Allied Telesis AT-S80 User Manual

Management software for use with the at-fs750/16 and at-fs750/24 fast ethernet smart switches
Hide thumbs Also See for AT-S80:
Table of Contents

Advertisement

Quick Links

User's Guide
For use with the AT-FS750/16 and
AT-FS750/24 Fast Ethernet Smart
Switches
Version 2.0.0
613-000213 Rev. C
Management
Software
AT-S80

Advertisement

Table of Contents
loading

Summary of Contents for Allied Telesis AT-S80

  • Page 1 Management Software AT-S80 User’s Guide For use with the AT-FS750/16 and AT-FS750/24 Fast Ethernet Smart Switches Version 2.0.0 613-000213 Rev. C...
  • Page 2 Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of...
  • Page 3: Table Of Contents

    Viewing Switch Information ..........................43 Rebooting the Switch............................46 Pinging a Remote System ..........................48 Returning the AT-S80 Management Software to the Factory Default Values ..........51 Chapter 4: Port Configuration ........................53 Displaying the Port Parameters........................54 Enabling and Disabling a Port .......................... 56 Setting a Port’s Speed and Duplex Mode......................
  • Page 4 Contents Modifying a Port Trunk ............................67 Enabling and Disabling a Port Trunk ........................ 69 Chapter 6: IGMP Snooping ........................... 71 IGMP Snooping Overview..........................72 Configuring IGMP Snooping ..........................74 Enabling or Disabling IGMP Snooping ....................... 74 Setting the Age-out Timer........................... 76 Setting Group Members ..........................
  • Page 5 AT-S80 Management Software User’s Guide Trap Receivers............................121 Default SNMP Community Strings ......................... 123 Creating an SNMP Community ........................124 Adding an SNMP Community ........................124 Deleting an SNMP Community ........................ 126 Modifying an SNMP Community ......................127 Creating an SNMP Host ..........................129 Adding an SNMP Host ..........................
  • Page 6 Viewing System Information ...........................233 Rebooting a Switch ............................236 Pinging a Remote System ..........................238 Returning the AT-S80 Management Software to the Factory Default Values..........240 Chapter 22: Port Configuration ........................241 Viewing and Configuring Ports Using the Physical Configuration Page ............242 Chapter 23: Port Trunking ...........................245 Creating a Port Trunk............................246...
  • Page 7 AT-S80 Management Software User’s Guide Chapter 27: Destination MAC Address Filter .................... 265 Setting a Destination MAC Filter ........................266 Removing a MAC Address ..........................268 Chapter 28: Bandwidth Control ........................269 Configuring Bandwidth Control........................270 Chapter 29: Virtual LANs ..........................273 Assigning Ports to a VLAN ..........................
  • Page 8 Contents Appendix A: AT-S80 Software Default Settings ..................339 Index ................................343...
  • Page 9 Figures Figure 1. Connecting the Management Cable to the Console Port ..................26 Figure 2. Login Menu................................27 Figure 3. Main Menu................................27 Figure 4. Basic Switch Configuration Menu.........................32 Figure 5. System IP Configuration Menu..........................33 Figure 6. System Administration Configuration Menu ......................36 Figure 7. User Interface Configuration Menu........................39 Figure 8.
  • Page 10 Figure 51. Software Upgrade Menu (2 of 2) ........................209 Figure 52. Entering a Switch’s IP Address in the URL Field....................214 Figure 53. AT-S80 Login Dialog Box ..........................215 Figure 54. Home Page for the AT-FS750/24 Switch......................216 Figure 55. IP Setup Page ..............................220 Figure 56.
  • Page 11 Table 3. RSTP Auto-Detect Port Costs ..........................152 Table 4. RSTP Auto-Detect Port Trunk Costs ........................152 Table 5. Port Priority Value Increments ..........................153 Table 6. RSTP Point-to-Point Status ..........................167 Table 7. Traffic Comparison Options ..........................331 Table 8. AT-S80 Management Software Default Settings ....................339...
  • Page 12 Tables...
  • Page 13: Preface

    Preface This guide contains instructions on how to use the AT-S80 management software to monitor and manage the AT-FS750/16 and AT-FS750/24 Fast Ethernet Smart switches. The AT-S80 Management Software has two management interfaces: a menus interface and a web browser interface. You access the menus interface through the console port on the switch.
  • Page 14: Where To Find Web-Based Guides

    Preface Where to Find Web-based Guides The installation and user guides for all Allied Telesis products are available in portable document format (PDF) on our web site at www.alliedtelesis.com. You can view the documents online or download them onto a local workstation or server.
  • Page 15: Document Conventions

    AT-S80 Management Software User’s Guide Document Conventions This document uses the following conventions: Note Notes provide additional information. Caution Cautions inform you that performing or omitting a specific action may result in equipment damage or loss of data. Warning Warnings inform you that performing or omitting a specific action...
  • Page 16: Contacting Allied Telesis

    Then select the appropriate menu Support tab. Warranty All Allied Telesis warranties are subject to the terms and conditions set out in the Allied Telesis Limited Warranties on our web site at www.alliedtelesis.com/warranty. Returning Products for return or repair must first be assigned a return materials authorization (RMA) number.
  • Page 17: Chapter 1: Overview

    Chapter 1 Overview This chapter provides an overview of the AT-S80 Management Software for the AT-FS750/16 and AT-FS750/24 switches. This chapter contains the following sections: “Management Overview” on page 18 “Remote SNMP Management” on page 20 “Management Access Level” on page 21 “Ports 17 and 18 on the AT-FS750/16 Switch and Ports 25 and 26 on...
  • Page 18: Management Overview

    Chapter 1: Overview Management Overview The AT-S80 Management Software allows you to view and adjust the operating parameters of the AT-FS750/16 and AT-FS750/24 Fast Ethernet Switches. A few examples of the management functions are listed here: Enable and disable ports Configure a port’s speed and duplex mode...
  • Page 19: Local Management Connection

    It does not interfere with the forwarding of network packets by the device. Remote The AT-S80 management software has a web browser interface for managing the AT-FS750/16 and AT-FS750/24 switches remotely from any Management management station on your network that has a web browser application.
  • Page 20: Remote Snmp Management

    Chapter 1: Overview Remote SNMP Management You can also remotely configure the switch using a Simple Network Management (SNMP) application such as AT-View. This management method requires an understanding of Management Information Base (MIB) objects. Note You must assign an IP address to the switch for remote SNMP management.
  • Page 21: Management Access Level

    When you log in as a manager, you can view and configure all of the switch’s operating parameters. You log in as a manager by entering the appropriate username and password when you start an AT-S80 management session. The default username is “manager” and the default...
  • Page 22: Ports 17 And 18 On The At-Fs750/16 Switch And Ports 25 And 26 On The At-Fs750/24 Switch

    Chapter 1: Overview Ports 17 and 18 on the AT-FS750/16 Switch and Ports 25 and 26 on the AT-FS750/24 Switch Ports 17 and 18 on the AT-FS750/16 switch and ports 25 and 26 on the AT-FS750/24 switch are dual ports. Each has one 10/100/1000Base-T twisted pair port and one transceiver slot for an optional SFP transceiver.
  • Page 23: Using The Menus Interface

    Section I Using the Menus Interface The chapters in this section explain how to manage the switch using the menus interface of the AT-S80 management software. The chapters include: Chapter 2, “Getting Started with the Menus Interface” on page 25 Chapter 3, “Basic Switch Parameters”...
  • Page 24 Section I: Using the Menus Interface...
  • Page 25: Chapter 2: Getting Started With The Menus Interface

    Getting Started with the Menus Interface This chapter contains instructions on how to access the menus interface of the AT-S80 Management Software by starting a local management session. This chapter contains the following sections: “Starting a Local Management Session” on page 26 “Using the Menus Interface”...
  • Page 26: Starting A Local Management Session

    Chapter 2: Getting Started with the Menus Interface Starting a Local Management Session You establish a local management session with the switch by connecting a terminal or personal computer with a terminal emulation program to the the Console port on the front panel of the switch. Note The switch does not need an IP address when managed from a local management session.
  • Page 27: Figure 2. Login Menu

    AT-S80 Management Software User’s Guide The Login Menu is shown in Figure 2. ====================================================== AT-FS750/16 Management System Local - Console Allied Telesis International Corp. Copyright 2008 ====================================================== Login Menu Login: Figure 2. Login Menu 4. Enter the manager login name and press Return. The default name is “manager.”...
  • Page 28: Using The Menus Interface

    Chapter 2: Getting Started with the Menus Interface Using the Menus Interface If you are using a DEC VT00 or ANSI (the default) terminal configuration, refer to Table 1 for instructions on how to move through the menus and select menu options. Table 1.
  • Page 29: Quitting From A Local Management Session

    AT-S80 Management Software User’s Guide Quitting from a Local Management Session To quit from a local management session, return to the Main Menu and type Q for Quit. Always be sure to exit from a management session when you are finished. This can protect the switch from unauthorized changes to its configuration should you leave your workstation unattended.
  • Page 30 Chapter 2: Getting Started with the Menus Interface Section I: Using the Menus Interface...
  • Page 31: Chapter 3: Basic Switch Parameters

    “Setting the User Interface Configuration” on page 38 “Viewing Switch Information” on page 43 “Rebooting the Switch” on page 46 “Pinging a Remote System” on page 48 “Returning the AT-S80 Management Software to the Factory Default Values” on page 51 Section I: Using the Menus Interface...
  • Page 32: Configuring The Ip Address, Subnet Mask, And Gateway Address

    Chapter 3: Basic Switch Parameters Configuring the IP Address, Subnet Mask, and Gateway Address This procedure explains how to manually assign an IP address, subnet mask, and gateway address to the switch. Note the following before performing the procedure: The switch does not need an IP address, subnet mask, or default gateway for normal network operations.
  • Page 33: Figure 5. System Ip Configuration Menu

    AT-S80 Management Software User’s Guide 2. From the Basic Switch Configuration Menu, type I to select System IP Configuration. The System IP Configuration Menu is shown in Figure 5. Basic Switch Configuration -> System IP Configuration Menu MAC Address: 00:06:5H:B2:65:84 IP Address: 0.0.0.0...
  • Page 34 Chapter 3: Basic Switch Parameters b. Type the subnet mask for the switch and press Enter. 5. To set the switch’s gateway address, do the following: a. Type G to select Set Default Gateway. The following prompt is displayed: Enter new gateway IP address> b.
  • Page 35: Enabling And Disabling The Dhcp Client

    AT-S80 Management Software User’s Guide Enabling and Disabling the DHCP Client This procedure explains how to activate and deactivate the DHCP client on the switch. When the client is activated, the switch obtains its IP configuration from a DHCP server on your network. Note the following...
  • Page 36: Configuring System Administration Information

    Chapter 3: Basic Switch Parameters Configuring System Administration Information This section explains how to assign a name to the switch. It also explains how to specify the location of the switch and the name of the switch’s administrator. Entering this information is optional. To set a switch’s administration information, perform the following procedure: 1.
  • Page 37 50 characters. Note Allied Telesis recommends assigning a name to each switch. Names can make it easier for you to identify the various switches in your network and can also help you avoid performing a configuration procedure on the wrong switch.
  • Page 38: Setting The User Interface Configuration

    Change the console timer, used to automatically end inactive local management sessions. Change the AT-S80 management login user name and password. Enable and disable the web server, used to manage the switch from a remote management station with a web browser.
  • Page 39: Figure 7. User Interface Configuration Menu

    AT-S80 Management Software User’s Guide The User Interface Configuration Menu is shown in Figure 7. Basic Switch Configuration -> User Interface Configuration Menu Console UI Idle Timeout: 5 Min. Password Protection: Enabled SNMP Agent: Enabled Web Server: Enabled Administrator List: No.
  • Page 40 Chapter 3: Basic Switch Parameters This parameter applies to a local management session but not to a remote web management session. A web browser management session remains active so long as your web browser is open. Note If you select 0, you must always remember to properly log off from a local management session when you are finished to prevent blocking future management sessions with the switch.
  • Page 41 Enter new password> e. Type the new password and press Enter. The password can be from 0 to 12 characters. Allied Telesis recommends not using special characters, such as spaces and exclamation points. The password is case sensitive. Not entering a new password deletes the current password without assigning a new one.
  • Page 42 Chapter 3: Basic Switch Parameters The following prompt is displayed: Retype new password. Enter the new password a second time. You must use the new login password the next time you start a local or web browser management session. g. To change both the user name and its corresponding password, type B.
  • Page 43: Viewing Switch Information

