User's Guide

Add to my manuals
862 Pages

advertisement

User's Guide | Manualzz

User’s Guide

AT-8524M LAYER 2+

FAST ETHERNET SWITCH

VERSION 1.1.1

Management

Software

®

AT-S62

PN 613-50485-00 Rev C

Copyright © 2004 Allied Telesyn, Inc.

960 Stewart Drive Suite B, Sunnyvale, CA 94085 USA

All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesyn, Inc.

Microsoft is a registered trademark of Microsoft Corporation, Netscape Navigator is a registered trademark of Netscape

Communications Corporation. All other product names, company names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners.

Allied Telesyn, Inc. reserves the right to make changes in specifications and other information contained in this document without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesyn, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesyn, Inc. has been advised of, known, or should have known, the possibility of such damages.

Table of Contents

List of Figures ......................................................................................................................................................................................................16

Preface ....................................................................................................................................................................................................................25

How This Guide is Organized ...........................................................................................................................................................................25

Document Conventions ....................................................................................................................................................................................27

Where to Find Web-based Guides .................................................................................................................................................................28

Contacting Allied Telesyn .................................................................................................................................................................................29

Online Support ............................................................................................................................................................................................ 29

Email and Telephone Support ............................................................................................................................................................... 29

Returning Products .................................................................................................................................................................................... 29

For Sales or Corporate Information ..................................................................................................................................................... 29

Management Software Updates ....................................................................................................................................................................30

Chapter 1

Overview ................................................................................................................................................................................................................31

Management Overview .....................................................................................................................................................................................32

Local Management Session ..............................................................................................................................................................................34

Telnet Management Session ............................................................................................................................................................................35

Web Browser Management Session ..............................................................................................................................................................36

SNMP Management Session ............................................................................................................................................................................37

Management Access Levels .............................................................................................................................................................................38

Section I

Basic Operations

...................................................................................................................................... 39

Chapter 2

Starting a Local or Telnet Management Session ................................................................................................................................40

Local Management Session ..............................................................................................................................................................................41

Starting a Local Management Session ................................................................................................................................................ 42

Enhanced Stacking .................................................................................................................................................................................... 44

Quitting a Local Session ........................................................................................................................................................................... 44

Telnet Management Session ............................................................................................................................................................................45

Starting a Telnet Management Session ............................................................................................................................................. 45

Quitting a Telnet Management Session ............................................................................................................................................. 46

Saving Your Parameter Changes ....................................................................................................................................................................47

3

Table of Contents

Chapter 3

Enhanced Stacking ........................................................................................................................................................................................... 48

Enhanced Stacking Overview ......................................................................................................................................................................... 49

Guidelines ..................................................................................................................................................................................................... 49

Setting a Switch’s Enhanced Stacking Status ............................................................................................................................................ 52

Selecting a Switch in an Enhanced Stack ................................................................................................................................................... 54

Returning to the Master Switch ............................................................................................................................................................ 55

Chapter 4

Basic Switch Parameters ................................................................................................................................................................................ 56

When Does a Switch Need an IP Address? ................................................................................................................................................. 57

How Do You Assign an IP Address? ..................................................................................................................................................... 58

Configuring an IP Address and Switch Name ........................................................................................................................................... 59

Activating the BOOTP and DHCP Client Software ................................................................................................................................... 62

Rebooting a Switch ............................................................................................................................................................................................. 64

Configuring the Manager and Operator Passwords ............................................................................................................................... 65

Setting the System Time ................................................................................................................................................................................... 67

Configuring the Console Startup Mode ...................................................................................................................................................... 71

Configuring the Console Timer ...................................................................................................................................................................... 72

Enabling or Disabling the Telnet Server ...................................................................................................................................................... 73

Setting the Baud Rate of the RS-232 Terminal Port ................................................................................................................................ 74

Pinging a Remote System ................................................................................................................................................................................ 75

Returning the AT-S62 Software to the Factory Default Values ........................................................................................................... 76

Viewing System Hardware and Software Information .......................................................................................................................... 78

Setting the Switch’s Temperature Threshold ............................................................................................................................................ 80

Chapter 5

SNMPv1 and SNMPv2c Configuration .................................................................................................................................................... 81

SNMPv1 and SNMPv2c Overview .................................................................................................................................................................. 82

Default SNMP Community Strings ...................................................................................................................................................... 84

Enabling or Disabling SNMP Management ................................................................................................................................................ 85

Setting the Authentication Failure Trap ..................................................................................................................................................... 86

Creating an SNMP Community String ......................................................................................................................................................... 87

Modifying a Community String ...................................................................................................................................................................... 89

Displaying the SNMP Community Strings .................................................................................................................................................. 93

Chapter 6

Port Parameters ................................................................................................................................................................................................. 94

Displaying Port Status ........................................................................................................................................................................................ 95

Configuring Port Parameters .......................................................................................................................................................................... 98

Setting the Rate Limit ......................................................................................................................................................................................107

Chapter 7

MAC Address Table ........................................................................................................................................................................................109

MAC Address Overview ...................................................................................................................................................................................110

Displaying MAC Addresses ............................................................................................................................................................................112

Adding Static Unicast and Multicast MAC Addresses ..........................................................................................................................116

Deleting Unicast and Multicast MAC Addresses ....................................................................................................................................118

Deleting All Dynamic MAC Addresses .......................................................................................................................................................119

Changing the Aging Time ..............................................................................................................................................................................120

Chapter 8

Port Trunking ....................................................................................................................................................................................................121

Port Trunking Overview ..................................................................................................................................................................................122

Port Trunking Guidelines ...................................................................................................................................................................... 122

Port Operating Specifications ............................................................................................................................................................. 123

4

AT-S62 User’s Guide

Load Distribution Methods .................................................................................................................................................................. 123

Creating a Port Trunk ....................................................................................................................................................................................... 129

Modifying a Port Trunk ................................................................................................................................................................................... 132

Deleting a Port Trunk ....................................................................................................................................................................................... 135

Chapter 9

Port Mirroring ................................................................................................................................................................................................... 136

Port Mirroring Overview ................................................................................................................................................................................. 137

Creating a Port Mirror ...................................................................................................................................................................................... 138

Deleting a Port Mirror ...................................................................................................................................................................................... 140

Chapter 10

Ethernet Statistics .......................................................................................................................................................................................... 141

Displaying Port Statistics ................................................................................................................................................................................ 142

Clearing Port Counters .................................................................................................................................................................................... 144

Section II

Advanced Operations

....................................................................................................................... 145

Chapter 11

File System ......................................................................................................................................................................................................... 146

File System Overview ....................................................................................................................................................................................... 147

File Naming Conventions ..................................................................................................................................................................... 148

Working with Boot Configuration Files ..................................................................................................................................................... 149

Creating a Boot Configuration File ................................................................................................................................................... 149

Setting the Active Boot Configuration File .................................................................................................................................... 152

Viewing a Boot Configuration File .................................................................................................................................................... 153

Editing a Boot Configuration File ...................................................................................................................................................... 154

Troubleshooting a Boot Configuration File ................................................................................................................................... 155

Copying, Renaming, and Deleting System Files .................................................................................................................................... 156

Displaying System Files ................................................................................................................................................................................... 158

Chapter 12

File Downloads and Uploads .................................................................................................................................................................... 160

Downloading the AT-S62 Image File onto a Switch ............................................................................................................................. 161

Downloading the AT-S62 Image from a Local Management Session .................................................................................. 162

Downloading the AT-S62 Image from a Telnet Management Session ................................................................................ 165

Downloading an AT-S62 Image File Switch to Switch ......................................................................................................................... 167

Downloading an AT-S62 Configuration File Switch to Switch ......................................................................................................... 169

Downloading a System File ........................................................................................................................................................................... 171

Downloading a System File from a Local Management Session ........................................................................................... 172

Downloading a System File from a Telnet Management Session ......................................................................................... 175

Uploading a System File ................................................................................................................................................................................. 177

Uploading a System File from a Local Management Session .................................................................................................. 178

Uploading a System File from a Telnet Management Session ............................................................................................... 180

Chapter 13

Event Log ............................................................................................................................................................................................................ 182

Event Log Overview ......................................................................................................................................................................................... 183

Enabling or Disabling the Event Log .......................................................................................................................................................... 184

Displaying Events .............................................................................................................................................................................................. 185

Modules ...................................................................................................................................................................................................... 187

Saving the Event Log ....................................................................................................................................................................................... 189

Clearing the Event Log .................................................................................................................................................................................... 190

5

Table of Contents

Chapter 14

Quality of Service ............................................................................................................................................................................................191

Quality of Service Overview ...........................................................................................................................................................................192

Class of Service (CoS) .............................................................................................................................................................................. 192

Scheduling ................................................................................................................................................................................................. 194

Configuring CoS .................................................................................................................................................................................................196

Mapping CoS Priorities to Egress Queues ................................................................................................................................................200

Configuring Egress Scheduling ....................................................................................................................................................................201

Displaying Port CoS Priorities .......................................................................................................................................................................202

Chapter 15

IGMP Snooping ................................................................................................................................................................................................203

IGMP Snooping Overview ..............................................................................................................................................................................204

Activating IGMP Snooping .............................................................................................................................................................................206

Displaying a List of Host Nodes ....................................................................................................................................................................209

Displaying a List of Multicast Routers ........................................................................................................................................................211

Chapter 16

Denial of Service Defense ...........................................................................................................................................................................212

Denial of Service Defense Overview ...........................................................................................................................................................213

SYN Flood Attack ..................................................................................................................................................................................... 213

SMURF Attack ............................................................................................................................................................................................ 214

Land Attack ................................................................................................................................................................................................ 214

Teardrop Attack ........................................................................................................................................................................................ 215

Ping of Death Attack ............................................................................................................................................................................... 216

IP Options Attack ..................................................................................................................................................................................... 217

Denial of Service Defense Guidelines ............................................................................................................................................... 217

Enabling or Disabling Denial of Service Prevention .............................................................................................................................218

Section III

SNMPv3 Operations

........................................................................................................................... 221

Chapter 17

SNMPv3 Configuration .................................................................................................................................................................................222

SNMPv3 Overview .............................................................................................................................................................................................223

SNMPv3 Authentication Protocols .................................................................................................................................................... 224

SNMPv3 Privacy Protocol ...................................................................................................................................................................... 225

SNMPv3 MIB Views .................................................................................................................................................................................. 225

SNMPv3 Storage Types .......................................................................................................................................................................... 226

SNMPv3 Message Notification ............................................................................................................................................................ 226

SNMPv3 Tables ......................................................................................................................................................................................... 227

SNMPv3 Configuration Example ........................................................................................................................................................ 232

Configuring the SNMPv3 Protocol ..............................................................................................................................................................233

Configuring the SNMPv3 User Table ..........................................................................................................................................................234

Creating an SNMPv3 User Table Entry ............................................................................................................................................. 234

Deleting an SNMPv3 User Table Entry ............................................................................................................................................. 238

Modifying an SNMPv3 User Table Entry .......................................................................................................................................... 238

Configuring the SNMPv3 View Table .........................................................................................................................................................244

Creating an SNMPv3 View Table Entry ............................................................................................................................................ 244

Deleting an SNMPv3 View Table Entry ............................................................................................................................................ 247

Modifying an SNMPv3 View Table Entry ......................................................................................................................................... 248

Configuring the SNMPv3 Access Table .....................................................................................................................................................253

Creating an SNMPv3 Access Table Entry ......................................................................................................................................... 253

Deleting an SNMPv3 Access Table Entry ......................................................................................................................................... 257

Modifying an SNMPv3 Access Table Entry ..................................................................................................................................... 259

6

AT-S62 User’s Guide

Configuring the SNMPv3 SecurityToGroup Table ................................................................................................................................. 268

Creating an SNMPv3 SecurityToGroup Table Entry .................................................................................................................... 268

Deleting an SNMPv3 SecurityToGroup Table Entry .................................................................................................................... 271

Modifying an SNMPv3 SecurityToGroup Table Entry ................................................................................................................. 272

Configuring the SNMPv3 Notify Table ...................................................................................................................................................... 276

Creating an SNMPv3 Notify Table Entry .......................................................................................................................................... 276

Deleting an SNMPv3 Notify Table Entry .......................................................................................................................................... 278

Modifying an SNMPv3 Notify Table Entry ...................................................................................................................................... 279

Configuring the SNMPv3 Target Address Table .................................................................................................................................... 283

Creating an SNMPv3 Target Address Table Entry ........................................................................................................................ 284

Deleting an SNMPv3 Target Address Table Entry ........................................................................................................................ 286

Modifying an SNMPv3 Target Address Table Entry .................................................................................................................... 287

Configuring the SNMPv3 Target Parameters Table .............................................................................................................................. 296

Creating an SNMPv3 Target Parameters Table Entry ................................................................................................................. 297

Deleting an SNMPv3 Target Parameters Table Entry ................................................................................................................. 300

Modifying an SNMPv3 Target Parameters Table Entry .............................................................................................................. 301

Configuring the SNMPv3 Community Table ........................................................................................................................................... 309

Creating an SNMPv3 Community Table Entry .............................................................................................................................. 310

Deleting an SNMPv3 Community Table Entry .............................................................................................................................. 313

Modifying an SNMPv3 Community Table Entry ........................................................................................................................... 314

Displaying SNMPv3 Table Menus ................................................................................................................................................................ 319

Displaying the Display SNMPv3 User Table Menu ...................................................................................................................... 319

Displaying the Display SNMPv3 View Table Menu ...................................................................................................................... 321

Displaying the Display SNMPv3 Access Table Menu .................................................................................................................. 322

Displaying the Display SNMPv3 SecurityToGroup Table Menu ............................................................................................. 323

Displaying the Display SNMPv3 Notify Table Menu ................................................................................................................... 324

Displaying the Display SNMPv3 Target Address Table Menu ................................................................................................. 325

Displaying the Display SNMPv3 Target Parameters Table Menu ........................................................................................... 326

Displaying the Display SNMPv3 Community Table Menu ....................................................................................................... 327

Section IV

Spanning Tree Protocols

............................................................................................................... 328

Chapter 18

Spanning Tree and Rapid Spanning Tree Protocols ...................................................................................................................... 329

STP and RSTP Overview .................................................................................................................................................................................. 330

Bridge Priority and the Root Bridge .................................................................................................................................................. 331

Mixed STP and RSTP Network ............................................................................................................................................................. 338

Spanning Tree and VLANs .................................................................................................................................................................... 338

Enabling or Disabling a Spanning Tree Protocol ................................................................................................................................... 340

Configuring STP ................................................................................................................................................................................................. 342

Configuring STP Bridge Settings ........................................................................................................................................................ 342

Configuring STP Port Settings ............................................................................................................................................................ 344

Displaying STP Port Settings ............................................................................................................................................................... 346

Configuring RSTP .............................................................................................................................................................................................. 347

Configuring RSTP Bridge Settings ..................................................................................................................................................... 347

Configuring RSTP Port Settings .......................................................................................................................................................... 349

Displaying Port RSTP Status ................................................................................................................................................................. 351

Chapter 19

Multiple Spanning Tree Protocol ............................................................................................................................................................ 352

MSTP Overview .................................................................................................................................................................................................. 353

Multiple Spanning Tree Instance (MSTI) ......................................................................................................................................... 354

VLAN and MSTI Associations ............................................................................................................................................................... 358

Multiple Spanning Tree Regions ........................................................................................................................................................ 358

7

Table of Contents

Summary of Guidelines ......................................................................................................................................................................... 363

Configuring MSTP Bridge Settings ..............................................................................................................................................................369

Configuring the CIST Priority .........................................................................................................................................................................372

Creating, Deleting, and Modifying MSTI IDs ............................................................................................................................................374

Creating an MSTI ID ................................................................................................................................................................................. 375

Deleting an MSTI ID ................................................................................................................................................................................ 375

Modifying an MSTI ID ............................................................................................................................................................................. 376

Associating VLANs to MSTI IDs .....................................................................................................................................................................377

Associating a VLAN to an MSTI ID ...................................................................................................................................................... 378

Removing a VLAN from an MSTI ID ................................................................................................................................................... 379

Associating VLANs to an MSTI ID and Deleting All Associated VLANs ................................................................................. 379

Configuring MSTP Port Settings ..................................................................................................................................................................380

Displaying MSTP Port Settings and Status ...............................................................................................................................................383

Section V

Virtual LANs

................................................................................................................................................ 384

Chapter 20

Tagged and Port-based Virtual LANs ....................................................................................................................................................385

VLAN Overview ...................................................................................................................................................................................................386

Port-based VLAN Overview ...........................................................................................................................................................................388

General Rules for Creating a Port-based VLAN ............................................................................................................................. 390

Drawbacks of Port-based VLANs ........................................................................................................................................................ 390

Port-based Example 1 ............................................................................................................................................................................ 391

Port-based Example 2 ............................................................................................................................................................................ 393

Tagged VLAN Overview ..................................................................................................................................................................................395

General Rules for Creating a Tagged VLAN .................................................................................................................................... 397

Tagged VLAN Example .......................................................................................................................................................................... 398

Creating a Port-based or Tagged VLAN ....................................................................................................................................................400

Example of Creating a Port-based VLAN ...................................................................................................................................................404

Example of Creating a Tagged VLAN .........................................................................................................................................................405

Modifying a VLAN ..............................................................................................................................................................................................406

Displaying VLANs ..............................................................................................................................................................................................410

Deleting a VLAN .................................................................................................................................................................................................411

Deleting All VLANs ............................................................................................................................................................................................414

Displaying PVIDs and Port Priorities ...........................................................................................................................................................415

Enabling or Disabling Ingress Filtering ......................................................................................................................................................416

Specifying a Management VLAN .................................................................................................................................................................418

Chapter 21

GARP VLAN Registration Protocol ..........................................................................................................................................................420

Basic Overview of GARP VLAN Registration Protocol (GVRP) ............................................................................................................421

Guidelines ................................................................................................................................................................................................... 423

GVRP and Network Security ................................................................................................................................................................. 424

GVRP-inactive Intermediate Switches .............................................................................................................................................. 425

Technical Overview of Generic Attribute Registration Protocol (GARP) ..............................................................................................426

Configuring GVRP ..............................................................................................................................................................................................430

Enabling or Disabling GVRP on a Port ........................................................................................................................................................432

Converting a Dynamic GVRP VLAN .............................................................................................................................................................435

Displaying GVRP Parameters and Statistics .............................................................................................................................................436

GVRP Counters .......................................................................................................................................................................................... 437

GVRP Database ......................................................................................................................................................................................... 441

GIP Connected Ports Ring ..................................................................................................................................................................... 442

GVRP State Machine ............................................................................................................................................................................... 443

8

AT-S62 User’s Guide

Chapter 22

Multiple VLAN Modes ................................................................................................................................................................................... 446

Multiple VLAN Mode Overview .................................................................................................................................................................... 447

802.1Q- Compliant Multiple VLAN mode ....................................................................................................................................... 447

Non-802.1Q Compliant Multiple VLAN Mode ............................................................................................................................... 449

Selecting a VLAN Mode ................................................................................................................................................................................... 451

Displaying VLAN Information ....................................................................................................................................................................... 452

Section VI

Port Security

............................................................................................................................................... 453

Chapter 23

MAC Address Security .................................................................................................................................................................................. 454

MAC Address Security Overview ................................................................................................................................................................. 455

Automatic ................................................................................................................................................................................................... 455

Limited ........................................................................................................................................................................................................ 455

Secured ....................................................................................................................................................................................................... 456

Locked ......................................................................................................................................................................................................... 456

Security Violations and Intrusion Actions ....................................................................................................................................... 456

Guidelines .................................................................................................................................................................................................. 457

Configuring MAC Address Port Security ................................................................................................................................................... 458

Displaying Port Security Levels .................................................................................................................................................................... 461

Chapter 24

802.1x Port-based Access Control .......................................................................................................................................................... 463

802.1x Port-based Access Control Overview .......................................................................................................................................... 464

Authentication Process ......................................................................................................................................................................... 465

Port Roles .................................................................................................................................................................................................... 466

RADIUS Accounting ................................................................................................................................................................................ 468

General Steps ............................................................................................................................................................................................ 469

Port-based Access Control Guidelines ............................................................................................................................................. 470

Enabling and Disabling Port-based Access Control ............................................................................................................................. 473

Setting Port Roles .............................................................................................................................................................................................. 474

Configuring Authenticator Port Parameters ........................................................................................................................................... 476

Configuring Supplicant Port Parameters ................................................................................................................................................. 480

Configuring RADIUS Accounting ................................................................................................................................................................ 483

Section VII

Management Security

...................................................................................................................... 485

Chapter 25

Web Server ......................................................................................................................................................................................................... 486

Web Server Overview ...................................................................................................................................................................................... 487

Supported Protocols .............................................................................................................................................................................. 487

General Steps to Configuring the Web Server for Encryption ................................................................................................ 488

Configuring the Web Server .......................................................................................................................................................................... 490

Chapter 26

Encryption Keys ............................................................................................................................................................................................... 492

Basic Overview ................................................................................................................................................................................................... 493

Encryption Key Length .......................................................................................................................................................................... 494

Encryption Key Guidelines ................................................................................................................................................................... 494

Technical Overview .......................................................................................................................................................................................... 495

Data Encryption ....................................................................................................................................................................................... 495

9

Table of Contents

Data Authentication ............................................................................................................................................................................... 497

Key Exchange Algorithms ..................................................................................................................................................................... 498

Creating an Encryption Key ...........................................................................................................................................................................500

Deleting an Encryption Key ...........................................................................................................................................................................504

Modifying an Encryption Key ........................................................................................................................................................................505

Exporting an Encryption Key .........................................................................................................................................................................506

Importing an Encryption Key ........................................................................................................................................................................508

Chapter 27

Public Key Infrastructure Certificates ...................................................................................................................................................510

Basic Overview ...................................................................................................................................................................................................511

Types of Certificates ................................................................................................................................................................................ 511

Distinguished Names ............................................................................................................................................................................. 512

SSL and Enhanced Stacking ................................................................................................................................................................. 514

Guidelines ................................................................................................................................................................................................... 515

Technical Overview ...........................................................................................................................................................................................516

SSL Encryption .......................................................................................................................................................................................... 516

User Verification ....................................................................................................................................................................................... 517

Authentication .......................................................................................................................................................................................... 518

Public Key Infrastructure ....................................................................................................................................................................... 518

Public Keys ................................................................................................................................................................................................. 518

Message Encryption ................................................................................................................................................................................ 518

Digital Signatures .................................................................................................................................................................................... 519

Certificates .................................................................................................................................................................................................. 519

Elements of a Public Key Infrastructure ........................................................................................................................................... 520

Certificate Validation .............................................................................................................................................................................. 521

Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 522

PKI Implementation ................................................................................................................................................................................ 522

Creating a Self-signed Certificate ................................................................................................................................................................524

Adding a Certificate to the Database .........................................................................................................................................................528

Modifying a Certificate ....................................................................................................................................................................................531

Deleting a Certificate .......................................................................................................................................................................................533

Viewing a Certificate ........................................................................................................................................................................................534

Generating an Enrollment Request ............................................................................................................................................................537

Installing CA Certificates onto a Switch ....................................................................................................................................................540

Configuring PKI ..................................................................................................................................................................................................541

Configuring SSL ..................................................................................................................................................................................................542

Chapter 28

Secure Shell (SSH) Protocol ........................................................................................................................................................................543

SSH Overview ......................................................................................................................................................................................................544

Support for SSH ........................................................................................................................................................................................ 544

SSH Server .................................................................................................................................................................................................. 545

SSH Clients ................................................................................................................................................................................................. 545

SSH and Enhanced Stacking ................................................................................................................................................................ 546

Guidelines ................................................................................................................................................................................................... 547

General Steps to Configuring SSH ..................................................................................................................................................... 547

Configuring the SSH Server ...........................................................................................................................................................................548

Displaying SSH Information ...........................................................................................................................................................................550

Chapter 29

RADIUS and TACACS+ Authentication Protocols ............................................................................................................................552

TACACS+ and RADIUS Overview .................................................................................................................................................................553

Guidelines ................................................................................................................................................................................................... 554

Configuring Authentication Protocol Settings .......................................................................................................................................557

Displaying RADIUS Status and Settings ........................................................................................................................................... 562

10

AT-S62 User’s Guide

Chapter 30

Management Access Control List ............................................................................................................................................................ 563

Management Access Control List Overview ............................................................................................................................................ 564

Parts of a Management ACE ................................................................................................................................................................ 564

Management ACL Guidelines ............................................................................................................................................................. 565

Management ACL Examples ............................................................................................................................................................... 566

Creating the Management ACL ................................................................................................................................................................... 568

Adding, Deleting, and Viewing ACEs ......................................................................................................................................................... 570

Section VIII

Web Browser Management

........................................................................................................ 571

Chapter 31

Starting a Web Browser Management Session ................................................................................................................................ 573

Starting a Web Browser Management Session ...................................................................................................................................... 574

Browser Tools ............................................................................................................................................................................................ 576

Saving Your Parameter Changes ................................................................................................................................................................. 577

Quitting a Web Browser Management Session ..................................................................................................................................... 578

Chapter 32

Enhanced Stacking ......................................................................................................................................................................................... 579

Setting a Switch’s Enhanced Stacking Status ......................................................................................................................................... 580

Selecting a Switch in an Enhanced Stack ................................................................................................................................................. 582

Returning to the Master Switch ......................................................................................................................................................... 583

Displaying the Enhanced Stacking Status ................................................................................................................................................ 584

Chapter 33

Basic Switch Parameters ............................................................................................................................................................................. 585

Configuring an IP Address and Switch Name ......................................................................................................................................... 586

Activating the BOOTP and DHCP Client Software ................................................................................................................................. 589

Displaying System Information .................................................................................................................................................................... 590

Configuring the Manager and Operator Passwords ............................................................................................................................ 592

Rebooting a Switch .......................................................................................................................................................................................... 594

Pinging a Remote System .............................................................................................................................................................................. 595

Returning the AT-S62 Software to the Factory Default Values ......................................................................................................... 596

Chapter 34

SNMPv1 and SNMPv2c Community Strings ...................................................................................................................................... 598

Enabling or Disabling SNMP Management ............................................................................................................................................. 599

Creating a New SNMPv1 or SNMPv2c Community String .................................................................................................................. 601

Modifying a Community String ................................................................................................................................................................... 604

Deleting a Community String ....................................................................................................................................................................... 606

Displaying the SNMP Status and Community Strings ......................................................................................................................... 607

Chapter 35

Port Parameters ............................................................................................................................................................................................... 609

Configuring Port Parameters ........................................................................................................................................................................ 610

Displaying Port Status and Statistics .......................................................................................................................................................... 616

Chapter 36

MAC Address Table ........................................................................................................................................................................................ 621

Displaying the MAC Address Table ............................................................................................................................................................ 622

Adding Static Unicast and Multicast MAC Addresses .......................................................................................................................... 624

Deleting Unicast and Multicast MAC Addresses .................................................................................................................................... 626

Changing the Aging Time .............................................................................................................................................................................. 627

11

Table of Contents

Chapter 37

Port Trunking ....................................................................................................................................................................................................628

Creating a Port Trunk .......................................................................................................................................................................................629

Modifying a Port Trunk ....................................................................................................................................................................................632

Deleting a Port Trunk .......................................................................................................................................................................................634

Displaying the Port Trunks .............................................................................................................................................................................635

Chapter 38

Port Mirroring ...................................................................................................................................................................................................637

Creating a Port Mirror ......................................................................................................................................................................................638

Modifying or Disabling a Port Mirror ..........................................................................................................................................................641

Deleting a Port Mirror ......................................................................................................................................................................................642

Displaying the Port Mirror ..............................................................................................................................................................................643

Chapter 39

File Downloads and Uploads .....................................................................................................................................................................644

Downloading a File ...........................................................................................................................................................................................645

Uploading a File .................................................................................................................................................................................................648

Chapter 40

Event Log ............................................................................................................................................................................................................650

Enabling or Disabling the Event Log ..........................................................................................................................................................651

Displaying Events ..............................................................................................................................................................................................653

Saving the Event Log .......................................................................................................................................................................................655

Clearing the Event Log ....................................................................................................................................................................................656

Chapter 41

Quality of Service ............................................................................................................................................................................................657

Configuring CoS .................................................................................................................................................................................................658

Mapping CoS Priorities to Egress Queues ................................................................................................................................................661

Configuring Egress Scheduling ....................................................................................................................................................................663

Displaying the CoS Settings ..........................................................................................................................................................................664

Displaying QoS Scheduling ...........................................................................................................................................................................666

Chapter 42

IGMP Snooping ................................................................................................................................................................................................667

Configuring IGMP Snooping .........................................................................................................................................................................668

Displaying a List of Host Nodes and Multicast Routers .......................................................................................................................671

Chapter 43

Denial of Service Defense ...........................................................................................................................................................................673

Configuring Denial of Service Attack Defense ........................................................................................................................................674

Displaying the DoS Settings ..........................................................................................................................................................................677

Chapter 44

SNMPv3 Protocol ............................................................................................................................................................................................678

Configuring the SNMPv3 Protocol ..............................................................................................................................................................679

Enabling the SNMP Protocol .........................................................................................................................................................................680

Configuring the SNMPv3 User Table ..........................................................................................................................................................683

Creating a User Table Entry .................................................................................................................................................................. 683

Deleting a User Table Entry .................................................................................................................................................................. 686

Modifying a User Table Entry .............................................................................................................................................................. 686

Configuring the SNMPv3 View Table .........................................................................................................................................................690

Creating a View Table Entry ................................................................................................................................................................. 690

Deleting a View Table Entry ................................................................................................................................................................. 693

Modifying a View Table Entry .............................................................................................................................................................. 694

12

AT-S62 User’s Guide

Configuring the SNMPv3 Access Table ..................................................................................................................................................... 696

Creating an Access Table ...................................................................................................................................................................... 696

Deleting an Access Table Entry .......................................................................................................................................................... 700

Modifying an Access Table Entry ....................................................................................................................................................... 701

Configuring the SNMPv3 SecurityToGroup Table ................................................................................................................................. 703

Creating a SecurityToGroup Table Entry ........................................................................................................................................ 703

Deleting a SecurityToGroup Table Entry ........................................................................................................................................ 705

Modifying a SecurityToGroup Table Entry ..................................................................................................................................... 706

Configuring the SNMPv3 Notify Table ...................................................................................................................................................... 708

Creating a Notify Table Entry .............................................................................................................................................................. 708

Deleting a Notify Table Entry .............................................................................................................................................................. 710

Modifying a Notify Table Entry ........................................................................................................................................................... 711

Configuring the SNMPv3 Target Address Table .................................................................................................................................... 713

Creating a Target Address Table Entry ............................................................................................................................................ 713

Deleting a Target Address Table Entry ............................................................................................................................................ 716

Modifying Target Address Table Entry ............................................................................................................................................ 717

Configuring the SNMPv3 Target Parameters Table .............................................................................................................................. 720

Creating a Target Parameters Table Entry ...................................................................................................................................... 720

Deleting a Target Parameters Table Entry ...................................................................................................................................... 723

Modifying a Target Parameters Table Entry .................................................................................................................................. 724

Configuring the SNMPv3 Community Table ........................................................................................................................................... 727

Creating an SNMPv3 Community Table Entry .............................................................................................................................. 727

Deleting an SNMPv3 Community Table Entry .............................................................................................................................. 730

Modifying an SNMPv3 Community Table Entry ........................................................................................................................... 731

Displaying SNMPv3 Tables ............................................................................................................................................................................ 733

Displaying User Table Entries .............................................................................................................................................................. 734

Displaying View Table Entries ............................................................................................................................................................. 735

Displaying Access Table Entries ......................................................................................................................................................... 736

Displaying SecurityToGroup Table Entries ..................................................................................................................................... 737

Displaying Notify Table Entries .......................................................................................................................................................... 738

Displaying Target Address Table Entries ........................................................................................................................................ 739

Displaying Target Parameters Table Entries .................................................................................................................................. 740

Displaying SNMPv3 Community Table Entries ............................................................................................................................. 741

Chapter 45

STP, RSTP, and MSTP ..................................................................................................................................................................................... 742

Enabling or Disabling Spanning Tree ........................................................................................................................................................ 743

Configuring STP ................................................................................................................................................................................................. 745

Configuring RSTP .............................................................................................................................................................................................. 748

Configuring MSTP ............................................................................................................................................................................................. 752

Configuring MSTP and CIST Parameters ......................................................................................................................................... 752

Associating VLANs to MSTIs ................................................................................................................................................................ 755

Configuring MSTP Port Parameters .................................................................................................................................................. 758

Displaying Spanning Tree Settings ............................................................................................................................................................ 760

Chapter 46

Virtual LANs ....................................................................................................................................................................................................... 761

Creating a New Port-Based or Tagged VLAN .......................................................................................................................................... 762

Modifying a Port-Based or Tagged VLAN ................................................................................................................................................. 766

Deleting a Port-Based or Tagged VLAN .................................................................................................................................................... 768

Displaying VLANs .............................................................................................................................................................................................. 769

Selecting a VLAN Mode ................................................................................................................................................................................... 771

Specifying a Management VLAN ................................................................................................................................................................. 773

13

Table of Contents

Chapter 47

GARP VLAN Registration Protocol ..........................................................................................................................................................775

Configuring GVRP ..............................................................................................................................................................................................776

Enabling or Disabling GVRP on a Port ........................................................................................................................................................778

Displaying the GVRP Settings .......................................................................................................................................................................780

Chapter 48

MAC Address Security ...................................................................................................................................................................................782

Displaying MAC Address Security Levels ..................................................................................................................................................783

Chapter 49

802.1x Port-based Access Control ..........................................................................................................................................................785

Enabling and Disabling Port-based Access Control .............................................................................................................................786

Setting Port Roles ..............................................................................................................................................................................................788

Configuring Authenticator Port Parameters ...........................................................................................................................................790

Configuring Supplicant Port Parameters ..................................................................................................................................................793

Displaying the Port-based Access Control Settings ..............................................................................................................................795

Chapter 50

Secure Shell Protocol ....................................................................................................................................................................................797

Configuring the SSH Server ...........................................................................................................................................................................798

Displaying SSH Information ...........................................................................................................................................................................800

Chapter 51

Encryption Keys, PKI, and SSL ...................................................................................................................................................................802

Displaying Encryption Keys ...........................................................................................................................................................................803

Displaying PKI Settings and Certificates ...................................................................................................................................................804

Displaying the SSL Settings ...........................................................................................................................................................................807

Chapter 52

RADIUS and TACACS+ Authentication Protocols ............................................................................................................................808

Configuring RADIUS and TACACS+ ............................................................................................................................................................809

Displaying the RADIUS or TACSACS+ Settings .......................................................................................................................................813

