific ports. Since RMON uses the SNMP agent for communicating with your NMS software, the SNMP Agent must be enabled and the SNMP feature must be configured on your.
Chapter 22: RMON Port Statistics You can remotely view individual port statistics with RMON by using your SNMP NMS software and the RMON portion of the MIB tree. Perform the following procedure to configure RMON port statistics for a specific port: 1.
AT-GS950/8 Web Interface User Guide Histories RMON histories are snapshots of port statistics. They are taken by the switch at predefined intervals and can be used to identify trends or patterns in the numbers or types of ingress packets on the ports on the switch.
Page 292
Chapter 22: RMON Interval - This parameter specifies how frequently the switch takes snapshots of the port’s statistics. The range is 1 to 3600 seconds (1 hour). For example, if you want the switch to take one snapshot every minute on a port, you specify an interval of sixty seconds. Owner - This parameter is used to identify the person who created an entry.
AT-GS950/8 Web Interface User Guide Events An event specifies the action of the switch when the ingress packet activity on a port crosses a statistical threshold defined in an alarm. The choices are to log a message in the event log of the switch, send an SNMP trap to an SNMP workstation, or both.
Page 294
Chapter 22: RMON 4. Once you have configured the parameters, click Add. Your entry will appear in the table at the bottom of the page. 5. If you want to configure additional RMON events, repeat steps 3 and 4. 6. From the main menu on the left side of the page, select Save Configuration to Flash to permanently save your changes.
AT-GS950/8 Web Interface User Guide Alarms RMON alarms are used to generate alert messages when packet activity on designated ports rises above or falls below specified threshold values. The alert messages can take the form of messages that are entered in the event log on the switch or traps that are send to your SNMP NMS software or both.
Chapter 22: RMON 2. From the RMON folder, select Alarm. The RMON Alarm Configuration Page is displayed. See Figure 106. Figure 106. RMON Alarm Configuration Page 3. The following fields are listed: Index - This parameter specifies the ID number of the new group. The range is 1 to 65535.
Page 297
AT-GS950/8 Web Interface User Guide Rising Event Index - This parameter specifies the event index for the rising threshold. Its range is 1 to 65535. This field is mandatory and must match an Event Index that you previously entered in “Events” on page 293.
Chapter 23 Network Statistics The sections in this chapter explain how to display traffic, error, and history statistics about the network traffic on the AT-GS950/8 switch and its ports. This chapter includes the following sections: “Overview” on page 300 “Traffic Comparison Statistics”...
Chapter 23: Network Statistics Overview Statistics provide important information for troubleshooting switch problems at the port level. The AT-S107 Management software provides a versatile set of statistics charts that you can customize for your needs, including (depending upon the chart) the ports whose statistics you want to view and the color used to draw the chart.
AT-GS950/8 Web Interface User Guide Traffic Comparison Statistics The Traffic Comparison statistics chart allows you to display a specified traffic statistic over all of the ports. You can select 12 statistic types and 12 colors for each port. To display traffic comparison statistics, perform the following procedure: 1.
Chapter 23: Network Statistics 3. To view traffic statistics, click on the arrow next to “Statistics” and select one of the options in Table 6. Table 6 Traffic Comparison Options Option Definition Inbound Octets (Bytes/s) Measures the number of inbound octet bits in bytes per second.
Page 303
AT-GS950/8 Web Interface User Guide 5. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: Green Blue Purple Yellow Orange Gray Light Red Light Blue Light Green Light Yellow Light Gray 6. To create the traffic comparison graph, select Draw. 7.
Chapter 23: Network Statistics Error Group Statistics The Error Group chart displays the discard and error counts for a specified port. To display error group statistics for a port, perform the following procedure: 1. Select the Statistics Chart folder. The Statistics Chart folder expands. 2.