    1. From the Main Menu, type G to select General Information. The General Information menu is shown in Figure 8. Main Menu -> General Information System up for: 24min(s), 36sec(s) Runtime Image: Version AT-S80 V2.0.0 [1.1.1.57] Boot Loader: Version 1.00.03 Hardware Information Version:...
  • Page 44 Chapter 3: Basic Switch Parameters Hardware Information Section Version The hardware version number. Fixed Baud Rate The baud rate of the console port. DRAM Size The size of the DRAM, in megabytes. Flash Size The size of the flash memory, in megabytes. Administration Information Section Switch Name The name of the switch.
  • Page 45 AT-S80 Management Software User’s Guide Automatic Network Features Section DHCP Mode The status of the DHCP client on the switch. For information about setting this parameter, refer to “Enabling and Disabling the DHCP Client” on page 35. 2. Press any key to return to the previous menu.
  • Page 46: Rebooting The Switch

    Chapter 3: Basic Switch Parameters Rebooting the Switch This procedure reboots the switch and reloads the AT-S80 management software from flash memory. You can reboot the device if you believe it is experiencing a problem. Rebooting the switch does not change any of the its parameter settings.
  • Page 47: Figure 10. System Reboot Menu

    Select reboot option (F/I/N)> 4. Type N to select Normal. Note The F and I options are described in “Returning the AT-S80 Management Software to the Factory Default Values” on page 51. 5. Type R to select Start Reboot Process.
  • Page 48: Pinging A Remote System

    Chapter 3: Basic Switch Parameters Pinging a Remote System This procedure instructs the switch to ping a node on your network. This procedure is useful in determining whether an active link exists between the switch and another network device. Note the following before performing the procedure: The switch must have an IP address and subnet mask.
  • Page 49 AT-S80 Management Software User’s Guide 3. Type I to select Set Target IP Address. The following prompt is displayed: Enter new target IP address> 4. Type the IP address of the node the switch is to ping and press Enter.
  • Page 50: Figure 12. Ping Results

    Chapter 3: Basic Switch Parameters Figure 12 shows an example of the results of a ping. Switch Tools Configuration -> Ping Execution Target IP Address: 149.35.8.33 Number of Requests: Timeout Value (sec): ================Result================= No. 1 20 ms No. 2 20 ms No.
  • Page 51: Returning The At-S80 Management Software To The Factory Default Values

    Returning the AT-S80 Management Software to the Factory Default Values This procedure returns all AT-S80 Management Software parameters to their default values. The default values are listed in Appendix A, ”AT-S80 Software Default Settings” on page 339. Caution This procedure reboots the switch. The device does not forward network traffic during the reboot process.
  • Page 52 6. Type Y to start the reboot process. The switch returns its operating parameters to the default values and begins to reload the AT-S80 Management Software. This process takes approximately one minute to complete. You can not manage the device during the reboot. After the reboot is finished, you can log in again if you want to continue to manage the device.
  • Page 53: Chapter 4: Port Configuration

    Chapter 4 Port Configuration This chapter contains the procedures for viewing and adjusting the parameter settings for the ports on the switch. This chapter contains the following sections: “Displaying the Port Parameters” on page 54 “Enabling and Disabling a Port” on page 56 “Setting a Port’s Speed and Duplex Mode”...
  • Page 54: Displaying The Port Parameters

    Chapter 4: Port Configuration Displaying the Port Parameters To display the parameter settings for the ports on the switch, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2.
  • Page 55 AT-S80 Management Software User’s Guide Type The port type. The port type will be one of the following: 10/100BaseTX - Base ports. 1000TX - Uplink 10/100/1000Base-TX twisted pair ports. 1000BaseX - Optional fiber optic SFP module. Link The status of the link between the port and the end node connected to the port.
  • Page 56: Enabling And Disabling A Port

    Chapter 4: Port Configuration Enabling and Disabling a Port This procedure allows you to enable or disable a port. A disabled port does not forward any ingress or egress packets. You may want to disable a port if a problem occurs with the node or cable connected to the port. After the problem is fixed, you can enable the port to resume normal operation.
  • Page 57: Setting A Port's Speed And Duplex Mode

    AT-S80 Management Software User’s Guide Setting a Port’s Speed and Duplex Mode To change a port’s speed or duplex mode, perform the following procedure: 1. From the Main Menu, type B to select Basic Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32 2.
  • Page 58 For 1000 Mbps operation on an uplink 10/100/1000Base-T twisted pair uplink port, Allied Telesis recommends using Auto- Negotiation. Setting the speed and duplex mode manually to 1000 Mbps full duplex is not recommended.
  • Page 59: Changing The Flow Control Setting

    AT-S80 Management Software User’s Guide Changing the Flow Control Setting Flow control applies to ports operating in full-duplex mode. A switch port uses flow control to control the flow of ingress packets from its end node. A port using flow control issues a special frame, referred to as a PAUSE frame, as specified in the IEEE 802.3x standard, to stop the transmission...
  • Page 60 Chapter 4: Port Configuration Section I: Using the Menus Interface...
  • Page 61: Chapter 5: Port Trunking

    Chapter 5 Port Trunking This chapter provides information and procedures for creating a port trunk and contains the following sections: “Port Trunking Overview” on page 62 “Creating a Port Trunk” on page 64 “Modifying a Port Trunk” on page 67 “Enabling and Disabling a Port Trunk”...
  • Page 62: Port Trunking Overview

    1 on the first AT-FS750 switch to port 6 on the second AT-FS750 switch, port 2 to port 7, and so on. To avoid compatibility problems, Allied Telesis recommends that both switches connected by a trunk are AT-FS750 switches. A port trunk between an AT-FS750 switch and another switch model might result in undesirable trunk behavior.
  • Page 63 AT-S80 Management Software User’s Guide Trunk 7 is reserved for the uplink ports 17 and 18 on the AT-FS750/16 switch and ports 25 and 26 on the AT-FS750/24 switch. You cannot add or remove ports from this trunk. To use the uplink ports as a port trunk, activate Trunk 7 as explained in “Enabling and Disabling a Port...
  • Page 64: Creating A Port Trunk

    Chapter 5: Port Trunking Creating a Port Trunk This procedure explains how to create a port trunk. Caution Do not connect the cables to the ports on the switches until after you have configured the trunk with the management software. Connecting the cables before configuring the software can create a loop in the network topology.
  • Page 65: Figure 15. Trunk Configuration Menu

    AT-S80 Management Software User’s Guide The Trunk Configuration Menu is shown in Figure 15. AT-FS750/24 Local Management System Advanced Switch Configuration -> Trunk Configuration Menu Group Status Port Members Trunk ID ------- -------------- --------------------- ---------- Disabled Disabled Disabled Disabled Disabled...
  • Page 66 Chapter 5: Port Trunking The following prompt is displayed: Enable or Disable trunk group number (E/D)> 8. Type E to enable the trunk. 9. Type Q to select Quit to previous menu and save your changes. The trunk is now operational on the switch. 10.
  • Page 67: Modifying A Port Trunk

    AT-S80 Management Software User’s Guide Modifying a Port Trunk This procedure adds and removes ports from a port trunk. Caution Disconnect the cables from the ports of the trunk before you modify the trunk. Leaving the cables connected can create a loop in the network topology.
  • Page 68 Chapter 5: Port Trunking You can specify the ports individually separated by commas (for example, 1,2,5), as a range of ports separated by a hyphen (for example, 2-4), or both (for example, 4,6,11-14). 6. Type Q to select Quit to previous menu and save your changes. 7.
  • Page 69: Enabling And Disabling A Port Trunk

    AT-S80 Management Software User’s Guide Enabling and Disabling a Port Trunk This procedure enables and disables a port trunk. Note the following before performing this procedure: Do not enable a port trunk until after you have configured the trunk on both switches.
  • Page 70 Chapter 5: Port Trunking 5. Type E to enable the trunk or D to disable it. 6. Type Q to select Quit to previous menu and save your changes. Section I: Using the Menus Interface...
  • Page 71: Chapter 6: Igmp Snooping

    Chapter 6 IGMP Snooping This chapter explains how to activate and configure the Internet Group Management Protocol (IGMP) snooping feature on the switch. Sections in the chapter include: “IGMP Snooping Overview” on page 72 “Configuring IGMP Snooping” on page 74 Section I: Using the Menus Interface...
  • Page 72: Igmp Snooping Overview

    Chapter 6: IGMP Snooping IGMP Snooping Overview IGMP enables IPv4 routers to create lists of nodes that are members of multicast groups. (A multicast group is a group of end nodes that want to receive multicast packets from a multicast application.) The router creates a multicast membership list by periodically sending out queries to the local area networks connected to its ports.
  • Page 73 AT-S80 Management Software User’s Guide Without IGMP snooping, a switch needs to flood multicast packets from all of its ports, except the port on which it received the packet. Such flooding of packets can negatively impact network performance. The AT-FS750 switches maintain a list of multicast groups through an...
  • Page 74: Configuring Igmp Snooping

    Chapter 6: IGMP Snooping Configuring IGMP Snooping The procedures in this section describe how to enable or disable IGMP snooping, set the age-out timer, and view group members. See the following procedures: “Enabling or Disabling IGMP Snooping” on page 74 “Setting the Age-out Timer”...
  • Page 75: Figure 17. Igmp Snooping Configuration Menu

    AT-S80 Management Software User’s Guide The IGMP Snooping Configuration Menu is shown in Figure 17. Advanced Switch Configuration -> IGMP Snooping Configuration Menu IGMP Snooping Status: Disabled IGMP Snooping Age-Out Timer: 280 seconds Multicast Group Address ----------------------- -------------------------------<COMMAND>------------------------------ [N}ext Page...
  • Page 76: Setting The Age-Out Timer

    Chapter 6: IGMP Snooping Setting the Age- Use the following procedure to set the age-out timer. out Timer 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 16 on page 74.
  • Page 77 AT-S80 Management Software User’s Guide The following prompt is displayed: Enter MAC Address (xx:xx:xx:xx:xx:xx)> 4. Enter a Multicast Group MAC address in the format xx:xx:xx:xx:xx. The range of the multicast MAC address is from 01:00:5E:00:01:00 to 01:00:5E:7F:FF:FF. The IGMP Configuration Menu is updated with the information.
  • Page 78 Chapter 6: IGMP Snooping Section I: Using the Menus Interface...
  • Page 79: Chapter 7: Static Multicast Address

    Chapter 7 Static Multicast Address This chapter explains how to assign static multicast addresses. Sections in the chapter include: “Static Multicast Address Overview” on page 80 “Creating a Static Multicast Address” on page 81 Section I: Using the Menus Interface...
  • Page 80: Static Multicast Address Overview

    Chapter 7: Static Multicast Address Static Multicast Address Overview There are 4 ways to populate the database of a MAC address table: Static unicast addresses which can only be assigned to one port Static multicast addresses which can be assigned to multiple ports Broadcast addresses which are broadcast to all of the ports on a switch Dynamically learned MAC addresses...
  • Page 81: Creating A Static Multicast Address

    AT-S80 Management Software User’s Guide Creating a Static Multicast Address The procedures in this section describe how to create, delete, and modify static multicast addresses. See the following procedures: “Adding a Static Multicast Address” on page 81 “Deleting a Static Group” on page 82 “Deleting a Static Member Port”...
  • Page 82: Deleting A Static Group

    Chapter 7: Static Multicast Address The following prompt is displayed: Enter MAC address for multicast entry > 4. Type a multicast MAC address. Then press enter. The range of acceptable multicast MAC addresses is from 01:00:5E:00:01:00 to 01:00:5E:7F:FF:FF. The following prompt is displayed: Select group member >...
  • Page 83: Deleting A Static Member Port

    AT-S80 Management Software User’s Guide You can add more than one group member at a time. You can specify the values individually (for example, 2,5,11), as a range (for example, 4-7), or both (for example, 2,5,11-15). 6. Type Q to select Quit to previous menu and save your changes.
  • Page 84 Chapter 7: Static Multicast Address Section I: Using the Menus Interface...
  • Page 85: Chapter 8: Port Mirroring

    Chapter 8 Port Mirroring This chapter provides a description of the Port Mirroring feature and contains procedures for setting up this feature. Port mirroring allows you to unobtrusively monitor the ingress and egress traffic on a port by copying the traffic to another port. This chapter contains the following sections: “Port Mirroring Overview”...
  • Page 86: Port Mirroring Overview