Chapter 53

Management Access Control List ............................................................................................................................................................815

Creating a Management ACL ........................................................................................................................................................................816

Adding or Deleting an ACE ............................................................................................................................................................................818

Displaying the Management ACL ................................................................................................................................................................819

Appendix A

AT-S62 Default Settings ...............................................................................................................................................................................820

Basic Switch Default Settings ........................................................................................................................................................................821

Boot Configuration File Default Setting .......................................................................................................................................... 821

Management Access Default Settings ............................................................................................................................................. 821

Management Interface Default Settings ......................................................................................................................................... 821

RS-232 Port Default Settings ............................................................................................................................................................... 822

SNTP Default Settings ............................................................................................................................................................................ 822

Switch Administration Default Settings .......................................................................................................................................... 823

System Software Default Settings ..................................................................................................................................................... 823

Enhanced Stacking Default Setting ............................................................................................................................................................824

SNMP Default Settings ....................................................................................................................................................................................825

Port Configuration Default Settings ...........................................................................................................................................................826

Event Log Default Settings ............................................................................................................................................................................827

Quality of Service ...............................................................................................................................................................................................828

IGMP Snooping Default Settings .................................................................................................................................................................829

14

AT-S62 User’s Guide

Denial of Service Prevention Default Settings ........................................................................................................................................ 830

STP, RSTP, and MSTP Default Settings ....................................................................................................................................................... 831

Spanning Tree Switch Settings ........................................................................................................................................................... 831

STP Default Settings ............................................................................................................................................................................... 831

RSTP Default Settings ............................................................................................................................................................................ 831

MSTP Default Settings ........................................................................................................................................................................... 832

VLAN Default Settings ..................................................................................................................................................................................... 833

GVRP Default Settings ..................................................................................................................................................................................... 834

MAC Address Security Default Settings .................................................................................................................................................... 835

802.1x Port-Based Network Access Control Default Settings ........................................................................................................... 836

Web Server Default Settings ......................................................................................................................................................................... 837

SSL Default Settings ......................................................................................................................................................................................... 838

PKI Default Settings .......................................................................................................................................................................................... 839

SSH Default Settings ........................................................................................................................................................................................ 840

Server-Based Authentication Default Settings ....................................................................................................................................... 841

Server-Based Authentication Default Settings ............................................................................................................................. 841

RADIUS Default Settings ....................................................................................................................................................................... 841

TACACS+ Client Default Settings ...................................................................................................................................................... 841

Management Access Control List Default Setting ................................................................................................................................ 842

Appendix B

SNMPv3 Configuration Examples ........................................................................................................................................................... 843

SNMPv3 Configuration Examples ............................................................................................................................................................... 844

SNMPv3 Manager Configuration ....................................................................................................................................................... 844

SNMPv3 Operator Configuration ....................................................................................................................................................... 845

SNMPv3 Worksheet ................................................................................................................................................................................ 846

Index ......................................................................................................................................................................... 849

15

List of Figures

Chapter 1

Overview ................................................................................................................................................................................................................31

Chapter 2

Starting a Local or Telnet Management Session ................................................................................................................................40

Figure 1: Connecting a Terminal or PC to the RS232 Terminal Port ................................................................................................. 42

Figure 2: Command Prompt ............................................................................................................................................................................ 43

Figure 3: Main Menu .......................................................................................................................................................................................... 43

Chapter 3

Enhanced Stacking ...........................................................................................................................................................................................48

Figure 4: Enhanced Stacking Example ........................................................................................................................................................ 51

Figure 5: Enhanced Stacking Menu .............................................................................................................................................................. 53

Figure 6: Stacking Services Menu .................................................................................................................................................................. 54

Chapter 4

Basic Switch Parameters ................................................................................................................................................................................56

Figure 7: System Administration Menu ....................................................................................................................................................... 59

Figure 8: System Configuration Menu ......................................................................................................................................................... 60

Figure 9: System Utilities Menu ...................................................................................................................................................................... 64

Figure 10: Passwords Configuration Menu ................................................................................................................................................ 65

Figure 11: Configure System Time Menu ................................................................................................................................................... 68

Figure 12: Console (Serial/Telnet) Configuration Menu ........................................................................................................................ 71

Figure 13: System Information Menu .......................................................................................................................................................... 78

Figure 14: System Hardware Information Menu ...................................................................................................................................... 79

Figure 15: Configure System Hardware Menu ......................................................................................................................................... 80

Chapter 5

SNMPv1 and SNMPv2c Configuration .....................................................................................................................................................81

Figure 16: SNMP Configuration Menu ......................................................................................................................................................... 85

Figure 17: SNMPv1 & SNMPv2c Community Menu ................................................................................................................................ 87

Figure 18: Modify SNMP Community Menu .............................................................................................................................................. 89

Figure 19: Display SNMP Community Menu ............................................................................................................................................. 93

Chapter 6

Port Parameters .................................................................................................................................................................................................94

Figure 20: Port Configuration Menu ............................................................................................................................................................ 95

Figure 21: Port Status Menu ............................................................................................................................................................................ 95

Figure 22: Port Configuration (Port) Menu ................................................................................................................................................ 98

Figure 23: Manual Speed and Duplex Mode Settings ........................................................................................................................ 101

16

AT-S62 User’s Guide

Figure 24: Head of Line Blocking ................................................................................................................................................................ 102

Figure 25: Flow Control Menu ..................................................................................................................................................................... 103

Figure 26: Back Pressure Menu ................................................................................................................................................................... 105

Figure 27: Rate Limiting Menu .................................................................................................................................................................... 108

Chapter 7

MAC Address Table ........................................................................................................................................................................................ 109

Figure 28: MAC Address Tables Menu ...................................................................................................................................................... 112

Figure 29: Display Unicast MAC Addresses Menu ................................................................................................................................ 112

Figure 30: Display All Menu - Unicast MAC Addresses ....................................................................................................................... 113

Figure 31: Display All Menu - Multicast MAC Addresses .................................................................................................................... 114

Figure 32: Configure MAC Addresses Menu ........................................................................................................................................... 116

Chapter 8

Port Trunking ................................................................................................................................................................................................... 121

Figure 33: Port Trunk Example .................................................................................................................................................................... 122

Figure 34: Load Distribution Method ....................................................................................................................................................... 125

Figure 35: Port Trunking Menu ................................................................................................................................................................... 130

Figure 36: Create Trunk Menu ..................................................................................................................................................................... 130

Figure 37: Modify Trunk Menu .................................................................................................................................................................... 133

Chapter 9

Port Mirroring ................................................................................................................................................................................................... 136

Figure 38: Port Mirroring Menu #1 ............................................................................................................................................................. 138

Figure 39: Port Mirroring Menu #2 ............................................................................................................................................................. 138

Chapter 10

Ethernet Statistics .......................................................................................................................................................................................... 141

Figure 40: Port Statistics Menu .................................................................................................................................................................... 142

Chapter 11

File System ......................................................................................................................................................................................................... 146

Figure 41: File Operations Menu ................................................................................................................................................................ 150

Figure 42: View File Menu ............................................................................................................................................................................. 154

Figure 43: List Files Menu .............................................................................................................................................................................. 159

Chapter 12

File Downloads and Uploads .................................................................................................................................................................... 160

Figure 44: Downloads and Uploads Menu .............................................................................................................................................. 162

Figure 45: Local Management Window ................................................................................................................................................... 164

Figure 46: Send File Window ....................................................................................................................................................................... 164

Figure 47: XModem File Send Window .................................................................................................................................................... 165

Figure 48: Local Management Window ................................................................................................................................................... 174

Figure 49: Send File Window ....................................................................................................................................................................... 174

Figure 50: XModem File Send Window .................................................................................................................................................... 175

Figure 51: Local Management Window ................................................................................................................................................... 180

Figure 52: Receive File Window .................................................................................................................................................................. 180

Chapter 13

Event Log ............................................................................................................................................................................................................ 182

Figure 53: Event Log Menu ........................................................................................................................................................................... 184

Figure 54: Event Log Example ..................................................................................................................................................................... 186

Chapter 14

Quality of Service ............................................................................................................................................................................................ 191

Figure 55: Security and Services Menu ..................................................................................................................................................... 196

Figure 56: Class of Service (CoS) Menu ..................................................................................................................................................... 197

Figure 57: Configure Port COS Priorities Menu ..................................................................................................................................... 198

Figure 58: Map CoS Priority to Egress Queue Menu ............................................................................................................................ 200

Figure 59: Configure Egress Scheduling Menu ..................................................................................................................................... 201

17

List of Figures

Figure 60: Show Port CoS Priorities Menu ............................................................................................................................................... 202

Chapter 15

IGMP Snooping ................................................................................................................................................................................................203

Figure 61: Advanced Configuration Menu .............................................................................................................................................. 206

Figure 62: IGMP Snooping Configuration Menu ................................................................................................................................... 206

Figure 63: View Multicast Hosts List Menu .............................................................................................................................................. 209

Figure 64: View Multicast Routers List Menu .......................................................................................................................................... 211

Chapter 16

Denial of Service Defense ...........................................................................................................................................................................212

Figure 65: Denial of Service (DoS) Menu .................................................................................................................................................. 218

Figure 66: LAN IP Subnet Menu ................................................................................................................................................................... 219

Figure 67: SYN Flood Configuration Menu ............................................................................................................................................. 220

Chapter 17

SNMPv3 Configuration ................................................................................................................................................................................222

Figure 68: MIB Tree .......................................................................................................................................................................................... 225

Figure 69: SNMPv3 User Configuration Process .................................................................................................................................... 228

Figure 70: SNMPv3 Message Notification Process ................................................................................................................................ 229

Figure 71: Configure SNMPv3 Table Menu ............................................................................................................................................. 235

Figure 72: Configure SNMPv3 User Table Menu ................................................................................................................................... 235

Figure 73: Modify SNMPv3 User Table Menu ......................................................................................................................................... 239

Figure 74: Configure SNMPv3 View Table Menu .................................................................................................................................. 245

Figure 75: Modify SNMPv3 View Table Menu ........................................................................................................................................ 249

Figure 76: Configure SNMPv3 Access Table Menu ............................................................................................................................... 254

Figure 77: Modify SNMPv3 Access Table Menu ..................................................................................................................................... 260

Figure 78: Configure SNMPv3 SecurityToGroup Table Menu .......................................................................................................... 269

Figure 79: Modify SNMPv3 SecurityToGroup Table Menu ................................................................................................................ 273

Figure 80: Configure SNMPv3 Notify Table Menu ................................................................................................................................ 277

Figure 81: Modify SNMPv3 Notify Table Menu ...................................................................................................................................... 280

Figure 82: Configure SNMPv3 Target Address Table Menu .............................................................................................................. 284

Figure 83: Modify SNMPv3 Target Address Table Menu .................................................................................................................... 288

Figure 84: Configure SNMPv3 Target Parameters Table Menu ....................................................................................................... 297

Figure 85: Modify SNMPv3 Target Parameters Table Menu ............................................................................................................. 303

Figure 86: Configure SNMPv3 Community Table Menu .................................................................................................................... 311

Figure 87: Modify SNMPv3 Community Table Menu .......................................................................................................................... 315

Figure 88: Display SNMPv3 Table Menu ................................................................................................................................................... 320

Figure 89: Display SNMPv3 User Table Menu ......................................................................................................................................... 320

Figure 90: Display SNMPv3 View Table Menu ........................................................................................................................................ 321

Figure 91: Display SNMPv3 Access Table Menu .................................................................................................................................... 322

Figure 92: Display SNMPv3 SecurityToGroup Table Menu ................................................................................................................ 323

Figure 93: Display SNMPv3 Notify Table Menu ..................................................................................................................................... 324

Figure 94: Display SNMPv3 Target Address Table Menu ................................................................................................................... 325

Figure 95: Display SNMPv3 Target Parameters Table Menu ............................................................................................................. 326

Figure 96: Display SNMPv3 Community Table Menu .......................................................................................................................... 327

Chapter 18

Spanning Tree and Rapid Spanning Tree Protocols ......................................................................................................................329

Figure 97: Point-to-Point Ports .................................................................................................................................................................... 336

Figure 98: Edge Port ........................................................................................................................................................................................ 337

Figure 99: Point-to-Point and Edge Port .................................................................................................................................................. 337

Figure 100: VLAN Fragmentation ............................................................................................................................................................... 338

Figure 101: Spanning Tree Configuration Menu ................................................................................................................................... 340

Figure 102: STP Menu ..................................................................................................................................................................................... 342

Figure 103: STP Port Parameters Menu .................................................................................................................................................... 344

Figure 104: Configure STP Port Settings Menu ..................................................................................................................................... 345

Figure 105: Display STP Port Configuration Menu ............................................................................................................................... 346

18

AT-S62 User’s Guide

Figure 106: RSTP Menu .................................................................................................................................................................................. 347

Figure 107: RSTP Port Parameters Menu ................................................................................................................................................. 349

Figure 108: Configure RSTP Port Settings Menu .................................................................................................................................. 350

Chapter 19

Multiple Spanning Tree Protocol ............................................................................................................................................................ 352

Figure 109: VLAN Fragmentation with STP or RSTP ............................................................................................................................ 355

Figure 110: MSTP Example of Two Spanning Tree Instances .......................................................................................................... 356

Figure 111: Multiple VLANs in a MSTI ...................................................................................................................................................... 357

Figure 112: Multiple Spanning Tree Region ........................................................................................................................................... 360

Figure 113: CIST and VLAN Guideline - Example 1 ............................................................................................................................... 365

Figure 114: CIST and VLAN Guideline - Example 2 ............................................................................................................................... 366

Figure 115: Spanning Regions - Example 1 ............................................................................................................................................ 367

Figure 116: MSTP Menu ................................................................................................................................................................................. 369

Figure 117: CIST Menu .................................................................................................................................................................................... 372

Figure 118: MSTI Menu ................................................................................................................................................................................... 374

Figure 119: VLAN-MSTI Association Menu .............................................................................................................................................. 378

Figure 120: MSTP Port Parameters Menu ................................................................................................................................................ 380

Figure 121: Configure MSTP Port Settings Menu ................................................................................................................................. 380

Chapter 20

Tagged and Port-based Virtual LANs ................................................................................................................................................... 385

Figure 122: Port-based VLAN - Example 1 ............................................................................................................................................... 391

Figure 123: Port-based VLAN - Example 2 ............................................................................................................................................... 393

Figure 124: Example of a Tagged VLAN ................................................................................................................................................... 398

Figure 125: VLAN Configuration Menu .................................................................................................................................................... 400

Figure 126: Configure VLANs Menu .......................................................................................................................................................... 401

Figure 127: Create VLAN Menu ................................................................................................................................................................... 401

Figure 128: Modify VLAN Menu .................................................................................................................................................................. 406

Figure 129: Expanded Modify VLAN Menu ............................................................................................................................................. 407

Figure 130: Show VLANs Menu ................................................................................................................................................................... 410

Figure 131: Delete VLAN Menu ................................................................................................................................................................... 411

Figure 132: Expanded Delete VLAN Menu .............................................................................................................................................. 412

Figure 133: Show PVIDs & Priorities Menu .............................................................................................................................................. 415

Chapter 21

GARP VLAN Registration Protocol ......................................................................................................................................................... 420

Figure 134: GVRP Example ........................................................................................................................................................................... 422

Figure 135: GARP Architecture ................................................................................................................................................................... 427

Figure 136: GID Architecture ....................................................................................................................................................................... 428

Figure 137: GARP-GVRP Menu ..................................................................................................................................................................... 430

Figure 138: GVRP Port Parameters Menu ................................................................................................................................................ 432

Figure 139: Configure GVRP Port Settings Menu ................................................................................................................................. 433

Figure 140: Display GVRP Port Configuration Menu ........................................................................................................................... 433

Figure 141: Other GARP Port Parameters Menu ................................................................................................................................... 436

Figure 142: GVRP Counters Menu (page 1) ............................................................................................................................................. 437

Figure 143: GVRP Counters Menu (page 2) ............................................................................................................................................. 438

Figure 144: GVRP Database Menu ............................................................................................................................................................. 441

Figure 145: GIP Connected Ports Ring Menu ......................................................................................................................................... 442

Figure 146: GVRP State Machine Menu (page 1) .................................................................................................................................. 443

Figure 147: Display GVRP State Machine Menu (page 2) .................................................................................................................. 443

Chapter 22

Multiple VLAN Modes ................................................................................................................................................................................... 446

Figure 148: Show VLANs Menu, Multiple VLANS .................................................................................................................................. 452

19

List of Figures

Chapter 23

MAC Address Security ...................................................................................................................................................................................454

Figure 149: Port Security Menu ................................................................................................................................................................... 458

Figure 150: Configure Port Security Menu #1 ........................................................................................................................................ 458

Figure 151: Configure Port Security Menu #2 ........................................................................................................................................ 459

Figure 152: Display Port Security Menu ................................................................................................................................................... 461

Chapter 24

802.1x Port-based Access Control ..........................................................................................................................................................463

Figure 153: Example of the Authenticator Role .................................................................................................................................... 467

Figure 154: Example of the Supplicant Role ........................................................................................................................................... 468

Figure 155: Port-based Authentication Across Multiple Switches ................................................................................................. 472

Figure 156: Port Access Control (802.1X) Menu .................................................................................................................................... 473

Figure 157: Configure Port Access Role Menu ....................................................................................................................................... 474

Figure 158: Configure Authenticator Menu ............................................................................................................................................ 476

Figure 159: Configure Authenticator Port Access Parameters Menu ............................................................................................ 477

Figure 160: Configure Supplicant Menu .................................................................................................................................................. 480

Figure 161: Configure Supplicant Port Access Parameters Menu .................................................................................................. 481

Figure 162: Radius Accounting Menu ....................................................................................................................................................... 483

Chapter 25

Web Server .........................................................................................................................................................................................................486

Figure 163: Web Server Configuration Menu ......................................................................................................................................... 490

Chapter 26

Encryption Keys ...............................................................................................................................................................................................492

Figure 164: Keys/Certificate Configuration Menu ................................................................................................................................ 500

Figure 165: Key Management Menu ......................................................................................................................................................... 501

Figure 166: Create Key Menu ....................................................................................................................................................................... 502

Figure 167: Export Key to File Menu .......................................................................................................................................................... 506

Figure 168: Import Key From File Menu ................................................................................................................................................... 508

Chapter 27

Public Key Infrastructure Certificates ...................................................................................................................................................510

Figure 169: Public Key Infrastructure (PKI) Configuration Menu .................................................................................................... 525

Figure 170: X509 Certificate Management Menu ................................................................................................................................. 525

Figure 171: Create Self-Signed Certificate Menu .................................................................................................................................. 526

Figure 172: Add Certificate Menu ............................................................................................................................................................... 528

Figure 173: Modify Certificate Menu ......................................................................................................................................................... 531

Figure 174: View Certificate Details Menu (page 1) ............................................................................................................................. 534

Figure 175: View Certificate Details Menu (page 2) ............................................................................................................................. 535

Figure 176: Generate Enrollment Request Menu ................................................................................................................................. 538

Figure 177: Secure Socket Layer (SSL) Menu .......................................................................................................................................... 542

Chapter 28

Secure Shell (SSH) Protocol ........................................................................................................................................................................543

Figure 178: SSH Remote Management of a Slave Switch .................................................................................................................. 546

Figure 179: Secure Shell (SSH) Menu ......................................................................................................................................................... 548

Figure 180: Show Server Information Menu ........................................................................................................................................... 550

Chapter 29

RADIUS and TACACS+ Authentication Protocols ............................................................................................................................552

Figure 181: Authentication Menu .............................................................................................................................................................. 557

Figure 182: TACACS+ Client Configuration Menu ................................................................................................................................ 558

Figure 183: RADIUS Client Configuration ................................................................................................................................................ 560

Figure 184: RADIUS Server Configuration ............................................................................................................................................... 561

Figure 185: Show Status Menu .................................................................................................................................................................... 562

20

AT-S62 User’s Guide

Chapter 30

Management Access Control List ............................................................................................................................................................ 563

Figure 186: Management ACL Menu ........................................................................................................................................................ 568

Chapter 31

Starting a Web Browser Management Session ................................................................................................................................ 573

Figure 187: Entering a Switch’s IP Address in the URL Field ............................................................................................................. 574

Figure 188: AT-S62 Login Page ................................................................................................................................................................... 575

Figure 189: Home Page .................................................................................................................................................................................. 575

Figure 190: Save Changes Button in the General Tab (Configuration) ......................................................................................... 577

Chapter 32

Enhanced Stacking ........................................................................................................................................................................................ 579

Figure 191: Enhanced Stacking Tab (Configuration) .......................................................................................................................... 581

Figure 192: Enhanced Stacking Page ........................................................................................................................................................ 582

Figure 193: Enhanced Stacking Tab (Monitoring) ................................................................................................................................ 584

Chapter 33

Basic Switch Parameters ............................................................................................................................................................................. 585

Figure 194: General Tab (Configuration) ................................................................................................................................................. 586

Figure 195: General Tab (Monitoring) ...................................................................................................................................................... 590

Figure 196: Ping Client Tab ........................................................................................................................................................................... 595

Figure 197: System Utilities Tab .................................................................................................................................................................. 597

Chapter 34

SNMPv1 and SNMPv2c Community Strings ...................................................................................................................................... 598

Figure 198: SNMP Tab (Configuration) ..................................................................................................................................................... 599

Figure 199: SNMP (SNMPv1 and SNMPv2c) Tab ................................................................................................................................... 601

Figure 200: Add New SNMPv1/v2c Community Page ........................................................................................................................ 602

Figure 201: Modify SNMPv1/v2c Community Page ............................................................................................................................. 604

Figure 202: SNMP Tab (Monitoring) .......................................................................................................................................................... 607

Chapter 35

Port Parameters .............................................................................................................................................................................................. 609

Figure 203: Port Settings Tab (Configuration) ....................................................................................................................................... 610

Figure 204: Port Configuration Page ......................................................................................................................................................... 611

Figure 205: Port Settings Tab (Monitoring) ............................................................................................................................................ 616

Figure 206: Port Status Page ........................................................................................................................................................................ 617

Figure 207: Port Statistics Page ................................................................................................................................................................... 618

Chapter 36

MAC Address Table ........................................................................................................................................................................................ 621

Figure 208: MAC Address Tab (Configuration) ...................................................................................................................................... 622

Figure 209: Add MAC Address Page .......................................................................................................................................................... 624

Chapter 37

Port Trunking ................................................................................................................................................................................................... 628

Figure 210: Port Trunking Tab ..................................................................................................................................................................... 630

Figure 211: Add New Trunk Page ............................................................................................................................................................... 631

Figure 212: Modify Trunk Page ................................................................................................................................................................... 633

Figure 213: Port Trunking Tab (Monitoring) ........................................................................................................................................... 635

Chapter 38

Port Mirroring ................................................................................................................................................................................................... 637

Figure 214: Port Mirroring Tab (Configuration) .................................................................................................................................... 638

Figure 215: Modify Mirror Page .................................................................................................................................................................. 639

Figure 216: Example of a Modify Mirror Page ........................................................................................................................................ 640

Figure 217: Port Mirroring Tab (Monitoring) .......................................................................................................................................... 643

21

List of Figures

Chapter 39

File Downloads and Uploads .....................................................................................................................................................................644

Figure 218: System Utilities Tab .................................................................................................................................................................. 646

Chapter 40

Event Log ............................................................................................................................................................................................................650

Figure 219: Event Log Tab ............................................................................................................................................................................. 651

Figure 220: Event Log Example ................................................................................................................................................................... 654

Chapter 41

Quality of Service ............................................................................................................................................................................................657

Figure 221: CoS Tab ......................................................................................................................................................................................... 658

Figure 222: CoS Setting for Port Page ....................................................................................................................................................... 659

Figure 223: QoS Scheduling Tab (Configuration) ................................................................................................................................. 661

Figure 224: CoS Tab (Monitoring) ............................................................................................................................................................... 664

Figure 225: CoS Setting for Port Page ....................................................................................................................................................... 664

Figure 226: QoS Scheduling Tab (Monitoring) ...................................................................................................................................... 666

Chapter 42

IGMP Snooping ................................................................................................................................................................................................667

Figure 227: IGMP Tab (Configuration) ...................................................................................................................................................... 668

Figure 228: IGMP Tab (Monitoring) ............................................................................................................................................................ 671

Chapter 43

Denial of Service Defense ...........................................................................................................................................................................673

Figure 229: DoS Tab ......................................................................................................................................................................................... 674

Figure 230: DoS Configuration Page ......................................................................................................................................................... 675

Figure 231: DoS Tab (Monitoring) .............................................................................................................................................................. 677

Chapter 44

SNMPv3 Protocol ............................................................................................................................................................................................678

Figure 232: Configuration System Page, SNMP Tab ............................................................................................................................ 681

Figure 233: SNMPv3 User Table Page ....................................................................................................................................................... 683

Figure 234: Add New SNMPv3 User Page ................................................................................................................................................ 684

Figure 235: Modify SNMPv3 User Page .................................................................................................................................................... 687

Figure 236: SNMPv3 View Table Page ....................................................................................................................................................... 690

Figure 237: Add New SNMPv3 View Page ............................................................................................................................................... 691

Figure 238: Modify SNMPv3 View Page .................................................................................................................................................... 694

Figure 239: SNMPv3 Access Table Page ................................................................................................................................................... 697

Figure 240: Add New SNMPv3 Access Page ........................................................................................................................................... 697

Figure 241: Modify SNMPv3 Access Page ................................................................................................................................................ 701

Figure 242: SNMPv3 SecurityToGroup Table Page .............................................................................................................................. 703

Figure 243: Add New SNMPv3 SecurityToGroup Page ....................................................................................................................... 704

Figure 244: Modify SNMPv3 SecurityToGroup Page ........................................................................................................................... 706

Figure 245: SNMPv3 Notify Table Page .................................................................................................................................................... 708

Figure 246: Add New SNMPv3 Notify Page ............................................................................................................................................. 709

Figure 247: Modify SNMPv3 Notify Page ................................................................................................................................................. 711

Figure 248: SNMPv3 Target Address Table Page .................................................................................................................................. 714

Figure 249: Add New SNMPv3 Target Address Table Page ............................................................................................................... 714

Figure 250: Modify SNMPv3 Target Address Table Page ................................................................................................................... 717

Figure 251: SNMPv3 Target Parameters Table Page ............................................................................................................................ 720

Figure 252: Add New SNMPv3 Target Parameters Table Page ........................................................................................................ 721

Figure 253: Modify SNMPv3 Target Parameters Table Page ............................................................................................................. 724

Figure 254: SNMPv3 Community Table Page ......................................................................................................................................... 728

Figure 255: Add New SNMPv3 Community Table Page ..................................................................................................................... 728

Figure 256: Modify SNMPv3 Community Table Page ......................................................................................................................... 731

Figure 257: Monitoring, SNMPv3 User Table Page ............................................................................................................................... 734

Figure 258: Monitoring, SNMPv3 View Table Page .............................................................................................................................. 735

22

AT-S62 User’s Guide

Figure 259: Monitoring, SNMPv3 Access Table Page .......................................................................................................................... 736

Figure 260: Monitoring, SNMPv3 SecurityToGroup Table Page ..................................................................................................... 737

Figure 261: Monitoring, SNMPv3 Notify Table Page ........................................................................................................................... 738

Figure 262: Monitoring, SNMPv3 Target Address Table Page ......................................................................................................... 739

Figure 263: Monitoring, SNMPv3 Target Parameters Table Page ................................................................................................... 740

Figure 264: Monitoring, SNMPv3 Community Table Page ................................................................................................................ 741

Chapter 45

STP, RSTP, and MSTP ..................................................................................................................................................................................... 742

Figure 265: Spanning Tree Tab (Configuration) .................................................................................................................................... 743

Figure 266: STP Spanning Tree Tab ........................................................................................................................................................... 745

Figure 267: STP Port Settings Window ..................................................................................................................................................... 747

Figure 268: RSTP Spanning Tree Tab ........................................................................................................................................................ 748

Figure 269: RSTP Port Settings Window .................................................................................................................................................. 750

Figure 270: MSTP Spanning Tree Tab ....................................................................................................................................................... 753

Figure 271: Add New MSTI Window .......................................................................................................................................................... 756

Figure 272: Modify MSTI Window .............................................................................................................................................................. 757

Figure 273: MSTP Port Settings Window ................................................................................................................................................. 758

Figure 274: Spanning Tree Tab (Monitoring) ......................................................................................................................................... 760

Chapter 46

Virtual LANs ....................................................................................................................................................................................................... 761

Figure 275: VLAN Tab (Configuration) ...................................................................................................................................................... 762

Figure 276: Add New VLAN Page ............................................................................................................................................................... 763

Figure 277: VLAN Tab (Monitoring) ........................................................................................................................................................... 769

Chapter 47

GARP VLAN Registration Protocol ......................................................................................................................................................... 775

Figure 278: GVRP Tab (Configuring) .......................................................................................................................................................... 776

Figure 279: GVRP Port Configuration Page ............................................................................................................................................. 778

Figure 280: GVRP Tab (Monitoring) ........................................................................................................................................................... 780

Chapter 48

MAC Address Security .................................................................................................................................................................................. 782

Figure 281: Port Security Tab (Monitoring) ............................................................................................................................................ 783

Figure 282: Security for Port(s) Tab ............................................................................................................................................................ 783

Chapter 49

802.1x Port-based Access Control .......................................................................................................................................................... 785

Figure 283: 802.1x Port Access Tab (Configuration) ............................................................................................................................ 786

Figure 284: Port Role Configuration Page ............................................................................................................................................... 788

Figure 285: Authenticator Parameters Page .......................................................................................................................................... 790

Figure 286: Supplicant Parameters Page ................................................................................................................................................. 793

Figure 287: 802.1x Port Access Tab (Monitoring) ................................................................................................................................. 795

Figure 288: Port Status Page ........................................................................................................................................................................ 796

Figure 289: Authenticator Port Parameters Page ................................................................................................................................. 796

Figure 290: Supplicant Port Parameters Page ....................................................................................................................................... 796

Chapter 50

Secure Shell Protocol .................................................................................................................................................................................... 797

Figure 291: Secure Shell Tab (Configuration) ........................................................................................................................................ 798

Figure 292: Secure Shell (Monitoring) ...................................................................................................................................................... 800

Chapter 51

Encryption Keys, PKI, and SSL .................................................................................................................................................................. 802

Figure 293: Keys Tab (Monitoring) ............................................................................................................................................................. 803

Figure 294: PKI Tab (Monitoring) ................................................................................................................................................................ 804

Figure 295: SSL Tab (Monitoring) ............................................................................................................................................................... 807

23

List of Figures

Chapter 52

RADIUS and TACACS+ Authentication Protocols ............................................................................................................................808

Figure 296: Server-based Authentication Tab (Configuration) ....................................................................................................... 809

Figure 297: TACACS+ Configuration Page .............................................................................................................................................. 810

Figure 298: RADIUS Configuration Page .................................................................................................................................................. 811

Figure 299: Server-Based Authentication Tab (Monitoring) ............................................................................................................. 813

Figure 300: TACACS+ Client Configuration Page (Monitoring) ....................................................................................................... 814

Figure 301: RADIUS Client Configuration Page (Monitoring) ........................................................................................................... 814

Chapter 53

Management Access Control List ............................................................................................................................................................815

Figure 302: Mgmt ACL Tab (Configuration) ............................................................................................................................................ 816

Figure 303: Mgmt ACL Tab (Monitoring) ................................................................................................................................................. 819

24

Preface

This guide contains instructions on how to configure an AT-8524M Layer

2+ Fast Ethernet Switch using the menu and web browser interfaces of the AT-S62 management software. For instructions on how to manage the switch from the command line interface, refer to the AT-S62

Command Line User’s Guide, available from the Allied Telesyn web site.

How This Guide is Organized

This manual is divided into seven sections. The chapters in Sections I to

VI explain how to manage a switch from a local or Telnet management session using the menu interface. The chapters in Section VII explain how to manage a switch using the web browser interface. Here is a brief overview of the sections:

Section I: Basic Operations

The chapters in this section explain how to perform basic operations on the switch from a local or Telnet management session using the menu interface. Some of the operations include setting port parameters, creating port trunks, and viewing the MAC address table.

Section II: Advanced Operations

The chapters in this section explain some of the more advanced operations of the switch. Examples include using the file system, downloading and uploading files, and configuring Quality of Service.

25

Preface

Section III: SNMPv3 Operations

The chapter in this section explains how to configure the switch for

SNMPv3. (The instructions for SNMPv1 and SNMPv2 are in Section 1,

Basic Operations.)

Section IV: Spanning Tree Protocols

The chapters in this section explain the Spanning Tree, Rapid Spanning

Tree, and Multiple Spanning Tree Protocols.

Section V: Virtual LANs

The chapters in this section explain port-based and tagged VLANs, GVRP, and the multiple VLAN modes.

Section VI: Port Security

The chapters in this section explain the MAC address security system and 802.1x port-based access control.

Section VII: Management Security

The chapters in this section explain the management security features, such as the Secure Sockets Layer (SSL) and the Secure Shell (SSH) protocols.

Section VIII: Web Browser Management

The chapters in this section explain how to manage a switch using a web browser, such as Microsoft® Internet Explorer or Netscape® Navigator, from a workstation on your network.

Caution

The software described in this documentation contains certain cryptographic functionality and its export is restricted by U.S. law. As of this writing, it has been submitted for review as a “retail encryption item” in accordance with the Export Administration

Regulations, 15 C.F.R. Part 730-772, promulgated by the U.S.

Department of Commerce, and conditionally may be exported in accordance with the pertinent terms of License Exception ENC

(described in 15 C.F.R. Part 740.17). In no case may it be exported to

Cuba, Iran, Iraq, Libya, North Korea, Sudan, or Syria. If you wish to transfer this software outside the United States or Canada, please contact your local Allied Telesyn sales representative for current information on this product’s export status.

26

AT-S62 User’s Guide

Document Conventions

This document uses the following conventions:

Note

Notes provide additional information.

Caution

Cautions inform you that performing or omitting a specific action may result in equipment damage or loss of data.

Warning

Warnings inform you that performing or omitting a specific action may result in bodily injury.

27

Preface

Where to Find Web-based Guides

The installation and user guides for all Allied Telesyn products are available in Portable Document Format (PDF) from on our web site at

www.alliedtelesyn.com. You can view the documents on-line or download them onto a local workstation or server.

28

AT-S62 User’s Guide

Contacting Allied Telesyn

This section provides Allied Telesyn contact information for technical support as well as sales or corporate information.

Online Support

You can request technical support online by accessing the Allied Telesyn

Knowledge Base from the following web site:

http://kb.alliedtelesyn.com. You can use the Knowledge Base to submit questions to our technical support staff and review answers to previously asked questions.