Page 305
AT-GS950/8 Web Interface User Guide 4. To select the amount of time before the screen is refreshed, click Auto Refresh. Choose from the following options: 5 seconds 10 seconds 15 seconds 30 seconds 5. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: Green Blue...
Chapter 23: Network Statistics Historical Status Charts The Historical Status chart allows you to select from 12 statistics to view for a selection of ports for however long this chart is running on the management workstation. To display historical status charts statistics for a port, perform the following procedure: 1.
AT-GS950/8 Web Interface User Guide Table 7 Historical Status Options Option Definition Inbound Octet Rate (Bytes) Measures the rate of inbound octet bits in bytes per second. Inbound Unicast Packet Rate (Pkts) Measures the rate of inbound unicast packets in packets per second.
Page 308
Chapter 23: Network Statistics 4. To select the amount of time before the screen is refreshed, click Auto Refresh. Choose from the following options: 5 seconds 10 seconds 15 seconds 30 seconds 5. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: Green Blue...
Chapter 24 Management Software Updates This chapter explains the methods for upgrading the AT-S107 Management software on the switch and saving configuration files. This chapter contains the following sections: “Overview” on page 310 “Upgrade Firmware Image via HTTP” on page 311 ...
Chapter 24: Management Software Updates Overview You can use the Management Software Updates features to upgrade the AT-S107 Management software to a new version, save a configuration file or load a configuration file. in addition, you can: Upload a configuration file from the switch onto a PC ...
AT-GS950/8 Web Interface User Guide Upgrade Firmware Image via HTTP This section describes how to upgrade an firmware image of the AT-S107 Management software using HTTP on an Internet server. Before downloading a new version of the AT-S107 Management software onto the switch with HTTP, note the following: The current configuration of the switch is retained when a new ...
Chapter 24: Management Software Updates 2. From the Firmware Upgrade folder, select via HTTP. The Firmware Upgrade via HTTP Page is displayed. See Figure 110. Figure 110. Firmware Upgrade via HTTP Page 3. Change the following parameter as necessary: Firmware File - Enter the path and the firmware file name or click the Browse button and select the file name.
AT-GS950/8 Web Interface User Guide Upgrade Firmware Image via TFTP This section describes how to upgrade an firmware image of the AT-S107 Management software using TFTP on an TFTP server. Before downloading a new version of the AT-S107 Management software onto the switch, note the following: The current configuration of a switch is retained when a new AT-S107 ...
Page 314
Chapter 24: Management Software Updates The Image/Version Date shows the current version and date of software installed on the switch. 3. Change the following parameters as necessary: TFTP Server IP - The IP address of the TFTP server from which you are downloading the new software.
AT-GS950/8 Web Interface User Guide Download or Upload a Configuration File via HTTP This section describes how to download or upload a configuration file using HTTP on an Internet server. Before you upload or download a configuration file via HTTP, note the following: You must be able to access the new AT-S107 image file from your PC.
Chapter 24: Management Software Updates Configuration To upload an AT-S107 configuration file onto the switch, perform the following procedure: File Upload 1. Select the Upload button. Select this button to upload a configuration file from the switch to your PC. The following window shown in Figure 113 is displayed.
AT-GS950/8 Web Interface User Guide Note If the IP address contained in the new configuration file is different than the one you currently have in your browser URL, you will loose connectivity with the AT-S107 Management software on the AT-GS950/8 switch after the new configuration file is loaded. If this is the case, you can identify the new IP address by using the ATI Web Discovery Tool.
Chapter 24: Management Software Updates Download or Upload a Configuration File via TFTP This section describes how to download or upload a configuration file using TFTP on an TFTP server. Before uploading or downloading a configuration file onto the switch using TFTP, note the following: Your network must have a TFTP server.
AT-GS950/8 Web Interface User Guide Configuration To download an AT-S107 configuration file onto the switch, perform the following procedure: File Download 1. Enter the name of the configuration file in the field next to the Config File Name parameter. 2. Select the Download button to download a configuration file onto the switch.
