Allied Telesis AT-GS950/8 User Manual

Allied Telesis AT-GS950/8 User Manual

Management software for the at-gs950/8 layer 2 gigabit ethernet websmart switch
Hide thumbs Also See for AT-GS950/8:
Table of Contents

Advertisement

Management
Software
AT-S82
User's Guide
For the AT-GS950/8 Layer 2 Gigabit Ethernet WebSmart Switch
Version 1.1.0
613-000375 Rev. B

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AT-GS950/8 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Allied Telesis AT-GS950/8

  • Page 1 Management Software AT-S82 User’s Guide For the AT-GS950/8 Layer 2 Gigabit Ethernet WebSmart Switch Version 1.1.0 613-000375 Rev. B...
  • Page 2 Allied Telesis, Inc. has been advised of, known, or...
  • Page 3: Table Of Contents

    Preface ... 7 Where to Find Web-based Guides ... 8 Contacting Allied Telesis ... 9 Online Support ... 9 Email and Telephone Support... 9 Warranty... 9 Returning Products ... 9 Sales or Corporate Information ... 9 Management Software Updates... 9 Chapter 1: Getting Started ...
  • Page 4 Contents Tagged Port Members ... 45 Untagged Port Members ... 45 Incoming and Outgoing Tagged and Untagged Frames ... 45 Incoming Frames ... 45 Outgoing Frames ... 45 Guidelines for Creating a VLAN ... 46 Working with VLANs ... 47 Creating a VLAN...
  • Page 5 Figures Figure 1. Login Dialog Box ...12 Figure 2. Main Page ...13 Figure 3. Save Configuration Page ...14 Figure 4. Basic Switch Information Page...18 Figure 5. Administrator Password Page ...22 Figure 6. Reboot Page ...23 Figure 7. Reset Page...24 Figure 8. Reset System Page...25 Figure 9.
  • Page 6 Figures...
  • Page 7: Preface

    Preface This guide contains instructions on how to use the AT-S82 management software to manage the AT-GS950/8 Smart Switch switch. This preface contains the following sections: “Where to Find Web-based Guides” on page 8 “Contacting Allied Telesis” on page 9...
  • Page 8: Where To Find Web-Based Guides

    Preface Where to Find Web-based Guides The installation and user guides for all Allied Telesis products are available in portable document format (PDF) on our web site at www.alliedtelesis.com. You can view the documents online or download them onto a local workstation or server.
  • Page 9: Contacting Allied Telesis

    You can use the Knowledge Base to submit questions to our technical support staff and review answers to previously asked questions. Email and For Technical Support via email or telephone, refer to the Allied Telesis web site: www.alliedtelesis.com. Select your country from the list Telephone displayed on the website.
  • Page 10 Preface...
  • Page 11: Chapter 1: Getting Started

    Chapter 1 Getting Started This chapter provides information and instructions on how to access the AT-S82 management software by starting a web browser management session. This chapter contains the following sections: “Starting a Management Session” on page 12 “Saving Changes” on page 14 “Quitting a Management Session”...
  • Page 12: Starting A Management Session

    Chapter 1: Getting Started Starting a Management Session You establish a local management session with the AT-GS950/8 switch by connecting an Ethernet cable to one of the eight ports on the front panel of the switch. To start a management session, perform the following procedure: 1.
  • Page 13: Figure 2. Main

    AT-S82 Management Software User’s Guide The main page, which by default displays the Basic Switch Information page, is shown in Figure 2. Figure 2. Main Page...
  • Page 14: Saving Changes

    Chapter 1: Getting Started Saving Changes The management software applies the changes you make when you click the Apply button on any web page. However, the management software does not automatically save the changes you make to the configuration file. You can save your changes to the configuration file each time that you change a parameter, or save the changes after you are done with all your changes and before you exit the web browser.
  • Page 15: Quitting A Management Session

    AT-S82 Management Software User’s Guide Quitting a Management Session To quit a management session, close the web browser.
  • Page 16 Chapter 1: Getting Started...
  • Page 17: Chapter 2: Basic Switch Parameters