Email and

Telephone

Support

Returning

Products

For Technical Support via email or telephone, refer to the Support &

Services section of the Allied Telesyn web site:

http://www.alliedtelesyn.com.

Products for return or repair must first be assigned a Return Materials

Authorization (RMA) number. A product sent to Allied Telesyn without a

RMA number will be returned to the sender at the sender’s expense.

To obtain a RMA number, contact Allied Telesyn’s Technical Support at our web site: http://www.alliedtelesyn.com.

For Sales or

Corporate

Information

You can contact Allied Telesyn for sales or corporate information at our web site: http://www.alliedtelesyn.com. To find the contact information for your country, select Contact Us -> Worldwide Contacts.

29

Preface

Management Software Updates

You can download new releases of management software for our managed products from either of the following Internet sites:

❑ Allied Telesyn web site: http://www.alliedtelesyn.com

❑ Allied Telesyn FTP server: ftp://ftp.alliedtelesyn.com

To download new software from the Allied Telesyn FTP server using your workstation’s command prompt, you need FTP client software and you must log in to the server. Enter “anonymous” as the user name and your email address for the password.

30

Chapter 1

Overview

This chapter reviews the functions of the AT-S62 management software, the types of sessions you can use to access the software, and the management access levels. This chapter contains the following sections:

❑ Management Overview on page 32

❑ Local Management Session on page 34

❑ Telnet Management Session on page 35

❑ Web Browser Management Session on page 36

❑ SNMP Management Session on page 37

❑ Management Access Levels on page 38

31

Chapter 1: Overview

Management Overview

The AT-S62 management software is intended for the AT-8524M switch.

You use the software to monitor and adjust the switch’s operating parameters. Some of the functions you can perform with the software include:

❑ Enable and disable ports

❑ Configure port parameters, such as speed and duplex mode

❑ Create virtual LANs (VLANs)

❑ Create port trunks and port mirrors

❑ Assign an Internet Protocol (IP) address and subnet mask

❑ Activate and configure the Spanning Tree Protocol (STP), Rapid

Spanning Tree Protocol (RSTP), or Multiple Spanning Tree

Protocol (MSTP)

❑ Access enhanced stacking features

❑ Configure Quality of Service (QoS)

❑ Enable and configure Internet Group Management Protocol

(IGMP) snooping

❑ Download and upload image, configuration, and system files

❑ Configure port security

The AT-S62 management software comes preinstalled on the switch with default settings for all operating parameters. Should the default settings be adequate for your network, you can use the device as an unmanaged switch by simply connecting it to your network, as explained in the hardware installation guide, and powering on the unit.

Note

The default settings for the management software can be found in

Appendix A, AT-S62 Default Settings on page 820.

To actively manage a switch and adjust its operating parameters, you must access its AT-S62 management software. The AT-S62 software has several different types of interfaces. There is a menu interface, another interface for managing a switch with a web browser, and a command line interface.

32

AT-S62 User’s Guide

There are four different ways to access the management software on an

AT-8524M switch. These methods are referred to in this guide as management sessions. They are:

❑ Local management session

❑ Telnet management session

❑ Web browser management session

❑ SNMP management session

The following sections in this chapter briefly describe each type of management session.

33

Chapter 1: Overview

Local Management Session

You establish a local management session with an AT-8524M switch by connecting a terminal or a PC with a terminal emulator program to the

RS232 Terminal Port on the switch, using the straight-through RS-232 management cable included with the switch. The RS232 Terminal Port is located on the front panel of the AT-8524M switch.

This type of management session is referred to as “local” because you must be physically close to the switch, such as in the wiring closet where the switch is located.

Note

For instructions on starting a local management session, refer to

Starting a Local Management Session on page 42.

A switch does not need an Internet Protocol (IP) address for you to manage it locally. You can start a local management session on a switch at any time. It will not affect the forwarding of frames by the device.

If you assign an AT-8524M switch an IP address and designate it as a master switch of an enhanced stack, you can manage all of the switches in the enhanced stack, all from the same local management session.

Note

For further information on enhanced stacking, refer to Enhanced

Stacking Overview on page 49.

34

AT-S62 User’s Guide

Telnet Management Session

You can use any management workstation on your network that has the

Telnet application protocol to manage an AT-8524M switch. This type of management session is referred to in this guide as a remote management session because you do not have to be in the wiring closet where the switch is located. You can manage the switch from any workstation on the network that has the application protocol.

To establish a Telnet management session with a switch, there must be at least one enhanced stacking switch in the subnet with an IP address.

Only one switch in a subnet needs to have an IP address. Once you have established a Telnet management session with the switch that has an IP address, you can use the enhanced stacking feature of the management software to access all other enhanced stacking switches that reside in the same subnet.

Note

For further information on enhanced stacking, refer to Enhanced

Stacking Overview on page 49.

Note

For instructions on how to start a Telnet management session, refer

to Starting a Telnet Management Session on page 45.

A Telnet management session gives you access to nearly all of a switch’s operating parameters. You can perform nearly all the same functions from a Telnet management session as you can from a local management session.

35

Chapter 1: Overview

Web Browser Management Session

You can also use a web browser from a management workstation on your network to manage a switch. This too is referred to as remote management because you can be anywhere on your network when managing the device.

Note

For instructions on starting this type of management session, refer

to Starting a Web Browser Management Session on page 574.

This method of management, as with Telnet management, requires that the switch have an IP address or be part of an enhanced stack. Starting a web browser management session on a master switch of an enhanced stack allows you to manage all of the switches in the same enhanced stack, all from the same management session.

Note

For further information on enhanced stacking, refer to Enhanced

Stacking Overview on page 49.

36

AT-S62 User’s Guide

SNMP Management Session

Another way to remotely manage the switch is with an SNMP management program. AT-S62 software supports SNMPv1, SNMPv2c, and SNMPv3. You need to be very familiar with Management

Information Base (MIB) objects to configure a switch using SNMP management.

The AT-S62 software supports the following MIBs:

❑ SNMP MIB-II (RFC 1213)

❑ Bridge MIB (RFC 1493)

❑ SNMPv3 (RFC 2571-6)

❑ User-based Security Model (USM) for SNMPv3 (RFC 2574)

❑ Interface Group MIB (RFC 2863)

❑ Ethernet MIB (RFC 1643)

❑ Remote Network MIB (RFC 1757)

❑ Allied Telesyn managed switch MIB

You must download the Allied Telesyn managed switch MIB files

(atiChassisSwitch.mib and atiStackinginfo.mib) from the Allied Telesyn web site and compile the files with your SNMP program. For instructions on how to compile the MIB file with your SNMP program, refer to your

SNMP management documentation.

For information about how to configure SNMP communities using a

local or Telnet management session, see Chapter 5, SNMPv1 and

SNMPv2c Configuration on page 81 and Chapter 17, SNMPv3

Configuration on page 222.

Note

SNMP management can use the enhanced stacking feature through

the private MIB (atiStackinginfo.mib). See Chapter 3, Enhanced

Stacking on page 48.

37

Chapter 1: Overview

Management Access Levels

There are two levels of management access in the AT-S62 management software: Manager and Operator. Manager access gives you the power to view and configure all of a switch’s operating parameters. Operator access only allows you to view the operating parameters; you cannot change any values.

The switch has two default login accounts. For Manager access, the login name is “manager” and the default password is “friend”. For Operator access, the login name is “operator” and the default password is also

“operator”. The usernames and passwords are case-sensitive.

You can create new Manager and Operator accounts with the RADIUS

and TACACS+ authentication protocols, as explained in Chapter 29,

RADIUS and TACACS+ Authentication Protocols on page 552.

38

Section I

Basic Operations

The chapters in this section cover a variety of basic switch features and functions. The chapters include:

❑ Chapter 2: Starting a Local or Telnet Management Session on page 40

❑ Chapter 3: Enhanced Stacking on page 48

❑ Chapter 4: Basic Switch Parameters on page 56

❑ Chapter 5: SNMPv1 and SNMPv2c Configuration on page 81

❑ Chapter 6: Port Parameters on page 94

❑ Chapter 7: MAC Address Table on page 109

❑ Chapter 8: Port Trunking on page 121

❑ Chapter 9: Port Mirroring on page 136

❑ Chapter 10: Ethernet Statistics on page 141

39

Chapter 2

Starting a Local or Telnet

Management Session

This chapter contains the procedure for starting a local or Telnet management session on an AT-8524M switch. The sections in the chapter are:

❑ Local Management Session on page 41

❑ Telnet Management Session on page 45

❑ Saving Your Parameter Changes on page 47

40

AT-S62 User’s Guide

Local Management Session

To establish a local management session, you connect a terminal or PC with a terminal emulator program to the RS-232 terminal port on the front panel of the AT-8524M switch.

A local management session is so named because you must be close to the switch, usually within a few meters, to start this type of management session. This means you must be in the wiring closet where the switch is located.

A switch does not need an IP address to be managed from a local management session. A local management session will not interfere with the switch’s forwarding of packets.

Starting a local management session on a switch that has been configured as a Master switch allows you to manage all the switches in the same enhanced stack. This relieves you of having to start a separate local management session for each switch, simplifying network management.

Starting a local management session on a switch that is not part of an enhanced stack or that is a slave switch allows you to manage just that switch.

Note

For information on enhanced stacking, refer to Enhanced Stacking

Overview on page 49.

Section I: Basic Operations 41

Chapter 2: Starting a Local or Telnet Management Session

Starting a Local

Management

Session

To start a local management session, perform the following procedure:

1. Connect one end of the straight-through RS232 management cable to the RS232 Terminal Port on the front panel of the switch.

MODE

AT-8524M

Fast Ethernet Switch

COL

100

FULL

ACT

STATUS

FAULT

MASTER

RPS

PWR

Section I: Basic Operations

Figure 1 Connecting a Terminal or PC to the RS232 Terminal Port

2. Connect the other end of the cable to an RS-232 port on a terminal or

PC with a terminal emulator program.

3. Configure the terminal or terminal emulator program as follows:

❑ Baud rate: 9600 bps

❑ Data bits: 8

❑ Parity None

❑ Stop bits: 1

❑ Flow control: None

Note

The port settings are for a DEC VT100 or ANSI terminal, or an equivalent terminal emulator program.

Note

During boot up, the switch displays the following prompt: Press

<CTRL>B to go to Boot Prompt

. This message is intended for manufacturing purposes only. (If you inadvertently display the boot prompt (=>), type boot and press Return to start the switch.)

42

Section I: Basic Operations

AT-S62 User’s Guide

4. When prompted, enter a username and password.

To configure the switch settings, enter “manager” as the user name. The default password for manager access is “friend”. To just view the settings, enter “operator” as the user name. The default password for operator access is “operator”. Usernames and passwords are case-sensitive. For information on the two access

levels, refer to Management Access Levels on page 38. (For

instructions on how to change a password, refer to Configuring the Manager and Operator Passwords on page 65.)

After logging on, you will see the window in Figure 2. This is the

command prompt interface. You will see either a “#” symbol if you logged on as a manager or a “$” symbol if you logged on as an operator.

#

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

<No System Name>

Figure 2 Command Prompt

For instructions on how to use the command line interface, refer to the AT-S62 Command Line User’s Guide, which is available from the Allied Telesyn web site.

5. To use the menu interface, type menu at the command prompt.

The Main Menu is shown in Figure 3.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

<No System Name>

User: Manager 11:20:02 02-Jan-2004

Main Menu

1 - Port Configuration

2 - VLAN Configuration

3 - Spanning Tree Configuration

4 - MAC Address Tables

5 - System Administration

6 - Advanced Configuration

7 - Security and Services

8 - Enhanced Stacking

C - Command Line Interface

Q - Quit

Enter your selection?

Figure 3 Main Menu

43

Chapter 2: Starting a Local or Telnet Management Session

To select a menu item, type the corresponding letter or number.

Pressing the Esc key or typing the letter R in a submenu, returns you to the previous menu.

Enhanced

Stacking

When you start a local management session on a switch that has been configured as a Master switch, you can manage all the switches in the enhanced stack from the same management session. This can save you the time and trouble of having to start a separate local management session each time you want to manage a switch in your network. It can also save you from having to go to the different wiring closets where the switches are located.

For information on enhanced stacking and how to manage different

switches from the same management session, refer to Chapter 3,

Enhanced Stacking on page 48.

Quitting a Local

Session

To quit a local session, return to the Main Menu and type Q for Quit.

You should always exit from a management session when you are finished managing a switch. This can prevent unauthorized individuals from making changes to a switch’s configuration should you leave your management station unattended.

Note

You cannot run both a local management session and a Telnet management session on the same switch simultaneously. Failure to properly exit from a local or Telnet management session may block future management sessions.

Section I: Basic Operations 44

AT-S62 User’s Guide

Telnet Management Session

You can use the Telnet application protocol from a workstation on your network to manage an AT-8524M switch. This type of management is referred to as remote management because you do not have to be physically close to the switch to start the session, such as with a local management session. Any workstation on your network that has the application protocol can be used to manage the unit.

In terms of functionally, there are almost no differences between managing a switch locally through the RS232 Terminal Port and remotely with the Telnet application protocol. You see the same menu selections and have nearly the same management capabilities.

To manage a switch using Telnet, it must have an IP address or be part of an enhanced stack.

Note

For background information on enhanced stacking, refer to

Enhanced Stacking Overview on page 49.

Starting a Telnet

Management

Session

To start a Telnet management session, specify the IP address of the

Master switch of the enhanced stack in the Telnet application protocol and enter a user name and password when prompted.

To configure a switch’s settings, enter “manager” as the user name. The default password for manager access is “friend”. To just view the settings, enter “operator” as the username. The default password for operator access is “operator”. User names and passwords are case-

sensitive. For information on the two access levels, refer to Management

Access Levels on page 38.

The management software displays the command line prompt shown in

Figure 2 on page 43. For instructions on how to use the command line

interface, refer to the AT-S62 Command Line User’s Guide, available from the Allied Telesyn web site.

To use the menu interface instead, type menu and press Return. The

Main Menu of a Telnet management session is the same menu for a local

management session, shown in Figure 3 on page 43. You can perform

nearly all the same functions from a Telnet management session as you can from a local management session.

The menus also function the same. To make a selection, type its corresponding number of letter. To return to a previous menu, type R or press ESC.

Section I: Basic Operations 45

Chapter 2: Starting a Local or Telnet Management Session

Note

You can run only one Telnet management session on a switch at a time. Additionally, you cannot run both a Telnet management session and a local management session on the same switch at the same time.

Quitting a

Telnet

Management

Session

To end a Telnet management session, return to the Main Menu and type

Q for Quit.

Section I: Basic Operations 46

AT-S62 User’s Guide

Saving Your Parameter Changes

When you make a change to a switch parameter, the change is, in most cases, immediately activated on the switch as soon as you enter it.

However, most parameter changes are initially saved only to temporary memory in the switch and will be lost the next time you reset or power cycle the unit. To permanently save your changes, you must select the S -

Save Configuration Changes option from the Main Menu. You should select that menu option whenever you have made a change to a switch parameter that you want the switch to retain even when it is reset or power cycled. If you do not see the option in the Main Menu, there are no parameter changes to be saved.

Section I: Basic Operations 47

Chapter 3

Enhanced Stacking

This chapter explains the enhanced stacking feature. The sections in this chapter include:

❑ Enhanced Stacking Overview on page 49

❑ Setting a Switch’s Enhanced Stacking Status on page 52

❑ Selecting a Switch in an Enhanced Stack on page 54

Section I: Basic Operations 48

AT-S62 User’s Guide

Enhanced Stacking Overview

The enhanced stacking feature can make it easier for you to manage the

AT-8524M switches in your network. It offers the following benefits:

❑ You can manage up to 24 switches from one local or remote management session. This eliminates the need of having to initiate a separate management session with each switch in your network.

❑ The switches can share the same IP address. This reduces the number of IP addresses that you need to assign to your network devices for remote management.

❑ Remotely managing a new switch in your network is simplified.

You simply connect it to your network. Once connected to the network, you can begin to manage it immediately from any workstation in your network.

Guidelines

There are a few guidelines to keep in mind when implementing enhanced stacking for your network:

❑ An enhanced stack cannot span subnets.

❑ All of the switches in an enhanced stack must use the same management VLAN. For information about Management VLANs,

refer to Specifying a Management VLAN on page 418.

❑ You can create multiple enhanced stacks within a subnet by assigning the switches to different Management VLANs.

❑ An enhanced stack must have at least one master switch.

❑ The master switch can be any switch that supports enhanced stacking, such as an AT-8000 Series switch, an AT-8400 Series switch, or an AT-8524M switch.

❑ You must assign the master switch an IP address and subnet mask.

❑ You must set a master switch’s stacking status to Master.

❑ The enhanced stacking feature uses the IP address 176.16.16.16.

Do not assign this address to any device on your subnet if you intend to use the enhanced stacking feature.

Section I: Basic Operations 49

Chapter 3: Enhanced Stacking

There are three basic steps to implementing this feature on your network:

1. You must select a switch to function as the master switch of the enhanced stack.

The master switch can be any switch that supports enhanced stacking, such as an AT-8000 Series switch, an AT-8400 Series switch, or an AT-8524M switch. For networks that consist of more than one subnet, there must be at least one master switch in each subnet.

It is recommended that each enhanced stack have two master switches, each assigned a unique IP address. That way, should you remove one of the master switches from the network, such as for maintenance, you all still be able to remotely manage the switches in the stack using the other master switch.

2. You must assign each master switch a unique IP address and a subnet mask.

A master switch must have a unique IP address and a subnet mask. The other switches in an enhanced stack, referred to as slave switches, do not need an IP address.

If an enhanced stack will have more than one master switch, you must assign each master switch a unique IP address.

Note

You can set the IP address manually or activate the BOOTP and

DHCP services on a master switch and have the master switch obtain its IP information from a BOOTP or DHCP server on your network. Initially assigning an IP address or activating the BOOTP and DHCP services can only be performed through a local management session.

For instructions on how to set the IP address manually, refer to

Configuring an IP Address and Switch Name on page 59. For

instructions on activating the BOOTP and DHCP services, refer to

Activating the BOOTP and DHCP Client Software on page 62.

3. Change the enhanced stacking status of the master switch to Master.

This is explained in Setting a Switch’s Enhanced Stacking Status on page 52.

Section I: Basic Operations 50

Master 1

IP Address

149.32.11.22

Master 2

IP Address

149.32.11.16

Figure 4 is an example of the enhanced stacking feature.

AT-S62 User’s Guide

Subnet A

Router

PWR

MASTER

RS-232 TERMINAL PORT

Subnet B

Master 1

IP Address

149.32.09.18

Master 2

IP Address

149.32.09.24

Figure 4 Enhanced Stacking Example

The example consists of a network of two subnets interconnected with a router. Two AT-8524M switches in each subnet have been selected as the master switches of their respective subnets, and each has been assigned a unique IP address.

To manage the switches of a subnet, you can start a local management session or a remote Telnet management session on one of the master switches in the subnet. You would then have management access to all enhanced stacking switches in the same subnet.

Section I: Basic Operations 51

Chapter 3: Enhanced Stacking

Setting a Switch’s Enhanced Stacking Status

The enhanced stacking status of the switch can be master switch, slave switch, or unavailable. Each status is described below:

❑ Master switch - A master switch of a stack can be used to manage all the other switches in a subnet. Once you establish a local or remote management session with the Master switch, you can access and manage all the switches in the stack.

A master switch must have a unique IP address. You can manually assign a master switch an IP address or activate the

BOOTP and DHCP client software on the switch.

❑ Slave switch - A slave switch can be remotely managed through a master switch. It does not need an IP address or subnet mask. This is the default setting.

❑ Unavailable - A switch with an unavailable stacking status cannot be remotely managed through a master switch. A switch with this designation can be managed locally. To be managed remotely, a switch with an unavailable stacking status must be assigned a unique IP address.

Note

You cannot change the stacking status of a switch accessed through enhanced stacking. To change the stacking status of a switch that does not have an IP address or subnet mask, such as a slave switch, you must use a local management session. If the switch has an IP address and subnet mask, such as a master switch, you can use either a local or a Telnet management session.

To adjust a switch’s enhanced stacking status, perform the following procedure:

1. From the Main Menu, type 8 to select Enhanced Stacking.

Section I: Basic Operations 52

Section I: Basic Operations

AT-S62 User’s Guide

The Enhanced Stacking menu is shown in Figure 5.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Enhanced Stacking

1 - Switch State-(M)aster/(S)lave/(U)navailable.... Master

2 - Stacking Services

R - Return to Previous Menu

Enter your selection?

Figure 5 Enhanced Stacking Menu

The menu displays the current status of the switch at the end of selection “1 - Switch State.” For example, the switch’s current status in the figure above is Master.

Note

The “2 - Stacking Services” selection in the menu is displayed only on master switches.

2. To change a switch’s stacking status, type 1 to select Switch State.

The following prompt is displayed.

Enter new setup (M/S/U) ->

3. Type M to change the switch to a master switch, S to make it a slave switch, or U to make the switch unavailable. Press Return.

A change to the status is immediately activated on the switch.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

53

Chapter 3: Enhanced Stacking

Selecting a Switch in an Enhanced Stack

Before you perform a procedure on a switch in an enhanced stack, you should first check to be sure that you are performing it on the correct switch. If you assigned system names to your switches, this should be easy. The name of the switch being managed is always displayed at the top of every management menu.

When you start a local or remote management session on the Master switch of an enhanced stack, you are by default addressing that particular switch. The management tasks that you perform affect only the master switch.

To manage a slave switch or another Master switch in the stack, you need to select it from the management software.

To select a switch to manage in an enhanced stack, perform the following procedure:

1. From the Main Menu, type 8 to select Enhanced Stacking.

2. From the Enhanced Stacking menu, type 2 to select Stacking Services.

Note

The Stacking Services selection is only available on a Master switch.

The Stacking Services menu is shown in Figure 6.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Stacking Services

Switch Software Switch

Num MAC Address Name Mode Version Model

-------------------------------------------------------------

1 - Get/Refresh List of Switches

2 - Sort Switches in New Order

3 - Access Switch

4 - Download Image/Bootloader File

5 - Download Configuration File

R - Return to Previous Menu

Enter your selection?

Figure 6 Stacking Services Menu

Section I: Basic Operations 54

AT-S62 User’s Guide

3. Type 1 to select Get/Refresh List of Switches.

The Master switch polls the subnet for all slave and Master switches that are a part of the enhanced stack and displays a list of the switches in the Stacking Services menu.

The Master switch on which you started the management session is not included in the list, nor are any switches with an enhanced stacking status of Unavailable.

By default, the switches are sorted in the menu by MAC address.

You can sort the switches by name using the selection 2 - Sort

Switches in New Order.

Note

Menu option “4 - Download Image/Bootloader” downloads the

AT-S62 image from a Master switch to another AT-8524M switch in

the subnet. The option is explained in Downloading an AT-S62

Image File Switch to Switch on page 167. Option “5 - Download

Configuration” allows you to download a configuration file from a

Master switch to another AT8524M switch in the subnet. This option

is explained in Downloading an AT-S62 Configuration File Switch to

Switch on page 169.

4. To manage a new switch, type 3 to select Access Switch.

A prompt similar to the following is displayed:

Enter the switch number -> [1 to 24}

5. Type the number of the switch in the list you want to manage.

6. Enter the appropriate username and password for the switch.

The Main Menu of the selected switch is displayed. You now can manage the switch. Any management tasks you perform affect only the selected switch.

Returning to the Master

Switch

When you have finished managing a slave switch, return to the Main

Menu of the slave switch and type Q for Quit. This returns you to the

Stacking Services menu. Once you see that menu, you are again addressing the Master switch from which you started the management session.

You can either select another switch in the list to manage or, if you want to manage the Master switch, return to the master switch’s Main Menu by typing R twice.

Section I: Basic Operations 55

Chapter 4

Basic Switch Parameters

Section I: Basic Operations

This chapter contains a variety of information and procedures. There is a discussion on when to assign an IP address to a switch and the different ways to do it. There are also procedures for resetting the switch, activating the switch default settings, and more.

Sections in the chapter include:

❑ When Does a Switch Need an IP Address? on page 57

❑ Configuring an IP Address and Switch Name on page 59

❑ Activating the BOOTP and DHCP Client Software on page 62

❑ Rebooting a Switch on page 64

❑ Configuring the Manager and Operator Passwords on page 65

❑ Setting the System Time on page 67

❑ Configuring the Console Startup Mode on page 71

❑ Configuring the Console Timer on page 72

❑ Enabling or Disabling the Telnet Server on page 73

❑ Setting the Baud Rate of the RS-232 Terminal Port on page 74

❑ Pinging a Remote System on page 75

❑ Returning the AT-S62 Software to the Factory Default Values on page 76

❑ Viewing System Hardware and Software Information on page 78

❑ Setting the Switch’s Temperature Threshold on page 80

56

AT-S62 User’s Guide

When Does a Switch Need an IP Address?

One of the tasks to building or expanding a network is deciding which managed switches need to be assigned a unique IP address. The rule used to be that a managed switch needed an IP address if you wanted to manage it remotely, such as with the Telnet application protocol.

However, if a network contained a lot of managed switches, having to assign each one an IP address was often cumbersome and time consuming. It was also often difficult keeping track of all the IP addresses.

The enhanced stacking feature of the AT-8000 Series, AT-8400 Series, and AT-8524M switches simplifies all this. With enhanced stacking, you only need to assign an IP address to one switch in each subnet in your network. The switch with the IP address is referred to as the Master switch of the enhanced stack. All switches in the same subnet share the

IP address.

Starting a local or remote management session on the Master switch automatically gives you complete management access to all the other enhanced stacking switches in the same enhanced stack.

This feature has two primary benefits. First, it helps reduce the number of IP addresses you have to assign to your network devices. Second, it allows you to configure multiple switches through the same local or remote management session.

If your network consists of multiple subnets, you must assign a unique IP address to at least one switch in each subnet. The switch with the IP address will be the Master switch of that subnet.

When you assign a switch an IP address, you must also assign it a subnet mask. The switch uses the subnet mask to determine which portion of an

IP address represents the network address and which the node address.

You must also assign the switch a gateway address if there is a router between the switch and the remote management workstation. This gateway address is the IP address of the router through which the switch and management station will communicate.

Note

For further information on enhanced stacking, refer to Enhanced

Stacking Overview on page 49.

Section I: Basic Operations 57

Chapter 4: Basic Switch Parameters

How Do You

Assign an IP

Address?

After you have decided which, if any, switches on your network need an

IP address, you must access the AT-S62 software on the switches and assign the addresses. There are two ways in which a switch can obtain an

IP address.

The first method is for you to assign the IP configuration information

manually. The procedure for this is explained in Configuring an IP

Address and Switch Name on page 59. Initially assigning an IP address to

a switch can only be done through a local management session.

The second method is for you to activate the BOOTP and DHCP client software on the switch and have the switch automatically download its

IP configuration information from a BOOTP or DHCP server on your

network. This procedure is explained in Activating the BOOTP and DHCP

Client Software on page 62.

Section I: Basic Operations 58

AT-S62 User’s Guide

Configuring an IP Address and Switch Name

The procedure in this section explains how to manually assign an IP address, subnet mask, and gateway address to the switch from a local or

Telnet management session. (If you want the switch to obtain its IP configuration from a DHCP or BOOTP server on your network, go to the

procedure Activating the BOOTP and DHCP Client Software on page 62.)

This procedure also explains how to assign a name to the switch, along with the name of the administrator responsible for maintaining the unit and the location of the switch.

To manually set a switch’s IP address, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

System Administration

1 - System Information

2 - System Configuration

3 - Console (Serial/Telnet) Configuration

4 - Web Server Configuration

5 - SNMP Configuration

6 - Authentication Configuration

7 - Management ACL

8 - Event Log

9 - System Utilities

R - Return to Previous Menu

Enter your selection?

Figure 7 System Administration Menu

Section I: Basic Operations 59

Chapter 4: Basic Switch Parameters

2. From the System Administration menu, type 2 to select System

Configuration.

The System Configuration menu is shown in Figure 8.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

System Configuration

1 - BOOTP/DHCP ........ Disabled

2 - IP Address ........ 0.0.0.0

3 - Subnet Mask ....... 0.0.0.0

4 - Default Gateway ... 0.0.0.0

5 - System Name ....... Production Switch

6 - Location .......... Bldg. 12 Rm. 201

7 - Administrator ..... Jane Smith

8 - Configure System Time

9 - Configure System Hardware

R - Return to Previous Menu

Figure 8 System Configuration Menu

3. Adjust the parameters as desired.

Note

A change to any parameter in this menu, including the IP address, subnet mask, and gateway address, is activated immediately on the switch.

The parameters in the System Configuration menu are described below:

1 - BOOTP/DHCP

This selection activates and deactivates the BOOTP and DHCP client software on the switch. For information on this selection,

refer to Activating the BOOTP and DHCP Client Software on page

62.

2 - IP Address

This parameter specifies the IP address of the switch. You must specify an IP address if you want to remotely manage the switch using a web browser, a Telnet utility or an SNMP management program, or it you want the switch to function as the Master switch of an enhanced stack. The IP address must be entered in the format: xxx.xxx.xxx.xxx. The default value is 0.0.0.0.

Section I: Basic Operations 60

Section I: Basic Operations

AT-S62 User’s Guide

3 - Subnet Mask

This parameter specifies the subnet mask for the switch. You must specify a subnet mask if you assigned an IP address to the switch.

The subnet mask must be entered in the format: xxx.xxx.xxx.xxx.

The default value is 255.255.0.0.

4 - Default Gateway

This parameter specifies the default router’s IP address. This address is required if you intend to remotely manage the switch from a management station that is separated from the switch by a router. The address must be entered in the format: xxx.xxx.xxx.xxx. The default value is 0.0.0.0.

5 - System Name

This parameter specifies a name for the switch (for example, Sales

Ethernet switch). The name is displayed at the top of the AT-S62 management menus and pages. The name can be from 1 to 20 characters. The name can include spaces and special characters, such as exclamation points and asterisks. The default is no name.

This parameter is optional.

Note

Allied Telesyn recommends that you assign each switch a name.

Names can help you identify the various switches in your network and help you avoid performing a configuration procedure on the wrong switch.

6 - Location

This parameter specifies the location of the switch, (for example,

4th Floor - rm 402B). The location can be from 1 to 20 characters.

The location can include spaces and special characters, such as dashes and asterisks. The default is no location. This parameter is optional.

7 - Administrator

This parameter specifies the name of the network administrator responsible for managing the switch. The name can be from 1 to

20 characters. It can include spaces and special characters, such as dashes and asterisks. The default is no name. This parameter is optional.

Note

There are two other options on this menu. Option “8 - Configure

System Time” is described in Setting the System Time on page 67.

Option “9 - Configure System Hardware” is described in Setting the

Switch’s Temperature Threshold on page 80.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

61

Chapter 4: Basic Switch Parameters

Activating the BOOTP and DHCP Client Software

The BOOTP and DHCP application protocols were developed to simplify network management. They are used to automatically assign IP configuration information to the devices on your network, such as an IP address, subnet mask, and a default gateway address.

The AT-8524M switch contains the client software for these protocols and can obtain its IP configuration information from a BOOTP or DHCP server on your network. If you activate this feature, the switch will seek its IP address and other IP configuration information from a BOOTP or

DHCP server on your network whenever you reset or power ON the device.

Naturally, for this to work there must be a BOOTP or DHCP server residing on your network and you must configure the service by entering in the switch’s MAC address.

BOOTP and DHCP services allow you to specify how the IP address is to be assigned to the switch. The choices are static and dynamic. If you choose static, the server always assigns the same IP address to the switch when the switch is reset or powered ON. This is the preferred configuration. Because the BOOTP and DHCP services always assigns the same IP address to a switch, you will always know which IP address to use when you need to remotely manage a particular switch.

If you choose dynamic, the server assigns any unused IP address that it has not already assigned to another device. This means that a switch might have a different IP address each time you reset or power cycle the device, making it difficult for you to remotely manage the unit.

Note

The BOOTP and DHCP client software is disabled by default on the switch.

To activate or deactivate the BOOTP and DHCP client software, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 2 to select System

Configuration.

The System Configuration menu is shown in Figure 8 on page 60.

3. From the System Configuration menu, type 1 to select BOOTP/DHCP.

Section I: Basic Operations 62

AT-S62 User’s Guide

The following prompt is displayed:

BOOTP/DHCP (E-Enabled, D-Disabled):

4. Type E to enable BOOTP and DHCP services on the switch or D to disable the services and press Return. The default is disabled.

Note

If you activate the BOOTP/DHCP client software, the switch immediately begins to query the network for a BOOTP or DHCP server. The switch continues to query the network for its IP configuration until it receives a response.

Any static IP address, subnet mask, or gateway address assigned to the switch is deleted from the System Configuration menu and replaced with the value the switch receives from the BOOTP or

DHCP server. If you later disable BOOTP and DHCP, these values are returned to their default settings.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 63

Chapter 4: Basic Switch Parameters

Rebooting a Switch

This procedure reboots the switch.

Note

Any configuration changes not save will be lost once the switch reboots. To save your configuration changes, return to the Main

Menu and type S to select Save Configuration Changes.

To reboot the switch, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 9 to select System

Utilities.

The System Utilities menu is shown in Figure 9.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

System Utilities

1 - File Operations

2 - Downloads and Uploads

3 - Ping a remote system

4 - Reset to Factory Defaults

5 - Reboot the switch

R - Return to Previous Menu

Enter your selection?

Section I: Basic Operations

Figure 9 System Utilities Menu

3. From the System Utilities menu, type 5 to select Reboot the switch.

The following prompt is displayed:

The switch is about to reboot. Do you want to proceed? [Yes/No] ->

4. Type Y to reboot the switch or N to cancel the procedure.

Caution

The switch will not forward traffic while it initializes its operating software, a process that takes approximately 20 seconds to complete. Some packet traffic may be lost. Once the switch is finished rebooting, you will need to reestablish your management session if you want to continue managing the unit.

64

AT-S62 User’s Guide

Configuring the Manager and Operator Passwords

There are two levels of management access on an AT-8524M switch: manager and operator. When you log in as manager, you can view and configure all of a switch’s operating parameters. When you log in as an operator, you can only view the operating parameters; you cannot change any values.

You log in as a manager or an operator by entering the appropriate username and password when you start an AT-S62 management session. The default password for manager access is “friend”. The default password for operator access is “operator”. Passwords are case-sensitive.

To change the manager or operator password, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 6 to select

Authentication Configuration.

3. From the Authentication Configuration menu, type 5 to select

Passwords Configuration.

The Passwords Configuration menu is shown in Figure 10.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Passwords Configuration

1 - Set Manager Password

2 - Set Operator Password

R - Return to Previous Menu

Enter your selection?