    Chapter 8: Port Mirroring Port Mirroring Overview The port mirroring feature allows you to unobtrusively monitor the ingress and egress traffic on a port by copying the traffic to another port. You can connect a network analyzer to the port where the traffic is copied and monitor it without impacting performance or speed.
  • Page 87: Configuring Port Mirroring

    AT-S80 Management Software User’s Guide Configuring Port Mirroring To set up port mirroring, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 16 on page 70.
  • Page 88 Chapter 8: Port Mirroring 7. Type E to select Enable/Disable Port Mirroring. The following prompt is displayed: Enable or Disable monitoring (E/D)> 8. Type E to enable port mirroring. You can now connect your data analyzer to the mirroring port. 9.
  • Page 89: Enabling Or Disabling Port Mirroring

    AT-S80 Management Software User’s Guide Enabling or Disabling Port Mirroring To enable or disable port mirroring on the switch, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64.
  • Page 90 Chapter 8: Port Mirroring Section I: Using the Menus Interface...
  • Page 91: Chapter 9: Dial-In User Configuration

    Chapter 9 Dial-in User Configuration This chapter describes the Dial-in User feature and provides procedures for configuring this feature. Sections in the chapter include: “Dial-in User Configuration Overview” on page 92 “Configuring a Dial-in User” on page 93 Section I: Using the Menus Interface...
  • Page 92: Dial-In User Configuration Overview

    Chapter 9: Dial-in User Configuration Dial-in User Configuration Overview The Dial-in User Configuration feature allows you to add and delete, and modify dial-in users to the AT-FS750 switch. In addition, you must assign each dial-in user a password and a VLAN. See Chapter 10, “Virtual LANs” on page 97 for more information about VLANs and VIDs.
  • Page 93: Configuring A Dial-In User

    AT-S80 Management Software User’s Guide Configuring a Dial-in User The procedures in this section describe how to create, delete, and modify dial-in users. See the following procedures: “Adding a Dial-in User” on page 93 “Deleting a Dial-in User” on page 94 “Modifying a Dial-in User”...
  • Page 94: Deleting A Dial-In User

    Chapter 9: Dial-in User Configuration 3. Type A to select Add User. The following prompt is displayed: Enter dial-in user name > 4. Type a name of a dial-in user. Then press Enter. The following prompt is displayed: Enter dial-in user password > 5.
  • Page 95: Modifying A Dial-In User

    AT-S80 Management Software User’s Guide Modifying a To change the password or the VLAN assignment of a dial-in user, perform the following procedure. Dial-in User 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64.
  • Page 96 Chapter 9: Dial-in User Configuration Section I: Using the Menus Interface...
  • Page 97: Chapter 10: Virtual Lans

    Chapter 10 Virtual LANs This chapter contains the procedures for creating, modifying, and deleting port-based and tagged Virtual Local Area Networks (VLANs). This chapter contains the following sections: “VLAN Overview” on page 98 “Port-based VLAN Overview” on page 100 “Tagged VLAN Overview” on page 101 “Creating a VLAN”...
  • Page 98: Vlan Overview

    VLAN remains within the VLAN. With VLANs, you can segment your network through the switch’s AT-S80 management software and so be able to group nodes with related functions into their own separate, logical LAN segments. These VLAN groupings can be based on similar data needs or security requirements.
  • Page 99 AT-S80 Management Software User’s Guide But with VLANS, you can change the LAN segment assignment of an end node connected to the switch through the switch’s AT-S80 management software. You can change the VLAN memberships through the management software without moving the workstations physically, or changing group memberships by moving cables from one switch port to another.
  • Page 100: Port-Based Vlan Overview

    A port-based VLAN can have as many or as few ports as needed. The VLAN can consist of all the ports on an Ethernet switch, or just a few ports. The parts of a port-based VLAN in the AT-S80 management software are: VLAN name...
  • Page 101: Tagged Vlan Overview

    AT-S80 Management Software User’s Guide Tagged VLAN Overview The second type of VLAN supported by the AT-S80 management software is the tagged VLAN. VLAN membership in a tagged VLAN is determined by information within the frames that are received on a port and the VLAN configuration of each port.
  • Page 102: Port Vlan Identifier

    Chapter 10: Virtual LANs The IEEE 802.1Q standard describes how tagging information within a packet is used to forward or discard traffic throughout the switch. If the incoming packet has a VLAN tag that matches one of the Group IDs of which the port is a member, the packet is accepted and forwarded to the appropriate port(s) within that VLAN.
  • Page 103: Creating A Vlan

    AT-S80 Management Software User’s Guide Creating a VLAN This section contains the procedure for creating a new port-based or tagged VLAN. This procedure assigns the VLAN a name, a VID number, and the untagged and tagged member ports. After you have performed this procedure, you must configure the untagged ports of the VLAN by adjusting their PVID values to match the virtual LAN’s VID number.
  • Page 104: Figure 22. Tagged-Based Vlan Configuration Menu

    Chapter 10: Virtual LANs 3. Type V to select 802.1Q VLAN. The Tagged-based VLAN Configuration Menu is shown in Figure 22. VLAN Management Menu -> Tagged-based VLAN Configuration VLAN ID VLAN Name VLAN Type ------- ------------------------------- --------- Default VLAN Permanent Sales Static ----------------------- <COMMAND>...
  • Page 105: Figure 23. Vlan Creation Menu

    AT-S80 Management Software User’s Guide The VLAN Creation Menu is shown in Figure 23. VLAN Management -> VLAN Creation Menu VLAN ID: VLAN Name: Port Member ---------------------------------------------------------------------- Tagged: UnTagged: ------------------------- <COMMAND> ---------------------------------- Set VLAN [I]D/[I]ndex [S]elect Port Member Set VLAN [N]ame...
  • Page 106 Chapter 10: Virtual LANs 10. Type T to indicate a tagged port or U to indicate an untagged port. 11. When the VLAN is complete, type A to select Apply and apply the VLAN settings. The Tagged-based VLAN Configuration Menu is displayed again with information about the VLAN you just created.
  • Page 107: Configuring The Pvid Of Untagged Ports

    AT-S80 Management Software User’s Guide Configuring the PVID of Untagged Ports This procedure adjusts a port’s VID value. The PVID value determines the VLAN in which the port is an untagged member. A port can be an untagged member of only one VLAN at a time. A port is an untagged member of the VLAN whose VID value matches its PVID.
  • Page 108: Figure 24. Port-Based Vlan Configuration Menu

    Chapter 10: Virtual LANs The Port-Based VLAN Configuration Menu is shown in Figure 24. VLAN Management -> Port-Based VLAN Configuration Menu Index Group Name Group Member ------- ------------- --------------------------- Sales Marketing 7,9-11 ------------------------- <COMMAND> ---------------------------------- [N]ext Page [A]dd Member Port [C]hange VLAN Group Name [P]revious Page [D]elete Member Port...
  • Page 109: Changing The Pvid

    AT-S80 Management Software User’s Guide 9. Type the name of the VLAN group. The VLAN name can contain up to 32 characters including spaces. Then press Enter. 10. Type Q to select Quit to previous menu and save your changes.
  • Page 110: Changing Port Vlan Type

    Chapter 10: Virtual LANs Changing Port To change the of ports that are assigned to a port-based VLAN on the VLAN Management Menu, perform the following procedure. VLAN Type 1. From the Main Menu, type A to select Advanced Switch Configuration.
  • Page 111: Displaying The Vlans

    AT-S80 Management Software User’s Guide Displaying the VLANs To display a list of the port-based and tagged VLANs on the switch, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64.
  • Page 112: Figure 25. Config Vlan Member Menu

    Chapter 10: Virtual LANs The Config VLAN Member Menu is shown in Figure 25. VLAN Management -> Config VLAN Member VLAN ID: 3 VLAN Name: Marketing Port Tagging ---------------------------------------------------------------------- ----------------------- <COMMAND> ------------------------------------ [N]ext Page [C]hange VLAN Name [A]dd VLAN Member [P]revious page [R]emove VLAN Member [Q]uit to Previous Menu...
  • Page 113: Resetting A Vlan To The Default Value

    AT-S80 Management Software User’s Guide Resetting a VLAN to the Default Value To delete all of the Port-based and Tagged VLANs on the switch and restore the default VLAN with a value of 1, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration.
  • Page 114: Modifying A Vlan

    Chapter 10: Virtual LANs Modifying a VLAN This procedure allows you to perform the following functions: Change the name of a VLAN. Add or remove tagged ports from a VLAN. Before performing this procedure, note the following: You cannot change the VID of a VLAN. You cannot add an untagged port to a VLAN with this procedure.
  • Page 115 AT-S80 Management Software User’s Guide 6. To change the VLAN’s name, do the following: a. Type C to select Change VLAN Name. The following prompt is displayed: Enter new VLAN name> b. Type the new name for the VLAN and press Enter. A VLAN name can be up to 32 characters and can include spaces.
  • Page 116: Deleting A Vlan

    Chapter 10: Virtual LANs Deleting a VLAN There are two separate procedures for deleting a VLAN depending on whether it is a Tagged or Port-based VLAN. See the following sections. Deleting a Port- To delete a port from a Port-based VLAN, perform the following procedure.
  • Page 117: Deleting A Tagged Vlan

    AT-S80 Management Software User’s Guide Deleting a Tagged To delete a Tagged VLAN, perform the following procedure: VLAN 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64.
  • Page 118 Chapter 10: Virtual LANs Section I: Using the Menus Interface...
  • Page 119: Chapter 11: Simple Network Management Protocol (Snmp)

    Chapter 11 Simple Network Management Protocol (SNMP) This chapter explains how to activate SNMP management on the switch and how to create, modify, and delete SNMPv1 and SNMPv2c community strings. Sections in the chapter include: “SNMP Overview” on page 120 “Creating an SNMP Community”...
  • Page 120: Snmp Overview

    Activate SNMP management on the switch. The default setting for SNMP management is disabled. Load the Allied Telesis MIBs for the switch onto your management workstation containing the SNMP application program. The MIBs are available from the Allied Telesis web site at www.alliedtelesis.com.
  • Page 121: Community String Attributes

    AT-S80 Management Software User’s Guide Community String Attributes A community string has attributes for controlling who can use the string and what the string will allow a network management to do on the switch. The community string attributes are defined below:...
  • Page 122 Chapter 11: Simple Network Management Protocol (SNMP) Trap receivers are the devices, typically management workstations or servers, that you want to receive the traps sent by the switch. You specify the trap receivers by their IP addresses. You assign the IP addresses to the community strings.
  • Page 123: Default Snmp Community Strings

    AT-S80 Management Software User’s Guide Default SNMP Community Strings The AT-S80 Management Software provides two default community strings: public and private. The public string has an access mode of Read- Only and the private string has an access mode of Read/Write. If you...
  • Page 124: Creating An Snmp Community

    Chapter 11: Simple Network Management Protocol (SNMP) Creating an SNMP Community The procedures in this section describe how to create, delete, and modify an SNMP community. See the following procedures: “Adding an SNMP Community” on page 124 “Deleting an SNMP Community” on page 126 “Modifying an SNMP Community”...
  • Page 125: Figure 27. Snmp Configuration Menu

    AT-S80 Management Software User’s Guide The SNMP Configuration Menu is shown in Figure 27. Basic Switch Configuration -> SNMP Configuration Menu [C]ommunity Configuration [H]ost Configuration [T]rap Receiver Configuration [Q]uit to previous menu Command> Figure 27. SNMP Configuration Menu 3. From the SNMP Configuration Menu, type C to select Community Configuration.
  • Page 126: Deleting An Snmp Community

    Chapter 11: Simple Network Management Protocol (SNMP) 4. To add a new community, type A to select Add New Community Entry. The following prompt is displayed: Enter entry number> a. Type an available entry number from 1 through 8. The following prompt is displayed: Enter community name>...
  • Page 127: Modifying An Snmp Community

    AT-S80 Management Software User’s Guide Modifying an Use the following procedure to modify an existing SNMP community. SNMP 1. From the Main Menu, type B to select Basic Switch Configuration. Community The Basic Switch Configuration Menu is shown in Figure 26 on page 124.
  • Page 128 Chapter 11: Simple Network Management Protocol (SNMP) The following prompt is displayed: Enter community name> b. Enter the new name of the SNMP community. You can enter a name of up to 20 characters in length. Special characters such as *, $, and @ are permitted.
  • Page 129: Creating An Snmp Host