Chapter 25 Loopback Protection This chapter explains how to configure the Loopback Protection feature for specific ports on the AT-GS950/8 switch. If the Tx and Rx pairs on the same port are connected, then this feature detects this condition and disables the port for a pre-configured amount of time.
Chapter 25: Loopback Protection Configuration To configure the Loopback Detection feature, perform the following procedure: 1. From the main menu on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select Loopback Detection. The AT-GS950/8 Loopback Detection Page is displayed.
Page 323
AT-GS950/8 Web Interface User Guide 4. Under the Loopback Detection Global Settings, configure the following parameters: Interval - This parameter sets the interval of time that the ports are tested. The range is 1 to 32767 seconds. Recover Time - This parameter sets the amount of time that the port will take to recover once the loopback condition has been removed.
Chapter 25: Loopback Protection Status The status of the Loopback Detection is given in the Loop Status column of the table at the bottom of the Loopback Detection page. See Figure 116 on page 322. The status is one of the following states: Normal - This status indicates that the port does not have the Tx to Rx pairs connected.
Chapter 26 Cable Diagnostics This chapter provides procedures to run cable diagnostics on the cables connected to the switch ports. If a port is selected, a cable must be connected to it for meaningful test results to be displayed. Note To permanently save your new settings or any changes to the configuration file, select Save Configuration to Flash from the main menu on the left side of the page.
Page 326
Chapter 26: Cable Diagnostics Test Results - Displays the diagnostic results for each pair in the cable. One of the following cable status parameters is displayed: OK - There is not problem detected with the cable. Open in Cable - There is an open wire within the cable. Short in Cable - Two wires are shorted together within the cable.
Appendix A MSTP Overview This appendix provides background information about the Multiple Spanning Tree Protocol (MSTP) and includes the following sections: “Overview” on page 328 “Multiple Spanning Tree Instance (MSTI)” on page 330 “General Guidelines” on page 333 ...
Appendix A: MSTP Overview Overview In the AT-GS950/8, STP and RSTP are referred to as single-instance spanning trees that search for physical loops across all VLANs in a bridged network. When loops are detected, the active protocol stops the loops by placing one or more bridge ports in a blocking state.
Page 329
AT-GS950/8 Web Interface User Guide Note Do not activate MSTP on the AT-GS950/8 switch without first familiarizing yourself with the following concepts and guidelines. Like STP and RSTP, you must activate this MSTP protocol on a switch and then configure the protocol parameters. Note The implementation of MSTP in the management software complies fully with the new IEEE 802.1s standard and should be interoperable...
Appendix A: MSTP Overview Multiple Spanning Tree Instance (MSTI) The individual spanning trees in MSTP are referred to as Multiple Spanning Tree Instances (MSTIs). A MSTI can span any number of AT-GS950 switches. The switch can support up to 31 MSTIs at a time. Before creating a MSTI, you first enable MSTP.
AT-GS950/8 Web Interface User Guide MSTP and the two VLANs have been assigned different spanning tree instances. Now that they reside in different MSTIs, both links remain active, enabling the VLANs to forward traffic over their respective direct link. Figure 119. MSTP Example of Two Spanning Tree Instances Multiple VLANS A MSTI can contain more than one VLAN.
Appendix A: MSTP Overview Figure 120. Multiple VLANs in a MSTI In this example, because an MSTI contains more than one VLAN, the links between the VLAN parts is made with tagged (not untagged) ports so that they can carry traffic from more than one virtual LAN. Referring again to Figure 120, the tagged link in MSTI 1 is carrying traffic for both the Presales and Sales VLANs between the two switches while the tagged link in MSTI 2 is carrying traffic for the Design and Engineering VLANs.
AT-GS950/8 Web Interface User Guide General Guidelines Here are the guidelines for MSTIs: The AT-GS950/8 switch can support up to 31 spanning tree instances, including the CIST. A MSTI can contain any number of VLANs. A VLAN can belong to only one MSTI at a time. ...