Figure 10 Passwords Configuration Menu

4. Type 1 to change the Manager password or type 2 to change the

Operator password.

5. When prompted, enter the current manager password. (This step does not apply for the operator password.)

6. When prompted, enter the new manager or operator password. The new password will be case-sensitive.

7. When prompted, re-enter the new password.

Section I: Basic Operations 65

Chapter 4: Basic Switch Parameters

Note

A password can be from 0 to 16 alphanumeric characters. Passwords are case-sensitive. You should not use spaces or special characters, such as asterisks (*) or exclamation points (!), in a password if you will be managing the switch from a web browser. Many web browsers cannot handle special characters in passwords.

Section I: Basic Operations 66

AT-S62 User’s Guide

Setting the System Time

This procedure explains how to set the switch’s date and time. Setting the system time is important if you configured the switch to send traps to your management workstations. Traps from a switch where the time has not been set will not contain the correct date and time, making it difficult for you to determine when the events represented by the traps occurred.

It is also important to set the system time if you intend to use the Secure

Sockets Layer (SSL) certificate feature described in Chapter 27, Public

Key Infrastructure Certificates on page 510. Certificates must contain the

date and time of when they were created.

There are two ways to set the switch’s time. One method is to set it manually. There is, however, a drawback to this method. The switch loses the values when reset or power cycled. Using this method requires resetting the values whenever you reset the device.

The second method uses the Simple Network Time Protocol (SNTP). The

AT-S62 management software comes with the client version of this protocol. You can configure the AT-S62 software to obtain the current date and time from an SNTP or Network Time Protocol (NTP) server located on your network or the Internet.

SNTP is a reduced version of the NTP. However, the SNTP client software in the AT-S62 management software is interoperable with NTP servers.

Note

The default system time on the switch is midnight, January 1, 1970.

To set the system time manually or to configure SNTP, do the following:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 2 to select System

Configuration.

The System Configuration menu is shown in Figure 8 on page 60.

3. From the System Configuration menu, type 8 to select Configure

System Time.

Section I: Basic Operations 67

Chapter 4: Basic Switch Parameters

The Configure System Time menu is shown in Figure 11.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure System Time

1 - System Time ................... 00:04:22 on 01-Jan-1970

2 - SNTP Status ................... Disabled

3 - SNTP Server ................... 0.0.0.0

4 - UTC Offset .................... +0

5 - Daylight Savings Time (DST) ... Enabled

6 - Poll Interval ................. 600 seconds

7 - Last Delta .................... +0 seconds

U - Update System Time

R - Return to Previous Menu

Enter your selection?

Figure 11 Configure System Time Menu

4. To set the system time manually, do the following: a. Type 1 to select System Time

The following prompt appears:

Enter new system time [hh:mm:ss] -> b. Enter a new time for the system in the following format: hours, minutes, and seconds all separated by colons.

The following prompt appears:

Enter new system date [dd-mm-yyyy] -> c. Enter a new date for the system. Use two numbers to specify the day and month. Use four numbers to specify the year. Separate the values with hyphens. For example, December 5, 2003 is specified 05-12-2003.

The new time and date are immediately activated on the switch.

5. To configure the switch to obtain its date and time from an SNTP or

NTP server on your network or the Internet, do the following: a. Type 3 to select SNTP Server to enter the IP address of an SNTP server.

Section I: Basic Operations 68

Section I: Basic Operations

AT-S62 User’s Guide

Note

If the switch is obtaining its IP address and subnet mask from a

DHCP sever, you can configure the DHCP server to provide the switch with an IP address of an NTP or SNTP server. If you configured the DHCP server to provide this address, then you do not need to enter it here, and you can skip ahead to Step C.

The following prompt is displayed:

Enter SNTP server IP address -> b. Enter an IP address of an SNTP or NTP server.

c. Type 4 to select UTC Offset to specify the difference between the

UTC and local time.

Note

If the switch is using DHCP, it automatically attempts to determine this value. In this case, you do not need to configure a value for the

UTC Offset parameter.

The following prompt is displayed:

Enter UTC Offset [-12 to 12] -> 0 d. Enter a UTC Offset time.

The default is 0 hours. The range is -12 to +12 hours.

e. Type 5 to select Daylight Savings Time (DST) to enable or disable the switch’s ability to adjust its system time to daylight savings time. The following prompt is displayed:

Adjust for Daylight Savings Time (E - Enabled,

D - Disabled) -> f. Select one of the following:

E - Enabled to allow the switch to adjust system time to daylight savings time. This is the default value.

D - Disabled to not allow the switch to adjust system time to daylight savings time.

Note

The switch does not set DST automatically. If the switch is in a locale that uses DST, you must remember to enable this in April when DST begins and disable it in October when DST ends. If the switch is in a locale that does not use DST, this option should be set to disabled all the time.

69

Chapter 4: Basic Switch Parameters g. Type 6 - Poll Interval to specify the time interval between queries to the SNTP server.

The following prompt is displayed:

Enter interval to poll SNTP server [60 to 1200]

-> 600 h. Enter the number of seconds the switch waits between polling the

SNTP or NTP server. The default is 600 seconds. The range is from

60 to 1200 seconds.

i.

Type 2 to select SNTP Status to enable or disable the SNTP client.

The following prompt appears:

SNTP Status (E-Enabled, D-Disabled) -> j.

Select one of the following:

E - Enables the SNTP client software on the switch.

D - Disables the SNTP client software

Once enabled, the switch immediately polls the SNTP or NTP server for the current date and time. (The switch will also automatically poll the server whenever a change is made to any of the parameters in this menu, so long as SNTP is enabled.)

The Last Delta option in the menu displays the last adjustment that was applied to system time due to a drift in the system clock between two successive queries to the SNTP server. This is a read only field.

The U - Update System Time selection in the menu allows you to prompt the switch to poll the SNTP or NTP server for the current time and date. You can use this selection to update the time and date immediately rather than wait for the switch’s next polling period. This selection has no effect if you set the date and time manually.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 70

AT-S62 User’s Guide

Configuring the Console Startup Mode

You can configure the AT-S62 software to display either the Main Menu or the command line interface prompt whenever you start a local or

Telnet management session. The default is the command line interface.

To change the console startup mode, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 3 to select Console

(Serial/Telnet) Configuration.

The Console (Serial/Telnet) Configuration menu is shown in

Figure 12.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Console (Serial/Telnet) Configuration

1 - Console Startup Mode ............ Menu

2 - Console Disconnect Interval ..... 10 minute(s)

3 - Console Baud Rate ............... 9600

4 - Telnet Server ................... Enabled

R - Return to Previous Menu

Enter your selection?

Figure 12 Console (Serial/Telnet) Configuration Menu

3. Type 1 to toggle Console Startup Mode between Menu and CLI. When set to Menu, a management session starts by displaying the Main

Menu. When set to CLI, a management session starts with the command line interface prompt. The default is CLI.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

A change to the console startup mode takes effect the next time you start a management session.

Section I: Basic Operations 71

Chapter 4: Basic Switch Parameters

Configuring the Console Timer

The AT-S62 management software uses the console timer, also referred to as the console disconnect interval, to automatically end inactive local and remote management sessions. The management software automatically ends a local or remote management session if does not detect any activity from the management station after the console timer has expired. For example, specifying two minutes for the console timer would cause the AT-S62 management software to automatically end a management session if it did not detect any activity from the local or remote management station after two minutes.

This security feature prevents unauthorized individuals from using your management station should you step away from your system while configuring a switch. The default for the console timeout value is 10 minutes.

To adjust the console timer, do the following:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 3 to select Console

(Serial/Telnet) Configuration.

The Console (Serial/Telnet) Configuration menu is shown in

Figure 12 on page 71.

3. From the Console (Serial/Telnet) Configuration menu, type 2 to select

Console Disconnect Interval and, when prompted, enter a new console timer value. The range is 1 to 60 minutes. The default is 10 minutes.

A change to the console timer is immediately activated on the switch.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 72

AT-S62 User’s Guide

Enabling or Disabling the Telnet Server

This procedure explains how to enable and disable the Telnet server on the switch. You might disable the server to prevent individuals from managing the switch with the Telnet application protocol or if you intend to use the Secure Shell (SSH) protocol.

To enable or disable the Telnet server, do the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 3 to select Console

(Serial/Telnet) Configuration.

The Console (Serial/Telnet) Configuration menu is shown in

Figure 12 on page 71.

3. Type 4 to toggle Telnet Server between Enabled and Disabled. The default is enabled.

A change to the Telnet server is immediately activated on the switch.

4. After making the change, type R until you return to the Main Menu.

Then type S to select Save Configuration Changes.

Section I: Basic Operations 73

Chapter 4: Basic Switch Parameters

Setting the Baud Rate of the RS-232 Terminal Port

The default baud rate of the RS-232 Terminal Port on the switch is 9600 bps. To change the baud rate, do the following:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 3 to select Console

(Serial/Telnet) Configuration.

The Console (Serial/Telnet) Configuration menu is shown in

Figure 12 on page 71.

3. From the Console (Serial/Telnet) Configuration menu, type 3 to select

Console Baud Rate.

The following message is displayed:

Supported baud rates are:

1200, 2400, 4800, 9600, 19200, 38400, 57600, or

115200

Enter new baud rate value --> [1200 to 115200]

4. Type the desired baud rate value and press Return.

The following message is displayed:

Baud rate changed to [baud rate you typed] bps.

Please change your terminal baud rate correspondingly.

Press <Enter> to continue.

Note

If you are running a local management session, be sure to change your terminal’s baud rate.

A change to the baud rate is automatically saved to permanent memory in the switch. You do not need to use the Save

Configuration Changes option in the Main Menu to permanently save this change.

Section I: Basic Operations 74

AT-S62 User’s Guide

Pinging a Remote System

You can instruct the switch to ping a remote device on your network.

This procedure is useful in determining whether a valid link exists between the switch and another device.

Note

The switch must have an IP address to perform this procedure.

To instruct the switch to ping a network device, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 9 to select System

Utilities.

The System Utilities menu is shown in Figure 9 on page 64.

3. For the System Utilities menu, type 3 to select Ping a Remote System.

The following prompt is displayed:

Please enter an IP address ->

4. Enter the IP address of the end node you want the switch to ping.

The results of the ping command are displayed on the screen.

5. To stop the ping, press any key.

Section I: Basic Operations 75

Chapter 4: Basic Switch Parameters

Returning the AT-S62 Software to the Factory Default Values

The procedure in this section returns all AT-S62 software parameters, including IP address and subnet mask, if assigned, to the default values.

Please note the following before performing this procedure:

❑ Returning all parameter settings to their default values also deletes any port-based or tagged VLANs you created on the switch.

❑ This procedure does not delete files from the AT-S62 file system.

To delete files, refer to Chapter 11, File System on page 146.

❑ This procedure does not delete any encryption keys stored in the

key database. To delete encryption keys, refer to Deleting an

Encryption Key on page 504.

❑ Returning a switch to its default values does not alter the contents of the active boot configuration file. To reset the file back to the default settings, you must must reestablished your management session after the switch reboots and select Save Configuration

Changes. Otherwise the switch will revert back to the previous configuration the next time you reset the unit.

The AT-S62 software default values can be found in Appendix A,

AT-S62 Default Settings on page 820.

Caution

This procedure results in a switch reset. The switch will not forward traffic while it initializes its operating software, a process that takes approximately 20 seconds to complete. Some packet traffic may be lost.

To return the AT-S62 software to the default settings, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 9 to select System

Utilities.

The System Utilities menu is shown in Figure 9 on page 64.

3. For the System Utilities menu, type 4 to select Reset to Factory

Defaults.

Section I: Basic Operations 76

Section I: Basic Operations

AT-S62 User’s Guide

The following prompt is displayed:

This operation requires a switch reboot. Continue?

[Yes/No] ->

4. Type Y for yes or N to cancel the procedure.

If you respond with yes, the following prompt is displayed:

Do you want to reset serial baud rate to 9600 bps?

[Yes/No] ->

5. Typing Y for yes will change the baud rate of the RS232 Terminal Port to its default value of 9600 bps. Typing N leaves the baud rate at its current setting.

The following prompt is displayed:

NOTE: Please save configuration after reboot in order to make the configuration changes permanent!!!

Waiting for background file operations to complete

.....

Rebooting the Switch .....

The unit has returned to its default settings once the reset process is complete.

6. Reestablish your management session.

7. From the Main Menu, type S to select Save Configuration Changes.

This step returns the active boot configuration file back to the default settings.

77

Chapter 4: Basic Switch Parameters

Viewing System Hardware and Software Information

The procedure in this section displays hardware and software information about the switch. The information includes the switch’s serial number and MAC address, as well as the status of the power supply and fan.

To display this information, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 1 to select System

Information.

The System Information menu is shown in Figure 13.

User: Manager

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

11:20:02 02-Jan-2004

System Information

MAC Address ..... 00:30:84:01:00:00

Model Name ...... AT-8524M

Serial Number ... S05525A023600000

IP Address ....... 167.11.11.11

Subnet Mask ...... 255.255.255.0

Gateway .......... 0.0.0.0

System Up Time ... 6D:11H:47M:34S

Bootloader ...... ATS62_LOADER v1.0.0

Build Date ....... Dec 16 2003 15:21:03

Application ..... ATS62 v1.2.0

Build Date ....... Apr 15 2004 17:57:17

System Name ..... Production Switch

Administrator ... John Doe

Location ........ Bldg. 5, Floor 4

H - System Hardware Status

U - Uplink Information

R - Return to Previous Menu

Enter your selection?

Figure 13 System Information Menu

You cannot change the information in this menu.

3. To display system hardware information, type H to select System

Hardware Status.

Section I: Basic Operations 78

AT-S62 User’s Guide

The System Hardware Information menu is shown in Figure 14.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

System Hardware Status

System 1.8V Power ............... 1.79V

System 2.5V Power ............... 2.53V

System 3.3V Power ............... 3.30V

System 5V Power ................. 5.07V

System Temperature (Celsius) .... 30C

System Fan Speed ................ 4720 RPM

Main Power Supply ............... AC - On

Redundant Power Supply .......... Not Present

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 14 System Hardware Information Menu

You cannot change the information in this menu.

Section I: Basic Operations 79

Chapter 4: Basic Switch Parameters

Setting the Switch’s Temperature Threshold

You can set a temperature threshold on the switch which, if exceeded, causes the unit to send an SNMP trap to your management workstation.

The default threshold is 90

°

Celsius.

To change the temperature threshold for the switch, do the following:

1. From the Main Menu, type 5 to select System Administration.

2. From the System Administration menu, type 2 to select System

Configuration.

3. From the System Configuration menu, type 9 to select Configure

System Hardware.

The Configure System Hardware menu is shown in Figure 15.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure System Hardware

1 - Temperature Threshold (Celsius) .......... 90 C

R - Return to Previous Menu

Enter your selection?

Figure 15 Configure System Hardware Menu

The menu displays the current temperature threshold for the switch.

4. Type 1 to select Temperature Threshold and, when prompted, enter a new threshold value. The range is -25

° to 90° Celsius.

5. After making the change, type R until you return to the Main Menu.

Then type S to select Save Configuration Changes.

Section I: Basic Operations 80

Chapter 5

SNMPv1 and SNMPv2c

Configuration

This chapter explains how to activate SNMP management on the switch and how to create, modify, and delete SNMPv1 and SNMPv2c community strings. Sections in the chapter include:

❑ SNMPv1 and SNMPv2c Overview on page 82

❑ Enabling or Disabling SNMP Management on page 85

❑ Setting the Authentication Failure Trap on page 86

❑ Creating an SNMP Community String on page 87

❑ Modifying a Community String on page 89

❑ Displaying the SNMP Community Strings on page 93

81

Chapter 5: SNMPv1 and SNMPv2 Community Strings

SNMPv1 and SNMPv2c Overview

The Simple Network Management Program (SNMP) is another way for you to manage the switch. This type of management involves viewing and changing the management information base (MIB) objects on the device using an SNMP application program.

The AT-S62 management software supports SNMPv1, SNMPv2c, and

SNMPv3. This chapter explains how to configure the switch’s software for SNMPv1 and SNMPv2c. For instructions on how to configure the

switch for SNMPv3, refer to Chapter 17, SNMPv3 Configuration on page

222.

The procedures in this chapter show you how to create and manage

SNMPv1 and SNMPv2c community strings through which your SNMP application program at your management workstation can access the switch’s MIB objects.

You can also configure SNMPv1 and SNMPv2c with the SNMPv3 Table

menus described in Chapter 17, SNMPv3 Configuration on page 222.

However, because the SNMPv3 Table menus require a much more extensive configuration, Allied Telesyn recommends configuring

SNMPv1 and SNMPv2c with the procedures in this chapter.

To manage a switch using an SNMP application program, you must do the following:

❑ Activate SNMP management on the switch. The default setting for

SNMP management is disabled. The procedure for this can be

found in Enabling or Disabling SNMP Management on page 85.

❑ Load the Allied Telesyn MIBs for the switch onto your management workstation containing the SNMP application program. The MIBs are available from the Allied Telesyn web site at www.alliedtelesyn.com.

To manage a switch using SNMP, you need to know the IP address of the switch or of a master switch and at least one of the switch’s community strings. A community string is a string of alphanumeric characters that gives you access to the switch.

A community string has several attributes that you can use to control who can use the string and what the string will allow a network management to do on the switch. The community string attributes are defined below:

Section I: Basic Operations 82

Section I: Basic Operations

AT-S62 User’s Guide

Community String Name

You must give the community string a name. The name can be from one to eight alphanumeric characters. Spaces are allowed.

Access Mode

This defines what the community string will allow a network manager to do. There are two access modes: Read and Read/Write. A community string with an access mode of Read can only be used to view but not change the MIB objects on a switch. A community string with a

Read/Write access can be used to both view the MIB objects and change them.

Operating Status

A community string can be enabled or disabled. When disabled, no one can use it to access the switch. You might disable a community string if you suspect someone is using it for unauthorized access to the device.

When a community string is enabled, then it is available for use.

Open or Closed Access Status

You can use this feature to control which management stations on your network can use a community string. If you select the open access status, any network manager who knows the community string can use it. If you assign it a closed access status, then only those network managers working from particular workstations can use it. You specify the workstations by assigning their IP addresses to the community string. A closed community string can have up to eight IP addresses of management workstations assigned to it.

If you decide to activate SNMP management on the switch, it is a good idea to assign a closed status to all community strings that have a

Read/Write access mode and then assign the IP addresses of your management workstations to those strings. This helps reduce the chance of someone gaining management access to a switch through a community string and making unauthorized configuration changes.

Trap Receivers

A trap is a signal sent to one or more management workstations by the switch to indicate the occurrence of a particular operating event on the device. There are numerous operating events that can trigger a trap. For instance, resetting the switch or the failure of a cooling fan are two examples of occurrences that cause a switch to send a trap to the management workstations. You can use traps to monitor activities on the switch.

Trap receivers are the devices, typically management workstations or servers, that you want to receive the traps sent by the switch. You specify the trap receivers by their IP addresses. You assign the IP addresses to the community strings.

83

Chapter 5: SNMPv1 and SNMPv2 Community Strings

Each community string can have up to eight trap IP addresses.

It does not matter which community strings you assign your trap receivers. When the switch sends a trap, it looks at all the community strings and sends the trap to all trap receivers on all community strings.

This is true even for community strings that have a access mode of only

Read.

If you are not interested in receiving traps, then you do not need to enter any IP addresses of trap receivers.

Default SNMP

Community

Strings

The AT-S62 management software provides two default community strings: public and private. The public string has an access mode of just

Read and the private string has an access mode of Read/Write. If you activate SNMP management on the switch, you should delete or disable the private community string, which is a standard community string in the industry, or change its status from open to closed to prevent unauthorized changes to the switch.

Section I: Basic Operations 84

AT-S62 User’s Guide

Enabling or Disabling SNMP Management

To enable or disable SNMP management for the switch, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 5 to select SNMP

Configuration.

The SNMP Configuration menu is shown in Figure 16.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

SNMP Configuration

1 - SNMP Status ........................ Disabled

2 - Authentication Failure Trap Status ..Disabled

3 - Configure SNMPv1 & SNMPv2c Community

4 - Display SNMPv1 & SNMPv2c Community

5 - Configure SNMPv3 Table

6 - Display SNMPv3 Table

R - Return to Previous Menu

Enter your selection?

Figure 16 SNMP Configuration Menu

3. Type 1 to toggle the SNMP Status option between its two settings of

Enabled and Disabled. When set to Disabled, the default, you cannot manage the switch using SNMP. When set to Enabled, you can manage the switch using SNMP.

A change to the SNMP status is immediately activated on the switch.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 85

Chapter 5: SNMPv1 and SNMPv2 Community Strings

Setting the Authentication Failure Trap

As mentioned in the SNMP Overview section in this chapter, a trap is a message sent by the switch to a management workstation or server to signal an operating event, such as when the device is reset.

An authentication failure trap is similar to other the traps. It too signals an operating event on the switch. But this trap is somewhat special because it relates to SNMP management. A switch that sends this trap could be indicating an attempt by someone to gain unauthorized management access using an SNMP application program to the switch.

There are two events that can cause a switch to send this trap:

❑ An SNMP management station attempts to access the switch using an incorrect or invalid community name.

❑ An SNMP management station tried to access a closed access community string, to which its IP address is not assigned.

Given the importance of this trap to the protection of your switch, the management software allows you to disable and enable it separately from the other traps. If you enable it, the switch will send this trap if either of the above events occur. If you disable it, the switch will not send this trap. The default is disabled.

If you enable this trap, be sure to add one or more IP addresses of trap receivers to the community strings so that the switch will know where to send the trap if it needs to.

To enable or disable the authentication trap, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 5 to select SNMP

Configuration.

The SNMP Configuration menu is shown in Figure 16 on page 85.

3. Type 2 to toggle Authentication Failure Trap Status between enabled and disabled. The default is disabled.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 86

AT-S62 User’s Guide

Creating an SNMP Community String

To create a new SNMP community string, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 5 to select SNMP

Configuration.

The SNMP Configuration menu is shown in Figure 16 on page 85.

3. From the SNMP Configuration menu, type 3 to select Configure

SNMPv1 & SNMPv2c Community.

The Configure SNMPv1 & SNMPv2c Community menu is shown in

Figure 17.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure SNMPv1 & SNMPv2c Community

Community Name AccessMode Status OpenAcc Manager IP Addr Trap Rec IP

--------------------------------------------------------------------

Private

Public

Read|Write

Read

Enabled Yes

Enabled Yes

1 - Create SNMP Community

2 - Delete SNMP Community

3 - Modify SNMP Community

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 17 SNMPv1 & SNMPv2c Community Menu

This menu lists the current community strings on the switch and

their attributes. For attribute definitions, refer to SNMPv1 and

SNMPv2c Overview on page 82.

4. Type 1 to select Create SNMP Community.

This prompt is displayed:

Enter SNMP Community Name:

Section I: Basic Operations 87

Chapter 5: SNMPv1 and SNMPv2 Community Strings

5. Enter the new SNMP community string. The name can be from one to fifteen alphanumeric characters. Spaces are allowed.

This prompt is displayed:

Enter Access Mode [R-Read Only, W-Read/Write]:

6. Specify the access mode for the new SNMP community string. If you specify Read, the community string will only allow you to view the

MIB objects on the switch. If you specify Read/Write, the community string will allow you to both view and change the SNMP MIB objects on the switch. This prompt is displayed:

Enter Open Access Status [Y-Yes, N-No]:

7. Specify the open access status. If you enter Yes, any network manager who knows the community string can use it. If you respond with No, making it closed access, only those management workstations whose

IP addresses you assign to the community string can use it. This prompt is displayed:

Enter SNMP Manager IP Addr:

8. If in Step 7 you responded with No making this a closed community string, specify the IP address of the management workstation that can use the string. A community string can have up to eight IP addresses of management workstations. But you can assign only one to it initially with this procedure. To add additional IP addresses, refer to

Modifying a Community String on page 89.

If you assigned the community string an access status of open, leave this field blank by pressing Return.

This prompt is displayed:

Enter Trap Receiver IP Addr:

9. If you want the switch to send traps to a management workstation or server, enter the IP address of the node here. A community string can have up to eight IP addresses of trap receivers. But you can assign only one initially with this procedure. To add additional IP addresses,

refer to Modifying a Community String on page 89.

If you do not want to add a IP address of a trap receiver to the community string, leave this field blank by pressing Return.

The AT-S62 software creates the new community string and adds it to the list in the SNMP Community menu. A new community string is immediately available for use to manage the switch.

10. If desired, repeat this procedure starting with Step 4 to create additional community strings.

11. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 88

AT-S62 User’s Guide

Modifying a Community String

To modify a community string, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 5 to select SNMP

Configuration.

The SNMP Configuration menu is shown in Figure 16 on page 85.

3. From the SNMP Configuration menu, type 3 to select Configure

SNMPv1 &SNMPv2c Community.

The Configure SNMPv1 &SNMPv2c Community menu in shown in

Figure 17 on page 87.

4. From the Configure SNMPv1 &SNMPv2c Community menu, type 3 to select Modify SNMP Community.

The Modify SNMP Community menu is shown in Figure 18.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify SNMPv1 & SNMPv2c Community

Community Name AccessMode Status OpenAcc Manager IP Addr Trap Rec IP

--------------------------------------------------------------------

Private Read|Write Enabled Yes

Public Read Enabled Yes

1 - Add Attributes to Community

2 - Delete Attributes from Community

3 - Set Community Access Mode

4 - Set Community Status

5 - Set Community Open Access

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 18 Modify SNMP Community Menu

This menu lists the current community strings on the switch and

their attributes. For attribute definitions, refer to SNMPv1 and

SNMPv2c Overview on page 82.

Section I: Basic Operations 89

Chapter 5: SNMPv1 and SNMPv2 Community Strings

The menu options are described below:

1 - Add Attributes to Community

If a community string has a closed access mode, you can use this selection to add new IP addresses of management workstations that can use the string. You can also use this option to add IP addresses of new trap receivers. To use this option, do the following:

1. From the Modify SNMP Community menu, type 1 to select Add

Attributes to Community. The following prompt is displayed:

Enter SNMP Community Name:

2. Enter the community string you want to modify. Community strings are case sensitive. This prompt is displayed:

Enter SNMP Manager IP Addr:

3. If you are modifying a community string with a closed access mode and you want to add an IP address of a management workstation to it, enter the workstation’s IP address at the prompt. Otherwise, just press Return. A community string can have a maximum of eight IP addresses, but you can add only one at a time with this procedure.

This prompt is displayed:

Enter Trap Receiver IP Addr:

4. If you want the switch to send traps to a trap receiver, enter the IP address of the receiver at this prompt. Otherwise, just press Return.

The community string is modified and the Modify SNMP

Configuration menu is displayed again.

5. Repeat this procedure to modify other community strings.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

2 - Delete Attributes from Community

Use this option to delete an IP address of a management workstation or a trap receiver from a community string. To use this option, do the following:

1. From the Modify SNMP Community menu, type 2 to select Delete

Attributes from Community. The following prompt is displayed:

Enter SNMP Community Name:

2. Enter the community string you want to modify. Community strings are case sensitive. This prompt is displayed:

Enter SNMP Manager IP Addr:

Section I: Basic Operations 90

Section I: Basic Operations

AT-S62 User’s Guide

3. If you want to remove the IP address of a management workstation from the community string, enter the IP address at the prompt.

Otherwise, just press Return. This prompt is displayed:

Enter Trap Receiver IP Addr:

4. If you want to remove the IP address of a trap receiver from the community string, enter the IP address at the prompt. Otherwise, just press Return.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

3 - Set Community Access Mode

Use this option to change a community string’s Read or Read/Write status. To use the selection, do the following:

1. From the Modify SNMP Community menu, type 3 to select Set

Community Access Mode. The following prompt is displayed:

Enter SNMP Community Name:

2. Enter the community string you want to modify. Community strings are case sensitive. This prompt is displayed:

Enter Access Mode [R-Read Only, W-Read/Write]:

3. Type R to change the string’s status to Read only, or W for Read/Write.

This confirmation prompt is displayed:

Do you want to change this Community Access Mode?

(Y/N): [Yes/No] ->

4. Type Y to change the string’s access mode or N to cancel the change.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

4 - Set Community Status

Use this option to enable or disable a community string. When disabled, no one can use the community string to access the switch. To use the selection, do the following:

1. From the Modify SNMP Community menu, type 4 to select Set

Community Status. The following prompt is displayed:

Enter SNMP Community Name:

2. Enter the community string you want to modify. Community strings are case sensitive. This prompt is displayed:

Enter Community Status [E-Enable, D-Disable]:

3. Type E to enable the community string or D to disable it. This confirmation prompt is displayed:

91

Chapter 5: SNMPv1 and SNMPv2 Community Strings

Do you want to change Community Status? (Y/N):

[Yes/No] ->

4. Type Y to change the string’s status or N to cancel the change.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

5 - Set Community Open Status

Use this selection to change a string’s open status. A string with an open status can be used by any network administrator. A string with a closed status can only be used from management workstations whose IP addresses are assigned to the community string. To use the option, do the following:

1. From the Modify SNMP Community menu, type 5 to select Set

Community Open Status. The following prompt is displayed:

Enter SNMP Community Name:

2. Enter the community string you want to modify. Community strings are case sensitive. This prompt is displayed:

Enter Open Access Status [Y-Yes, N-No]:

3. Type Y to assign the string an open status or N to assign it a closed status. This confirmation prompt is displayed:

Do you want to change Open Access Status? (Y/N):

[Yes/No] ->

4. Type Y to change the string’s open status or N to cancel the change.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 92

AT-S62 User’s Guide

Displaying the SNMP Community Strings

To display the attributes of all the SNMP community strings on the switch, use the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 5 to select SNMP

Configuration.

The SNMP Configuration menu is shown in Figure 16 on page 85.

3. From the SNMP Configuration menu, type 4 to select Display SNMPv1

& SNMPv2c Community.

The Display SNMPv1 & SNMPv2c Community menu is shown in

Figure 19.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display SNMPv1 & SNMPv2c Community

Community Name Access Mode Status OpenAcc Manager IP Addr Trap Receiver IP

====================================================================================

Private125 Read|Write Enabled No

PublicATI78

HighSchool2

Read Only

Read|Write

Enabled

Enabled

No

No

147.41.11.30

147.45.16.80

147.41.11.12

147.44.16.86

147.45.16.88

147.45.16.90

147.45.10.80

147.45.16.70

147.45.16.80

147.42.22.22

147.45.16.86

147.45.16.88

147.45.16.90

147.45.10.80

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 19 Display SNMP Community Menu

For attribute definitions, refer to SNMPv1 and SNMPv2c Overview on page 82.

Section I: Basic Operations 93

Chapter 6

Port Parameters

The chapter contains the procedures for viewing and adjusting the parameter settings for the individual ports on a switch.

This chapter contains the following procedures:

❑ Displaying Port Status on page 95

❑ Configuring Port Parameters on page 98

❑ Setting the Rate Limit on page 107

94

AT-S62 User’s Guide

Displaying Port Status

To display the current status and settings of the ports on the switch, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

The Port Configuration menu is shown in Figure 20.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Configuration

1 - Port Configuration

2 - Port Status

3 - Port Statistics

4 - Port Trunking

5 - Port Security

6 - Port Mirroring

R - Return to Previous Menu

Enter your selection?

Figure 20 Port Configuration Menu

2. From the Port Configuration Menu, type 2 to select Port Status.

An example of the Port Status menu is shown in Figure 21.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Status

3

4

5

6

Port Link Neg MDIO Speed Duplex PVID Flow Ctl

---------------------------------------------------------

1

2

Up

Up

Auto

Auto

Auto

Auto

0010

0100

Half

Full

0012

0012

Disabled

Disabled

7

8

Up

Up

Up

Up

Up

Up

Auto

Auto

Auto

Auto

Auto

Auto

Auto

Auto

Auto

Auto

Auto

Auto

0100

0100

0010

0100

0100

0010

Full

Full

Half

Full

Full

Half

0012

0023

0012

0011

0011

0011

Disabled

Disabled

Disabled

Disabled

Disabled

Disabled

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 21 Port Status Menu

Section I: Basic Operations 95

Chapter 6: Port Parameters

Section I: Basic Operations

Note

The speed, duplex mode, and flow control settings will be blank for ports that have not established a link with their end node.

The information in this menu is for viewing purposes only. The columns in the menu are described below:

Port

The port number.

Link

The status of the link between the port and the end node connected to the port. Possible values are:

Up - indicates that a valid link exists between the port and the end node.

Down - indicates that the port and the end node have not established a valid link.

Neg

The status of Auto-Negotiation on the port. Possible values are:

Auto - Indicates that the port is using Auto-Negotiation to set operating speed and duplex mode.

Manual - Indicates that the operating speed and duplex mode have been set manually.

MDIO

The operating configuration of the port. Possible values are Auto,

MDI, MDI-X. The status Auto indicates that the port will automatically determine the appropriate MDI or MDI-X setting.

Speed

The operating speed of the port. Possible values are:

0010 - 10 Mbps

0100 - 100 Mbps

1000 - 1000 Mbps (Gigabit Ethernet ports only)

Duplex

The duplex mode of the port. Possible values are half-duplex and full-duplex.

PVID

The port’s VLAN identifier (PVID). This number corresponds to the

VID of the VLAN in which the port is an untagged member. This column will not include the VIDs of the VLANs where the port is a tagged member.

96

Flow Ctl

The flow control setting for the port. Possible values are:

Disabled - No flow control on the port.

Enabled - Flow control is activated.

AT-S62 User’s Guide

Section I: Basic Operations 97

Chapter 6: Port Parameters

Configuring Port Parameters

To configure the parameter settings of a port, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

The Port Configuration menu is shown in Figure 20 on page 95.

2. From the Port Configuration menu, type 1 to select Port Configuration.

The following prompt is displayed:

Enter port-list ->

3. Enter the number of the port you want to configure. You can specify more than one port at a time. You can specify the ports individually (for example, 5,7,22), as a range (for example, 18-23), or both (for example,

1,5,14-22).

The Port Configuration menu is shown in Figure 22.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Configuration

Configuring Port 11

0 - Port Description ..................... Port-1

1 - Status ............................... Enabled

2 - Broadcast Filter ..................... Disabled

3 - MDI/MDIX Crossover ................... Auto

4 - Negotiation .......................... Auto

7 - HOL Blocking Prevention Threshold .... 7168 cells

8 - Flow Control

9 - Back Pressure

L - Rate Limit

D - Set Default Port Configuration

F - Force Renegotiation

X - Reset Port

R - Return to Previous Menu

Enter your selection?