    AT-S80 Management Software User’s Guide Creating an SNMP Host This procedures in this section adds, removes, and modifies SNMP hosts. Adding an SNMP To add or remove ports from a trunk, perform the following procedure: Host 1. From the Main Menu, type B to select Basic Switch Configuration.
  • Page 130: Deleting An Host Entry

    Chapter 11: Simple Network Management Protocol (SNMP) 4. Type A to select Add New Host Entry. The following prompt is displayed: Enter entry number> a. Enter a value between 1 and 10. Then press Enter. The following prompt is displayed: Enter IP address for host>...
  • Page 131: Modifying An Host Entry

    AT-S80 Management Software User’s Guide The Host Configuration Menu is updated. 5. Type Q to select Quit to previous menu and save your changes. Modifying an To modify an entry from the Host Community Menu, perform the following procedure: Host Entry 1.
  • Page 132 Chapter 11: Simple Network Management Protocol (SNMP) The following prompt is displayed: Enter community name> e. Enter the new community name followed by Enter. Select B to change both the IP address and Community. The following prompt is displayed: Enter IP address for host> g.
  • Page 133: Enabling And Disabling Snmp Traps

    AT-S80 Management Software User’s Guide Enabling and Disabling SNMP Traps The procedures in this section describe how to enable, disable, and modify traps. See the following procedures: “Enabling an SNMP Trap” on page 133 “Deleting a Trap Receiver” on page 135 “Modifying a Trap Receiver”...
  • Page 134: Figure 30. Trap Receiver Configuration Menu

    Chapter 11: Simple Network Management Protocol (SNMP) The Trap Receiver Configuration Menu is displayed in Figure 29. SNMP Configuration Menu -> Trap Receiver Configuration Menu Authentication Trap:Enabled Version IP Address Community ---- ------- ------------- -------------- 167.114.71.1 Tech Com 167.114.71.2 Tech Com 167.114.71.3 System Test ------------------------------<COMMAND>-------------------------------...
  • Page 135: Deleting A Trap Receiver

    AT-S80 Management Software User’s Guide d. Enter a previously defined community name followed by Enter. See “Adding an SNMP Community” on page 124. The Trap Receiver Configuration Menu is redrawn with the new trap displayed. 5. Type Q to select Quit to previous menu and save your changes.
  • Page 136 Chapter 11: Simple Network Management Protocol (SNMP) The Trap Receiver Configuration Menu is displayed in Figure 29 on page 129. 4. Type M to select Modify Trap Receiver Entry. The following prompt is displayed: Enter entry number> a. Enter a trap number between 1 and 10. Then press Enter. The following prompt is displayed: Choose which to be modified (V/I/C/A) >...
  • Page 137: Enabling Or Disabling Traps

    AT-S80 Management Software User’s Guide h. Enter a previously defined community name followed by Enter. See “Adding an SNMP Community” on page 124. Type A to change the trap version, IP address, and community name. Then press Enter. The following prompt is displayed: Enter trap version (1/2) >...
  • Page 138 Chapter 11: Simple Network Management Protocol (SNMP) a. Enter E to enable all configured traps. Or, enter D to disable all configured traps. Note You can only enable or disable all traps. You may not enable or disable traps individually. 5.
  • Page 139: Chapter 12: Quality Of Service (Qos)

    Chapter 12 Quality of Service (QoS) This chapter contains the procedures for configuring Quality of Service (QoS). This chapter contains the following sections: “QoS Overview” on page 140 “Mapping CoS Priorities to Egress Queues” on page 143 “Changing the Temporary Priority Level of Untagged Traffic” on page 146 Section I: Using the Menus Interface...
  • Page 140: Qos Overview

    The priorities are 0 to 7, with 0 the lowest priority and 7 the highest. When a tagged packet is received on a port on the switch, it is examined by the AT-S80 software for its priority. The switch software uses the priority to determine which egress priority queue the packet should be stored in on the egress port.
  • Page 141: Table 2. Default Mappings Of Ieee 802.1P Priority Levels To Egress Port Priority Queues

    Note QoS is disabled by default on the switch. You can customize these priority-to-queue assignments using the AT-S80 management software. The procedure for changing the default mappings is found in “Mapping CoS Priorities to Egress Queues” on page 143. Note that because all ports must use the same priority-to-egress queue mappings, they are applied at the switch level.
  • Page 142 Chapter 12: Quality of Service (QoS) The default setting for Quality of Service is disabled. When the feature is disabled, all tagged packets are stored in the lowest priority egress queue of a port. Section I: Using the Menus Interface...
  • Page 143: Mapping Cos Priorities To Egress Queues

    AT-S80 Management Software User’s Guide Mapping CoS Priorities to Egress Queues This procedure changes the mappings of CoS priority levels to egress priority queues. The default mappings are shown in Table 2 on page 141. This is set at the switch level and applies to all ports. This procedure also enables and disables QoS.
  • Page 144: Figure 32. Traffic Class Configuration Menu

    Chapter 12: Quality of Service (QoS) The Traffic Class Configuration Menu is shown in Figure 32. Quality of Service Configuration -> Traffic Class Configuration Menu QoS Status: Disabled Traffic Class Queue ------------- ----- 3: Highest 0: Lowest ----------------------- <COMMAND> ------------------------------------ Set [S]tatus Set [P]riority Queue [Q]uit to previous Page...
  • Page 145 AT-S80 Management Software User’s Guide The following prompt is displayed: Enter queue for traffic class > c. Enter the new egress queue number for the traffic class. The range is 0 to 3 where 0 is the lowest priority queue and 3 is the highest.
  • Page 146: Changing The Temporary Priority Level Of Untagged Traffic

    Chapter 12: Quality of Service (QoS) Changing the Temporary Priority Level of Untagged Traffic This procedure explains how to change the temporary priority level of untagged packets that enter a port, and so change the egress queue where the packets are stored. For example, you could assign a temporary priority value of 5 to the untagged packets received on a port so that the packets are stored in queue 2 on the egress port.
  • Page 147: Figure 33. Port Priority Configuration Menu

    AT-S80 Management Software User’s Guide The Port Priority Configuration Menu is shown in Figure 33. Quality of Service Configuration -> Port Priority Configuration Menu QoS Status: Enabled Port Trunk Traffic Class Queue Override ---- ----- ------------- ----- -------- Disabled Enabled...
  • Page 148 Chapter 12: Quality of Service (QoS) packets received on the port are stored in queue 0 on the egress port. If this field is set to Enable, all untagged packets received on the port are stored in the egress queue specified in the table. 4.
  • Page 149: Chapter 13: Rapid Spanning Tree Protocol (Rstp)

    Chapter 13 Rapid Spanning Tree Protocol (RSTP) This chapter describes how to configure the Rapid Spanning Tree Protocol (RSTP) on the switch and includes the following sections: “RSTP Overview” on page 150 “Enabling or Disabling RSTP” on page 157 “Configuring the RSTP Bridge Settings” on page 160 “Configuring STP Compatibility”...
  • Page 150: Rstp Overview

    Chapter 13: Rapid Spanning Tree Protocol (RSTP) RSTP Overview The performance of a Ethernet network can be negatively impacted by the formation of a data loop in the network topology. A data loop exists when two or more nodes on a network can transmit data to each other over more than one data path.
  • Page 151 AT-S80 Management Software User’s Guide You can designate which switch on your network you want as the root bridge by giving it the lowest bridge priority number. You might also consider which bridge should function as the backup root bridge in the event you need to take the primary root bridge offline, and assign that bridge the second lowest bridge identifier number.
  • Page 152: Table 3. Rstp Auto-Detect Port Costs

    Chapter 13: Rapid Spanning Tree Protocol (RSTP) Table 3 lists the RSTP port costs with Auto-Detect. Table 3. RSTP Auto-Detect Port Costs Port Speed Port Cost 10 Mbps 2,000,000 100 Mbps 200,000 1000 Mbps 20,000 Table 4 lists the RSTP port costs with Auto-Detect when the port is part of a port trunk.
  • Page 153: Table 5. Port Priority Value Increments

    BPDU is called the hello time. This is a value that you can set in the AT-S80 Management Software. The interval is measured in seconds and the default is two seconds. Consequently, if an AT-FS750 switch is selected as the root bridge of a spanning tree domain, it transmits a BPDU every two seconds.
  • Page 154: Figure 34. Point-To-Point Ports

    Chapter 13: Rapid Spanning Tree Protocol (RSTP) There are two possible selections: Point-to-point port Edge port The default setting for the RSTP port point-to-point status is automatic. With the automatic setting, the point-to-point status is True of the port is operating in full-duplex mode.
  • Page 155: Mixed Stp And Rstp Networks

    AT-S80 Management Software User’s Guide AT-FS750/24 24-Port 10/100Mbps + 2 SFP/1000T Combo WebSmart Switch SPEED LINK/ACT 1000M SPEED 100M LINK/ACT LINK/ACT POWER Edge Port Figure 35. Edge Port A port can be both a point-to-point and an edge port at the same time.
  • Page 156: Rapid Spanning Tree And Vlans

    RSTP or STP BPDU packets. Rapid Spanning The spanning tree implementation in the AT-S80 Management Software is a single-instance spanning tree. The switch supports just one spanning Tree and VLANs tree. You cannot define multiple spanning trees.
  • Page 157: Enabling Or Disabling Rstp

    AT-S80 Management Software User’s Guide Enabling or Disabling RSTP To enable or disable RSTP, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32.
  • Page 158 Chapter 13: Rapid Spanning Tree Protocol (RSTP) Root Path Cost The sum of all the root port costs of all the bridges between the switch’s root port and the root bridge including the switch’s root port cost. Time Since Topology Change The time in seconds since the last topology change took place.
  • Page 159 AT-S80 Management Software User’s Guide Bridge Forward Delay This is the time interval between generating and sending configuration messages by the bridge. 3. Type E to select Enable/Disable Global RSTP. The following prompt is displayed: Enable or Disable Global RSTP (E/D)>...
  • Page 160: Configuring The Rstp Bridge Settings

    Chapter 13: Rapid Spanning Tree Protocol (RSTP) Configuring the RSTP Bridge Settings To configure the RSTP bridge settings, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2.
  • Page 161 AT-S80 Management Software User’s Guide The following prompt is displayed: Enter bridge maximum age> Indicates the length of time after which stored bridge protocol data units (BPDUs) are deleted by the bridge. All of the bridges in a bridged LAN use this aging time to test the age of stored configuration messages called bridge protocol data units (BPDUs).
  • Page 162: Configuring Stp Compatibility

    Chapter 13: Rapid Spanning Tree Protocol (RSTP) Configuring STP Compatibility Choosing an RSTP protocol version allows you to determine if the switch ports will operate in RSTP-only mode or are STP-compatible. This setting applies to all of the ports; you cannot set this on a per-port basis. To configure the STP compatibility, perform the following procedure: 1.
  • Page 163: Configuring Rstp Port Settings

    AT-S80 Management Software User’s Guide Configuring RSTP Port Settings This section contains the following topics: “Configuring the Basic RSTP Port Settings,” next “Configuring the Advanced RSTP Port Settings” on page 165 Configuring the To configure the basic RSTP port settings, perform the following...
  • Page 164 Chapter 13: Rapid Spanning Tree Protocol (RSTP) 4. Type I to select Set Port Priority. The following prompt is displayed: Select port number to be changed> Port number is in range from 1 to 9, 0 to set all ports 5.
  • Page 165: Configuring The Advanced Rstp Port Settings

    AT-S80 Management Software User’s Guide Select port number to be changed> Port number is in range from 1 to 9, 0 to set all ports This parameter enables or disables RSTP on a specified port or a group of ports in a trunk.
  • Page 166: Figure 40. Rstp Advanced Port Configuration Menu

    Chapter 13: Rapid Spanning Tree Protocol (RSTP) The RSTP Advanced Port Configuration menu is shown in Figure 39. Rapid Spanning Tree Configuration -> RSTP Advanced Port Configuration Port Trunk Link State Role Admin/OperEdge Admin/OperPtoP Migrat ---- ----- ---- ---------- --------- -------------------------------------- Down Forwarding Disabled False/False...
  • Page 167: Table 6. Rstp Point-To-Point Status