    Chapter 2 Basic Switch Parameters This chapter contains the following sections: “Configuring the IP Address, Subnet Mask, Gateway Address, and BOOTP or DHCP” on page 18 “Disabling or Enabling Ping Blocking” on page 20 “Enabling or Disabling 802.1X Forwarding Control” on page 21 “Changing the Administrator’s Password”...
  • Page 18: Configuring The Ip Address, Subnet Mask, Gateway Address, And Bootp Or Dhcp

    2. To set the switch’s IP address, in the Get IP From field, choose one of Caution Allied Telesis strongly recommends that you record the MAC address of this switch, as shown on the Basic Switch Information Page (Figure 4) before you configure or enable the BOOTP or DHCP options of the Get IP From parameter.
  • Page 19 a. In the IP Address field, enter the IP address. The default is 192.168.1.1. b. In the Subnet Mask field, type the subnet mask for the switch. The default is 255.255.255.0. c. In the Default Gateway field, type the IP address of the default gateway.
  • Page 20: Disabling Or Enabling Ping Blocking

    Enabled The switch does not respond to ping requests. This is the default. Disabled The switch responds to ping requests. Allied Telesis recommends that you choose this setting. select Save Configuration. The Save Configuration page is shown in Figure 3 on page 14.
  • Page 21: Enabling Or Disabling 802.1X Forwarding Control

    Enabling or Disabling 802.1X Forwarding Control This procedure describes how to enable or disable 802.1x forwarding control. The default setting is disabled. When you disable this feature, 802.1x packets are not forwarded. If this feature is enabled, these packets are forwarded to their destination which might be a switch running an authentication protocol.
  • Page 22: Changing The Administrator's Password

    Chapter 2: Basic Switch Parameters Changing the Administrator’s Password To reset the administrator’s password, perform the following procedure: 1. From the main menu, select Administrator Password. 2. In the Old Password field, type the old password. 3. In the New Password field, type the new password. 4.
  • Page 23: Rebooting The Switch

    Rebooting the Switch This procedure reboots the switch and reloads the AT-S82 management software from flash memory. You might reboot the device if you believe it is experiencing a problem. Rebooting the device does not change any of the device’s parameter settings. To reboot the switch, perform the following procedure: 1.
  • Page 24: Resetting The Switch And Retaining The Ip Address

    Chapter 2: Basic Switch Parameters Resetting the Switch and Retaining the IP Address There are two options for resetting the switch: resetting all the parameters except the IP address, or resetting the switch to return all the parameters to their default values. The procedure for resetting the switch to the default values is described in “Returning the AT-S82 Management Software to the Factory Default Values”...
  • Page 25: Returning The At-S82 Management Software To The Factory Default Values

    Returning the AT-S82 Management Software to the Factory Default Values This procedure returns all AT-S82 management software parameters to their default values, including the IP address, which is reset to 192.168.1.1. To reset all the parameters except the IP address, follow the procedure in “Resetting the Switch and Retaining the IP Address”...
  • Page 26: Downloading New Firmware

    Chapter 2: Basic Switch Parameters Downloading New Firmware To download new firmware onto the switch, perform the following procedure: 1. From the main menu, select Download Firmware. 2. In the Server IP Address field, type the IP address of the server 3.
  • Page 27: Chapter 3: Port Configuration

    Chapter 3 Port Configuration This chapter contains the following section: “Configuring Port Parameters” on page 28 Section I: Using the Menus Interface...
  • Page 28: Configuring Port Parameters

    Chapter 3: Port Configuration Configuring Port Parameters This procedure explains how to configure the following port parameters: To configure the ports, perform the following procedure: 1. From the main menu, select Port Configuration. State Speed and duplex mode Flow control Medium type (only for ports 7 and 8) The Port Configuration page is shown in Figure 11.
  • Page 29 Note Auto Speed/Duplex is disabled when you manually configure a port’s Speed/Duplex. In this situation, you must use a crossover Ethernet cable to connect that port to another network device. 2. To set the parameters for a port, choose the port using the From and To lists.
  • Page 30 Chapter 3: Port Configuration 5. To enable or disable flow control on the port, choose the port using the 6. From the Flow Control list, choose one of the following: 7. From the Medium Type list, choose one of the following: 8.
  • Page 31 Chapter 4 Trunking This chapter contains the following sections: “Trunking Overview” on page 32 “Configuring the Trunking Algorithm” on page 34 “Setting up the Trunk” on page 35 Section I: Using the Menus Interface...
  • Page 32: Chapter 4: Trunking