Figure 22 Port Configuration (Port) Menu

Note

The Port Configuration menu in the figure above is for a 10/100 Mbps twisted pair port. The menu for a fiber optic port will contain a subset of the parameters.

Section I: Basic Operations 98

Section I: Basic Operations

AT-S62 User’s Guide

If you are configuring multiple ports and the ports have different settings, the Port Configuration menu displays the settings of the lowest numbered port. Once you have configured the settings of the port, all of its settings are copied to the other selected ports.

4. Adjust the port parameters as necessary. You adjust a parameter by typing its number. The parameters are described below.

Note

A change to a parameter is immediately activated on the port.

0 - Port Description

You use this selection to assign a name to a port. The name can be from one to fifteen alphanumeric characters. Spaces are allowed, but you should not use special characters, such as asterisks or exclamation points. (You cannot set a port name if you are configuring more than one port.)

1 - Status

You use this selection to enable or disable a port. When disabled, a port will not forward frames to or from the node connected to the port.

You might want to disable a port and prevent packets from being forwarded if a problem occurs with the node or cable connected to the port. Once the problem has been fixed, you can enable the port again to resume normal operation.

You might also want to disable a port that is not being used to secure it from unauthorized connections.

Possible settings for this parameter are:

Enabled The port will forward packets. This is the default setting.

Disabled The port will not forward packets.

2 - Broadcast Filter

Most frames on an Ethernet network are usually unicast frames. A unicast frame is a frame that is sent to a single destination. A node sending a unicast frame intends the frame for a particular node on the network.

Broadcast frames are different. Broadcast frames are directed to all nodes on the network or all nodes within a particular virtual

LAN. Broadcast packets can perform a variety of functions. For example, some network operating systems use broadcast frames to announce the presence of devices on a network.

99

Chapter 6: Port Parameters

Section I: Basic Operations

The problem with broadcast frames is that too many of them traversing a network can impact network performance. The more bandwidth consumed by broadcast frames, the less available for unicast frames.

Should the performance of your network be impacted by heavy broadcast traffic, you can use this parameter to limit the number of broadcast frames forwarded by the switch and so limit the number of broadcast frames on your network.

When you activate this feature on a port, the port will discard all egress broadcast packets. When the port has a broadcast packet that is intended to be sent to the end node connected to the port, the port will instead discard the packet.

It should be noted that the filtering takes place only on egress broadcast packets—packets that a port is transmitting. This filter does not apply to ingress broadcast packets.

Possible settings for this parameter are:

Enabled The port will discard all egress broadcast frames.

Disabled The port will transmit egress broadcast frames. This is the default setting.

3 - MDI/MDIX Crossover

You use this selection to set the wiring configuration of the port.

The configuration can be Auto, MDI, or MDI-X. The default setting is Auto.

The default Auto setting activates the auto-MDI/MDI-X feature on a port, which enables a port to configure itself automatically as

MDI or MDI-X when connected to an end node. This allows you to use a straight-through twisted pair cable when connecting any type of network device to a port on the switch.

The Auto setting is only available when a port is set to Auto-

Negotiate its speed and duplex mode. It is also the only setting available when a port’s speed and duplex are set through Auto-

Negotiation.

The auto-MDI/MDI-X feature is not available if you disable Auto-

Negotiation on a port and set a port’s speed and duplex mode manually. A port where Auto-Negotiation has been disabled defaults to MDI-X. Disabling Auto-Negotiation may require that you manually configure a port’s MDI/MDI-X setting using this option or use a crossover cable.

4 - Negotiation

You use this selection to configure a port for Auto-Negotiation or to manually set a port’s speed and duplex mode.

100

Section I: Basic Operations

AT-S62 User’s Guide

If you select Auto for Auto-Negotiation, which is the default setting, the switch will set both speed and duplex mode for the port automatically. The switch determines the highest possible common speed between the port and its end node and sets the port to that speed. This helps to ensure that the port and the end node are operating at the highest possible common speed.

You should note the following concerning the operation of Auto-

Negotiation on a switch port:

❑ In order for a switch port to successfully Auto-Negotiate its duplex mode with an end node, the end node should also be using Auto-

Negotiation. Otherwise, a duplex mode mismatch can occur. A switch port using Auto-Negotiation will default to half-duplex if it detects that the end node is not using Auto-Negotiation. This will result in a mismatch if the end node is operating at a fixed duplex mode of full-duplex.

To avoid this problem, when connecting an end node with a fixed duplex mode of full-duplex to a switch port, you should disable

Auto-Negotiation on the port and set the port’s speed and duplex mode manually.

❑ When the port is set to Auto-Negotiate, the MDI/MDI-X setting is locked at auto-MDI/MDI-X. The switch automatically determines the correct MDI/MDI-X setting. You cannot manually set

MDI/MDI-X manually.

❑ When Auto-Negotiation is disabled on a port, the auto-MDI/MDI-

X feature on a port is also disabled, and the port defaults to the

MDI-X configuration. Consequently, if you disable Auto-

Negotiation and set a port’s speed and duplex mode manually, you might also need to set the port’s MDI/MDI-X setting as well.

If you select Manual, two additional selections are displayed in the menu:

5 - Speed .............. 0100

6 - Duplex ............. Full

Figure 23 Manual Speed and Duplex Mode Settings

You use these selections to manually set a port’s speed and duplex mode. The possible settings for the 2 - Speed selection are:

0010

0100

1000

10 Mbps

100 Mbps

1000 Mbps (optional Gigabit Ethernet ports only)

101

Chapter 6: Port Parameters

The possible settings for the duplex mode are Full-duplex and

Half-duplex.

7 - HOL Blocking Prevention Threshold

Head of line (HOL) blocking is a problem that occurs when a port on a switch becomes oversubscribed. An oversubscribed port is receiving more packets from other switch ports than it can transmit in a timely manner.

The problem an oversubscribed port can create is that it can prevent other ports from forwarding packets to each other. This is because ingress packets on a port are buffered in a First In, First

Out (FIFO) manner. If the head of an ingress queue consists of a packet destined for an oversubscribed port, the ingress queue will not be able to forward any of its other packets to the egress queues of other ports.

A simplified version of the problem is illustrated in Figure 24. It

shows four ports on a switch. Port D is receiving packets from two ports—50% of the ingress traffic on Port A and 100% of the ingress traffic on Port B. The result is that not only is Port A unable to forward packets to Port D because the latter’s egress queues are filled with packets from Port B, but it is also unable to forward traffic to Port C because its ingress queue has frames destined to

Port D that it is unable to forward.

Port A Port C

50%

C C C C D D D D

Ingress Queue

Egress Queue

50%

Port B Port D

D D D D D D D D

Ingress Queue

100%

D D D D D D D D

Engress Queue

Figure 24 Head of Line Blocking

Section I: Basic Operations 102

Section I: Basic Operations

AT-S62 User’s Guide

The HOL Limit parameter can help prevent this problem from occurring. This parameter sets a threshold on the utilization of a port’s egress queue. When the threshold for a port is exceeded, the switch signals other ports to discard packets to the oversubscribed port.

For example, referring to the figure above, when the utilization of the storage capacity of Port D exceeds the threshold, the switch signals the other ports to discard packets destined for Port D. Port

A drops the D packets, enabling it to once again forward packets to Port C.

The number for this value represents cells. A cell is 64 bytes. The range is 1 to 61,440 cells. The default is 7,168.

8 - Flow Control

Sets flow control on the port. This option applies only to ports operating in full-duplex mode.

A switch port uses flow control to control the flow of ingress packets from its end node.

A port using flow control issues a special frame, referred to as a

PAUSE frame, as specified in the IEEE 802.3x standard, to stop the transmission of data from an end node. When a port needs to stop an end node from transmitting data, it issues this frame. The frame instructs the end node to cease transmission. The port continues to issue PAUSE frames until it is ready again to receive data from the end node.

The default setting for flow control on a switch port is disabled.

Selecting this option displays the Flow Control menu, shown in

Figure 25.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Flow Control

Configuring Port 11

1 - Flow Control ................. Disabled

2 - Flow Control (Cell Limit) .... 8192

R - Return to Previous Menu

Enter your selection?

Figure 25 Flow Control Menu

103

Chapter 6: Port Parameters

The options in the Flow Control menu are described below:

1 - Flow Control

Disabled - No flow control on the port. This is the default setting.

Enabled - Flow control is activated. This setting is appropriate only when the end node connected to the port is also using flow control.

Auto - The port uses flow control only if it detects that the end node is using it.

2 - Flow Control (Cell Limit)

Specifies the number of cells. A cell represents 64 bytes. The range is 1 to 57,344 cells. The default is 8192.

B -Back Pressure

Sets backpressure on a port. This option only applies for ports operating in half-duplex mode.

Backpressure performs much the same function as flow control.

Both are used by a port to control the flow of ingress packets from the end node.

Where they differ is that while flow control applies to ports operating in full-duplex, backpressure applies to ports operating in half-duplex mode.

When a twisted pair port on the switch operating in half-duplex mode needs to stop an end node from transmitting data, it forces a collision. A collision on an Ethernet network occurs when two end nodes attempt to transmit data using the same data link at the same time. A collision causes the end nodes to stop sending data. This is called backpressure.

When a switch port needs to stop a half-duplex end node from transmitting data, it forces a collision on the data link, which stops the end node. Once the port is ready to receive data again, it stops forcing collisions.

The default setting for backpressure on a switch port is disabled.

Section I: Basic Operations 104

Section I: Basic Operations

AT-S62 User’s Guide

Selecting this option displays the Back Pressure menu shown in

Figure 26.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Back Pressure

Configuring Port 11

1 - Back Pressure ................. Disabled

2 - Back Pressure Cell Limit ...... 8192

R - Return to Previous Menu

Enter your selection?

Figure 26 Back Pressure Menu

The options on the Back Pressure menu are described below:

1 - Back Pressure

Enables and disables backpressure on a port. Possible values are:

Disabled - The port will not use backpressure. This is the default setting.

Enabled - The port will use backpressure.

2 - Back Pressure Cell Limit

Specifies the number of cells. A cell represents 64 bytes. The range is 1 to 57,344 cells. The default is 8192.

Note

For an explanation of the L - Rate Limit menu option, refer to Setting the Rate Limit on page 107.

The last parameters on the Port Configuration menu are:

D - Set Default Port Configuration

Resets all port settings to the default values.

F - Force Renegotiation

If the port is already operating in Auto-Negotiation, this options prompts the port to Auto-Negotiate again with the end node. This can be helpful if you believe that a port and end node are not operating at the same speed and duplex mode. If the port’s speed and duplex mode have been set manually, this option returns the port to Auto-Negotiation.

105

Chapter 6: Port Parameters

X - Reset Port

Resets the speed and duplex mode of the selected port to the default value of Auto-Negotiation. Also returns the MDI/MDIX setting to the default value of Auto-Detect.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 106

AT-S62 User’s Guide

Setting the Rate Limit

This feature allows you to set the maximum number of ingress packets the switch ports accept each second. Packets exceeding the threshold are discarded. You can enable the rate limiting threshold independently for multicast, broadcast, and unknown unicast packets. However, the same threshold applies to all packet types.

To configure this feature, you must enter a rate limit. This establishes the maximum number of packets the individual ports will accept per second. This limit applies to all ports and to all three packet types. There can be only one packet limit value for the switch.

Here is an example. Assume that you set a rate limit of 5,000 packets and you enable multicast and broadcast rate limiting. Each switch port will each accept up to 5,000 ingress multicast packets and 5,000 ingress broadcast packets each second. If a port receives more than that of either type, it discards the extra packets. Since the feature was not activated for unknown unicast packets, the ports do not restrict their number. (An unknown unicast packet is a packet with a MAC address not stored in the switch’s MAC address table.)

To set rate limiting, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

The Port Configuration menu is shown in Figure 20 on page 95.

2. From the Port Configuration menu, type 1 to select Port

Configuration.

The following prompt is displayed:

Enter port-list ->

3. Enter any port on the switch.

This feature cannot be set on a per-port basis. You can enter any port or range of ports and the change will apply to all switch ports.

The Port Configuration menu is shown in Figure 22 on page 98.

4. Type L to select Rate Limit.

Section I: Basic Operations 107

Chapter 6: Port Parameters

The Rate Limiting menu is shown in Figure 27.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Rate Limiting

Configuring Port 1

1 - Broadcast Rate Limiting Status ........... Disabled

2 - Multicast Rate Limiting Status ........... Disabled

3 - Unknown Unicast Rate Limiting Status ..... Disabled

4 - Rate Limit ............................... 262143 packets/second

R - Return to Previous Menu

Enter your selection?

Figure 27 Rate Limiting Menu

5. Type 4 to select Rate Limit and, when prompted, enter the maximum number of broadcast, multicast, and unknown unicast ingress packets you want all switch ports to accept each second. This threshold is applied independently to each packet type.

6. Type 1, 2, or 3 to activate the threshold for broadcast packets, multicast packets, and unknown unicast packets, respectively. You can enable this feature on one, two, or all three packet types.

Rate limiting changes are immediately implemented on all switch ports.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 108

Chapter 7

MAC Address Table

The chapter contains the procedures for viewing the static and dynamic

MAC address table.

This chapter contains the following sections:

❑ MAC Address Overview on page 110

❑ Displaying MAC Addresses on page 112

❑ Adding Static Unicast and Multicast MAC Addresses on page 116

❑ Deleting Unicast and Multicast MAC Addresses on page 118

❑ Deleting All Dynamic MAC Addresses on page 119

❑ Changing the Aging Time on page 120

109

Chapter 7: MAC Address Table

MAC Address Overview

Every hardware device that you connect to your Ethernet network has a unique MAC address assigned to it by the device’s manufacturer. For example, every network interface card (NIC) that you use to connect your computers to your network has a MAC address assigned to it by the adapter’s manufacturer.

The AT-8524M Series switch contains a MAC address table with a storage capacity of 8,000 entries. The switch uses the table to store the MAC addresses of the network nodes connected to its ports, along with the port number on which each address was learned.

The switch learns the MAC addresses of the end nodes by examining the source address of each packet received on a port. It adds the address and port on which the packet was received to the MAC table if the address has not already been entered in the table. The result is a table that contains all the MAC addresses of the devices that are connected to the switch’s ports, and the port number where each address was learned.

When the switch receives a packet, it also examines the destination address and, by referring to its MAC address table, determines the port where the destination node is connected. It then forwards the packet to the appropriate port and on to the end node. This increases network bandwidth by limiting each frame to the appropriate port when the intended end node is located, freeing the other switch ports for receiving and transmitting data.

If the switch receives a packet with a destination address that is not in the MAC address table, it floods the packet to all the ports on the switch.

If the ports have been grouped into virtual LANs, the switch floods the packet only to those ports which belong to the same VLAN as the port on which the packet was received. This prevents packets from being forwarded onto inappropriate LAN segments and increases network security. When the destination node responds, the switch adds its MAC address and port number to the table.

If the switch receives a packet with a destination address that is on the same port on which the packet was received, it discards the packet without forwarding it on to any port. Because both the source node and the destination node for the packet are located on the same port on the switch, there is no reason for the switch to forward the packet. This too increases network performance by preventing frames from being forwarded unnecessarily to other network devices.

Section I: Basic Operations 110

Section I: Basic Operations

AT-S62 User’s Guide

The type of MAC address described above is referred to as a dynamic

MAC address. Dynamic MAC addresses are addresses that the switch learns by examining the source MAC addresses of the frames received on the ports.

Dynamic MAC addresses are not stored indefinitely in the MAC address table. The switch deletes a dynamic MAC address from the table if it does not receive any frames from the node after a specified period of time.

The switch assumes that the node with that MAC address is no longer active and that its MAC address can be purged from the table. This prevents the MAC address table from becoming filled with addresses of nodes that are no longer active.

The period of time that the switch waits before purging an inactive dynamic MAC address is called the aging time. This value is adjustable on the AT-8524M switch. The default value is 300 seconds (5 minutes). For

instructions on changing the aging timer, refer to Changing the Aging

Time on page 120.

The MAC address table can also store static MAC addresses. A static MAC address is a MAC address of an end node that you assign to a switch port manually. A static MAC address, once entered in the table, remains in the table indefinitely and is never deleted, even when the end node is inactive.

You might need to enter static MAC addresses of end nodes the switch will not learn in its normal dynamic learning process, or if you want a

MAC address to remain permanently in the table, even when the end node is inactive.

111

Chapter 7: MAC Address Table

Displaying MAC Addresses

The management software has two menu selections for displaying the

MAC addresses of a switch. One selection displays the static and dynamic unicast MAC addresses while the other displays the static and dynamic multicast addresses.

To display the MAC address tables, perform the following procedure:

1. From the Main Menu, type 4 to select MAC Address Tables.

The MAC Address Tables menu is shown in Figure 28.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

MAC Address Tables

1 - MAC Address Aging Time ......... 300 second(s)

2 - MAC Addresses Configuration

3 - Display Unicast MAC Addresses

4 - Display Multicast MAC Addresses

R -

Return to

Previous Menu

Enter your selection?

Section I: Basic Operations

Figure 28 MAC Address Tables Menu

2. From the MAC Address Tables menu, type 3 to select Display Unicast

MAC Addresses or 4 to select Display Multicast MAC Addresses.

The Display Unicast MAC Addresses menu is shown in Figure 29.

The Display Multicast MAC Addresses menu has the same selections.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display Unicast MAC Addresses

1 - Display All

2 - Display Static

3 - Display Dynamic

4 - Display by Port

5 - Display Specified MAC

6 - Display by VLAN ID

7 - Display on Base Ports

R -

Return to

Previous Menu

Enter your selection?

Figure 29 Display Unicast MAC Addresses Menu

112

AT-S62 User’s Guide

3. Select the desired option. The options are explained below:

1 - Display All

This selection displays all dynamic addresses learned on the ports of the switch and all static addresses that have been assigned to the ports. An example of a unicast MAC address table is shown in

Figure 30.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display All

Page 1

Total Number of MAC Addresses: 121

MAC Address Port VlanID Type

---------------------------------------------------------------------

01:80:C1:00:02:01

00:a0:d2:18:1a:c8

0

1

0

1

Static (fixed, non-aging)

Dynamic

00:a0:c4:16:3b:80

00:a0:12:c2:10:c6

00:a0:c2:09:10:d8

00:a0:33:43:a1:87

2

3

4

5

1

1

1

1

Dynamic

Dynamic

Dynamic

Dynamic

00:a0:12:a7:14:68

00:a0:d2:22:15:10

00:a0:d4:18:a6:89

6

7

8

1

1

1

Dynamic

Dynamic

Dynamic

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 30 Display All Menu - Unicast MAC Addresses

Note

The first address in the unicast MAC address table is the address of the switch.

The information in this menu is for viewing purposes only. The columns in a unicast MAC address menu are defined below.

MAC - The static or dynamic unicast MAC address.

Port - The port where the address was learned or assigned. The

MAC address with Port 0 is the address of the switch.

VlanID - The ID number of the VLAN where the port is an untagged member.

Type - The type of the address: static or dynamic.

Section I: Basic Operations 113

Chapter 7: MAC Address Table

An example of a multicast MAC address table is shown in Figure

31.

User: Manager

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

11:20:02 02-Jan-2004

Display All

Page 1

Total Number of MCAST MAC Addresses: 1

MAC Address VLAN ID Type Port Maps (U:Untagged T:Tagged)

------------------------------------------------------------------------

01:00:51:00:00:01 1 Static U:1-4

T:

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 31 Display All Menu - Multicast MAC Addresses

The information in this menu is for viewing purposes only. The columns in a multicast MAC address menu are defined below.

MAC Address- The static or dynamic multicast MAC address.

VlanID - The ID number of the VLAN where the port is an untagged member.

Type - The type of address: static or dynamic.

Port Maps - The tagged and untagged ports on the switch that are members of a multicast group. This column is useful in determining which ports belong to different groups.

The other options in the Display Unicast MAC Addresses menu or

Display Multicast MAC Addresses menu are:

2 - Display Static

This selection displays just the static addresses assigned to the ports on the switch.

3 - Display Dynamic

This selection displays just the dynamic addresses learned on the ports on the switch.

4 - Display by Port

Displays the dynamic and static MAC addresses of a particular port. When you select this option, you are prompted for a port number. You can specify more than one port at a time.

Section I: Basic Operations 114

Section I: Basic Operations

AT-S62 User’s Guide

5 - Display Specified MAC

Displays the port number on which a MAC address was assigned or learned.

In some situations, you might want to know on which port a particular MAC address was learned. You could display the MAC address table and scroll through the list looking for the MAC address. But if the switch is part of a large network, finding the address could prove difficult.

This menu option offers an easier way. You can specify the MAC address and let the management software automatically locate the port on the switch where the device is connected.

6 - Display by VLAN ID

Displays all the static and dynamic addresses learned on the tagged and untagged ports of a specific VLAN. When you select this option, you are prompted for the VLAN ID number of the

VLAN. You can specify only one VLAN at a time

7 - Display on Base Ports

This displays the static and dynamic MAC addresses learned on

Ports 1 through 24 on the AT-8524M switch. It does not display any addresses assigned or learned on ports on any optional expansion modules.

115

Chapter 7: MAC Address Table

Adding Static Unicast and Multicast MAC Addresses

This section contains the procedure for adding static unicast and multicast MAC addresses to the switch. You can assign up to 255 static addresses per port on an AT-8524M Series switch.

To add a static MAC address, perform the following procedure:

1. From the Main Menu, type 4 to select MAC Address Tables.

The MAC Address Tables menu is shown in Figure 28 on page 112.

2. From the MAC Address Tables menu, type 2 to select MAC Addresses

Configuration.

The MAC Addresses Configuration menu is shown in Figure 32.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

MAC Addresses Configuration

1 - Add Static MAC Address

2 - Delete MAC Address

3 - Delete All Dynamic MAC Addresses

R - Return to Previous Menu

Enter your selection?

Figure 32 Configure MAC Addresses Menu

3. From the Configure MAC Addresses menu, type 1 to select Add static

MAC address.

The following prompt is displayed:

Please enter MAC address ->

4. Enter the static unicast or multicast MAC address in either of the following formats:

XXXXXXXXXXXX or XXXXXX XXXXXX

5. Once you have specified the MAC address, the following prompt is displayed:

Enter port-list: ->

6. Enter the number of the port on the switch where you want to assign the static address. If you are adding a static unicast address, you can specify only one port.

If you are entering a static multicast address, you must specify the port when the multicast application is located as well as the ports where the host nodes are connected. Assigning the address only

Section I: Basic Operations 116

AT-S62 User’s Guide to the port where the multicast application is located will result in the failure of the multicast packets to be properly forwarded to the host nodes. You can specify the ports individually (e.g., 1,4,5), as a range (e.g., 11-14) or both (e.g., 15-17,22,24).

The following prompt is displayed:

Please enter VLAN ID: [1 to 4094] -> 1

7. Enter the VLAN ID where the port is a member.

8. Repeat this procedure starting with Step 3 to enter additional static unicast or multicast MAC addresses.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 117

Chapter 7: MAC Address Table

Deleting Unicast and Multicast MAC Addresses

To delete a dynamic or static unicast or multicast address from the MAC address table, perform the following procedure:

1. From the Main Menu, type 4 to select MAC Address Tables.

The MAC Address Tables menu is shown in Figure 28 on page 112.

2. From the MAC Address Tables menu, type 2 to select Configure MAC

Addresses.

The Configure MAC Addresses menu is shown in Figure 32 on page 116.

3. From the Configure MAC Addresses menu, type 2 to select Delete

MAC Address.

The following prompt is displayed:

Please enter a MAC address ->

4. Enter the unicast or multicast MAC address to be deleted in either of the following formats:

XXXXXXXXXXXX or XXXXXX XXXXXX

After you have entered the MAC address, the following prompt is displayed:

Please enter VLAN ID -> [1 to 4094] -> 1

5. Enter the VLAN ID of the port where the address was assigned or learned.

The MAC address is deleted from the switch’s MAC address table.

Note

You cannot delete a switch’s MAC address, an STP BPDU MAC address, or a broadcast address.

6. Repeat the procedure to delete additional MAC addresses.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 118

AT-S62 User’s Guide

Deleting All Dynamic MAC Addresses

To delete all dynamic unicast and multicast MAC address from the MAC address table, do the following:

1. From the Main Menu, type 4 to select MAC Address Tables.

The MAC Address Tables menu is shown in Figure 28 on page 112.

2. From the MAC Address Tables menu, type 2 to select MAC Addresses

Configuration.

The MAC Addresses Configuration menu is shown in Figure 32 on page 116.

3. From the MAC Addresses Configuration menu, type 3 to select Delete

All Dynamic MAC Addresses.

The following prompt is displayed:

All learned MAC (non-static) addresses will be deleted

Do you want to continue? [Yes/No] ->

4. Enter Y to delete the addresses or N to cancel the procedure.

If you respond with yes, all dynamic unicast and multicast addresses are deleted from the table, and the switch begins to learn new addresses.

Section I: Basic Operations 119

Chapter 7: MAC Address Table

Changing the Aging Time

The switch uses the aging time to delete inactive dynamic MAC addresses from the MAC address table. When the switch detects that no packets have been sent to or received from a particular MAC address in the table after the period specified by the aging time, the switch deletes the address. This prevents the table from becoming full of addresses of nodes that are no longer active.

The default setting for the aging time is 300 seconds (5 minutes).

To adjust the aging time, perform the following procedure:

1. From the Main Menu, type 4 to select MAC Address Tables.

The MAC Address Tables menu is shown in Figure 28 on page 112.

2. From the MAC Address Tables menu, type 1 to select MAC Address

Aging Time.

The following prompt is displayed:

Enter your new value -> [8 to 512]

3. Enter a new value in seconds.

The range is 8 to 512 seconds. The default is 300 seconds (5 minutes).

The new value is immediately activated on the switch.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations 120

Chapter 8

Port Trunking

This chapter contains the procedures for creating, modifying, and deleting port trunks. Sections in the chapter include:

❑ Port Trunking Overview on page 122

❑ Creating a Port Trunk on page 129

❑ Modifying a Port Trunk on page 132

❑ Deleting a Port Trunk on page 135

121

Chapter 8: Port Trunking

Port Trunking Overview

A port trunk is an economical way for you to increase the bandwidth between two Ethernet switches. A port trunk is a group of ports that have been grouped together to function as one logical path. A port trunk increases the bandwidth between switches and is useful in situations where a single physical data link between switches is insufficient to handle the traffic load.

A port trunk always sends packets from a particular source to a particular destination over the same link within the trunk. A single link is designated for flooding broadcasts and packets of unknown destination.

The example in Figure 33 consists of a port trunk of four data links

between two AT-8524M switches.

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

LINK

MODE

LINK

MODE

MODE

AT-8524M Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Figure 33 Port Trunk Example

Port Trunking

Guidelines

Observe the following guidelines when you create a port trunk:

❑ The switch can support up to six port trunks at a time.

❑ A port trunk can contain up to 8 ports.

❑ The ports of a port trunk must be of the same medium type. For example, they can be all twisted pair ports or all fiber optic ports.

❑ The ports of a trunk can be either consecutive (for example Ports

5-9) or nonconsecutive (for example, Ports 4, 8, 11, 20).

❑ The speed, duplex mode, and flow control settings must be the same for all the ports in a trunk.

❑ The ports of a port trunk must be untagged members of the same

VLAN. A port trunk cannot consist of untagged ports from different VLANs.

Section I: Basic Operations

122

Port Operating

Specifications

The speed, duplex mode, flow control, and back pressure settings must be the same for all the ports of a port trunk. When you create a port trunk, the management software copies the current settings of the lowest numbered port in the trunk to the other ports. For example, if you create a port trunk consisting of ports 5 to 8, the parameter settings for port 5 are copied to ports 6, 7, and 8 so that all the ports of the trunk have the same settings. For this reason it is recommended that before creating a port trunk you first examine the settings of the lowest number port that will be in the trunk and verify that it has the correct settings.

Once you have created a port trunk, do not change the speed, duplex mode, flow control or back pressure of any port in the trunk without making the same change to the other ports.

Load

Distribution

Methods

AT-S62 User’s Guide

❑ When cabling a trunk, the order of the connections should be maintained on both nodes. The lowest numbered port in a trunk on the switch should be connected to the lowest numbered port of the trunk on the other device, the next lowest numbered port on the switch should be connected to the next lowest numbered port on the other device, and so on.

For example, assume that you are connecting a trunk between two AT-8524M switches. On the first AT-8524M switch you had chosen ports 12, 13, 14, 15 for the trunk. On the second AT-8524M switch you had chosen ports 21, 22, 23, and 24. To maintain the order of the port connections, you would connect port 12 on the first AT-8524M switch to port 21 on the second AT-8524M switch, port 13 to port 22, and so on.

❑ You can create a port trunk of the ports in two expansion modules in an AT-8524M switch, providing that the ports are of the same medium type and have the same operating specifications.

There are two steps for creating a port trunk. The first is to identify the ports on the switch that are to function as the port trunk. The second is to select a load distribution method. This second step is important because unless you select the correct distribution method for your configuration, the switch might not evenly distribute the load across all the links of a trunk. Naturally, this could greatly diminish the value of the port trunk.

The AT-S62 management software offers six load distribution methods.

They are:

❑ Source MAC Address (Layer 2)

❑ Destination MAC Address (Layer 2)

❑ Source MAC Address / Destination MAC Address (Layer 2)

Section I: Basic Operations

123

Chapter 8: Port Trunking

❑ Source IP Address (Layer 3)

❑ Destination IP Address (Layer 3)

❑ Source IP Address / Destination IP Address (Layer 3)

The load distribution methods can be divided into two general groups.

One group uses MAC addresses (Layer 2) to distribute the traffic and the other uses IP addresses (Layer 3).

Source Address Distribution Methods

When a switch receives a packet from a network node, it examines the destination address to determine on which switch port, if any, the packet should be transmitted. If the packet is destined for a port trunk, the switch then examines the source address of the packet. If this is the first packet from the source node to be transmitted over a port trunk, the switch assigns the source address to one of the trunk links.

Addresses are assigned to the ports of a trunk in a round-robin fashion. If this is the first packet to be sent over the trunk, the source address is assigned to the lowest numbered port in the trunk. All subsequent packets from the source node are sent out the assigned data link of the trunk.

When another node sends a packet over the trunk, its address is assigned to the next lowest port in the trunk, and so forth. Once addresses have been assigned to all the ports in the trunk, the process is repeated starting with the lowest numbered port.

The goal of assigning addresses in this fashion is to try to evenly distribute the addresses, or at least as much as possible, across all the ports of the trunk, so as to ensure that all links in the trunk are utilized.

Figure 34 shows an example with two AT-8524M Series switches

interconnected with a port trunk of three data links. The trunk on Switch

#1 consists of ports 13 to 15 and on Switch #2 of ports 1 to 3. The workstations are directing traffic to a server connected to Switch #2. The server is connected to Switch #2 with a fiber optic Gigabit Ethernet data link provided by an 1000Base fiber optic expansion module in Switch #2.

Section I: Basic Operations

124

AT-S62 User’s Guide

Workstation

B

Workstation

A

Workstation

C

Workstation

D

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Switch #1

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Switch #2

Section I: Basic Operations

Figure 34 Load Distribution Method

Now assume that you configured the port trunk on Switch #1 with the source MAC address load distribution method. The switch might

distribute the load as shown in Table 1.

Table 1 Switch #1 - Source MAC Address Load Distribution

Source Address Trunk Port

Workstation A - 00A0EE 2313A3 13

Workstation B - 00A134 1A9032 15

Workstation C -00A301 9083B2 14

Workstation B -001B21 87C6D6 13

125

Chapter 8: Port Trunking

For example, when Workstation B sends a packet to the server, Switch #1 uses Port 15 of the trunk to transmit it to Switch #2.

An assignment of a source address to a port trunk remains active as long as the source node remains active. If the MAC address times out, the assignment is dropped. If the source node becomes active again and needs to transmit a packet over the trunk, a new assignment is made, either to the same port or to a different port in the trunk.

Note that packets sent back from the destination node to the original source node may travel the same data link or a different data link in the trunk.

As a general rule, the source address load distribution method is useful in situations where the number of source nodes equals or is greater than the number of data links in the trunk.

So when would the source address method be inappropriate? Returning

to the example in Figure 34 on page 125, assume that you configured

Switch #2 also for source MAC address load distribution. The result would be that the switch would use only one data link in the trunk to send packets back to Switch #1, because there is only one source, a

Gigabit Ethernet server. Since there is only one source, only one data link is used. So obviously this method is not appropriate when there are fewer source nodes than data links.

Destination Address Distribution Methods

The destination address method is much the same as the source address method. The difference is, of course, that the destination address of a packet, rather than its source address, is used to distribute the traffic across the ports of a trunk.

When a switch receives a packet from a network node, it examines the destination address to determine on which switch port, if any, the packet should be transmitted. If the packet is destined for a port trunk and if this is the first packet intended for that destination address to cross the trunk, the switch assigns the destination address to one of the trunk links.

Destination addresses are assigned to the ports of a trunk in a roundrobin fashion. If this is the first packet to be sent over the trunk, the destination address is assigned to the lowest numbered port in the trunk. All subsequent packets intended to the destination node are sent out the assigned data link of the trunk.

Section I: Basic Operations

126

Section I: Basic Operations

AT-S62 User’s Guide

When another node sends a packet over the trunk, its address is assigned to the next lowest port in the trunk, and so forth. After an address has been assigned to all the ports in the trunk, the process is repeated starting with the lowest numbered port.

Destination address trunking is typically used in a situation where there is one or just a few source nodes transmitting to many destination

nodes. Switch #2 in Figure 34 on page 125 is an example of where this

type of load distribution would be useful. The server connected to the switch is sending packets to multiple destination nodes.

Table 2 shows how Switch #2 might distribute the server traffic across

the ports of the trunk using the destination MAC address method.

Table 2 Switch #2 - Destination MAC Address Load Distribution

Method

Destination Address Trunk Port

Workstation A - 00A0EE 2313A3 14

Workstation B - 00A134 1A9032 13

Workstation C - 00A301 9083B2 13

Workstation D - 001B21 87C6D6 15

For example, when the server connected to Switch #2 needs to send a packet to Workstation C, the switch uses port 13.

Source Address/Destination Address Distribution Methods

With this distribution method, a switch creates a matrix of the source and destination addresses and then uses the matrix to determine which port in the trunk a frame is to be transmitted. With this method, packets from a particular source node might be sent over different data links in a trunk when sent to different destination addresses.

As an example of how this works, assume that you configured Switch #2 in our example with source MAC address/destination MAC address. The

result might be something similar to that shown in Table 3.