    AT-S80 Management Software User’s Guide The following prompt is displayed: Select port number to be changed> Port number is in range from 1 to 9, 0 to set all ports 8. Enter the number of the port you want to change, or type 0 (zero) to apply the settings to all ports on the switch.
  • Page 168: Displaying The Rstp Topology

    Chapter 13: Rapid Spanning Tree Protocol (RSTP) Displaying the RSTP Topology To display the RSTP topology, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32. 2.
  • Page 169 AT-S80 Management Software User’s Guide Link Whether the link on the port is up or down. Desig. Root The designated root bridge is the switch that is directly connected to the local switch. The MAC address of the designated root bridge is displayed.
  • Page 170 Chapter 13: Rapid Spanning Tree Protocol (RSTP) Section II: Menus Interface...
  • Page 171: Chapter 14: Bandwidth Control

    Chapter 14 Bandwidth Control This chapter explains how to activate and configure the Internet Group Management Protocol (IGMP) snooping feature on the switch. Sections in the chapter include: “Bandwidth Control Overview” on page 172 “Configuring Bandwidth Control” on page 173 Section I: Using the Menus Interface...
  • Page 172: Bandwidth Control Overview

    Chapter 14: Bandwidth Control Bandwidth Control Overview If the performance of your network is affected by heavy traffic, you can use bandwidth control to set the rate of various types of packets that a port receives. You can control ingress packet types, including broadcast, multicast, and DLF packets or a combination of all three types, and limit their rates.
  • Page 173: Configuring Bandwidth Control

    AT-S80 Management Software User’s Guide Configuring Bandwidth Control The procedures in this section describe how to set bandwidth control options on the switch and on the ports. See the following sections: “Assigning Broadcast or Multicast Packets” on page 173 “Setting the Ingress Limit Rate” on page 174 “Setting Ingress Status”...
  • Page 174: Setting The Ingress Limit Rate

    Chapter 14: Bandwidth Control 3. From the Advanced Switch Configuration Menu, type M to select Set Ingress Mode. The following prompt is displayed: Set Bandwidth Control-> Enter port number> 4. Type a port number. Then press Enter. The following prompt is displayed for port 12: Enter Ingress Mode for port 12 (B/M) >...
  • Page 175: Setting Ingress Dlf Status

    AT-S80 Management Software User’s Guide 3. Type I to select Set Ingress. The following prompt is displayed: Set Bandwidth Control-> Enter port number> 4. Type a port number. Then press Enter. The following prompt is displayed if you select port 12: Enable or Disable Ingress Bandwidth Control for port 12 (E/D)>...
  • Page 176 Chapter 14: Bandwidth Control Section I: Using the Menus Interface...
  • Page 177: Chapter 15: Ip Access List

    Chapter 15 IP Access List This chapter explains how to activate and configure the IP Access List feature on the switch. Sections in the chapter include: “IP Access List Overview” on page 178 “Configuring IP Access List” on page 179 Section I: Using the Menus Interface...
  • Page 178: Ip Access List Overview

    Chapter 15: IP Access List IP Access List Overview The IP Access List feature, when enabled, restricts remote (web) access to the management software by means of a user-configured list of IP addresses. It does not restrict the management ping response activity. Note By default, the IP Access List feature is disabled.
  • Page 179: Configuring Ip Access List

    AT-S80 Management Software User’s Guide Configuring IP Access List The procedures in this section describe how to enable or disable the IP Access List Restriction feature and how to add or remove IP addresses from the list. See the following sections: “Enabling or Disabling IP Access List Restriction”...
  • Page 180: Adding Or Removing Ip Addresses

    Chapter 15: IP Access List 3. To enable the IP Access List feature, type S to select Set IP Restriction Status. The following prompt is displayed: Enable or Disable IP Restriction (E/D) > 4. Type E to enable the IP Restriction feature or D to disable the IP Restriction feature.
  • Page 181: Chapter 16: Destination Mac Filter

    Chapter 16 Destination MAC Filter This chapter explains how to activate the Destination MAC filter on the switch. Sections in the chapter include: “Destination MAC Filtering Overview” on page 182 “Configuring Destination MAC Filtering” on page 183 Section I: Using the Menus Interface...
  • Page 182: Destination Mac Filtering Overview

    Chapter 16: Destination MAC Filter Destination MAC Filtering Overview Destination MAC Filtering is a security feature that prevents AT-FS750/16 or AT-FS750/24 switches from receiving packets from a particular device which is specified by its MAC address. After you add a MAC address of a device to the list of Destination MAC Filtering, then the AT-FS750 switch drops or discards packets sent from this device.
  • Page 183: Configuring Destination Mac Filtering

    AT-S80 Management Software User’s Guide Configuring Destination MAC Filtering The procedures in this section describe how to add or remove MAC addresses from the Destination MAC filtering addresses. See the following procedures: “Setting Destination MAC Filtering” on page 183 “Removing Destination MAC Filtering Addresses” on page 184...
  • Page 184: Removing Destination Mac Filtering Addresses

    Chapter 16: Destination MAC Filter 4. Enter a MAC address in the following format: xx:xx:xx:xx:xx:xx The MAC address is displayed in the Destination MAC Filter menu. 5. Type Q to select Quit to previous menu and save your changes. Removing To remove a destination MAC filtering address on the switch, perform the following procedure: Destination MAC...
  • Page 185: Chapter 17: 802.1X Port-Based Network Access Control

    Chapter 17 802.1x Port-based Network Access Control This chapter contains information about and the procedure for configuring 802.1x Port-based Network Access Control. It includes the following sections: “802.1x Port-based Network Access Control Overview” on page 186 “Guest VLANs” on page 192 “Configuring 802.1x Port-based Network Access Control Feature”...
  • Page 186: 802.1X Port-Based Network Access Control Overview

    Chapter 17: 802.1x Port-based Network Access Control 802.1x Port-based Network Access Control Overview 802.1x Port-based Network Access Control (IEEE 802.1x) is used to control who can send traffic through and receive traffic from a switch port. With this feature, the switch does not allow an end node to send or receive traffic through a port until the user of the node logs on by entering a username and password.
  • Page 187: Authentication Process

    AT-S80 Management Software User’s Guide Authentication Below is a brief overview of the authentication process that occurs between a supplicant, authenticator, and authentication server. For further Process details, refer to the IEEE 802.1x standard. Either the authenticator (that is, a switch port) or the supplicant can initiate an authentication prompt exchange.
  • Page 188: Figure 45. Example Of The Authenticator Role

    Chapter 17: 802.1x Port-based Network Access Control server. Each client that attempts to access the network is uniquely identified by the switch using the client's MAC address. Force-unauthorized - Places the port in the unauthorized state, ignoring all attempts by the client to authenticate. This port control setting blocks all users from accessing the network through the port and is similar to disabling a port and can be used to secure a port from use.
  • Page 189: General Steps

    Default VLAN. Allied Telesis does not support connecting more than one supplicant to an authenticator port on the switch. The switch allows only one supplicant to log on per port.
  • Page 190 IEEE 802.1x standard. This can introduce security risks and can result in undesirable switch behavior. To avoid this, Allied Telesis recommends use the Force- authorized setting of the Port Control feature on ports that are connected to more than one end node, such as a port connected to another switch or to a hub.
  • Page 191: Figure 46. Port-Based Authentication Across Multiple Switches

    AT-S80 Management Software User’s Guide Ports used to interconnect switches should be set to the port control setting of Force-authorized. This is illustrated in Figure 46. Switch A Port 22: Port 6: 802.1x Port Control 802.1x Port Control Setting: Force-authorized...
  • Page 192: Guest Vlans

    Chapter 17: 802.1x Port-based Network Access Control Guest VLANs An authenticator port in the unauthorized state typically accepts and transmits only 802.1x packets while waiting to authenticate a supplicant. However, you can configure an authenticator port to be a member of a Guest VLAN when no supplicant is logged on.
  • Page 193: Configuring 802.1X Port-Based Network Access Control Feature

    AT-S80 Management Software User’s Guide Configuring 802.1x Port-based Network Access Control Feature To configure 802.1x Port-based Network Access Control feature, perform the following procedure: 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64.
  • Page 194 Chapter 17: 802.1x Port-based Network Access Control 3. Type P to select Port No. The following prompt is displayed: Enter port number> 4. Enter the number of the port on the switch you want to configure. You can configure only one port at a time. The Port Based Access Control Configuration Menu is updated with the current settings of the selected port.
  • Page 195 AT-S80 Management Software User’s Guide Maximum Request. Sets the maximum number of times that the switch retransmits an EAP Request packet to the client before it times out the authentication session. The default value for this parameter is 2 retransmissions. The range is 1 to 10 retransmissions.
  • Page 196 Chapter 17: 802.1x Port-based Network Access Control 8. To select between port-base or MAC address based authentication, type M to select Auth Mode. The following prompt is displayed: Select the Port based or MAC based auth mode (P/M) > a. Select P and the menu is redrawn. b.
  • Page 197: Configuring Mac Based Access Control Feature

    AT-S80 Management Software User’s Guide Configuring MAC Based Access Control Feature To configure the MAC Based Access Control feature, perform the following procedure. 1. From the Main Menu, type A to select Advanced Switch Configuration. The Advanced Switch Configuration Menu is shown in Figure 14 on page 64.
  • Page 198: Figure 48. Mac Based Access Control Configuration Menu

    Chapter 17: 802.1x Port-based Network Access Control The MAC Based Access Control Configuration Menu is displayed. See Figure 48. Advanced Switch Configuration -> MAC Based Access Control Configuration Menu Port No: 1 Port Control: Forced Authorized Authentication Method: Local Transmit Period: 30 sec Max Request: 2 Quiet Period: 60 sec Re-auth Period : 3600 sec Re-auth Status: Disabled Supplicant MAC Addr MAC Control...
  • Page 199 AT-S80 Management Software User’s Guide Port Control Sets the 802.1x port control setting. The possible settings are: A (Auto) - Enables 802.1x port-based authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port changes or the port receives an EAPOL-Start packet from a supplicant.
  • Page 200 Chapter 17: 802.1x Port-based Network Access Control 8. To permit a guest VLAN ID, type G. The following prompt is displayed: Enter guest VLAN ID > a. Type a VLAN ID and then press Enter. The MAC Based Access Control Configuration Menu is updated with the new guest VLAN ID.
  • Page 201: Chapter 18: Radius Authentication Protocol

    Chapter 18 RADIUS Authentication Protocol This chapter describes how to configure the RADIUS client software on the switch. You can use the RADIUS client with 802.1x port-based network access control to control who can forward packets through the switch. Sections in the chapter include: “RADIUS Overview”...
  • Page 202: Radius Overview

    The AT-S80 management software comes with RADIUS client software. You can use the client software together with 802.1x port-based network access control to control which end users and end nodes can send packets through the switch.
  • Page 203: Configuring The Radius Client

    AT-S80 Management Software User’s Guide Configuring the RADIUS Client To configure the RADIUS client, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32.
  • Page 204 Chapter 18: RADIUS Authentication Protocol 7. Enter the port number that you want to assign to UDP. You may only assign one port number to this parameter. The default value is 1812. 8. Type C to select Shared Secret. The following prompt is displayed: Enter secret string for server>...
  • Page 205: Displaying The Radius Client Settings

    AT-S80 Management Software User’s Guide Displaying the RADIUS Client Settings To display the RADIUS client status and settings, perform the following procedure: 1. From the Main Menu, type B to select Basic Switch Configuration. The Basic Switch Configuration Menu is shown in Figure 4 on page 32.
  • Page 206 Chapter 18: RADIUS Authentication Protocol Section I: Using the Menus Interface...
  • Page 207: Chapter 19: Management Software Updates

    Chapter 19 Management Software Updates This chapter explains how to download a new version of the AT-S80 Management Software onto the switch. The procedure is: “Downloading a New Management Software Image Using TFTP” on page 208 Note For information on how to obtain new releases of the AT-S80 Management Software, refer to “Management Software Updates”...
  • Page 208: Downloading A New Management Software Image Using Tftp

    Both models of the AT-FS750 Series use the same AT-S80 management software image. The current configuration of a switch is retained when a new AT-S80 software image is installed. To return a switch to its default configuration values, refer to “Returning the AT-S80 Management Software to the Factory Default Values”...
  • Page 209: Figure 50. Software Upgrade Menu (1 Of 2)