    The AT-S82 management software provides three load To ensure compatibility, set up trunks only between AT-GS950/8 devices. The trunk always contains two ports, one of which is designated the master port.
  • Page 33 AT-S82 Management Software User’s Guide distribution methods: MAC-SA - source MAC address MAC-DA - destination MAC address DAxorSA - destination MAC address/source MAC address...
  • Page 34: Configuring The Trunking Algorithm

    Chapter 4: Trunking Configuring the Trunking Algorithm To configure the trunk load method, perform the following procedure: 1. From the main menu, select Trunking Algorithm. 2. Choose one of the load methods from the list: 3. Click Apply to implement your changes. 4.
  • Page 35: Setting Up The Trunk

    Setting up the Trunk To set up the trunk, perform the following procedure: 1. From the main menu, select Port Trunking. The Port Trunking page is shown in Figure 13. The current trunks, if any, are shown in the Current Trunking Group Entries area.
  • Page 36 Chapter 4: Trunking 3. For the Group ID, choose a trunk group ID from the list. IDs from 1 4. For the State, choose the state of the trunk, either enabled or 5. Click Apply to implement your changes. 6. To save the settings to the configuration file, from the main menu, 7.
  • Page 37: Chapter 5: Port Mirroring

    Chapter 5 Port Mirroring This chapter contains the following sections: “Port Mirroring Overview” on page 38 “Configuring Port Mirroring” on page 39 Section I: Using the Menus Interface...
  • Page 38: Port Mirroring Overview

    Chapter 5: Port Mirroring Port Mirroring Overview The port mirroring feature allows you to unobtrusively monitor the ingress and egress traffic on a port on the switch by having the traffic copied to another switch port. By connecting a network analyzer to the port where the traffic is being copied to, you can monitor the traffic on the other port without impacting its performance or speed.
  • Page 39: Configuring Port Mirroring

    Configuring Port Mirroring To configure the trunk load method, perform the following procedure: 1. From the main menu, select Port Mirroring. The Port Mirroring page is shown in Figure 15. 2. From the Target Port list, select the target port. This is the port where you will connect the network analyzer and the port to which traffic will be mirrored.
  • Page 40 Chapter 5: Port Mirroring...
  • Page 41 Chapter 6 VLANs This chapter contains the following sections: “VLAN Features” on page 42 “VLAN Overview” on page 44 “Working with VLANs” on page 47 “Protected Ports VLAN” on page 50 Section I: Using the Menus Interface...
  • Page 42: Chapter 6: Vlans

    Chapter 6: VLANs VLAN Features A Virtual Local Area Network (VLAN) is a logical grouping of devices on different physical LAN segments that allows users to communicate as if they were physically connected to a single LAN, independent of the physical configuration of the network.
  • Page 43 AT-S82 Management Software User’s Guide VLANs can be used to control the flow of data in your network, since the traffic generated by an end-node in a VLAN is restricted to the other end- nodes in the same VLAN. In addition, VLANs can prevent data from flowing to unauthorized end-nodes...
  • Page 44: Vlan Overview

    VLAN even though the VLAN spans multiple switches. For example, if you had a VLAN titled Marketing that spanned three AT-GS950/8 switches, you would assign the Marketing VLAN on each switch the same VID. VLAN Port You need to specify which ports on the switch are to be members of a VLAN.
  • Page 45: Tagged Port Members

    AT-S82 Management Software User’s Guide Tagged Port Members A port is a tagged member of a specific VLAN when it is a member of more than one VLAN. If a port is a tagged member of one VLAN, then the same port is also an untagged member of another VLAN.
  • Page 46: Guidelines For Creating A Vlan

    Chapter 6: VLANs member of the VLAN). These frames are untagged after transmission from the switch. Guidelines for The following are guidelines for creating a VLAN. Creating a VLAN The switch can support up to a total of 255 VLANs. Each VLAN must be assigned a unique VID.
  • Page 47: Working With Vlans