127

Chapter 8: Port Trunking

Source MAC Address

Server

Table 3 Switch #2 - Source MAC Address/Destination MAC Address Method

Destinations MAC Addresses

00B012 DA0231

2

Workstation

A

00A0EE

2313A3

1

Workstation

B

00A134

1A9032

3

Workstation

C

00A301

9083B2

1

Workstation

D

001B21

87C6D6

Even though there is only one source, all the data links in the trunk are used. For instance, if the server needs to send a packet to workstation C, by referring to the matrix Switch #2 would use port 3 of the trunk to transmit the packet from that particular source MAC address to Switch

#1.

This method is useful when a port trunk needs to send packets from one source node to many destination nodes, something that the source address method is not suited for. This method is also valid when sending from many source nodes to one destination node, or from many sources to many destinations.

Table 4 shows a possible matrix for a port trunk of three data links using

this method to handle traffic from four sources to four destinations.

Table 4 Source MAC Address/Destination MAC Address Load Distribution Method

Source MAC

Addresses

00B012 DA0231

001230 DA2943

0042AA D45A21

00456A C23521

00A0EE

2313A3

1

2

3

1

1

2

2

3

Destination MAC Addresses

00A134

1A9032

00A301

9083B2

2

3

3

1

001B21

87C6D6

1

2

3

1

As a general rule, the source address/destination address distribution method is more flexible than the source address or destination address method alone. If you are not sure which load distribution to choose, use this method.

Section I: Basic Operations

128

AT-S62 User’s Guide

Creating a Port Trunk

This section contains the procedure for creating a port trunk on the

switch. Be sure to review the guidelines in Port Trunking Overview on page 122 before performing the procedure.

Caution

Do not connect the cables to the trunk ports on the switches until after you have configured the trunk with the management software.

Connecting the cables before configuring the software will create a loop in your network topology. Data loops can result in broadcast storms and poor network performance.

Note

Before you create a port trunk, examine the speed, duplex mode, and flow control settings of the lowest numbered port that will be a part of the trunk. Check to be sure that the settings are correct for the end node to which the trunk will be connected. When you create the trunk, the AT-S62 management software copies the settings of the lowest numbered port in the trunk to the other ports so that all the settings are the same.

You should also check to be sure that the ports are untagged members of the same VLAN. You cannot create a trunk of ports that are untagged members of different VLANs.

To create a port trunk, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

The Port Configuration menu is shown in Figure 20 on page 95.

2. From the Port Configuration menu, type 4 to select Port Trunking.

Section I: Basic Operations

129

Chapter 8: Port Trunking

The Port Trunking menu is shown in Figure 35.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Trunking

ID Name Ports Method Status

----------------------------------------------------

C - Create Trunk

D - Delete Trunk

M - Modify Trunk

R - Return to Previous Menu

Enter your selection?

Figure 35 Port Trunking Menu

This menu lists any trunks that already exist on the switch.

3. Type C to select Create Trunk.

The Create Trunk menu is shown in Figure 36.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Create Trunk

1 - Trunk ID ......... 1

2 - Trunk Name .......

3 - Trunk Method ..... SRC/DST MAC

4 - Trunk Ports ......

C - Create Trunk

R - Return to Previous Menu

Enter your selection?

Figure 36 Create Trunk Menu

4. Type 1 to select Trunk ID and, when prompted, enter an ID number for the trunk of from 1 to 6. A trunk must be assigned a unique ID number. The default value is the next unused ID number.

5. Type 2 to select Trunk Name and, when prompted, enter a name for the trunk. The name can be up to fifteen alphanumeric characters. No spaces or special characters, such as asterisks and exclamation points, are allowed. Each trunk must have a unique name.

Section I: Basic Operations

130

Section I: Basic Operations

AT-S62 User’s Guide

6. To set the load distribution method, type 3 to toggle the selection through the following possible settings:

❑ SRC MAC - Source MAC address

❑ DST MAC - Destination MAC address

❑ SRC/DST MAC - Source address /destination MAC address

❑ SRC IP - Source IP address trunking

❑ DST IP - Destination IP address trunking

❑ SRC/DST IP - Source address /destination IP address

The default is SRC/DST MAC. For background information, refer to

Load Distribution Methods on page 123.

7. Type 4 to select Trunk Ports and, when prompted, enter the ports of the trunk. A trunk can contain up to eight ports. You can identify the ports individually (for example, 3,7,10), as a range (for example, 5-11), or both (for example, 2,4,11-14).

8. Type C to select Create Trunk.

The port trunk is now active on the switch.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

10. Configure the ports on the remote switch for port trunking.

11. Connect the cables to the ports of the trunk on the switch.

The port trunk is ready for network operations.

131

Chapter 8: Port Trunking

Modifying a Port Trunk

This section contains the procedure for modifying a port trunk on the

switch. Be sure to review the guidelines in Port Trunking Overview on page 122 before performing the procedure.

Caution

If you will be adding or removing ports from the trunk, you should disconnect all data cables from the ports of the trunk on the switch before performing the procedure. Adding or removing ports from a port trunk without first disconnecting the cables may result in loops in your network topology, which can produce broadcast storms and poor network performance.

Note the following before performing this procedure:

❑ If you are adding a port and the port will be the lowest numbered port in the trunk, its parameter settings will overwrite the settings of the existing ports in the trunk. Consequently, you should check to see if its settings are appropriate prior to adding it.

❑ If you are adding a port and the port will not be the lowest numbered port in the trunk, its settings will be changed to match the settings of the existing ports in the trunk.

❑ If you are adding a port to a trunk, you should check to be sure that the new port is an untagged member of the same VLAN as the other trunk ports. A trunk cannot contain ports that are untagged members of different VLANs.

To modify a port trunk, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

The Port Configuration menu is shown in Figure 20 on page 95.

2. From the Port Configuration menu, type 4 to select Port Trunking.

The Port Trunking menu is shown in Figure 35 on page 130.

3. Type M to select Modify Trunk.

The following prompt is displayed:

Enter Trunk ID: [1 to 6] ->

4. Enter the ID number of the trunk you want to modify.

Section I: Basic Operations

132

Section I: Basic Operations

AT-S62 User’s Guide

The Modify Trunk menu is displayed. The menu displays the operating specifications of the selected trunk. An example is shown in

Figure 37.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify Trunk

1 - Trunk ID ......... 2

2 - Trunk Name ....... Server11

3 - Trunk Method ..... SRC/DST MAC

4 - Trunk Ports ...... 12-16

M - Modify Trunk

R - Return to Previous Menu

Enter your selection?

Figure 37 Modify Trunk Menu

Note

You cannot change a trunk’s ID number.

5. To modify a port trunk’s name, type 2 to select Trunk Name and, when prompted, enter the new name for the trunk. The name can be up to fifteen alphanumeric characters. No spaces or special characters, such as asterisks and exclamation points, are allowed. Each trunk must have a unique name.

6. To change the trunk’s load distribution method, type 3 to toggle the selection through the following possible settings.

❑ SRC MAC - Source MAC address

❑ DST MAC - Destination MAC address

❑ SRC/DST MAC - Source address /destination MAC address

❑ SRC IP - Source IP address trunking

❑ DST IP - Destination IP address trunking

❑ SRC/DST IP - Source address /destination IP address

For background information on these selections, refer to Load

Distribution Methods on page 123.

133

Chapter 8: Port Trunking

7. To change the ports of a trunk, type 4 to select Trunk Ports and, when prompted, enter the new ports of the trunk. A trunk can contain up to eight ports. You can identify the ports individually (for example,

3,7,10), as a range (for example, 5-11), or both (for example, 2,4,11-14).

The new list of ports replaces the existing ports of the trunk.

8. Type M to select Modify Trunk.

The modifications to the port trunk are activated on the switch.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

10. Reconnect the cables to the ports of the trunk on the switch.

The modified port trunk is ready for network operations.

Section I: Basic Operations

134

AT-S62 User’s Guide

Deleting a Port Trunk

Caution

Disconnect the cables from the port trunk on the switch before performing the following procedure. Deleting a port trunk without first disconnecting the cables can create loops in your network topology. Data loops can result in broadcast storms and poor network performance.

To delete a port trunk from the switch, perform the following procedure:

1. From the Main Menu, type 1 to select Port Menu.

2. From the Port Menu, type 4 to select Port Trunking.

The Port Trunking menu in Figure 35 on page 130 is displayed.

3. Type D to select Delete Trunk.

The following prompt is displayed:

Enter Trunk ID: [1 to 6] ->

4. Enter the ID number of the trunk to be deleted.

A confirmation prompt is displayed.

5. Type Y for yes to delete the port trunk or N for no to cancel this procedure.

The port trunk is deleted from the switch.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations

135

Chapter 9

Port Mirroring

This chapter contains the procedures for creating and deleting a port mirror. Sections in the chapter include:

❑ Port Mirroring Overview on page 137

❑ Creating a Port Mirror on page 138

❑ Deleting a Port Mirror on page 140

136

AT-S62 User’s Guide

Port Mirroring Overview

The port mirroring feature allows you to unobtrusively monitor the traffic being received and transmitted on one or more ports on a switch by having the traffic copied to another switch port. You can connect a network analyzer to the port where the traffic is being copied and monitor the traffic on the other ports without impacting network performance or speed.

The port(s) whose traffic you want to mirror is called the source port(s).

The port where the traffic will be copied to is called the destination port.

Observe the following guidelines when you create a port mirror:

❑ You can select more than one source port at a time. However, the more ports you mirror, the less likely the destination port will be able to handle all the traffic. For example, if you mirror the traffic of six heavily active ports, the destination port is likely to drop packets, meaning that it will not provide an accurate mirror of the traffic of the six source ports.

❑ The source and destination ports must be located on the same switch.

❑ You can mirror either the ingress or egress traffic of the source ports, or both.

Section I: Basic Operations

137

Chapter 9: Port Mirroring

Creating a Port Mirror

To create a port mirror, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

The Port Configuration menu is shown in Figure 20 on page 95.

2. From the Port Configuration menu, type 6 to select Port Mirroring.

The Port Mirroring menu is shown in Figure 38.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Mirroring

1 - Enable/Disable .................... Disabled

R - Return to Previous Menu

Enter your selection?

Figure 38 Port Mirroring Menu #1

3. Type 1 to select Enable/Disable.

The following prompt is displayed.

Enter Enable(E)/Disable(D):

4. Type E to enable the feature.

New options are added to the Port Mirroring menu, as shown in

Figure 39.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Mirroring

1 - Enable/Disable ...................... Enabled

2 - Mirror-To (Destination) Port ........ None

3 - Ingress (Rx) Mirror (Source) Ports .. None

4 - Egress (Tx) Mirror (Source) Ports ... None

R - Return to Previous Menu

Enter your selection?

Figure 39 Port Mirroring Menu #2

Section I: Basic Operations

138

AT-S62 User’s Guide

5. Type 2 to select Mirror-To Port and, when prompted, enter the number of the port to function as the destination port. This is the port where the traffic from the source ports will be copied to and where the network analyzer will be located. You can specify only one destination port.

6. If you want to mirror the ingress (received) traffic on one or more ports, type 3 to select Ingress Mirror Port and, when prompted, enter the ports. You can identify the ports individually (for example, 3,7,10), as a range (for example, 5-11), or both (for example, 2,4,11-14).

Entering “0” (zero) removes all ingress source ports.

7. If you want to mirror the egress (transmitted) traffic from one or more ports, type 4 to select Egress Mirror Port and, when prompted, enter the ports. Entering “0” (zero) removes all egress source ports.

To monitor both the ingress and egress traffic of the source ports, you must specify the ports in both menu options 3 and 4.

The port mirror is now functional. Attach a network analyzer to the destination port to monitor the traffic on the source ports.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section I: Basic Operations

139

Chapter 9: Port Mirroring

Deleting a Port Mirror

To delete a port mirror, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

The Port Configuration menu is shown in Figure 20 on page 95.

2. From the Port Configuration menu, type 6 to select Port Mirroring.

The Port Mirroring menu is shown in Figure 39 on page 138.

3. Type 1 to select Enable/Disable.

The following prompt is displayed.

Enter Enable(E)/Disable(D):

4. Type D to disable the feature.

Port mirroring on the switch is now disabled. You can disconnect the network analyzer from the destination port and use the port for normal network operations.

Section I: Basic Operations

140

Chapter 10

Ethernet Statistics

This chapter contains the procedures for displaying data traffic statistics.

The chapter contains the following sections:

❑ Displaying Port Statistics on page 142

❑ Clearing Port Counters on page 144

141

Chapter 10: Ethernet Statistics

Displaying Port Statistics

To display Ethernet port statistics, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

2. From the Port Configuration menu, type 3 to select Port Statistics.

The Port Statistics menu is shown in Figure 40.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Statistics

1 - Display Port Statistics

3 - Clear Port Statistics

R - Return to Previous Menu

Enter your selection?

Figure 40 Port Statistics Menu

3. From the Port Statistics menu, type 1 to select Display Port Statistics.

This prompt is displayed:

Enter port-list:

4. Enter the port whose statistics you want to view. You can specify more than one port at a time.

A menu is displayed containing the statistics for each port. The information in this menu is for viewing purposes only. The statistics are defined below:

Bytes Received

Number of bytes received on the port.

Bytes Sent

Number of bytes transmitted from the port.

Frames Received

Number of frames received on the port.

Frames Sent

Number of frames transmitted from the port.

Broadcast Frames Received

Number of broadcast frames received on the port.

Broadcast Frames Sent

Number of broadcast frames transmitted from the port.

Section I: Basic Operations

142

Section I: Basic Operations

AT-S62 User’s Guide

Multicast Frames Received

Number of multicast frames received on the port.

Multicast Frames Sent

Number of multicast frames transmitted from the port.

Frames 64 Bytes

Frames 65 - 127 Bytes

Frames 128 - 255 Bytes

Frames 256 - 511 Bytes

Frames 512 - 1023 Bytes

Frames 1024 - 1518 Bytes

Number of frames transmitted from the port, grouped by size.

CRC Error

Number of frames with a cyclic redundancy check (CRC) error but with the proper length (64-1518 bytes) received on the port.

Jabber

Number of occurrences of corrupted data or useless signals appearing on the port.

No. of Rx Errors

Total number of frames received on the port containing errors.

No. of Tx Errors

Total number of frames transmitted on the port containing errors.

Undersize Frames

Number of frames that were less than the minimum length specified by IEEE 802.3 (64 bytes including the CRC) received on the port.

Oversize Frames

Number of frames exceeding the maximum specified by IEEE

802.3 (1518 bytes including the CRC) received on the port.

Fragments

Number of undersized frames, frames with alignment errors, and frames with frame check sequence (FCS) errors (CRC errors) received on the port.

Tx Collisions

Number of collisions that have occurred on the port. This applies only to ports operating in half duplex.

143

Chapter 10: Ethernet Statistics

Clearing Port Counters

To return the statistics counters of a port to zero, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

2. From the Port Configuration menu, type 3 to select Port Statistics.

The Port Statistics menu is shown in Figure 40 on page 142.

1. From the Port Statistics menu, type 2 to select Clear Port Statistics.

This prompt is displayed:

Enter port-list:

2. Enter the port whose statistics counters you want to return to zero.

You can specify more than one port at a time.

The port counters are returned to zero.

Section I: Basic Operations

144

Section II

Advanced Operations

The chapters in this section explain how to manage an AT-8524M switch from a local or Telnet management session. The chapters include:

❑ Chapter 11: File System on page 146

❑ Chapter 12: File Downloads and Uploads on page 160

❑ Chapter 13: Event Log on page 182

❑ Chapter 14: Quality of Service on page 191

❑ Chapter 15: IGMP Snooping on page 203

❑ Chapter 16: Denial of Service Defense on page 212

145

Chapter 11

File System

This chapter describes the AT-S62 file system, and how you can use the file system to copy, rename, and delete system files. This chapter also explains how you can use the file system to select which boot configuration file you want the switch to use the next time the device is reset or power cycled. This chapter contains the following sections:

❑ File System Overview on page 147

❑ Working with Boot Configuration Files on page 149

❑ Copying, Renaming, and Deleting System Files on page 156

❑ Displaying System Files on page 158

146

AT-S62 User’s Guide

File System Overview

The AT-S62 management software has a file system for storing system files. You can view the file system, as well as copy, rename, and delete files. The following file types are supported by the AT-S62 file system:

❑ Boot configuration files

❑ Public keys

❑ Public certificates

❑ Certificate enrollment requests

For an explanation of a boot configuration file, refer to Working with

Boot Configuration Files on page 149.

Public encryption keys, public certificates, and certificate enrollment request files are related to the Secure Sockets Layer (SSL) certificates

feature described in Chapter 26, Encryption Keys on page 492, and

Chapter 27, Public Key Infrastructure Certificates on page 510. Refer to

those chapters for background information on those files.

Note

The certificate file, certificate enrollment request file, and key file are supported only on the version of AT-S62 management software that features SSL and PKI security.

This chapter does not explain how to transfer a file from the AT-S62 file system to a management workstation or to an TFTP server. For those

instructions, refer to Chapter 12, File Downloads and Uploads on page

160.

Note

The file system may contain one or more ENC.UKF files. These are encryption key pairs. These files cannot be deleted or copied in the file system. For instructions on deleting an encryption key, refer to

Deleting an Encryption Key on page 504.

The file system should not be used to store the switch’s AT-S62 image file.

Section II: Advanced Operations 147

Chapter 11: File System

File Naming

Conventions

The file system is a flat file system which means directories are not supported. Files are uniquely identified by a file name in the following format: filename.ext

where:

filename is a descriptive name for the file, and may be one to sixteen characters in length. Valid characters are lowercase letters

(a–z), uppercase letters (A–Z), digits (0–9), and the following characters: ~ ’ @ # $ % ^ & ( ) _ - { }. Invalid characters are: ! * + = “|

\ [ ] ; : ? / , < >.

ext is a file name extension of three characters in length, preceded by a period (.). The extension is used by the switch to determine the file type.

Table 5 File Extensions and File Types

Extension

.cfg

.cer

.csr

.key

File Type

Configuration file (or boot script)

Certificate file

Certificate enrollment request

Key file

The following is an example of a valid file name for a configuration file: standardconfig.cfg

The following is an example of an invalid file name: sys/head_o.cfg

The backslash character (/ ) is not a valid character because subdirectories are not supported.

Using Wildcards to Specify Groups of Files

You can use the asterisk character (*) as a wildcard character in some fields to identify groups of files. In addition, a wildcard can be combined with other characters. The following are examples of valid wildcard expressions:

*.cfg

*.key

28*.cfg

Section II: Advanced Operations 148

AT-S62 User’s Guide

Working with Boot Configuration Files

A boot configuration file contains a series of commands that configure the switch’s parameter settings when you power cycle or reset the device. The commands in the file recreate all the VLANs, port settings, spanning tree settings, port trunks, port mirrors, and so on.

A switch can contain multiple boot configuration files, but only one can be active on a switch at a time. The active boot file is the file that the switch uses to configure itself whenever the unit is reset or power cycled. The active boot file is also the file that is updated whenever you select the Save Configuration Changes option from the Main Menu or use the Save Configuration command from the command line interface.

You can create different configuration files and store them in the switch’s file system. For instance, you might create a backup of a configuration file to protect against the loss of the file, or you might create different configuration files to see which works best on the switch and for your network. You can also copy configuration files onto different switches to save yourself the trouble of having to manually configure AT-8524M switches that are to have similar configurations.

The procedures in this section explain how to create a boot configuration file, set the active boot configuration file, view the contents of a configuration file, and edit a file. The procedures are:

❑ Creating a Boot Configuration File on page 149

❑ Setting the Active Boot Configuration File on page 152

❑ Viewing a Boot Configuration File on page 153

❑ Editing a Boot Configuration File on page 154

❑ Troubleshooting a Boot Configuration File on page 155

To display a list of the configuration files that exist on the switch, see

Displaying System Files on page 158.

Creating a Boot

Configuration

File

This procedure explains how to create a new boot configuration file on the switch. You might want to create a boot configuration file to download it onto another switch. Or, you might want to create a backup of your current configuration. This procedure consists of three phases:

❑ Phase 1: Creating a Configuration File

❑ Phase 2: Configuring the Switch’s Parameter Settings

❑ Phase 3: Selecting the Active Configuration File for the Switch

Section II: Advanced Operations 149

Chapter 11: File System

Phase 1: Creating a Configuration File

Before you begin to configure the switch with the parameter settings that you want to save in a new configuration file, you should first create the file. Configuring the parameters first and then creating the new configuration file might cause you to inadvertently change a configuration file you might not want to change.

To perform this phase, do the following:

1. From the Main Menu, type 5 to select System Administration.

2. From the System Administration menu, type 9 to select System

Utilities.

3. From the System Utilities menu, type 1 to select File Operations.

The File Operations menu is shown in Figure 41.

Allied Telesyn AT-8524M Series - ATS62

Production Switch

User: Manager 11:20:02 02-Jan-2004

File Operations

1 - Boot Configuration File ............ boot.cfg (Exists)

2 - Current Configuration .............. boot.cfg

3 - Create Configuration File

4 - Copy File

5 - Rename File

6 - Delete File

7 - View File

8 - List Files

R - Return to Previous Menu

Enter your selection?

Figure 41 File Operations Menu

Option 1 - Boot Configuration File specifies the file that is updated whenever you save a configuration change using the Save

Configuration Changes option in the Main Menu or the Save

Configuration command in the command line interface. It is also the boot file that the switch will use the next time you reset or power cycle the unit. Option 2 - Current Configuration specifies the boot configuration file the switch used the last time it was reset or power cycled.

4. Type 3 to select Create Configuration File.

Section II: Advanced Operations 150

Section II: Advanced Operations

AT-S62 User’s Guide

The following prompt is displayed:

Enter the file name (or None):

5. Enter a file name for the new configuration file.

The file name can be up to 16 alphanumeric characters. Spaces are

allowed. The filename must include the extension “.cfg”. See File

Naming Conventions on page 148.

Note

If the filename already exists, the system displays a message asking if you want to overwrite the existing file.

Note

You cannot name a configuration file “default.cfg.” This file name is reserved by the switch.

The management software create the new configuration file and stores it in the file system. The file contains the current switch configuration.

6. Type 1 to select Boot Configuration File.

The following prompt is displayed:

Enter the file name:

7. Enter the same file name that you entered in Step 5.

This makes your new configuration file the active file on the switch. Any changes you now make to the switch’s parameter settings are saved to this file.

The file name will now appear following selection 1 in the File

Operations menu. The file name should be followed by “Exist”, meaning that the file exists in the switch’s file system. If “Not

Found” appears instead, you probably enter the name incorrectly, in which case you need to repeat Steps 6 and 7.

Phase 2: Configuring the Switch’s Parameter Settings

Now that you have created a configuration file and designated it as the active boot configuration file on the switch, you can now configure the switch’s parameter settings by making those changes that you want the new configuration file to contain. Once you have done that, be sure to save your changes to the configuration file by returning to the Main

Menu and typing S to select Save Configuration Changes. Failure to save your changes will mean that the configuration file will not contain the new parameter settings.

151

Chapter 11: File System

Note

Only the active boot configuration file is changed when you select the Save Configuration Changes option in the Main Menu. No other boot configuration files stored on the switch are altered.

Phase 3: Selecting the Active Configuration File for the Switch

You have now created the configuration file, made the necessary changes to the switch’s parameter settings, and saved the changes. If you want the switch to use this new configuration file the next time you reset or power cycle the switch, no further steps are necessary. The new configuration file is already the active boot file on the device.

If you want the switch to use a different file as the active configuration

file, then perform the procedure in Setting the Active Boot Configuration

File on page 152.

If you want to create another new configuration file, repeat this procedure starting with Phase 1.

Setting the

Active Boot

Configuration

File

This procedure selects the active boot configuration file on the switch.

The switch uses the active configuration file the next time the unit is reset or power cycled to set its parameter settings. You can select a configuration file that you created on the switch or that you downloaded onto the switch from another switch.

The switch comes with one default configuration file, called

“default.cfg.” This is the default active configuration file.

Note

The active boot configuration file is updated whenever you select the Save Configuration Changes from the Main Menu or the Save

Configuration command from the command line interface.

To select the active boot configuration file for the switch, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

2. From the System Administration menu, type 9 to select System

Utilities.

3. From the System Utilities menu, type 1 to select File Operations.

The File Operations menu is shown in Figure 41 on page 150.

4. Type 1 to select Boot Configuration File.

Section II: Advanced Operations 152

AT-S62 User’s Guide

The following prompt is displayed:

Enter the file name:

5. Enter the file name of the configuration file you want the switch to use the next time it is reset or power cycled.

The file name will now appear following selection 1 in the File

Operations menu. The file name should be followed by “Exist”, which means that the file exists in the switch’s file system. In the future, the switch will use the newly selected configuration file whenever you reset the unit, unless you designate another boot configuration file as the active boot file.

Note

If “Not Found” appears, the file does not exist. If you reboot the switch using a nonexistent configuration file the switch is reset to its factory default settings.

6. To activate the parameter settings in the newly selected boot configuration file, reset or power cycle the switch.

Viewing a Boot

Configuration

File

Use the following procedure to view the contents of a configuration file.

(To display the names of the configuration files on the switch, see

Displaying System Files on page 158.)

This procedure starts from the File Operations menu. If you are unsure

how to display the menu, perform steps 1 to 3 in Setting the Active Boot

Configuration File on page 152.

To view the contents of a configuration file, perform the following procedure:

1. From the File Operations menu, type 7 to select View File.

The following prompt is displayed:

Enter file name:

2. Enter the name of the configuration file you want to view.

Section II: Advanced Operations 153

Chapter 11: File System

The contents of the configuration file are displayed in the View

File menu. An example is shown in Figure 42.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

View File

Configuration File: mydefault.cfg

-------------------------------------------------------------------

#

# System Configuration

# set system name="Production Switch" set system contact="Jane Smith" set system location="Building 5"

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 42 View File Menu

A configuration file contains those switch settings that differ from the AT-S62 default values. The parameter settings are shown in their command line equivalents. The switch executes the commands in the boot configuration file to configure its settings when it is reset or power cycled. For information on command line commands, refer to the AT-S62 Command Line User’s Guide.

The information in this menu is for viewing purposes only.

3. Type N for Next Page and P for Previous Page to scroll through the file.

Editing a Boot

Configuration

File

You can edit a boot configuration file using a text editor on your management workstation. To edit the file, you must first upload it from the switch to your management workstation. You cannot edit a boot configuration file directly on the switch. Once you have edited the file, you can download it back to the switch and make it the active boot configuration file.

For instructions on how to upload a configuration file from a switch to

your management workstation, refer to Uploading a System File on page

177. For instructions on how to download a configuration file from your

workstation back to the switch, refer to Downloading a System File on page 171. For instructions on how to designate an active boot

configuration file, refer to Setting the Active Boot Configuration File on page 152.

Section II: Advanced Operations 154

AT-S62 User’s Guide

Here are several guidelines for editing a boot configuration file:

❑ The text editor must be able to store the file as ASCII text. Do not insert special formatting codes, such as boldface or italics into a boot configuration file.

❑ The configuration file must contain AT-S62 command line commands. You enter the commands you want the switch to perform when reset or power cycled. For a description of the commands, refer to the AT-S62 Command Line User’s Guide.

❑ A boot configuration file is divided into sections with each section devoted to the commands of a particular function. For example, the VLAN Configuration section should contain commands for creating VLANs or for setting the VLAN mode.

❑ Each command must start flush left against the margin.

❑ To comment out a command so that the switch does not perform it, precede the command with the symbol “#”.

❑ You should test the commands manually by entering them at the command line before inserting them into a boot configuration file. This will help ensure that you understand the syntax and parameters of the commands and that the commands produce the desired results.

Troubleshooting a Boot

Configuration

File

If a boot configuration file contains an invalid or incorrect command, the switch, when reset or power cycled, will stop processing the configuration file at the point of the invalid command. The invalid command and any commands following it in the file will not be performed. To troubleshoot a configuration file, start a local management session with the switch and reset the device. Messages on the screen during the boot up and configuration process will indicate the line in the configuration file that contains the error. You can download the file to your management workstation and edit it to correct the error.

Section II: Advanced Operations 155

Chapter 11: File System

Copying, Renaming, and Deleting System Files

Use this procedure to copy, rename, and delete system files. To view a

list of system file names, see Displaying System Files on page 158.

Note

Files with the extension UKF are encryption key pairs. These files cannot be copied, renamed, or deleted from the file system. To

delete a key pair from the switch, refer to Deleting an Encryption Key on page 504.

To copy, rename, or delete a file in the file system, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

2. From the System Administration menu, type 9 to select System

Utilities.

3. From the System Utilities menu, type 1 to select File Operations.

The File Operations menu is shown in Figure 41 on page 150.

4. To copy a file, do the following: a. From the File Menu, type 4 to select Copy File.

Note

Selecting Copy File does not allow you to overwrite files.

The following prompt is displayed:

Enter the source file name: b. Enter the name of the file you want to copy.

The following prompt is displayed:

Enter the destination file name: c. Enter the new file name.

You can enter a file name of up to 16 alphanumeric characters, followed by a 3 letter extension. You should keep the same extension as the original filename.

The following message is displayed:

Please wait...

Press any key ...

d. Press any key to return to the File Operations menu.

Section II: Advanced Operations 156

Section II: Advanced Operations

AT-S62 User’s Guide

5. To rename a system file, do the following: a. From the File Operations menu, type 5 to select Rename File.

The following prompt is displayed:

Enter the source file name: b. Enter the name of the file you want to rename.

The following prompt is displayed:

Enter the destination file name: c. Enter the new name for the file.

You can enter a file name of up to 16 alphanumeric characters, followed by a 3 letter extension. You must keep the same extension.

The following message is displayed:

Please wait...

Press any key ...

d. Press any key to return to the File Operations menu.

6. To delete a system file, do the following: a. From the File Operations menu, type 6 to select Delete File.

The following prompt is displayed:

Enter file name to be deleted: b. Enter the name of the file you want to delete.

The following prompt is displayed:

Please wait...

Press any key ...

c. Press any key to return to the File Operations menu.

Note

Deleting the configuration file that is acting as the active boot configuration file will cause the switch to use its default settings the next time you reboot or power cycle the switch, unless you select another active boot configuration file. For instructions on how to

change the active boot configuration file, see Setting the Active

Boot Configuration File on page 152.

157

Chapter 11: File System

Displaying System Files

Use this procedure to display a list of the system files currently stored on the switch. For information about shortcuts for specifying file names, see

File Naming Conventions on page 148.

To display a list of current system file names, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

2. From the System Administration menu, type 9 to select System

Utilities.

3. From the System Utilities menu, type 1 to select File Operations.

The File Operations menu is shown in Figure 41 on page 150.

4. From the File Operations menu, type 8 to select List Files.

The following prompt is displayed:

Enter file name pattern to list:

5. Enter a configuration file name or pattern using the wildcard “*”.

Below are examples of how to use the wildcard to display different files.

To display a list of all the files, enter:

*.*

To display a list of the certificate files, enter:

*.cer

To display a list of the configuration files, enter:

*.cfg

To display a list of the key files, enter:

*.key

To display a list of the files that begin with the letter t, enter: t*.*

Section II: Advanced Operations 158

AT-S62 User’s Guide

The List Files menu is displayed. An example of the menu is shown

in Figure 43.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

List Files

File Name Size (Bytes) Last Modified

------------------------------------------------------------------default.cfg

boot.cfg

newcfg.cg

805

1249

1082 serverkey150.key

768

ProdSw.cer

1024

ProdSw2.cer

560

01/10/2002 12:01:16

10/24/2003 16:50:40

07/12/2003 16:59:06

11/30/2003 19:17:35

11/30/2003 20:38:20

12/11/2003 20:56:13

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 43 List Files Menu

The columns in the List Files menu are described below:

❑ The File Name column contains the name of the system file.

❑ The Size column indicates the size of the file, in bytes.

❑ The Last Modified column lists the time the file was created or last modified, in the following date and time format: month/day/year hours:minutes:seconds.

The information in this menu is for viewing purposes only.

Section II: Advanced Operations 159

Chapter 12

File Downloads and Uploads

This chapter contains procedures for downloading a new AT-S62 image file onto the switch. This chapter also contains procedures for uploading and downloading system files, such as a boot configuration file, from the file system in the switch. The procedures in this chapter are:

❑ Downloading the AT-S62 Image File onto a Switch on page 161

❑ Downloading an AT-S62 Image File Switch to Switch on page 167

❑ Downloading an AT-S62 Configuration File Switch to Switch on page 169

❑ Downloading a System File on page 171

❑ Uploading a System File on page 177

Note

For instructions on how to obtain the latest version of the AT-S62

management software, refer to Management Software Updates on page 30.

160

AT-S62 User’s Guide

Downloading the AT-S62 Image File onto a Switch

This section contains two procedures for downloading a new AT-S62 image file onto the switch. They are:

❑ Downloading the AT-S62 Image from a Local Management

Session on page 162

❑ Downloading the AT-S62 Image from a Telnet Management

Session on page 165

Caution

Installing a new AT-S62 image file will invoke a switch reset. Some network traffic may be lost.

You can use either Xmodem or TFTP when downloading files from a local management session. You must use TFTP when downloading files from a Telnet management session.

Here are guidelines that apply to both Xmodem and TFTP downloads:

❑ The current configuration of a switch is retained when a new

AT-S62 software image is installed. If you want to return a switch

to its default configuration values, refer to Returning the AT-S62

Software to the Factory Default Values on page 76.

❑ The AT-S62 image file contains the bootloader for the switch. You cannot load the image file and bootloader separately.

Here are guidelines that apply to an Xmodem download:

❑ Xmodem can only download the image file onto the switch on which you started the local management session. You cannot use

Xmodem to download a new image file onto a switch accessed through enhanced stacking.

❑ The new AT-S62 image file must be stored on the computer or terminal connected to the RS232 Terminal Port on the switch.

Here are guidelines that apply to a TFTP download:

❑ There must be a node on your network that contains the TFTP server software and the new AT-S39 image file to be downloaded must be stored on the server.

❑ You should start the TFTP server software before you begin the download procedure.

❑ The switch on which you are downloading the new image file must have an IP address and subnet mask, such as a master switch

Section II: Advanced Operations

161

Chapter 12: File Downloads and Uploads of an enhanced stack. You cannot use TFTP on a slave switch, since that type of switch typically does not have an IP address.

Instead, you would need to perform the download from a local management session of the switch using Xmodem or,

alternatively switch to switch, as explained in Downloading an

AT-S62 Image File Switch to Switch on page 167.

The following procedures assume that you have already obtained the new software from Allied Telesyn and stored it on the management workstation from which you will be performing the procedure, or on the

TFTP server.