    3. Type T to select TFTP Upgrade. The Software Upgrade Menu (2 of 2) is shown in Figure 51. Main Menu -> Software Upgrade Menu Image Version/Date: AT-S80 V2.0.0 [1.1.1.57/Dec 6 2007 14:39:48 TFTP Server IP: 0.0.0.0 Image File Name:...
  • Page 210 6. Type F to select Set Image File Name. The following prompt is displayed: Enter file name > 7. Enter the file name of the AT-S80 image file on the TFTP server and press Enter. 8. Type R to select Set Retry Count.
  • Page 211: Using The Web Browser Interface

    Section II Using the Web Browser Interface The chapters in this section provide information and procedures for using the web browser interface of the AT-S80 Management Software. The chapters include: Chapter 20, “Starting a Web Browser Management Session” on page Chapter 21, “Basic Switch Parameters”...
  • Page 212 Section II: Using the Web Browser Interface...
  • Page 213: Chapter 20: Starting A Web Browser Management Session

    Chapter 20 Starting a Web Browser Management Session This chapter contains the procedures for starting, using, and quitting a web browser management session on the AT-FS750/16 and AT-FS750/24 switches. Sections in the chapter include: “Establishing a Remote Connection to Use the Web Browser Interface” on page 214 “Web Browser Tools”...
  • Page 214: Establishing A Remote Connection To Use The Web Browser Interface

    Chapter 20: Starting a Web Browser Management Session Establishing a Remote Connection to Use the Web Browser Interface To manage an AT-FS750/16 or AT-FS7950/24 switch using the web browser interface, you must assign an IP address and a subnet mask to the switch.
  • Page 215: Figure 53. At-S80 Login Dialog Box

    The AT-S80 Management Software displays the login dialog box, shown in Figure 53. Figure 53. AT-S80 Login Dialog Box 3. Enter the AT-S80 management login user name and password. The default user name is “manager” and the password is “friend.” The login name and password are case-sensitive.
  • Page 216: Figure 54. Home Page For The At-Fs750/24 Switch

    Chapter 20: Starting a Web Browser Management Session The AT-S80 management software displays the home page which is called the Switch Information Page. See Figure 54. For more information about the Switch Information Page, see “Viewing System Information” on page 233.
  • Page 217: Web Browser Tools

    AT-S80 Management Software User’s Guide Web Browser Tools You can use the web browser tools to move around the management pages. Selecting Back on your browser’s toolbar returns you to the previous display. You can also use the browser’s bookmark feature to save the link to the switch.
  • Page 218: Quitting A Web Browser Management Session

    Chapter 20: Starting a Web Browser Management Session Quitting a Web Browser Management Session To exit a web browser management session, close the web browser. Section II: Using the Web Browser Interface...
  • Page 219: Chapter 21: Basic Switch Parameters

    “Setting the User Interface Configuration” on page 231 “Viewing System Information” on page 233 “Rebooting a Switch” on page 236 “Pinging a Remote System” on page 238 “Returning the AT-S80 Management Software to the Factory Default Values” on page 240 Section II: Using the Web Browser Interface...
  • Page 220: Configuring An Ip Address, Subnet Mask And Gateway Address

    Chapter 21: Basic Switch Parameters Configuring an IP Address, Subnet Mask and Gateway Address This procedure explains how to change the IP address, subnet mask, and gateway address to the switch. Before performing the procedure, note the following: The switch needs an IP address, subnet mask, or default gateway if you plan to manage the device remotely with a web browser from a management workstation on your network.
  • Page 221 AT-S80 Management Software User’s Guide 3. Change the IP configuration parameters by entering new information in the fields: System MAC Address This parameter displays the MAC address of the switch. You cannot change this parameter. System IP Address Enter the IP address for the switch.
  • Page 222: Setting Up The Ip Access List

    Chapter 21: Basic Switch Parameters Setting Up the IP Access List The procedures in this section describe how to enable or disable the IP Access List feature on the switch and how to add or remove IP addresses from the list. See the following sections: “Creating an IP Access List”...
  • Page 223 AT-S80 Management Software User’s Guide 4. Enter an IP address that you want to prevent from accessing the switch in the xxx.xxx.xxx.xxxx format next to the IP Address field. Then click Add. The IP address is added to the IP Access List Table.
  • Page 224: Deleting An Ip Address

    Chapter 21: Basic Switch Parameters Deleting an IP To delete an IP address from the IP Access List, perform the following procedure: Address To create a list of restricted IP addresses, perform the following procedure: 1. From the book marks on the left side of the page, select System. The System folder expands.
  • Page 225: Enabling And Disabling The Dhcp Client

    AT-S80 Management Software User’s Guide Enabling and Disabling the DHCP Client This procedure explains how to activate and deactivate the DHCP client on the switch. When the client is activated, the switch obtains its IP configuration, such as its IP address and subnet mask, from a DHCP server on your network.
  • Page 226: Configuring System Management Information

    Chapter 21: Basic Switch Parameters Configuring System Management Information This section explains how to assign a name to the switch, as well as the location of the switch and the name of the switch’s administrator. Entering this information is optional. To set a switch’s administration information, perform the following procedure: 1.
  • Page 227 AT-S80 Management Software User’s Guide Note Allied Telesis recommends assigning a name to each switch. Names can make it easier for you to identify the various switches in your network and can also help you avoid performing a configuration procedure on the wrong switch.
  • Page 228: Configuring System Administration Information

    Chapter 21: Basic Switch Parameters Configuring System Administration Information This section explains how to enable password protection and create users in the web interface. See the following sections: “Adding System Administration Information” on page 228 “Modifying Administration Information” on page 229 “Deleting Administration Information”...
  • Page 229: Modifying Administration Information

    AT-S80 Management Software User’s Guide This value appears as the Index value in the Administration table. 5. To create a user name, enter a user name in the box next to the User Name field. You can enter a value of up to 12 alphanumeric characters.
  • Page 230: Deleting Administration Information

    Chapter 21: Basic Switch Parameters Deleting To delete a user name, perform the following procedure. Administration 1. From the book marks on the left side of the page, select System. Information The System folder expands. 2. From the System folder, select Administration. The Administration Page is shown in Figure 58 on page 228.
  • Page 231: Setting The User Interface Configuration

    Change the console timer, used to automatically end inactive local management sessions. Change the AT-S80 management login user name and password. Enable and disable the web server, used to manage the switch from a remote management station with a web browser.
  • Page 232 Chapter 21: Basic Switch Parameters 3. To configure the console idle time out parameter, do the following: a. Click the Console UI Time Out field and enter a new value. The range is 0 to 60 minutes. The default is 5 minutes. A timeout value to 0 causes the console connection to never time out.
  • Page 233: Viewing System Information

    AT-S80 Management Software User’s Guide Viewing System Information To view general information about the switch, perform the following procedure: 1. The Switch Information Page is the page that appears after you log on to the web interface. The Switch Information Page is shown in Figure Figure 61.
  • Page 234 Chapter 21: Basic Switch Parameters Boot Loader The version number and build date of the bootloader firmware. Hardware Information Section: Revision The hardware version number. DRAM Size The size of the DRAM, in megabytes. Flash Size The size of the flash memory, in megabytes. Console Baud Rate The baud rate of the console port.
  • Page 235 AT-S80 Management Software User’s Guide a gateway address or “Enabling and Disabling the DHCP Client” on page 225 to activate the DHCP client. DHCP Mode The status of the DHCP client on the switch. For information about setting this parameter, refer to “Enabling and Disabling the DHCP Client”...
  • Page 236: Rebooting A Switch

    Chapter 21: Basic Switch Parameters Rebooting a Switch This procedure reboots the switch and reloads the AT-S80 management software from flash memory. You can reboot the device if you believe it is experiencing a problem. Rebooting the switch does not change any of its parameter settings.
  • Page 237 AT-S80 Management Software User’s Guide 4. Click Apply. The switch immediately begins to reload the AT-S80 management software. This process takes approximately one minute to complete. You can not manage the device during the reboot. After the reboot is finished, you can log in again if you want to continue to manage the device.
  • Page 238: Pinging A Remote System

    Chapter 21: Basic Switch Parameters Pinging a Remote System This procedure instructs the switch to ping a node on your network. This procedure is useful in determining whether an active link exists between the switch and another network device. Note the following before performing the procedure: The switch must have an IP address and subnet mask.
  • Page 239: Figure 64. Ping Test Results Page

    AT-S80 Management Software User’s Guide 3. Click Start. 4. To view the ping results, click Show Ping Results. A sample Ping Test Results page is shown in Figure 64. Figure 64. Ping Test Results Page 5. Click Back to Ping Test to return to the Ping Test Configuration page.
  • Page 240: Returning The At-S80 Management Software To The Factory Default Values

    Returning the AT-S80 Management Software to the Factory Default Values This procedure returns all AT-S80 Management Software parameters to their default values. The default values are listed in Appendix A, “AT-S80 Software Default Settings” on page 339. Caution This procedure causes the switch to reboot. The switch does not forward network traffic during the reboot process.
  • Page 241: Chapter 22: Port Configuration

    Chapter 22 Port Configuration The section in this chapter explains how to view and change the parameter settings of the individual ports on the switch: “Viewing and Configuring Ports Using the Physical Configuration Page” on page 242 Section II: Using the Web Browser Interface...
  • Page 242: Viewing And Configuring Ports Using The Physical Configuration Page

    Chapter 22: Port Configuration Viewing and Configuring Ports Using the Physical Configuration Page This procedure explains how to configure the ports on the switch using the Physical Interface Page. This page allows you to view and configure the parameter settings of all the switch ports at one time. To configure the ports, perform the following procedure: 1.
  • Page 243 AT-S80 Management Software User’s Guide 2. Adjust the port settings as needed. Not all parameters are adjustable. The parameters are defined here: Port Index The port number. You cannot change this parameter. Trunk The trunk group number. A number in this column indicates that the port has been added to a trunk.
  • Page 244 For 1000 Mbps operation on an uplink 10/100/1000Base-T twisted pair uplink port, Allied Telesis recommends using Auto- Negotiation. Setting the speed and duplex mode manually to 1000 Mbps full duplex is not recommended.
  • Page 245: Chapter 23: Port Trunking

    Chapter 23 Port Trunking This chapter contains the following procedures for working with port trunking: “Creating a Port Trunk” on page 246 “Modifying a Port Trunk” on page 248 “Enabling and Disabling a Port Trunk” on page 249 Note For background information on this feature, refer to “Port Trunking Overview”...
  • Page 246: Creating A Port Trunk

    Chapter 23: Port Trunking Creating a Port Trunk This procedure explains how to create a port trunk. Caution Do not connect the cables to the ports on the switches until after you have configured the trunk with the management software. Connecting the cables before configuring the software can create a loop in the network topology.
  • Page 247 AT-S80 Management Software User’s Guide If the switch does not contain a port trunk, all of the ports on the switch are unchecked. If there is a port trunk, the ports in the trunk are checked. Note Trunk 7 is reserved for ports 17 and 18 on the AT-FS750/16 and ports 25 and 26 on the AT-FS750/24.
  • Page 248: Modifying A Port Trunk

    3. Click the status of the port trunk that you want to modify and change the status from Enable to Disable. Note Allied Telesis recommends disabling a port trunk before adding or removing ports. 4. Click Apply. 5. To add or remove a port from a trunk, click the dialog box for the port in the corresponding trunk row.
  • Page 249: Enabling And Disabling A Port Trunk

    AT-S80 Management Software User’s Guide Enabling and Disabling a Port Trunk This procedure enables and disables a port trunk. Note the following before performing this procedure: Do not enable a port trunk until after you have configured the trunk on both switches.
  • Page 250 Chapter 23: Port Trunking Section II: Using the Web Browser Interface...
  • Page 251: Chapter 24: Port Mirroring

    Chapter 24 Port Mirroring This chapter contains the procedure for setting up port mirroring. Port mirroring allows you to unobtrusively monitor the ingress and egress traffic on a port by having the traffic copied to another port. This chapter contains the following sections: “Configuring Port Mirroring”...
  • Page 252: Configuring Port Mirroring

    Chapter 24: Port Mirroring Configuring Port Mirroring To set up port mirroring, perform the following procedure: 1. From the Bridge folder, select Spanning Tree. The Spanning Tree folder expands. 2. From the Spanning Tree folder, select Mirroring. The Mirroring Page is shown in Figure 67. Figure 67.
  • Page 253: Disabling Port Mirroring