Appendix A: MSTP Overview VLAN and MSTI Associations Part of the task to configuring MSTP involves assigning VLANs to spanning tree instances. The mapping of VLANs to MSTIs is called associations. A VLAN, either port-based or tagged, can belong to only one instance at a time, but an instance can contain any number of VLANs.
AT-GS950/8 Web Interface User Guide Ports in Multiple MSTIs A port can be a member of more than one MSTI at a time if it is a tagged member of one or more VLANs assigned to different MSTI’s. In this circumstance, a port might be have to operate in different spanning tree states simultaneously, depending on the requirements of the MSTIs.
Appendix A: MSTP Overview Multiple Spanning Tree Regions Another important concept of MSTP is regions. A MSTP region is defined as a group of bridges that share exactly the same MSTI characteristics. Those characteristics are: Region name Region revision ...
AT-GS950/8 Web Interface User Guide Figure 121. Multiple Spanning Tree Region The AT-GS950/8 switch determines regional boundaries by examining the MSTP BPDUs received on the ports. A port that receives a MSTP BPDU from another bridge with regional information different from its own is considered to be a boundary port and the bridge connected to the port as belonging to another region.
Appendix A: MSTP Overview Each MSTI functions as an independent spanning tree within a region. Consequently, each MSTI must have a root bridge to locate physical loops within the spanning tree instance. An MSTI’s root bridge is called a regional root.
Page 339
AT-GS950/8 Web Interface User Guide Each MSTI must have a regional root for locating loops in the instance. MSTIs can share the same regional root or have different roots. A regional root is determined by the MSTI Bridge Priority value and a bridge’s MAC address.
Appendix A: MSTP Overview Common and MSTP has a default spanning tree instance called the Common and Internal Spanning Tree (CIST). This instance has an MSTI ID of 0. Internal Spanning Tree This instance has unique features and functions that make it different from the (CIST) MSTIs that you create yourself.
AT-GS950/8 Web Interface User Guide Associating VLANs to MSTIs When you are using Multiple Spanning Tree, Allied Telesis recommends that you assign each VLANs to one of the existing MSTIs on a switch. You should not leave any VLAN unassigned including the Default VLAN. This is to prevent the blocking of a port that should be in the forwarding state.
Appendix A: MSTP Overview Figure 123. CIST and VLAN Guideline - Example 2 When port 3 on switch B receives a BPDU, the switch notes the port sending the packet belongs only to CIST 0. Therefore, switch B uses CIST 0 in determining whether a loop exists. The result would be that the switch detects a loop because the other port is also receiving BPDU packets from CIST 0.
AT-GS950/8 Web Interface User Guide VLANs Across Different Regions Special consideration needs to be taken into account when you connect different MSTP regions or an MSTP region and a single-instance STP or RSTP region. Unless planned properly, VLAN fragmentation can occur between the VLANS of your network.
Appendix A: MSTP Overview Another approach is to configure multiple regions in a subnet and group the VLANs that need to span two or more regions into the same MSTI. If other VLANs also exist that do not span multiple regions, they can be assigned to other MSTIs within their respective region.
AT-GS950/8 Web Interface User Guide Summary of Guidelines Careful planning is essential for the successful implementation of MSTP. This section reviews all the rules and guidelines mentioned in earlier sections, and contains a few new ones: The AT-GS950/8 switch can support up to 32 multiple spanning tree ...
Appendix A AT-GS950/8 Default Parameters Table 9 lists the factory default settings for the AT-S107 Management software on the AT-GS950/8 switch. The Parameters reflect the fields found on each web page. Table 9. AT-S107 Management Software Default Settings AT-GS950/8 Parameter Specifications Default Setting System/Management...
Need help?
Do you have a question about the AT-GS950/8 and is the answer not in the manual?
Questions and answers