    Working with VLANs This section contains the following procedures for working with VLANs: “Creating a VLAN,” next “Displaying all VLANs” on page 48 “Modifying a VLAN” on page 49 Creating a VLAN To create a VLAN, perform the following procedure: 1.
  • Page 48: Displaying All Vlans

    Chapter 6: VLANs 3. In the VID field, supply a number for the VLAN ID, from 2 to 4094. 4. In the VLAN Name field, enter a unique name for the VLAN. No 5. In the Tag row, select the ports that you want to be tagged members of 6.
  • Page 49: Modifying A Vlan

    The list of current VLANs is shown in Figure 18. Modifying a To modify the ports in a VLAN, perform the following procedure: VLAN 1. From the main menu, select VLAN Configuration. The VLAN Configuration page is shown in Figure 16 on page 47. 2.
  • Page 50: Protected Ports Vlan

    Chapter 6: VLANs Protected Ports VLAN You use the protected ports VLAN feature when you want to prevent ports from communicating with one another, but you want them all to have access to common resources. For example, in a hotel or apartment complex, the computer in each room or apartment needs to be isolated from one another, but they all need access to the internet or a server.
  • Page 51: Figure 21. Protected Port

    1. From the main menu, select Protected Port. The Protected Port page is shown in Figure 21. Figure 21. Protected Port Page 2. Determine which port(s) will be the Primary port(s). 3. Click the box on the Isolated row for all ports that you want to isolate from one another.
  • Page 52 Chapter 6: VLANs...
  • Page 53: Chapter 7: Class Of Service

    Chapter 7 Class of Service This chapter contains the following sections: “Class of Service Overview” on page 54 “Mapping Priorities to Queues” on page 57 “Setting Up the Schedule” on page 58 Section I: Using the Menus Interface...
  • Page 54: Class Of Service Overview

    Chapter 7: Class of Service Class of Service Overview When the egress queues on a port in an Ethernet switch contains more packets than the port can handle in a timely manner, the port may be forced to delay the transmission of some packets. A port may be forced to delay transmission of packets while it handles other traffic and, in some situations, some packets destined to be forwarded from the port are discarded.
  • Page 55: Scheduling

    Table 1 lists the mappings between the eight CoS priority levels and the four egress queues of a switch port. Table 1. Default Mappings of IEEE 802.1p Priority Levels to Priority IEEE 802.1p Priority Level For example, if a tagged packet with a priority level of 2 entered a port on the switch, the switch would store the packet in Q11 on the egress port.
  • Page 56 Chapter 7: Class of Service example. In this example, the port transmits a maximum of 25 packets from Q3, then 15 packets from Q2, and so forth. Table 2. Scheduling Example Maximum Number of Port Egress Queue Packets...
  • Page 57: Mapping Priorities To Queues

    Mapping Priorities to Queues To map priorities to queues, perform the following procedure: 1. From the main menu, select CoS Priority to Queue. The CoS Priority to Queue page is shown in Figure 22. The default queue for each priority is displayed 2.
  • Page 58: Setting Up The Schedule

    Chapter 7: Class of Service Setting Up the Schedule To configure map ports to priority queues, perform the following procedure: 1. From the main menu, select CoS Output Scheduling. 2. To set the weight for a queue, go to that queue and type a number. 3.
  • Page 59: Assigning Priority To Ports

    Assigning Priority to Ports To assign a priority to a specific port, perform the following procedure: 1. From the main menu, select CoS Port Priority Assignment. The CoS Port Priority Assignment page is shown in Figure 24. 2. Choose the port you want to set using the From and To lists. You can select one port (From 2 To 2, for example) or a range of ports (From 1 To 5, for example).
  • Page 60 Chapter 7: Class of Service...
  • Page 61: Chapter 8: Spanning Tree Protocol (Stp)

    Chapter 8 Spanning Tree Protocol (STP) This chapter contains the following sections: “Spanning Tree Overview” on page 62 “Configuring Spanning Tree” on page 71 “Configuring STP Port Settings” on page 74 Section I: Using the Menus Interface...
  • Page 62: Spanning Tree Overview