    AT-S80 Management Software User’s Guide Disabling Port Mirroring To disable port mirroring, perform the following procedure: 1. From the Bridge folder, select Spanning Tree. The Spanning Tree folder expands. 2. From the Spanning Tree folder, select Mirroring. The Mirroring Page is shown in Figure 67 on page 252.
  • Page 254 Chapter 24: Port Mirroring Section II: Using the Web Browser Interface...
  • Page 255: Chapter 25: Static Multicast Address Table

    Chapter 25 Static Multicast Address Table This chapter contains the following procedures for setting group MAC addresses in the web interface: “Configuring Static Multicast Address Table” on page 256 “Modifying a Static Multicast Address Table” on page 258 “Deleting a Group MAC Address” on page 259 Note For background information, refer to Chapter 7, “Static Multicast Address”...
  • Page 256: Configuring Static Multicast Address Table

    Chapter 25: Static Multicast Address Table Configuring Static Multicast Address Table This procedure explains how to add group MAC addresses to the Static Multicast Address Table. To configure the Static Multicast Address Table, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Spanning Tree folder expands.
  • Page 257: Figure 69. Static Multicast Table With Group Mac Addresses

    AT-S80 Management Software User’s Guide Figure 69. Static Multicast Table with Group MAC Addresses Section II: Using the Web Browser Interface...
  • Page 258: Modifying A Static Multicast Address Table

    Chapter 25: Static Multicast Address Table Modifying a Static Multicast Address Table This procedure explains how to change the group number of the Static Multicast Address Table. To modify the group number in the Static Multicast Address Table, perform the following procedure: 1.
  • Page 259: Deleting A Group Mac Address

    AT-S80 Management Software User’s Guide Deleting a Group MAC Address To delete a Group MAC Address from the Static Multicast Address Table, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Spanning Tree folder expands.
  • Page 260 Chapter 25: Static Multicast Address Table Section II: Using the Web Browser Interface...
  • Page 261: Chapter 26: Igmp Snooping

    Chapter 26 IGMP Snooping This chapter contains the following procedures for working with IGMP Snooping in the web interface. Sections in the chapter include: “Configuring IGMP Snooping” on page 262 Note For background information, refer to “IGMP Snooping Overview” on page 72.
  • Page 262: Configuring Igmp Snooping

    Chapter 26: IGMP Snooping Configuring IGMP Snooping This procedure explains how to set IGMP snooping and the IGMP Snooping age-out timer on the switch. To configure IGMP snooping, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Spanning Tree folder expands.
  • Page 263 AT-S80 Management Software User’s Guide Note The Multicast Group Address field contains MAC addresses of nodes that are members of multicast groups. To set a Multicast Group Address, see “Setting Group Members” on page 76. You cannot configure this field in the web interface.
  • Page 264 Chapter 26: IGMP Snooping Section II: Using the Web Browser Interface...
  • Page 265: Chapter 27: Destination Mac Address Filter

    Chapter 27 Destination MAC Address Filter This chapter contains the following procedures for setting MAC addresses in the Destination MAC Filter in the web interface: “Setting a Destination MAC Filter” on page 266 “Removing a MAC Address” on page 268 Note For background information, refer to “Destination MAC Filtering Overview”...
  • Page 266: Setting A Destination Mac Filter

    Chapter 27: Destination MAC Address Filter Setting a Destination MAC Filter This procedure explains how to set a Destination MAC Filter on the switch. To add a MAC address from a Destination MAC Filter list, perform the following procedure: 1. From the bookmarks on the left side of the page, select Security. The Security folder expands.
  • Page 267: Figure 73. Destination Mac Address With Entries

    AT-S80 Management Software User’s Guide The Destination MAC Filter table is updated with the new MAC address. See Figure 73 for an example. Figure 73. Destination MAC Address with Entries Section II: Using the Web Browser Interface...
  • Page 268: Removing A Mac Address

    Chapter 27: Destination MAC Address Filter Removing a MAC Address To remove a MAC address from a Destination MAC Filter list, perform the following procedure: 1. From the bookmarks on the left side of the page, select Security. The Security folder expands. 2.
  • Page 269: Chapter 28: Bandwidth Control

    Chapter 28 Bandwidth Control This chapter contains the following procedures for working with Bandwidth Control in the web interface. Sections in the chapter include: “Configuring Bandwidth Control” on page 270 Note For background information, refer to “Bandwidth Control Overview” on page 172. Section II: Using the Web Browser Interface...
  • Page 270: Configuring Bandwidth Control

    Chapter 28: Bandwidth Control Configuring Bandwidth Control This procedure explains how to set Bandwidth Control on a port. To configure Bandwidth Control, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The options under the Bridge folder expand to include Spanning Tree. 2.
  • Page 271 AT-S80 Management Software User’s Guide 3. To change the status of the packet threshold for all the ports on the switch, select the pull-down menu next to the Broad/Multicast Packet Threshold field. Choose Low, Medium, and High from the pull-down menu.
  • Page 272 Chapter 28: Bandwidth Control Section II: Using the Web Browser Interface...
  • Page 273: Chapter 29: Virtual Lans

    Chapter 29 Virtual LANs This chapter contains the procedures for creating, modifying, and deleting port-based and tagged Virtual Local Area Networks (VLANs) from a web browser management session. This chapter contains the following sections: “Assigning Ports to a VLAN” on page 274 “Creating a Tagged VLAN”...
  • Page 274: Assigning Ports To A Vlan

    Chapter 29: Virtual LANs Assigning Ports to a VLAN To assign ports to a tagged or port-based VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands.
  • Page 275: Creating A Tagged Vlan

    AT-S80 Management Software User’s Guide Creating a Tagged VLAN To create a tagged VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN.
  • Page 276: Figure 77. Example Of Tagged Vlan Page

    Chapter 29: Virtual LANs For an example of Tagged VLANs, see Figure 77. Figure 77. Example of Tagged VLAN Page Section II: Using the Web Browser Interface...
  • Page 277: Modifying A Tagged Vlan

    AT-S80 Management Software User’s Guide Modifying a Tagged VLAN To modify a tagged VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN.
  • Page 278 Chapter 29: Virtual LANs 6. To change the name of the VLAN, type in a name in the VLAN Name field. 7. To assign ports to the VLAN, click on the port numbers labeled either Static Tagged or Static Untagged. Then click Apply. Section II: Using the Web Browser Interface...
  • Page 279: Deleting A Tagged Vlan

    AT-S80 Management Software User’s Guide Deleting a Tagged VLAN To delete a tagged VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN.
  • Page 280: Creating A Port-Based Vlan

    Chapter 29: Virtual LANs Creating a Port-Based VLAN To create a port-based VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN. The VLAN folder expands.
  • Page 281: Modifying A Port-Based Vlan

    AT-S80 Management Software User’s Guide Modifying a Port-Based VLAN To modify a port-based VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN.
  • Page 282 Chapter 29: Virtual LANs 6. To change the name of the VLAN, type in a name in the VLAN Name field. 7. To assign ports to the VLAN, click on the port numbers labeled either Static Tagged or Static Untagged. Then click Apply. Section II: Using the Web Browser Interface...
  • Page 283: Deleting A Port-Based Vlan

    AT-S80 Management Software User’s Guide Deleting a Port-Based VLAN To delete a port-based VLAN, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select VLAN.
  • Page 284 Chapter 29: Virtual LANs Section II: Using the Web Browser Interface...
  • Page 285: Chapter 30: Simple Network Management Protocol (Snmp)

    Chapter 30 Simple Network Management Protocol (SNMP) This chapter contains the following procedures for working with SNMP: “Creating an SNMP Community” on page 286 “Modifying an SNMP Community” on page 287 “Deleting an SNMP Community” on page 288 “Creating a Host Table” on page 289 “Modifying a Host Table Entry”...
  • Page 286: Creating An Snmp Community

    Chapter 30: Simple Network Management Protocol (SNMP) Creating an SNMP Community This procedure explains how to create an SNMP community with the web interface. To create an SNMP community, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands.
  • Page 287: Modifying An Snmp Community

    AT-S80 Management Software User’s Guide Modifying an SNMP Community Use the following procedure to modify the name and the access level of an existing SNMP community. You cannot change the Index entry. To change the name and access level of a community, perform the following procedure: 1.
  • Page 288: Deleting An Snmp Community

    Chapter 30: Simple Network Management Protocol (SNMP) Deleting an SNMP Community Use the following procedure to delete an SNMP community in the Community Table. 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2.
  • Page 289: Creating A Host Table

    AT-S80 Management Software User’s Guide Creating a Host Table Use the following procedure to create a Host Table. 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Host Table.
  • Page 290: Modifying A Host Table Entry

    Chapter 30: Simple Network Management Protocol (SNMP) Modifying a Host Table Entry Use the following procedure to modify the community name assignment or the IP address of an entry in the Host Table. To modify an entry in the Host Table, perform the following procedure: 1.
  • Page 291: Deleting A Host Table Entry

    AT-S80 Management Software User’s Guide Deleting a Host Table Entry Use the following procedure to delete a Host Table entry. 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands. 2. From the SNMP folder, select Host Table.
  • Page 292: Enabling Or Disabling Traps

    Chapter 30: Simple Network Management Protocol (SNMP) Enabling or Disabling Traps This procedure enables or disables traps for an SNMP community that was previously defined. For more information, see “Creating an SNMP Community” on page 286. To enable or disable a trap, perform the following procedure: 1.
  • Page 293: Modifying Traps

    AT-S80 Management Software User’s Guide Modifying Traps Use this procedure to modify the IP address and the SNMP version of a trap for an SNMP community. To modify a trap, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP.
  • Page 294: Deleting Traps

    Chapter 30: Simple Network Management Protocol (SNMP) Deleting Traps Use this procedure to delete traps from an SNMP community. To delete a trap, perform the following procedure: 1. From the bookmarks on the left side of the page, select SNMP. The SNMP folder expands.
  • Page 295: Chapter 31: Quality Of Service (Qos)

    Chapter 31 Quality of Service (QoS) This chapter contains the procedure for configuring Quality of Service (QoS). This chapter includes the following procedures: “Mapping CoS Priorities to Egress Queues” on page 296 “Configuring CoS” on page 298 Note For background information, refer to “QoS Overview” on page 140 Section II: Using the Web Browser Interface...
  • Page 296: Mapping Cos Priorities To Egress Queues

    Chapter 31: Quality of Service (QoS) Mapping CoS Priorities to Egress Queues This procedure explains how to change the default mappings of CoS priorities to egress priority queues, as shown in Table 2 on page 141. This is set at the switch level. You cannot set this at the per-port level. This procedure also enables and disables QoS.
  • Page 297 AT-S80 Management Software User’s Guide 4. To change the egress priority queue assignment of an 802.1p priority class, click the dialog circle of the queue for the corresponding priority. For example, to direct all tagged traffic with a priority of 4 to egress queue 3 on the ports, click the dialog circle for queue 3 in the priority 4 row.
  • Page 298: Configuring Cos

    Chapter 31: Quality of Service (QoS) Configuring CoS As explained in “QoS Overview” on page 140, a packet received on a port is placed it into one of four priority queues on the egress port according to the switch’s mapping of 802.1p priority levels to egress priority queues. The default mappings are shown in Table 2 on page 141.
  • Page 299: Figure 85. Default Port Vlan &Cos Page

    AT-S80 Management Software User’s Guide The Default Port VLAN & CoS Page is shown in Figure 85. Figure 85. Default Port VLAN &CoS Page The columns in the menu display the following information: Port Index Displays the port number. Trunk Displays the trunk number if the port is a member of a trunk.
  • Page 300 Chapter 31: Quality of Service (QoS) Queue Displays the number of the queue where untagged packets received on the port are stored on the egress queue. In this field, 0 is the lowest value and 3 is the highest value. Override Displays whether the priority level in ingress tagged frames is being used or not.
  • Page 301: Chapter 32: Rapid Spanning Tree Protocol (Rstp)

    Chapter 32 Rapid Spanning Tree Protocol (RSTP) This chapter contains the following procedures for working with the Remote Spanning Tree Protocol (RSTP): “Basic RSTP Configuration” on page 302 “Configuring RSTP Port Settings” on page 305 “Viewing the RSTP Topology” on page 309 Note For background information on RSTP, refer to “RSTP Overview”...
  • Page 302: Basic Rstp Configuration