Downloading the AT-S62

Image from a

Local

Management

Session

To download a new software image onto a switch from a local management session using Xmodem or TFTP, perform the following procedure:

1. Establish a local management session on the switch where you intend to download the new management software.

2. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

3. From the System Administration menu, type 9 to select System

Utilities.

The System Utilities menu is shown in Figure 9 on page 64.

4. For the System Utilities menu, type 2 to select Downloads and

Uploads.

The Downloads and Uploads menu is shown in Figure 44.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Downloads and Uploads

1 - Download Application Image/BootLoader

2 - Upload Application Image/BootLoader

3 - Download a file

4 - Upload a file

R -

Return to

Previous Menu

Enter your selection?

Figure 44 Downloads and Uploads Menu

Section II: Advanced Operations

162

Section II: Advanced Operations

AT-S62 User’s Guide

Note

Options 3 and 4 are described in Uploading a System File on page

177.

5. Type 1 to select Download Application Image/Bootloader.

The following prompt is displayed:

Download Method/Protocol [X-Xmodem, T-TFTP]:

6. To download the AT-S62 image file using Xmodem, go to Step 7. To download the file using TFTP, do the following: a. Type T.

The following prompt is displayed:

TFTP Server IP address: b. Enter the IP address of the TFTP server.

The following prompt is displayed:

Remote File Name: c. Enter the directory path and file name of the AT-S62 image file stored on the TFTP server.

The following message is displayed:

Getting the file from Remote TFTP Server - Please wait ...

d. If you have not already done so, start the TFTP server software.

Once the switch has downloaded the image file, this message is displayed:

File received successfully!

Note

The switch validates the file and then begins the initialization process of writing the image to flash. The switch will not forward any network traffic during the initialization process. Once the management software is initialized, the switch automatically resets.

7. To download a file using Xmodem, type X at the prompt displayed in

Step 5.

163

Chapter 12: File Downloads and Uploads

The following prompt is displayed:

You are going to invoke the Xmodem download utility.

Do you wish to continue? [Yes/No]

Note: Please select 1K Xmodem protocol for faster download.

8. Type Y for Yes.

The prompt “Downloading” is displayed.

9. Begin the file transfer of the new management software image.

Note

The transfer protocol must be Xmodem or 1K Xmodem.

Steps 10 through 13 illustrate how you would download a file using the Hilgraeve HyperTerminal program.

10. From the HyperTerminal main window, select the Transfer menu.

Then select Send File from the pull-down menu, as shown in Figure

45.

Figure 45 Local Management Window

The Send File window is shown in Figure 46.

Figure 46 Send File Window

Section II: Advanced Operations

164

AT-S62 User’s Guide

11. Click the Browse button and specify the location and file to be downloaded onto the switch.

12. Click on the Protocol field and select as the transfer protocol either

Xmodem or, for a faster download, 1K XModem.

13. Click Send.

The software immediately begins to download onto the switch. The

Xmodem File Send window in Figure 47 displays current status of the

software download. The download process takes a couple minutes to complete.

Figure 47 XModem File Send Window

Note

Once the switch has downloaded the new image, it begins to initialize the software, a process that takes approximately one minute to complete. The switch will not forward any network traffic during the initialization process. Once the management software is initialized, the switch automatically resets.

Downloading the AT-S62

Image from a

Telnet

Management

Session

To download a new software image onto a switch from a Telnet management session using TFTP, perform the following procedure:

1. Establish a Telnet management session on the switch where you intend to download the new management software.

2. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

Section II: Advanced Operations

165

Chapter 12: File Downloads and Uploads

3. From the System Administration menu, type 9 to select System

Utilities.

The System Utilities menu is shown in Figure 9 on page 64.

4. For the System Utilities menu, type 2 to select Downloads and

Uploads.

The Downloads and Uploads menu is shown in Figure 44 on page

162.

5. Type 1 to select Download Application Image/Bootloader.

The following prompt is displayed:

Only TFTP downloads are available for a Telnet access

TFTP Server IP address:

6. Enter the IP address of the TFTP server.

The following prompt is displayed:

Remote File Name:

7. Enter the directory path and file name of the image file or configuration file that you want to download.

The following message is displayed:

Getting the file from Remote TFTP Server - Please wait ...

8. If you have not already, start the TFTP server software.

Once the switch has downloaded the image file, this message is displayed:

File received successfully!

Note

The switch validates the file and then begins the initialization process of writing the image to flash. The switch will not forward any network traffic during the initialization process. Once the management software is initialized, the switch automatically resets.

Section II: Advanced Operations

166

AT-S62 User’s Guide

Downloading an AT-S62 Image File Switch to Switch

The previous section contained the procedure for downloading an

AT-S62 software image onto a switch from a local or Telnet management session. The procedure in this section explains how to download an

AT-S62 software image from one AT-8524M switch to another AT-8524M switch.

This procedure is useful in networks that contain a large number of

AT-8524M switches. Once you have updated the software on the master switch of an enhanced stack, you can instruct the master switch to automatically upgrade the other AT-8524M switches in the enhanced stack.

Note

This procedure can be performed from a local or Telnet management session.

To download a management software image from a master switch to other switches in the same enhanced stack, perform the following procedure:

1. From the Main Menu, type 8 to select Enhanced Stacking.

The Enhanced Stacking menu is shown in Figure 5 on page 53.

2. From the Enhanced Stacking menu, type 2 to select Stacking Services.

Note

The “2 - Stacking Services” selection is available only on master switches.

The Stacking Services menu is shown in Figure 6 on page 54.

3. Type 1 to select Get/Refresh List of Switches. The master switch polls the network for all enhanced stacking switches in the subnet and displays the switches in the Stacking Services menu.

4. Type 4 to select Download Image/Bootloader.

The following prompt is displayed:

Enter the list of switches ->

5. Enter the number (Num column in menu) of the AT-8524M switch whose software you want to update. You can specify more than one switch at a time.

Section II: Advanced Operations

167

Chapter 12: File Downloads and Uploads

Note

You cannot download AT-S62 software onto any other type of enhanced stacking switch other than AT-8524M switches.

The following prompt is displayed:

Do you want to show remote switch burning flash ->

[Yes/No]

6. You can respond with Yes or No to this prompt. It does not affect the download.

The following prompt is displayed:

Do you want confirmation before downloading each switch -> [Yes/No]

7. If you answer Yes to this prompt, the management software prompts you with a confirmation message before upgrading a switch. If you answer No, the management software does not display a confirmation prompt before downloading.

The management software begins the download. The management software notifies you when the download is complete.

Caution

Once a switch image file has been downloaded, the switch must decompress it and write it to flash. This can require one to two minutes to complete. Do not reset or power off the unit while it is decompressing the file. Once the file has been decompressed, the switch automatically resets.

Section II: Advanced Operations

168

AT-S62 User’s Guide

Downloading an AT-S62 Configuration File Switch to Switch

This procedure downloads a boot configuration file from the master

AT-8524M switch to another AT-8524M switch in an enhanced stack. The switch where you download the file will mark it as the active boot configuration file, and will automatically reset. Once the reset is complete, the switch will be operating with the parameter settings contained in the downloaded configuration file. For an explanation of

configuration files, refer to Working with Boot Configuration Files on page 149.

Note

This procedure can be performed from a local or Telnet management session.

Note

Once a configuration file has been downloaded onto a switch with this procedure, the unit automatically resets. Some network traffic may be lost while the switch reloads its operating software.

To download a boot configuration file on the master switch to another switch in an enhanced stack, perform the following procedure:

1. From the Main Menu, type 8 to select Enhanced Stacking.

The Enhanced Stacking menu is shown in Figure 5 on page 53.

2. From the Enhanced Stacking menu, type 2 to select Stacking Services.

Note

The “2 - Stacking Services” selection is available only on master switches.

The Stacking Services menu is shown in Figure 6 on page 54.

3. Type 1 to select Get/Refresh List of Switches. The master switch polls the network for all enhanced stacking switches in the subnet and displays the switches in the Stacking Services menu.

4. Type 5 to select Download Configuration.

The following prompt is displayed:

Enter the configuration file name ->

5. Enter the name of the configuration file on the master switch that you want to download. The name must include the suffix “.cfg”. (To view the names of the configuration files in the switch’s file system, refer to

Displaying System Files on page 158.)

Section II: Advanced Operations

169

Chapter 12: File Downloads and Uploads

After you enter a name, the following prompt is displayed:

Enter the list of switches ->

6. Enter the number (Num column in menu) of the AT-8524M switch where you want to download the configuration file. You can specify more than one switch at a time (for example, 2,4,5).

Note

An AT-8524M configuration file can be downloaded only onto other

AT-8524M switches. Do not attempt to download the file onto any other type of enhanced stacking switch.

The following prompt is displayed:

Do you want confirmation before downloading each switch -> [Yes/No]

7. If you answer Yes to this prompt, the management software prompts you with a confirmation message before downloading the file to a switch. If you answer No, the management software does not display a confirmation prompt before downloading.

The management software begins the download and notifies you when the download is complete. The configuration file is automatically designated as the new active boot configuration file on the switch, and the unit is reset. Once the reset is complete, the switch will be operating with the parameter settings in the configuration file that you downloaded onto it.

Section II: Advanced Operations

170

AT-S62 User’s Guide

Downloading a System File

This section contains the procedures for downloading a system file into the switch’s file system from a management workstation or TFTP server.

You can download any of the following files:

❑ Boot configuration file

❑ Public encryption key

❑ CA certificate

Note

CA certificates and key files are supported only on the version of

AT-S62 management software that features SSL, PKI, and SSH security.

This section contains the following two procedures:

❑ Downloading a System File from a Local Management Session on page 172

❑ Downloading a System File from a Telnet Management Session on page 175

You can use either Xmodem or TFTP when downloading files from a local management session. You must use TFTP when downloading files from a Telnet management session.

Caution

Do not use either of these procedures to download an AT-S62 image file onto a switch. Doing so will store the image file in the switch’s file

system. To download an AT-S62 image file, see Downloading the

AT-S62 Image File onto a Switch on page 161 or Downloading an

AT-S62 Image File Switch to Switch on page 167.

Here are guidelines for an Xmodem download:

❑ Xmodem can only download a file onto the switch on which you started the local management session. You cannot use Xmodem to download a file onto a switch accessed through enhanced stacking.

❑ The file to be downloaded must be stored on the computer or terminal connected to the RS232 Terminal Port on the switch.

Here are guidelines that apply to a TFTP download:

❑ There must be a node on your network that contains the TFTP

Section II: Advanced Operations

171

Chapter 12: File Downloads and Uploads server software and the file to be downloaded must be stored on the server.

❑ You should start the TFTP server software before you begin the download procedure.

❑ The switch on which you are downloading the file must have an IP address and subnet mask, such as a master switch of an enhanced stack. You cannot use TFTP on a slave switch, since that type of switch typically does not have an IP address. Rather, you would need to perform the download from a local management session of the switch using Xmodem.

Downloading a

System File from a Local

Management

Session

To download a system file onto a switch from a local management session using Xmodem or TFTP, perform the following procedure:

1. Establish a local management session on the switch where you want to download the system file.

2. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

3. From the System Administration menu, type 9 to select System

Utilities.

The System Utilities menu is shown in Figure 9 on page 64.

4. For the System Utilities menu, type 2 to select Downloads and

Uploads.

The Downloads and Uploads menu is shown in Figure 44 on page

162.

5. Type 3 to select Download a File.

The following prompt is displayed:

Download Method/Protocol [X-Xmodem, T-TFTP]:

6. To download a system file using Xmodem, go to Step 7. To download a file using TFTP, do the following: a. Type T.

The following prompt is displayed:

TFTP Server IP address: b. Enter the IP address of the TFTP server.

The following prompt is displayed:

Remote File Name:

Section II: Advanced Operations

172

Section II: Advanced Operations

AT-S62 User’s Guide c. Enter the directory path and file name of the system file on the

TFTP server to be downloaded to the switch. You can specify only one system file.

The following prompt is displayed:

Local File Name: d. Enter a name for the system file. This is the name that the switch will store the file as in its file system.

The following message is displayed:

Getting the file from Remote TFTP Server - Please wait ...

e. If you have not already, start the TFTP server software.

Once the switch has downloaded the system file, this message is displayed:

File received successfully!

7. To download a file using Xmodem, type X at the prompt displayed in

Step 5.

The following prompt is displayed:

Local File Name:

8. Enter a name for the system file. This is the name that the switch will store the file as in its file system.

The following prompt is displayed:

You are going to invoke the Xmodem download utility.

Do you wish to continue? [Yes/No]

Note: Please select 1K Xmodem protocol for faster download.

9. Type Y for Yes.

The prompt “Downloading” is displayed.

10. Begin the file transfer of the system file using the terminal emulator program.

Note

The transfer protocol must be Xmodem or 1K Xmodem.

Steps 11 through 14 illustrate how you would download a system file using the Hilgraeve HyperTerminal program.

173

Chapter 12: File Downloads and Uploads

11. From the HyperTerminal main window, select the Transfer menu.

Then select Send File from the pull-down menu, as shown in Figure

45.

Figure 48 Local Management Window

The Send File window is shown in Figure 46.

Figure 49 Send File Window

12. Click the Browse button and specify the location and system file to be downloaded onto the switch.

13. Click on the Protocol field and select as the transfer protocol either

Xmodem or, for a faster download, 1K XModem.

14. Click Send.

Section II: Advanced Operations

174

AT-S62 User’s Guide

The software immediately begins to download onto the switch. The

Xmodem File Send window in Figure 47 displays current status of the

software download. The download process takes a couple minutes to complete.

Figure 50 XModem File Send Window

The download is complete when the Downloads and Uploads menu is displayed.

Downloading a

System File from a Telnet

Management

Session

To download a system file onto a switch from a Telnet management session using TFTP, perform the following procedure:

1. Establish a Telnet management session on the switch where you intend to download the new management software.

2. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

3. From the System Administration menu, type 9 to select System

Utilities.

The System Utilities menu is shown in Figure 9 on page 64.

4. For the System Utilities menu, type 2 to select Downloads and

Uploads.

The Downloads and Uploads menu is shown in Figure 44 on page

162.

Section II: Advanced Operations

175

Chapter 12: File Downloads and Uploads

Note

Options 3 and 4 in the menu are described in Uploading a System

File on page 177.

5. Type 3 to select Download a File.

The following prompt is displayed:

Only TFTP downloads are available for a Telnet access

TFTP Server IP address:

6. Enter the IP address of the TFTP server.

The following prompt is displayed:

Remote File Name:

7. Enter the directory path and file name of the system file you want to download.

The following message is displayed:

Getting the file from Remote TFTP Server - Please wait ...

8. If you have not already, start the TFTP server software.

Once the switch has downloaded the system file, this message is displayed:

File received successfully!

Section II: Advanced Operations

176

AT-S62 User’s Guide

Uploading a System File

The procedures in this section are used to upload a system file from a switch to a computer or TFTP server. A system file can be any of the following:

❑ Boot configuration file

❑ Public key

❑ PKI certificate

❑ Certificate enrollment request

Note

The certificate file, certificate enrollment request file, and key file are supported only on the version of AT-S62 management software that features SSL and PKI security.

This section contains the following two procedures:

❑ Uploading a System File from a Local Management Session on page 178

❑ Uploading a System File from a Telnet Management Session on page 180

You can use either Xmodem or TFTP when uploading files from a local management session. You must use TFTP when uploading files from a

Telnet management session.

Here are guidelines for an Xmodem upload:

❑ Xmodem can upload a file only from the switch on which you started the local management session. You cannot use Xmodem to upload a file from a switch accessed through enhanced stacking.

Here are guidelines that apply to a TFTP upload:

❑ There must be a node on your network that contains the TFTP server software.

❑ You should start the TFTP server software before you begin the download procedure.

❑ The switch from which you are uploading the file must have an IP address and subnet mask, such as a master switch of an enhanced stack. You cannot use TFTP on a slave switch, since that type of switch typically does not have an IP address. Rather, you would

Section II: Advanced Operations

177

Chapter 12: File Downloads and Uploads need to perform the upload from a local management session of the switch using Xmodem.

Uploading a

System File from a Local

Management

Session

This procedure explains how to upload a system file from the switch to a workstation or TFTP server from a local management session using

Xmodem or TFTP. To upload a system file, perform the following procedure:

1. Establish a local management session on the switch where you want to upload the system file.

2. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

3. From the System Administration menu, type 9 to select System

Utilities.

The System Utilities menu is shown in Figure 9 on page 64.

4. For the System Utilities menu, type 2 to select Downloads and

Uploads.

The Downloads and Uploads menu is shown in Figure 44 on page

162.

5. Type 4 to select Upload a File.

The following prompt is displayed:

Upload Method/Protocol [X-Xmodem, T-TFTP]:

6. To upload a system file using Xmodem, go to Step 7. To upload a file using TFTP, do the following: a. Type T.

The following prompt is displayed:

TFTP Server IP address: b. Enter the IP address of the TFTP server.

The following prompt is displayed:

Remote File Name: c. Enter the directory path where you want the system file stored on the TFTP server along with a name for the file.

The following message is displayed:

Local File Name:

Section II: Advanced Operations

178

Section II: Advanced Operations

AT-S62 User’s Guide d. Enter the name of the system file on the switch that you want to upload to the TFTP server. You can specify only one file. You may not use wildcards.

The following message is displayed:

Sending the file to Remote TFTP Server - Please wait ...

Once the switch has uploaded the system file, this message is displayed:

File sent successfully!

The file is now stored on the TFTP server. You can now download the file onto another AT-8524M switch in your network.

7. To upload a file using Xmodem, type X at the prompt displayed in

Step 5.

The following message is displayed:

Local File Name:

8. Enter the name of the system file on the switch that you want to upload to your computer. You can specify only one file. You can not use wildcards.

The following prompt is displayed:

You are going to invoke the Xmodem download utility.

Do you wish to continue? [Yes/No]

Note: Please select 1K Xmodem protocol for faster download.

9. Type Y for Yes.

The following message is displayed:

Use Hyper Terminal's 'Transfer/Receive File' option to select Protocol

Note: Please select '1K Xmodem' protocol for faster upload...

10. Begin the file transfer.

Note

The transfer protocol must be Xmodem or 1K Xmodem.

Steps 11 through 14 illustrate how you would upload a file using the

Hilgraeve HyperTerminal program.

179

Chapter 12: File Downloads and Uploads

11. From the HyperTerminal main window, select the Transfer menu.

Then select Receive File from the pull-down menu, as shown in

Figure 51.

Figure 51 Local Management Window

The Receive File window is shown in Figure 52.

Figure 52 Receive File Window

12. Click the Browse button and specify the location on your computer where you want the system file stored.

13. Click on the Protocol field and select as the transfer protocol either

Xmodem or, for a faster download, 1K XModem.

14. Click Receive.

The switch uploads the file from the switch to your computer.

Uploading a

System File from a Telnet

Management

Session

To upload a system file from the switch using a Telnet management session and TFTP, perform the following procedure:

1. Establish a Telnet management session on the switch containing the system file you want to upload to the TFTP server.

2. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

3. From the System Administration menu, type 9 to select System

Utilities.

Section II: Advanced Operations

180

Section II: Advanced Operations

AT-S62 User’s Guide

The System Utilities menu is shown in Figure 9 on page 64.

4. For the System Utilities menu, type 2 to select Downloads and

Uploads.

The Downloads and Uploads menu is shown in Figure 44 on page

162.

5. Type 4 to select Upload a File.

The following prompt is displayed:

Only TFTP uploads are available for a Telnet access

TFTP Server IP address:

6. Enter the IP address of the TFTP server.

The following prompt is displayed:

Remote File Name:

7. Enter a name for the system file. This is the name the file will be stored as on the TFTP server.

The following message is displayed:

Local File Name:

8. Enter the name of the system file on the switch that you want to upload to the TFTP server. You can specify only one file. You can not use wildcards.

The following message is displayed:

Sending the file to Remote TFTP Server - Please wait

...

Once the switch has uploaded the system file, this message is displayed:

File sent successfully!

The file is now stored on the TFTP server. You can now download the file onto another AT-8524M switch in your network.

181

Chapter 13

Event Log

This chapter describes the event log. Sections in the chapter include:

❑ Event Log Overview on page 183

❑ Enabling or Disabling the Event Log on page 184

❑ Displaying Events on page 185

❑ Saving the Event Log on page 189

❑ Clearing the Event Log on page 190

182

AT-S62 User’s Guide

Event Log Overview

A managed switch is a complex piece of computer equipment that includes both hardware and software. Multiple software features operate simultaneously, interoperating with each other and processing large amounts of network traffic. It is often difficult to determine exactly what is happening when a switch appears not to be operating normally, or what happened when a problem occurs.

A network manager’s major task is to monitor the network functions and to deal with problems as they arise. The event log provides vital information about network activity on the AT-8524M switch that can help you identify and solve network problems. The information includes the time and date when an event occurred, the event’s severity, the

AT-S62 module that generated the event, and an event description.

The event log can store up to 4,000 entries. All events are purged from the log when the switch is reset or power cycled.

Note

The event log, even when disabled, will log all AT-S62 initialization events that occur whenever the switch is reset or power cycled. Any switch events that occur after AT-S62 initialization are entered into the log only if it is enabled. The default setting for the event log is enabled.

Allied Telesyn recommends setting the switch’s date and time if you intend to use the event log. Otherwise, the switch will not log the entries

with the correct date and time. For instructions, refer to Setting the

System Time on page 67.

Section II: Advanced Operations

183

Chapter 13: Event Log

Enabling or Disabling the Event Log

To enable or disable the event log, do the following:

1. From the Main Menu, type 5 to select System Administration.

2. From the System Administration menu, type 8 to select Event Log.

The Event Log menu is shown in Figure 53.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Event Log

1 - Event Logging..............Enabled

2 - Log Full Action............Wrap

3 - Display Output.............Temporary (Memory)

4 - Display Order..............Chronological

5 - Display Mode...............Normal

6 - Display Severity...........E,W,I

7 - Display Module.............All

C - Clear Log

S - Save Log to File

V - View Log

R - Return to Previous Menu

Enter your selection?

Figure 53 Event Log Menu

3. Type 1 to toggle Log Status between the two selections Enabled and

Disabled. If you enable the log, the system immediately begins to add events in the log. The default is enabled.

4. Type 2 to toggle Log Full Action between the two selections Wrap and Halt. The Wrap option causes the log to delete old entries as it adds new entries once it reaches its maximum capacity of 4,000 events. The Halt option causes the log to stop adding new entries once it reaches maximum capacity. The default is Wrap.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

To display the events in the log, go to the next procedure.

Section II: Advanced Operations

184

AT-S62 User’s Guide

Displaying Events

To view the event log, do the following:

1. From the Main Menu, type 5 to select System Administration.

2. From the System Administration menu, type 8 to select Event Log.

The Event Log menu is shown in Figure 53 on page 184.

3. Configure options 3 through 7 in the Event Log menu to specify the types of events you want to view. The options are described below:

3 - Display Output

Selects an event log. This option has only the one selection

Temporary. The event log is located in temporary memory.

4- Display Order

Controls the order of the events in the log. Choices are

Chronological, which displays the events in the order oldest to newest, and Reverse Chronological, which displays the events newest to oldest. The default is Chronological.

5 - Display Mode

Controls the format of the event log. Choices are Normal, which displays the time, module, severity, and description for each event, and Full, which displays the same information as Normal, plus filename, line number, and event ID. The default is Normal.

6 - Display Severity

Displays events of a selected severity. Choices are I for

Informational, E for Error, W for Warning, D for Debug, and ALL for

All. The default is informational, error, and warning. You can select more than one severity at a time (for example, E,W).

7 - Display Module

Displays events of a selected AT-S62 module. For a list of the

modules, refer to Modules on page 187. The default is ALL, which

displays the events for all modules.

4. Once you have set the log filters, type V to select View Log.

Section II: Advanced Operations

185

Chapter 13: Event Log

Figure 54 shows an example of the event log in the Full display

mode. The Normal display mode does not include the Filename,

Line Number, and Event ID items.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Event Log

S Date Time EventID Source File:Line Number

Event

------------------------------------------------------------------

I 2/01/04 09:11:02 073001 garpmain.c:259 garp: GARP initialized

I 2/01/04 09:55:15 083001 portconfig.c:961 pcfg: PortConfig initialized

I 2/01/04 10:22:11 063001 vlanapp.c:444 vlan: VLAN initialization succeeded

I 2/01/04 12:24:12 093001 mirrorapp.c:158 pmirr: Mirror initialization succeeded

I 2/01/04 12:47:08 043016 macapp.c:1431 mac: Delete Dynamic MAC by Port[2] succeeded

Temporary (Memory) Log Events 1 - 5 of 212

P - Previous Page N - Next Page F - First Page L - Last Page

R - Return to Previous Menu

Enter your selection?

I

E

W

Figure 54 Event Log Example

The columns in the log are described below:

❑ S (Severity) - The event’s severity. Table 6 defines the different

severity levels.

Table 6 Event Log Severity Levels

Value Severity Level Description

D

Error

Warning

Information

Debug

Switch operation is severely impaired.

An issue may require manager attention.

Useful information that can be ignored during normal operation.

Messages intended for Technical Support and Software Development.

Section II: Advanced Operations

186

AT-S62 User’s Guide

❑ Date/Time - The date and time the event occurred.

❑ Event - The module within the AT-S62 software that generated the event followed by a brief description of the event. For a list of

the AT-S62 modules, see Modules on page 187.

❑ Event ID - A unique number that identifies the event. (Displayed only in the Full display mode.)

❑ Filename and Line Number - The subpart of the AT-S62 module and the line number that generated the event. (Displayed only in the Full display mode.)

Modules

The Mod column in the event log displays an abbreviation of the AT-S62

software module that generated the event. Table 7 lists the modules and

their abbreviations.

Table 7 AT-S62 Modules

Module Name

GARP

HTTP

IGMP

IP

MAC

MGMACL

PACCESS

PCFG

ALL

ACL

CLI

DOS

ENCO

ESTACK

EVTLOG

FILE

Description

All modules

Port access control list

Command line interface commands

Denial of service defense

Encryption keys

Enhanced stacking

Event log

File system

GARP GVRP

Web server

IGMP snooping

Switch IP configuration, DHCP, and BOOTP

MAC address table

Management access control list

802.1x port-based access control

Port configuration

Section II: Advanced Operations

187

Chapter 13: Event Log

Module Name

PKI

PMIRR

PSEC

PTRUNK

QOS

RADIUS

SNMP

SSH

SSL

STP

SYSTEM

TACACS

Telnet

TFTP

Time

VLAN

Table 7 AT-S62 Modules

Description

Public Key Infrastructure

Port mirroring

Port security (MAC address-based)

Port trunking

Quality of Service

RADIUS authentication protocol

SNMP

Secure Shell protocol

Secure Sockets Layer protocol

Spanning Tree, Rapid Spanning, and Multiple

Spanning Tree protocols

Hardware status; Manager and Operator log in and log off events.

TACACS+ authentication protocol

Telnet

TFTP

SNTP

Port-based and tagged VLANs, and multiple

VLAN modes

Section II: Advanced Operations

188

AT-S62 User’s Guide

Saving the Event Log

The Event Log menu has the selection “S - Save Log to File” for saving the current contents of the log as a file in the file system. Once in the file system, you can either view it or download it to your management workstation. To use the option, first configure options 2 to 7 in the Event

Log menu to specify which log entries you want to save.

When you select the option, you are asked to specify a filename. The name can be up to 16 alphanumeric characters, followed by the extension “.log”.

For instructions on the AT-S62 file system, refer to Chapter 11, File

System.

Section II: Advanced Operations

189

Chapter 13: Event Log

Clearing the Event Log

To clear all events from the log, perform the following procedure:

1. From the Main menu, type 5 to select System Administration.

2. From the System Administration menu, type 8 to select Event Log.

The Event Log menu is shown in Figure 53 on page 184.

3. Type C to select Clear Log.

A confirmation prompt is displayed,

4. Type Y to clear the log or N to cancel the procedure.

The log, if enabled, will immediately begin to learn new events.

Section II: Advanced Operations

190

Chapter 14

Quality of Service

This chapter contains the procedures for configuring Quality of Service

(QoS). Sections in the chapter include:

❑ Quality of Service Overview on page 192

❑ Configuring CoS on page 196

❑ Mapping CoS Priorities to Egress Queues on page 200

❑ Configuring Egress Scheduling on page 201

❑ Displaying Port CoS Priorities on page 202

191

Chapter 14: Quality of Service

Quality of Service Overview

Class of Service

(CoS)

When a port on an Ethernet switch becomes oversubscribed—its egress queues contain more packets than the port can handle in a timely manner—the port may be forced to delay the transmission of some packets. This can result in the delay of packets reaching their destinations. A port may be forced to delay transmission of packets while it handles other traffic, and, in some situations, some packets destined to be forwarded to an oversubscribed port from other switch ports may be discarded.

Minor delays are often of no consequence to a network or its performance. But there are applications, referred to as delay or time sensitive applications, that can be impacted by packet delays. Voice transmission and video conferencing are two examples. If packets carrying data for either of these are delayed from reaching their destination, the audio or video quality may suffer.

This is where QoS is of value. It allows you to manage the flow of traffic through a switch by having the switch ports give higher priority to some packets, such as delay sensitive traffic, over other packets. This is referred to as prioritizing traffic.

QoS, as implemented in the AT-S62 management software, consists of the following two parts:

❑ Class of Service

❑ Scheduling

CoS applies primarily to tagged packets. A tagged packet, as explained

in Tagged VLAN Overview on page 395, contains information within it

that specifies the VLAN to which the packet belongs.

A tagged packet can also contain a priority level. This priority level is used by network switches and other networking devices to know how important (delay sensitive) that packet is compared to other packets.

Packets of a high priority are typically handled before packets of a low priority.

CoS, as defined in the IEEE 802.1p standard, has eight levels of priority.

The priorities are 0 to 7, with 0 the lowest priority and 7 the highest.

When a tagged packet is received on a port on the switch, it is examined by the AT-S62 software for its priority. The switch software uses the priority to determine which egress priority queue the packet should be directed to on the egress port.

Section II: Advanced Operations

192

Section II: Advanced Operations

AT-S62 User’s Guide

Each switch port has four egress queues. The queues are Q0, Q1, Q2, and

Q3. Q0 is the lowest priority queue and Q3 is the highest. A packet in a high priority egress queue is typically transmitted out a port sooner than a packet in a low priority queue.

Table 8 lists the mappings between the eight CoS priority levels and the

four egress queues of a switch port.

Table 8 Default Mappings of IEEE 802.1p Priority Levels to Priority Queues

IEEE 802.1p Priority

Level

0 or 1

2 or 3

4 or 5

6 or 7

Port Priority Queue

Q0 (lowest)

Q1

Q2

Q3 (highest)

For example, assume that a tagged packet with a priority level of 3 enters a port on the switch. The switch, after examining the packet’s destination address, determines that the packet is to be sent out port 6.

The switch must now determine in which of port 6’s egress queues the packet should be stored. It examines the priority level in the packet, which is 3. Now the switch knows to store the packet in port 6’s Q1 egress queue.

You can change these mappings. For example, you might decide that packets with a priority of 5 need to be handled by egress queue Q3 and packets with a priority of 2 should be handled in Q0. The result is shown

in Table 9.

Table 9 Example of Customized CoS Mappings to Priority Queues

IEEE 802.1p Priority

Level

0, 1, or 2

3

4

5, 6, or 7

AT-S62 Priority Queue

Q0 (lowest)

Q1

Q2

Q3 (highest)

The procedure for changing the default mappings is found in Mapping

CoS Priorities to Egress Queues on page 200. Note that because all ports

must use the same priority-to-egress queue mappings, these mappings are applied at the switch level. They cannot be set on a per-port basis.

193

Chapter 14: Quality of Service

You can configure a port to completely ignore the priority levels in its tagged packets and store all the packets in the same egress queue. For instance, perhaps you decide that all tagged packets received on port 4 should be stored in the egress port’s Q3 egress queue, regardless of the priority level in the packets themselves. The procedure for overriding

priority levels is explained in Configuring CoS on page 196.

CoS relates primarily to tagged packets rather than untagged packets because untagged packets do not contain a priority level. By default, all untagged packets are placed in a port’s Q0 egress queue, the queue with the lowest priority. But you can override this and instruct a port’s untagged frames to be stored in a higher priority queue. The procedure

for this is also explained in Configuring CoS on page 196.

One last thing to note is that the AT-S62 software does not change the priority level in a tagged packet. The packet leaves the switch with the same priority it had when it entered. This is true even if you change the default priority-to-egress queue mappings.

Scheduling

A switch port needs a mechanism for knowing the order in which it should handle the packets in its four egress queues. For example, if all the queues contain packets, should the port transmit all packets from

Q3, the highest priority queue, before moving on to the other queues, or should it instead just do a few packets from each queue and, if so, how many?

This control mechanism is called scheduling. Scheduling determines the order in which a port handles the packets in its egress queues. The

AT-S62 software has two types of scheduling:

❑ Strict priority

❑ Weighted round robin priority

Note

Scheduling is set at the switch level. You cannot set this on a perport basis.

Strict Priority Scheduling

With this type of scheduling, a port transmits all packets out of higher priority queues before it transmits any from the low priority queues. For instance, as long as there are packets in Q3 it does not handle any packets in Q2.

The value to this type of scheduling is that high priority packets are always handled before low priority packets.

Section II: Advanced Operations

194

Section II: Advanced Operations

AT-S62 User’s Guide

The problem with this method is that some low priority packets might never be transmitted out the port because a port might never get to the low priority queues. A port handling a large volume of high priority traffic may be so busy transmitting that traffic that it never has an opportunity to get to any packets that are stored in its low priority queues.

Weighted Round Robin Priority Scheduling

The weighted round robin scheduling method functions as its name implies. The port transmits a set number of packets from each queue, in a round robin fashion, so that each has a chance to transmit traffic. This method guarantees that every queue receives some attention from the port for transmitting packets.

To use this scheduling method, you need to specify the maximum number of packets a port should transmit from a queue before moving to the next queue. This is referred to as specifying the “weight” of a queue. In all likelihood, you will want to give greater weight to the packets in the higher priority queues over the lower queues.

Table 10 shows an example.

Table 10 Example of Weighted Round Robin Priority

Port Egress Queue

Q3

Q2

Q1

Q0

Maximum Number of

Packets

5

1

15

10

In this example, the port transmits a maximum number of 15 packets from Q3 before moving to Q2, from which it transmits up to 10 packets, and so forth.

195

Chapter 14: Quality of Service

Configuring CoS

As explained in Quality of Service Overview on page 192, a tagged

packet received on a port is placed it into one of four priority queues on the egress port according to the switch’s mapping of 802.1p priority levels to egress priority queues. The default mappings are shown in

Table 8 on page 193.