    Chapter 8: Spanning Tree Protocol (STP) Spanning Tree Overview The performance of a Ethernet network can be negatively impacted by the formation of a data loop in the network topology. A data loop exists when two or more nodes on a network can transmit data to each other over more than one data path.
  • Page 63: Path Costs And Port Costs

    You can change the bridge priority number in the AT-S82 management software. You can designate which switch on your network you want as the root bridge by giving it the lowest bridge priority number. You might also consider which bridge should function as the backup root bridge in the event you need to take the primary root bridge offline, and assign that bridge the second lowest bridge identifier number.
  • Page 64 Path cost is simply the sum of the port costs between a bridge and the root bridge. The AT-GS950/8 WebSmart switch automatically sets the port cost according to the speed of the port, assigning a lower value for higher speeds. Table 6 lists the STP port costs.
  • Page 65: Port Priority

    trunk. Table 7. RSTP Auto Port Trunk Costs Port Speed 10 Mbps 100 Mbps 1000 Mbps You cannot set the port cost manually. Port Priority If two paths have the same port cost, the bridges must select a preferred path. In some instances this can involve the use of the port priority parameter.
  • Page 66: Hello Time And Bridge Protocol Data Units (Bpdus)

    BPDU is called the hello time. This is a value that you can set in the AT-S82 management software. The interval is measured in seconds and the default is two seconds. Consequently, if an AT-GS950/8 WebSmart switch is selected as the root bridge of a spanning tree domain, it transmits a BPDU every two seconds.
  • Page 67: Point-To-Point And Edge Ports

    STP or RSTP, then the port is an edge port. Figure 26 illustrates an edge port on an AT-GS950/8 WebSmart switch. The port is connected to an Ethernet hub, which in turn is connected to a series of Ethernet workstations.
  • Page 68: Figure 27. Point-To-Point And Edge Port

    Chapter 8: Spanning Tree Protocol (STP) A port can be both a point-to-point and an edge port at the same time. It operates in full-duplex and has no STP or RSTP devices connected to it. Figure 27 illustrates a port functioning as both a point-to-point and edge port.
  • Page 69: Spanning Tree And Vlans

    AT-S82 Management Software User’s Guide If you decide to activate spanning tree on the switch, there is no reason not to activate RSTP on an AT-GS950/8 WebSmart switch even when all other switches are running STP. The switch can combine its RSTP with the STP of the other switches.
  • Page 70 Chapter 8: Spanning Tree Protocol (STP) information on tagged and untagged ports, refer to Chapter 6, “VLANs” on page 41.)
  • Page 71: Configuring Spanning Tree

    Configuring Spanning Tree To define the spanning tree settings at the switch level, perform the following procedure: 1. From the main menu, select STP Global Settings. The Switch Spanning Tree Settings page is shown in Figure 29. 2. From the STP Version list, select STP or RSTP. 3.
  • Page 72 For a list of the increments, refer to Table 3, “Bridge Priority Value Increments” on page 63. RSTP Enables the Remote Spanning Tree Protocol. STP Compatible Enables the Spanning Tree Protocol. maximum number of BPDU packets in each hello time. Enabled The AT-GS950/8 WebSmart switch does not process the BPDU...
  • Page 73 This is the default setting. Disabled The switch processes the BPDU packets. Allied Telesis recommends that you choose this setting. 10. Click Apply. To configure the ports, refer to “Configuring STP Port Settings,” next.
  • Page 74: Configuring Stp Port Settings

    Chapter 8: Spanning Tree Protocol (STP) Configuring STP Port Settings To configure the STP settings, perform the following procedure: 1. From the main menu, select STP Port Settings. 2. From the From and To lists, select the port(s) you want to configure, 3.
  • Page 75 This parameter is used as a tie breaker when two or more ports are determined to have equal costs to the root bridge. The range is 0 to 240 in increments of 16. The default value is 8 (priority value 128). For a list of the increments, refer to Table 8, “Port Priority Value Increments”...
  • Page 76 Chapter 8: Spanning Tree Protocol (STP)

This manual is also suitable for:

At-s82

Table of Contents

Save PDF