    Chapter 32: Rapid Spanning Tree Protocol (RSTP) Basic RSTP Configuration To configure the RSTP settings, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select Spanning Tree. 3.
  • Page 303 AT-S80 Management Software User’s Guide Protocol Version Set this field to enable to activate RSTP on the switch. This field is greyed out until you set the Global RSTP Status to enable. To activate this field click Apply. This page contains the following items of information in the middle portion of the page.
  • Page 304 Chapter 32: Rapid Spanning Tree Protocol (RSTP) Bridge ID The MAC address of the bridge. The bridge identifier is use as a tie breaker in the selection of the root bridge when two or more bridges have the same bridge priority. You cannot change this setting. Bridge Priority The priority number for the bridge, in hexadecimal format.
  • Page 305: Configuring Rstp Port Settings

    AT-S80 Management Software User’s Guide Configuring RSTP Port Settings This section contains the following topics: “Configuring the Basic RSTP Port Settings,” next “Configuring the Advanced RSTP Port Settings” on page 307 Configuring the To configure the basic RSTP port settings, perform the following...
  • Page 306: Figure 87. Rstp Basic Port Configuration Page

    Chapter 32: Rapid Spanning Tree Protocol (RSTP) The RSTP Basic Port Configuration Page is shown in Figure 87. Figure 87. RSTP Basic Port Configuration Page 4. In the STP Status column for the port you want to configure, select the STP status from the list, either Enable or Disable.
  • Page 307: Configuring The Advanced Rstp Port Settings

    AT-S80 Management Software User’s Guide 6. In the Path Cost column for the port you want to configure, type a number for the Path Cost. Path cost is described in “Path Costs and Port Costs” on page 151. 7. Click Apply.
  • Page 308: Figure 88. Rstp Advanced Port Configuration Page

    Chapter 32: Rapid Spanning Tree Protocol (RSTP) The RSTP Advanced Port Configuration Page is shown in Figure 88. Figure 88. RSTP Advanced Port Configuration Page 4. In the Admin/OperEdge column for the port you want to configure, choose True or False to set whether or not the port will operate as an edge port.
  • Page 309: Viewing The Rstp Topology

    AT-S80 Management Software User’s Guide Viewing the RSTP Topology To view the current RSTP topology, perform the following procedure: 1. From the bookmarks on the left side of the page, select Bridge. The Bridge folder expands. 2. From the Bridge folder, select Spanning Tree.
  • Page 310 Chapter 32: Rapid Spanning Tree Protocol (RSTP) Link Status Indicates the whether the link on the port is up or down. Designated Root Indicates the designated root bridge to which the switch’s root port is actively connected. Designated Cost Indicates the sum of all the root port costs on all bridges, including the switch, between the switch and the root bridge.
  • Page 311: Chapter 33: 802.1X Port-Based Network Access Control Feature

    Chapter 33 802.1x Port-based Network Access Control Feature This chapter contains the procedure for configuring 802.1x Port-based Network Access Control: “Configuring 802.1x Port-based Network Access Control Feature” on page 312 Note For background information, refer to “802.1x Port-based Network Access Control Overview” on page 186. Section II: Using the Web Browser Interface...
  • Page 312: Configuring 802.1X Port-Based Network Access Control Feature

    Chapter 33: 802.1x Port-based Network Access Control Feature Configuring 802.1x Port-based Network Access Control Feature To configure the 802.1x Port-based Network Access Control feature, perform the following procedure: 1. From the bookmarks on the left side of the page, click Security. The Security folder expands.
  • Page 313 AT-S80 Management Software User’s Guide 4. Configure the following parameters as needed. The parameters are defined here: NAS ID This parameter assigns an 802.1x identifier to the switch that applies to all ports. The NAS ID can be up to sixteen characters. Valid characters are 0 to 9, a to z, and A to Z.
  • Page 314 Chapter 33: 802.1x Port-based Network Access Control Feature Force-unauthorized - Places the port in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface. Force-authorized - Disables IEEE 802.1x port-based authentication and causes the port to transition to the authorized state without any authentication exchange required.
  • Page 315 AT-S80 Management Software User’s Guide 5. When you are finished configuring the parameters, click Apply at the bottom of the 802.1x Access Control Configuration Page. 6. If the port control setting is Auto and you want to return the EAPOL machine state on the port to the initialized state, select Yes for the Initialize parameter and click Apply.
  • Page 316 Chapter 33: 802.1x Port-based Network Access Control Feature Section II: Using the Web Browser Interface...
  • Page 317: Chapter 34: Dial-In User

    Chapter 34 Dial-in User This chapter contains the following procedure for setting the Dial-in User feature in the web interface. “Adding a Dial-in User” on page 318 “Modifying a Dial-in User” on page 319 “Deleting a Dial-in User” on page 320 Note For background information, refer to “Dial-in User Configuration Overview”...
  • Page 318: Adding A Dial-In User

    Chapter 34: Dial-in User Adding a Dial-in User This procedure explains how to add a Dial-in User on the switch. For each user, you must assign an user name, password, and a VLAN. To configure a Dial-in User, perform the following procedure: 1.
  • Page 319: Modifying A Dial-In User

    AT-S80 Management Software User’s Guide Modifying a Dial-in User This procedure explains how to modify an existing Dial-in User on the switch. For each user, you may change the password and the VLAN assignment. However, you cannot change the user name.
  • Page 320: Deleting A Dial-In User

    Chapter 34: Dial-in User Deleting a Dial-in User This procedure explains how to delete an existing Dial-in User on the switch. To delete a Dial-in user, perform the following procedure: 1. From the bookmarks on the left side of the page, select Security. The Security folder expands.
  • Page 321: Chapter 35: Radius Authentication Protocol

    Chapter 35 RADIUS Authentication Protocol This chapter explains how to configure the RADIUS client on the switch. You can use the RADIUS client with 802.1x Port-based Network Access Control feature to control who can forward packets through the switch. The chapter contains the following section: “Configuring the RADIUS Client”...
  • Page 322: Configuring The Radius Client

    Chapter 35: RADIUS Authentication Protocol Configuring the RADIUS Client To configure the RADIUS client, perform the following procedure: 1. From the book marks on the left side of the page, select Security. The Security folder expands. 2. From the Security folder, select RADIUS. The RADIUS Page is shown in Figure 92.
  • Page 323: Chapter 36: Management Software Updates

    “Upgrading a Firmware Image With TFTP” on page 324 “Upgrading a Firmware Image With HTTP” on page 326 Note For information on how to obtain new releases of the AT-S80 Management Software, refer to “Management Software Updates” on page 16.
  • Page 324: Upgrading A Firmware Image With Tftp

    Both models of the AT-FS750 switch use the same AT-S80 software image. The current configuration of a switch is retained when a new AT-S80 software image is installed. To return a switch to its default configuration values, refer to “Returning the AT-S80 Management Software to the Factory Default Values”...
  • Page 325: Figure 93. Firmware Upgrade Via Tftp Page

    The IP address of the TFTP server from which you are downloading the new software. Download File Name The name of the AT-S80 file you are downloading. Retry Count: The number of times the firmware upgrade is retried. The default number of tries is 5.
  • Page 326: Upgrading A Firmware Image With Http

    Before downloading a new version of the AT-S80 Management Software onto the switch with HTTP, note the following: The current configuration of a switch is retained when a new AT-S80 software image is installed. To return a switch to its default configuration values, refer to “AT-S80 Software Default Settings”...
  • Page 327: Figure 94. Firmware Upgrade Via Http Page

    AT-S80 Management Software User’s Guide The Firmware Upgrade via HTTP Page is shown in Figure 94. Figure 94. Firmware Upgrade via HTTP Page 4. Change the following parameters as necessary: Image/Version Date Displays the current version and date of software installed on the switch.
  • Page 328 Chapter 36: Management Software Updates Section II: Using the Web Browser Interface...
  • Page 329: Chapter 37: Statistics

    Chapter 37 Statistics This chapter provides procedures to display traffic, error, and history statistics. This chapter contains the following section: “Displaying Switch Statistics” on page 330 Section II: Using the Web Browser Interface...
  • Page 330: Displaying Switch Statistics

    Displaying Switch Statistics Statistics provide important information for troubleshooting switch problems at the port level. The AT-S80 Management Software provides a versatile set of statistical charts that you can customize for your needs, including (depending upon the chart) the ports whose statistics you want to view and the color to use in drawing the statistics in the chart.
  • Page 331: Figure 95. Traffic Comparison Chart Page

    AT-S80 Management Software User’s Guide The Traffic Comparison Chart Page opens as shown in Figure 95. Figure 95. Traffic Comparison Chart Page 3. To view traffic statistics, click on the arrow next to “Statistics” and select one of the options in Table 7.
  • Page 332 Chapter 37: Statistics Table 7 Traffic Comparison Options (Continued) Option Definition Inbound Discard Rate (Pkts/s) Measures the rate of inbound discarded packets in packets per second. Inbound Error Rate (Pkts/s) Measures the number of inbound errors in packets per second. Outbound Octet Rate (Bytes/s) Measures the number of outbound octet bits in bytes per second.
  • Page 333 AT-S80 Management Software User’s Guide Table 7 Traffic Comparison Options (Continued) Option Definition Outbound Non-unicast Packets Measures the number of outbound non-unicast (such (Pkts) as broadcast and multicast packets) packets. Outbound Discards (Pkts) Measures the number of outbound discarded packets.
  • Page 334 Chapter 37: Statistics – Light Yellow – Light Gray 6. To create the traffic comparison graph, select Draw. Section II: Using the Web Browser Interface...
  • Page 335: Displaying Error Group Statistics

    AT-S80 Management Software User’s Guide Displaying Error To display error group statistics for a port, perform the following procedure: Group Statistics 1. From the book marks on the left side of the page, select the Statistics Chart folder. The Statistics Chart folder expands.
  • Page 336 Chapter 37: Statistics – 15 seconds – 30 seconds 5. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: – Green (This is the default.) – Blue – – Purple – Yellow –...
  • Page 337: Displaying Historical Status Charts

    AT-S80 Management Software User’s Guide Displaying To display historical status charts statistics for a port, perform the following procedure: Historical Status Charts 1. From the book marks on the left side of the page, select the Statistics Chart folder. The Statistics Chart folder expands.
  • Page 338 Chapter 37: Statistics 3. To select the amount of time before the screen is refreshed, click Auto Refresh. Choose from the following options: – 5 seconds – 10 seconds – 15 seconds – 30 seconds 4. To select the color of the traffic comparison graph, select Color. Choose one of the following colors: –...
  • Page 339: Table 8. At-S80 Management Software Default Settings

    Appendix A AT-S80 Software Default Settings Table 8 lists the factory default settings for the management software. Table 8. AT-S80 Management Software Default Settings Parameter Default Setting IP Configuration IP Address 0.0.0.0 Subnet Mask 0.0.0.0 Default Gateway Address 0.0.0.0 DHCP Client...
  • Page 340 Appendix A: AT-S80 Software Default Settings Table 8. AT-S80 Management Software Default Settings (Continued) Parameter Default Setting Flow Control (Full-duplex Mode) Enabled Back pressure (Half-duplex Mode) Enabled (not adjustable) Port Trunking Status Disabled IGMP Snooping Status Disabled IGMP Snooping Age-Out Timer...
  • Page 341 AT-S80 Management Software User’s Guide Table 8. AT-S80 Management Software Default Settings (Continued) Parameter Default Setting IP Access List IP Restriction Disabled 802.1x Port-based Network Access Control NAS ID Nas1 Port Control Force Authorized Transmission Period 30 seconds Supplicant Timeout...
  • Page 342 Appendix A: AT-S80 Software Default Settings...
  • Page 343 59 configuring 193 described 186 guidelines 189 gateway address, configuring 32 supplicant, described 186 hardware information 43 AT-S80 Management Software hello time, described 153 features 18 resetting to factory defaults 51 upgrading 208 IGMP snooping upgrading with HTTP 326...
  • Page 344 Index port duplex mode, configuring 57 deleting traps 135 port mirroring disabling traps 137 configuring 87 enabling traps 133 described 86 modifying a host table entry 290 disabling 89 modifying traps 135 port priority, described 152 SNMP application program 19 port speed, configuring 57 SNMP community strings port statistics...
  • Page 345 AT-S80 Management Software User’s Guide deleting 117 displaying 111 modifying 114 overview 98 port-based, defined 100 tagged, defined 101 VLAN ID, described 100 VLAN name, described 100 web browser management session explained 19 quitting 218 starting 214 web browser tools 217...
  • Page 346 Index...

This manual is also suitable for:

At-s80 2.0.0

Table of Contents