However, you can override the mappings at the port level so that all tagged packets are placed into a specific egress priority queue regardless of the priority level in the packets themselves.

Note that this determination is made when a packet is received on the ingress port and before the frame is forwarded to the egress port.

Consequently, you need to configure this feature on the ingress port.

For example, when you configure a switch port so that all ingress tagged frames are handled by the egress priority queue Q2, all tagged frames received on the port are directed to the Q2 priority egress queue on the egress ports.

You can also use CoS to control which priority queue handles untagged frames that ingress a port. By default, untagged frames (that is, frames without VLAN or priority level information) are automatically assigned to

Q0, the lowest priority queue. But you can configure CoS on a port so that all untagged frames received on the port are directed to one of the other queues.

To configure CoS for a port, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Security and Services

1 - Port Access Control (802.1X)

2 - Denial of Service (DoS)

3 - Class of Service (CoS)

4 - Keys/Certificates Configuration

5 - Secure Shell (SSH)

6 - Secure Socket Layer (SSL)

R - Return to Previous Menu

Enter your selection?

Figure 55 Security and Services Menu

Section II: Advanced Operations

196

Section II: Advanced Operations

AT-S62 User’s Guide

Note

Options 4, 5, and 6 are not available in all versions of the AT-S62 management software. Contact your sales representative to determine if these features are available in your locale.

2. From the Security and Services menu, type 3 to select Class of Service

(CoS).

The Class of Service (CoS) menu is shown in Figure 56.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

Class of Service (CoS)

Number of CoS Queues: 4

1 - Configure Port CoS Priorities

2 - Map CoS Priority to Egress Queue

3 - Configure Egress Scheduling

4 - Show Port CoS Priorities

R - Return to Previous Menu

Enter your selection?

Figure 56 Class of Service (CoS) Menu

The “Number of CoS Queues” line indicates the number of egress queues each port has. On the AT-8524M switch, there are four queues per port. This value cannot be changed.

3. From the Class of Service menu, type 1 to select Configure Port CoS

Priorities.

The following prompt is displayed:

Enter port number -> [1 to 24] ->

4. Enter the number of the port on the switch where you want to configure CoS. You can specify only one port at a time.

197

Chapter 14: Quality of Service

The Configure Port COS Priorities menu is shown in Figure 57.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

Configure Port COS Priorities

1 - Port Number ................... 1

2 - Priority (0-7) 0=Low 7=High ... 0

3 - Override Priority (Y/N) ....... N

C - Configure COS Priorities

R - Return to Previous Menu

Enter your selection?

Figure 57 Configure Port COS Priorities Menu

Menu option 1 cannot be changed.

5. Type 2 to select Priority (0 - 7). The following prompt is displayed:

Enter new value -> [0 to 7]

6. Enter a value from 1 to 7 that corresponds to the egress queue where you want all untagged frames received on the port to be stored. For example, if you want all ingress untagged packets received on the port stored in egress queue Q2, enter 4 or 5. The default is 0, which corresponds to Q0. (If you perform Step 6 and override the priority level in tagged packets, this queue will also be used to store all tagged

packets.) The values are listed in Table 11.

Table 11 Default Mappings of Priority Levels to Priority Queues

Value Egress Queue

0 or 1

2 or 3

Q0

Q1

4 or 5 Q2

6 or 7 Q3

7. If you are configuring a tagged port and you want the switch to ignore the priority tag in ingress tagged frames, type 3 to select

Override Priority and type Y.

All ingress tagged frames are directed to the queue specified in Step

6.

Section II: Advanced Operations

198

AT-S62 User’s Guide

Note

The tagged information in a frame is not changed as the frame traverses the switch. A tagged frame leaves a switch with the same priority level that it had when it entered.

The default for this parameter is No, meaning that the priority level of tagged frames is determined by the priority level specified in the frame itself.

8. Type C to select Configure Port COS Priorities.

A change to a port CoS setting is immediately activated on the port.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section II: Advanced Operations

199

Chapter 14: Quality of Service

Mapping CoS Priorities to Egress Queues

This procedure explains how to change the default mappings of CoS

priorities to egress priority queues, shown in Table 10 on page 195. This

is set at the switch level. You cannot set this at the per-port level.

To change the mappings, perform the following procedure.

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page 196.

2. From the Security and Services menu, type 3 to select Class of Service

(CoS).

The Class of Service (CoS) menu is shown in Figure 56 on page 197.

3. From the Class of Service (CoS) menu, type 2 to select Map CoS

Priority to Egress Queue.

The Map CoS Priority to Egress Queue menu is shown in Figure 58.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

Map CoS Priority to Egress Queue

1 - CoS 0 Priority Queue ...... Q0

2 - CoS 1 Priority Queue ...... Q0

3 - CoS 2 Priority Queue ...... Q1

4 - CoS 3 Priority Queue ...... Q1

5 - CoS 4 Priority Queue ...... Q2

6 - CoS 5 Priority Queue ...... Q2

7 - CoS 6 Priority Queue ...... Q3

8 - CoS 7 Priority Queue ...... Q3

R - Return to Previous Menu

Enter your selection?

Figure 58 Map CoS Priority to Egress Queue Menu

4. Type the number of the CoS priority whose queue assignment you want to change. This toggles the queue value through the possible queue settings.

For example, to direct all tagged packets with a CoS priority of 5 to egress queue Q3, you would toggle 6 until the CoS 5 Priority Queue value reads Q3.

5. If desired, repeat Step 3 to change the queue assignments of other

CoS priorities.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section II: Advanced Operations

200

AT-S62 User’s Guide

Configuring Egress Scheduling

This procedure explains how to select and configure a scheduling method for Class of Service. Scheduling determines the order in which the ports handle packets in their egress queues. For an explanation of

the two scheduling methods, refer to Scheduling on page 194.

Scheduling is set at the switch level. You cannot set this on a per-port basis.

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page 196.

2. From the Security and Services menu, type 3 to select Class of Service

(CoS).

The Class of Service (CoS) menu is shown in Figure 56 on page 197.

3. From the Class of Service (CoS) menu, type 3 to select Configure

Egress Scheduling.

The Configure Egress Scheduling menu is shown in Figure 59.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

Configure Egress Scheduling

1 - Scheduling Mode ............ Strict Priority

2 - Queue 0 Weight ............. 0

3 - Queue 1 Weight ............. 0

4 - Queue 2 Weight ............. 0

5 - Queue 3 Weight ............. 0

R - Return to Previous Menu

Enter your selection?

Figure 59 Configure Egress Scheduling Menu

Section II: Advanced Operations

4. Type 1 to toggle Scheduling Mode between its two possible settings.

The default setting is Strict Priority.

If you select Strict Priority, skip the next step. Options 2 through 5 in the menu do not apply to Strict Priority scheduling.

5. If you select Weighted Round Robin Priority as the scheduling method, select menu options 2 through 5 and specify the maximum number of packets you want a port to transmit from each queue before it moves to the next queue. The range is 0 to 255. For an

example, refer to Table 10 on page 195. The default value of 1 for each

queue gives all egress queues the same weight.

6. Return to the Main Menu and type S to select Save Configuration

Changes.

201

Chapter 14: Quality of Service

Displaying Port CoS Priorities

The following procedure displays a menu that lists the current egress priority queue settings for each port.

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page 196.

2. From the Security and Services menu, type 3 to select Class of Service

(CoS).

The Class of Service (CoS) menu is shown in Figure 56 on page 197.

3. From the Class of Service (CoS) menu, type 4 to select Show Port CoS

Priorities.

The Show Port CoS Priorities menu is shown in Figure 60.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Show Port CoS Priorities

Port PVID Priority Override Priority

---------------------------------------------

01

02

03

04

05

06

07

1

1

1

1

1

1

1

0

0

0

0

0

0

0

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

No

No

No

No

No

No

No

Figure 60 Show Port CoS Priorities Menu

The PVID column displays the current PVID value for each switch port.

Section II: Advanced Operations

202

Chapter 15

IGMP Snooping

This chapter explains how to activate and configure the Internet Group

Management Protocol (IGMP) snooping feature on the switch. Sections in the chapter include:

❑ IGMP Snooping Overview on page 204

❑ Activating IGMP Snooping on page 206

❑ Displaying a List of Host Nodes on page 209

❑ Displaying a List of Multicast Routers on page 211

203

Chapter 15: IGMP Snooping

IGMP Snooping Overview

IGMP snooping is best explained by first defining IGMP. This protocol enables routers to create lists of nodes that are members of multicast groups. (A multicast group is a group of end nodes that want to receive multicast packets from a multicast application.) The router creates a multicast membership list by periodically sending out queries to the local area networks connected to its ports.

A node wanting to become a member of a particular multicast group responds to a query by sending a report. A report indicates an end node’s desire to become a member of a multicast group. Nodes that join a multicast group are referred to as host nodes. After it has become a member of a multicast group, a host node must continue to periodically issue reports to remain a member.

After the router has received a report from a host node, it notes the multicast group that the host node wants to join and the port on the router where the node is located. Any multicast packets belonging to that multicast group are then forwarded by the router out the port. If a particular port on the router has no nodes that want to be members of multicast groups, the router does not send multicast packets out the port. This improves network performance by restricting multicast packets only to router ports where host nodes are located.

There are three versions of IGMP. The AT-8524M switch supports IGMP

Version 1 and Version 2. One of the differences between the two versions is how a host node signals that it no longer wants to be a member of a multicast group. In Version 1 it simply stops sending reports. If a router does not receive a report from a host node after a predefined length of time, referred to as a time-out value, it assumes that the host node no longer wants to receive multicast frames, and removes it from the membership list of the multicast group.

In Version 2 a host node exits from a multicast group by sending a leave

request. After a router receives a leave request from a host node, it promptly removes the node from appropriate membership list. The router also stops sending multicast packets out the port to which the node is connected if it determines there are no further host nodes on the port.

IGMP snooping enables the switch to monitor the flow of queries from a router and reports from host nodes to build its own multicast membership lists. It uses the lists to forward multicast packets only to switch ports where there are host nodes that are members of multicast groups. This improves switch performance and network security by restricting the flow of multicast packets only to those switch ports connected to host nodes.

Section II: Advanced Operations

204

AT-S62 User’s Guide

Without IGMP snooping a switch would be obligated to flood multicast packets out all of its ports, except the port on which it received the packet. Such flooding of packets can negatively impact switch and network performance.

The AT-8524M switch maintains its list of multicast groups through an adjustable timeout value, which controls how frequently it expects to see reports from end nodes that want to remain members of multicast groups, and by processing leave requests.

Note

By default, IGMP snooping is disabled on the switch.

Section II: Advanced Operations

205

Chapter 15: IGMP Snooping

Activating IGMP Snooping

To activate or deactivate IGMP snooping on the switch and to configure

IGMP snooping parameters, perform the following procedure:

1. From the Main Menu, type 6 to select Advanced Configuration.

The Multicast Configuration menu is shown in Figure 61.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Advanced Configuration

1 - IGMP Snooping Configuration

R - Return to Previous Menu

Enter your selection?

Figure 61 Advanced Configuration Menu

2. From the Advanced Configuration menu, type 1 to select IGMP

Snooping Configuration.

The IGMP Snooping Configuration menu is shown in Figure 62.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

IGMP Snooping Configuration

1 - IGMP Snooping Status ......... Disabled

2 - Multicast Host Topology ...... Single-Host/Port (Edge)

3 - Host/Router Timeout Interval . 260 seconds

4 - Maximum Multicast Groups ..... 64

5 - Multicast Router Port(s) ..... Auto Detect

6 - View Multicast Hosts List

7 - View Multicast Routers List

R - Return to Previous Men

Enter your selection?

Figure 62 IGMP Snooping Configuration Menu

Section II: Advanced Operations

206

Section II: Advanced Operations

AT-S62 User’s Guide

The options in the menu are defined below:

1 - IGMP Snooping Status

Enables and disables IGMP snooping on the switch. After selecting this option, type E to enable or D to disable this feature.

2 - Multicast Host Topology

Defines whether there is only one host node per switch port or multiple host nodes per port. Possible settings are Single-Host/Port

(Edge) and Multiple Host/Ports (Intermediate).

The Single-Host/Port setting is appropriate when there is only one host node connected to each port on the switch. This setting causes the switch to immediately stop sending multicast packets out a switch port when a host node signals its desire to leave a multicast group by sending a leave request or when the host node stops sending reports. The switch responds by immediately ceasing the transmission of additional multicast packets out the port where the host node is connected.

The Multi-Host setting is appropriate if there is more than one host node connected to a switch port, such as when a port is connected to an Ethernet hub to which multiple host nodes are connected. With this setting selected the switch continues sending multicast packets out a port even after it receives a leave request from a host node on the port. This ensures that the remaining active host nodes on the port will continue to receive the multicast packets. Only after all the host nodes connected to a switch port have transmitted leave requests or have timed out will the switch stop sending multicast packets out the port.

If a switch has a mixture of host nodes, that is, some connected directly to the switch and others through an Ethernet hub, you should select the Multi-Host Port (Intermediate) selection.

3 - Host/Router Timeout Interval

Specifies the time period in seconds at which the switch determines that a host node has become inactive. An inactive host node is a node that has not sent an IGMP report during the specified time interval.

The range is from 1 second to 86,400 seconds (24 hours). The default is 260 seconds.

This parameter also specifies the time interval used by the switch in determining whether a multicast router is still active. The switch makes the determination by watching for queries from the router. If the switch does not detect any queries from a multicast router during the specified time interval, it assumes that the router is no longer active on the port.

207

Chapter 15: IGMP Snooping

When selecting a value for this parameter, it is important to note that the value you enter actually defines the approximate mid-point of a range within which a timeout can occur. Consequently, an actual timeout may occur earlier or later than the value that you enter. The range is from 0.7 to 1.4 of your value. For example, if you leave this parameter set to the default 260 seconds, a timeout can occur from

182 seconds to 364 seconds. You may need to take this into account when setting this parameter.

4 - Maximum Multicast Groups

Specifies the maximum number of multicast groups the switch will learn. This parameter is useful with networks that contain a large number of multicast groups. You can use the parameter to prevent the switch’s MAC address table from filling up with multicast addresses, leaving no room for dynamic or static MAC addresses. The range is 1 to 255 groups. The default is 64 multicast groups.

5 - Multicast Router Port(s)

Specifies the port on the switch to which a multicast router is detected. You can let the switch determine this automatically by selecting Auto Detect, or you can specify the port yourself by entering a port number. To select Auto Detect, enter “0” (zero) for this parameter. You can specify more than one port.

Your changes are immediately activated on the switch.

Note

Option “6 - View Multicast Hosts List” is described in Displaying a List of Host Nodes, next. Option “7 - View Multicast Routers List” is

described in Displaying a List of Multicast Routers on page 211.

3. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section II: Advanced Operations

208

AT-S62 User’s Guide

Displaying a List of Host Nodes

You can use the AT-S62 software to display a list of the multicast groups on a switch, as well as the host nodes. To display the list, perform the following procedure:

1. From the Main Menu, type 6 to select Advanced Configuration.

The Advanced Configuration menu is shown in Figure 61 on page

206.

2. From the Advanced Configuration menu, type 1 to select IGMP

Snooping Configuration.

The IGMP Snooping Configuration menu is shown in Figure 62 on page 206.

3. From the IGMP Snooping Configuration menu, type 6 to select View

Multicast Host List.

The View Multicast Host List is shown in Figure 63.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

View Multicast Hosts List

Number of Multicast Groups: 0

MulticastGroup VLAN ID Member Port/TrunkIDHostIP Status

------------------------------------------------------------

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 63 View Multicast Hosts List Menu

The information in this menu is for viewing purposes only. The columns are defined below:

Multicast Group - The multicast address of the group.

VLAN ID - The VID of the VLAN in which the port is an untagged member.

Member Port/TrunkID - The port on the switch to which a host node of the multicast group is connected. If the host node is connected to the switch through a trunk, the trunk ID number, not the port number, is displayed.

Section II: Advanced Operations

209

Chapter 15: IGMP Snooping

HostIP - The IP address of the host node connected to the port.

Status - The status of the host node. The options are:

Active: The host node is an active member of the group.

Left Group: The host node has recently left the group.

Section II: Advanced Operations

210

AT-S62 User’s Guide

Displaying a List of Multicast Routers

A multicast router is a router that is receiving multicast packets from a multicast application and transmitting the packets to host nodes. You can use the AT-S62 software to display a list of the multicast routers that are connected to the switch.

To display a list of the multicast routers, perform the following procedure:

1. From the Main Menu, type 6 to select Advanced Configuration.

The Advanced Configuration menu is shown in Figure 61 on page

206.

2. From the Advanced Configuration menu, type 1 to select IGMP

Snooping Configuration.

The IGMP Snooping Configuration menu is shown in Figure 62 on page 206.

3. From the IGMP Snooping Configuration menu, type 7 to select View

Multicast Routers List. The View Multicast Routers List menu is shown

in Figure 64.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

View Multicast Routers List

VLAN Port/TrunkID RouterIP

------------------------------------------------

U - Update Display

R - Return to Previous Menu

Section II: Advanced Operations

Enter your selection?

Figure 64 View Multicast Routers List Menu

The information in this menu is for viewing purposes only. The columns are defined below:

VLAN

The VID of the VLAN in which the port is an untagged member.

Port

The port on the switch where the multicast router is connected. If the switch learned the router on a port trunk, the trunk ID number, not the port number, is displayed.

Router IP

The IP address of the multicast router.

211

Chapter 16

Denial of Service Defense

This chapter contains procedures on how to configure the switch to protect your network against Denial of Service (DoS) attacks. Sections in the chapter include:

❑ Denial of Service Defense Overview on page 213

❑ Enabling or Disabling Denial of Service Prevention on page 218

212

AT-S62 User’s Guide

Denial of Service Defense Overview

The AT-S62 management software can help protect your network against the following types of Denial of Service attacks.

❑ SYN Flood Attack

❑ SMURF Attack

❑ Land Attack

❑ Teardrop Attack

❑ Ping of Death Attack

❑ IP Options Attack

The following subsections briefly describe each type of attack and the mechanism employed by the AT-S62 management software to protect your network.

Note

Be sure to read the following descriptions before implementing a

DoS defense on a switch. Some defense mechanisms are CPU intensive and can impact switch behavior.

SYN Flood

Attack

In this type of attack, an attacker sends a large number of TCP connection requests (TCP SYN packets) with bogus source addresses to the victim. The victim responds with acknowledgements (SYN ACK packets), but since the original source addresses are bogus, the victim node does not receive any replies. If the attacker sends enough requests in a short enough period, the victim may freeze operations when the number of requests exceeds the capacity of its connections queue.

To defend against this form of attack, a switch port monitors the number of ingress TCP connection requests it receives. If a port receives more than 60 requests per second, the following occurs.

❑ The switch sends a SNMP trap to the management workstations

❑ The port discards all ingress TCP-SYN packets for one minute.

However, the port continues to allow existing TCP connections to go through.

This defense mechanism does not involve the switch’s CPU. You can activate it on as many ports as you want without it impacting switch performance.

Section II: Advanced Operations 213

Chapter 16: Denial of Service Defense

SMURF Attack

This DoS attack is instigated by an attacker sending a ICMP Echo (Ping) request containing a broadcast address as the destination address and the address of the victim as the source of the ICMP Echo (Ping) request.

This overwhelms the victim with a large number of ICMP Echo (Ping) replies from the other network nodes.

A switch port defends against this form of attack by examining the destination addresses of ingress ICMP Echo (Ping) request packets and discarding those that contain a broadcast address as a destination address.

Implementing this defense requires providing an IP address of a node on your network and a subnet mask. The switch will use the two to determine the broadcast address of your network.

This defense mechanism does not involve the switch’s CPU. You can activate it on as many ports as you want without having it negatively impact switch performance.

Land Attack

In this attack, an attacker sends a bogus IP packet where the source and destination IP addresses are the same. This leaves the victim thinking that it is sending a message to itself.

The most direct approach for defending against this form of attack would be for the AT-S62 management software to check the source and destination IP addresses in the IP packets, searching for and discarding those with identical source and destination addresses. But this would require too much processing by the switch’s CPU, and would adversely impact switch performance.

Instead, the switch examines the IP packets that are entering or leaving your network. IP packets generated within your network and containing a local IP address as the destination address are not allowed to leave the network, while IP packets generated outside the network but containing a local IP address as the source address are not allowed into the network.

In order for this defense mechanism to work, you need to specify an uplink port. This is the port on the switch that is connected to the device, such as a DSL router, that leads outside your network. You can specify only one uplink port.

You will also need to specify an IP address of one of your network nodes and a subnet mask. The management software uses the two to determine which addresses are local to your network and which are not.

Note

This defense mechanism should only be used if there is a port on the switch that is connected to a device that leads outside your network.

Section II: Advanced Operations 214

AT-S62 User’s Guide

Here is a overview of how the process takes place. This example assumes that you have activated the feature on port 4 and that you have specified port 1 as the uplink port. The steps below review what happens when an ingress IP packet arrives on port 4:

1. When port 4 receives an ingress IP packet with a destination MAC address learned on uplink port 1, it examines the packet’s destination

IP addresses before forwarding the packet.

2. If the destination IP address is local to the network, port 4 does not forward the packet to uplink port 1 because the port assumes that there is no reason for the packet to leave the network. Instead, it discards the packet.

3. If the destination IP address is not local to the network, port 4 forwards the packet to uplink port 1.

Here is a review of how the process takes place when an ingress IP packet arrives on uplink port 1 that is destined for port 4:

1. When uplink port 1 receives an ingress IP packet with a destination

MAC address that was learned on port 4, it examines the packet’s source IP address before forwarding the packet.

2. If the source IP address is local to the network, uplink port 1 does not forward the packet to port 4 because it assumes that a packet with a source IP address that is local to the network should not be entering the network from outside the network.

3. If the source IP address is not local to the network, port 1 forwards the packet to port 4.

Here are some guidelines to using this defense:

❑ If you choose to use it, Allied Telesyn recommends activating it on all ports on the switch, including the uplink port.

❑ You can specify only one uplink port.

This form of defense is not CPU intensive. Activating it on all ports should not affect switch behavior.

Teardrop Attack

An attacker sends an IP packet in several fragments with a bogus offset value, used to reconstruct the packet, in one of the fragments to a victim.

The victim is unable to reassemble the packet, possibly causing it to freeze operations.

The defense mechanism for this type of attack has all ingress IP traffic received on a port sent to the switch’s CPU. The CPU samples related, consecutive fragments, checking for fragments with invalid offset values.

Section II: Advanced Operations 215

Chapter 16: Denial of Service Defense

If one is found, the following occurs:

❑ The switch sends a SNMP trap to the management workstations.

❑ The switch port discards the fragment with the invalid offset and, for a one minute period, discards all ingress fragmented IP traffic.

Because the CPU only samples the ingress IP traffic, this defense mechanism may catch some, though not necessarily, all of this form of attack.

Caution

This defense is extremely CPU intensive; use with caution.

Unrestricted use can cause a switch to halt operations should the

CPU become overwhelmed with IP traffic. To prevent this, Allied

Telesyn recommends activating this defense on only one switch port at a time.

Ping of Death

Attack

The attacker sends an oversized, fragmented ICMP Echo (Ping) request

(greater than 65,535 bits) to the victim, which, if lacking a policy for handling oversized packets, may freeze.

To defend against this form of attack, a switch port searches for the last fragment of a fragmented ICMP Echo (Ping) request and examines its offset to determine if the packet size is greater than 63,488 bits. If it is, the fragment is forwarded to the switch’s CPU for final packet size determination. If the switch determines that the packet is oversized, the following occurs:

❑ The switch sends a SNMP trap to the management workstations.

❑ The switch port discards the fragment and, for one minute, discards all fragmented ingress ICMP Echo (Ping) requests.

Note

This defense mechanism requires some involvement by the switch’s

CPU, though not as much as the Teardrop defense. This will not impact the forwarding of traffic between the switch ports, but it can affect the handling of CPU events, such as the processing of IGMP packets and spanning tree BPDUs. For this reason, Allied Telesyn recommends limiting the use of this defense, activating it only on those ports where an attack is most likely to originate.

Also note that an attacker can circumvent the defense by sending a stream of ICMP Echo (Ping) requests with a size of 63,488 to 65,534 bits.

A large number of requests could overwhelm the switch’s CPU.

Section II: Advanced Operations 216

AT-S62 User’s Guide

IP Options

Attack

In the basic scenario of an IP attack, an attacker sends packets containing bad IP options. There are several different types of IP option attacks and the AT-S62 management software does not distinguish between them.

The defense mechanism counts the number of ingress IP packets containing IP options received on a port. If the number exceeds 20 packets per second, the switch considers this a possible IP options attack and does the following occurs:

❑ It sends a SNMP trap to the management workstations.

❑ The switch port discards all ingress packets containing IP options for one minute.

This defense mechanism does not involve the switch’s CPU. You can activate it on as many ports as you want without it impacting switch performance.

Note

This defense does not actually check IP packets for bad IP options.

Consequently, it can only alert you to a possible attack.

Denial of

Service Defense

Guidelines

Below are guidelines to observe when using this feature:

❑ A switch port can support more than one DoS defense at a time.

❑ The Teardrop and the Ping of Death defenses are CPU intensive.

Use these defenses with caution.

❑ Some defenses allow you to specify a mirror port where offending traffic is copied.

Section II: Advanced Operations 217

Chapter 16: Denial of Service Defense

Enabling or Disabling Denial of Service Prevention

To configure DoS defense, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page

196.

2. From the Security and Services menu, type 2 to select Denial of

Service (DoS).

The Denial of Service (DoS) Menu is shown in Figure 65.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

DoS Menu

1 - Lan IP Subnet

2 - SYN Flood Configuration

3 - Smurf Configuration

4 - Land Configuration

5 - Teardrop Configuration

6 - Ping Of Death Configuration

7 - IP Option Configuration

R - Return to Previous Menu

Enter your selection?

Figure 65 Denial of Service (DoS) Menu

3. If you are implementing the SMURF or Land defense, you must provide the IP address of a node connected to the switch and a subnet mask. For the Land defense, you must also specify an uplink port. To do this, complete the following steps. Otherwise, skip ahead to Step 4.

a. Type 1 to select Lan IP Subnet.

Section II: Advanced Operations 218

Section II: Advanced Operations

AT-S62 User’s Guide

The LAN IP Subnet menu is shown in Figure 66.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Lan IP Subnet

1 - IP Address ................. 0.0.0.0

2 - Subnet Mask ................ 0.0.0.0

3 - Uplink Port ................ 26

R - Return to Previous Menu

Enter your selection?

Figure 66 LAN IP Subnet Menu b. Type 1 to select IP Address and, when prompted, enter the IP address of one of the devices connected to the switch, preferably the lowest IP address.

c. Type 2 to select Subnet Mask and enter the mask. A binary “1” indicates the switch should filter on the corresponding bit of the

IP address, while a “0” indicates that it should not. As an example, assume that the devices connected to a switch are using the IP address range 149.11.11.1 to 149.11.11.50. The mask would be

0.0.0.63.

d. If you are activating the Land defense, type 3 to select Uplink Port and enter the number of the port connected to the device (e.g.,

DSL router) that leads outside your network. You can specify only one uplink port.

e. Type R to return to the Denial of Service (DoS) Configuration menu and continue with the next step.

4. Type the number of the DoS attack that you want to enable or disable.

5. When prompted, enter the port(s) where you want to enable or disable a defense mechanism.

Note

If you plan to use the Teardrop defense, Allied Telesyn recommends activating it on only the uplink port and one other port. The defense is CPU intensive and can overwhelm the switch’s CPU.

219

Chapter 16: Denial of Service Defense

A menu is displayed containing either one or two options, depending on the DoS defense you selected. An example of the

menu is shown in Figure 67.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

SYN Flood Configuration

Configuring DoS for Port 2

1 - DoS Status ................. Disabled

R - Return to Previous Menu

Enter your selection?

Figure 67 SYN Flood Configuration Menu

6. Adjust the parameter settings as needed. The parameters are defined below.

DoS Status

Enables and disables the selected DoS defense on the selected ports. The default is disabled.

Mirror Port

This option appears for Land, Tear Drop, Ping of Death, and IP

Options. You can use this option to copy offending traffic to another port on the switch. You can specify only one mirror port.

Specifying a mirror port is not required.

7. Repeat this procedure starting with Step 3 to configure other DoS defenses.

8. Return to the Main Menu and type S to select Save Configuration

Changes.

Section II: Advanced Operations 220

Section III

SNMPv3 Operations

This section contains the following chapter:

❑ Chapter 17: SNMPv3 Configuration on page 222

221

Chapter 17

SNMPv3 Configuration

This chapter provides a description of the AT-S62 implementation of the

SNMPv3 protocol. In addition, it provides procedures that allow you to create and modify SNMPv3 users. The following sections are provided:

❑ SNMPv3 Overview on page 223

❑ Configuring the SNMPv3 Protocol on page 233

❑ Configuring the SNMPv3 User Table on page 234

❑ Configuring the SNMPv3 View Table on page 244

❑ Configuring the SNMPv3 Access Table on page 253

❑ Configuring the SNMPv3 SecurityToGroup Table on page 268

❑ Configuring the SNMPv3 Notify Table on page 276

❑ Configuring the SNMPv3 Target Address Table on page 283

❑ Configuring the SNMPv3 Target Parameters Table on page 296

❑ Configuring the SNMPv3 Community Table on page 309

❑ Displaying SNMPv3 Table Menus on page 319

Note

Several SNMPv3 parameters appear only in the AT-S62 version 1.1.1 software.

222

AT-S62 User’s Guide

SNMPv3 Overview

The SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c

protocol implementation which is described in Chapter 5: SNMPv1 and

SNMPv2c Configuration on page 81. In the SNMPv3 protocol, User-based

Security Model (USM) authentication is implemented along with encryption, allowing you to configure a secure SNMP environment.

The SNMP terminology changes in the SNMPv3 protocol. In the SNMPv1 and SNMPv2c protocols, there are two actors in an SNMP network—a manager and an agent. A manager is a server that runs SNMP management software. The manager is often called the Network

Management System (NMS). An agent is the SNMP software that runs on a network device, such as the AT-8524M switch. An NMS is responsible for querying, or polling, agents in the network. In addition, the agent sends messages to the NMS indicating events. In the AT-S62 implementation of SNMPv3, the switch sends trap and inform messages.

In SNMPv3, managers and agents are both called entities. Each entity consists of an Engine Id and SNMP applications. Each AT-8524M switch has a unique Engine ID number. The roles of authoritative entity and non-authoritative entity can change depending on the type of message that is sent. Consider the following three cases:

❑ The NMS sends an inform message to the switch. Once a network device (either an NMS or the switch) sends an inform message, the network device expects a response to this type of message. When the switch receives an inform message, then the switch is considered an authoritative entity. In this case, the NMS is the non-authoritative entity.

❑ If the switch sends a trap message (a type of message that does not expect a response), then the switch is considered the authoritative entity. In this case, the NMS is the non-authoritative entity.

❑ If the switch sends an inform message, then the NMS is considered the authoritative entity. In this case, the switch is the non-authoritative entity

The concept of entities is important because they help define an internal architecture for the SNMPv3 protocol—as opposed to just defining a set of messages. This new architecture makes the protocol more secure. For more details about the architecture, consult the SNMPv3 RFCs. For the

SNMP RFCs supported by this release of the AT-S62 software, see SNMP

Management Session on page 37.

Section III: SNMPv3 Operations 223

Chapter 17: SNMPv3 Configuration

SNMPv3

Authentication

Protocols

With the SNMPv3 protocol, you create users, determine the protocol used for message authentication as well as determine if data transmitted between an SNMP agent and an NMS is encrypted. In addition, you have the ability to restrict user privileges by determining the user’s view of the

Management Information Bases (MIBs). In this way, you restrict which

MIBs the user can display and modify. In addition, you can restrict the types of messages the switch can send on behalf of a user.

After you have created a user, you define SNMPv3 message notification.

This consists of determining where messages are sent and what types of messages can be sent. This configuration is similar to the SNMPv1 and

SNMPv2c configuration because you configure IP addresses of trap receivers, or hosts. In addition, with the SNMPv3 implementation you decide what types of messages can be sent.

This section further describes the features of the SNMPv3 protocol. The following subsections are included:

❑ SNMPv3 Authentication Protocols on page 224

❑ SNMPv3 Privacy Protocol on page 225

❑ SNMPv3 MIB Views on page 225

❑ SNMPv3 Storage Types on page 226

❑ SNMPv3 Message Notification on page 226

❑ SNMPv3 Tables on page 227

❑ SNMPv3 Configuration Example on page 232

The SNMPv3 protocol supports two authentication protocols—HMAC-

MD5-96 (MD5) and HMAC-SHA-96 (SHA). Both MD5 and SHA use an algorithm to generate a message digest. Each authentication protocol authenticates a user by checking the message digest. In addition, both protocols use keys to perform authentication. The keys for both protocols are generated locally using the Engine ID, a unique identifier that is assigned to each switch automatically, and the user password.

You modify a key only by modifying the user password.

In addition, you have the option of assigning no user authentication. In this case, no authentication is performed for this user. Allied Telesyn does not recommend this configuration for security reasons.

Note

The keys generated by the MD5 and SHA protocols are specific to the SNMPv3 protocol. They have no relation to the SSL and SSH keys for encryption.

Section III: SNMPv3 Operations 224

AT-S62 User’s Guide

SNMPv3 Privacy

Protocol

After you have configured an authentication protocol, you have the option of assigning a privacy protocol if you have the encrypted version of the AT-S62 software. In SNMPv3 protocol terminology, privacy is equivalent to encryption. Currently, the DES protocol is the only encryption protocol supported. The DES privacy protocol requires the authentication protocol to be configured as either MD5 or SHA.

If you assign a DES privacy protocol to a user, then you are also required to assign a privacy password. If you choose to not assign the privacy to

DES, then SNMPv3 messages are sent in plain text format.

Note

You are able to configure the Privacy Protocol only if you are using the encrypted version of the AT-S62 software.

SNMPv3 MIB

Views

The SNMPv3 protocol allows you to configure MIB views for users and groups. The MIB tree is defined by RFC 1155 (Structure of Management

Information). See Figure 68.

root ccitt (0) iso (1) joint-iso-ccitt (2) standard (0) registration-authority (1) member-body (2) identified-organization (3) dod (6) internet (1) directory (1) mgmt (2) experimental (3) private (4) mib-2 (1) system (1) interfaces (2) at (3) icmp (5) ip (4) tcp (6) udp (7) cmot (9) egp (8) snmp (11) transmission (10) host (25) dot1 dBridge (117)

Figure 68 MIB Tree

Section III: SNMPv3 Operations 225

Chapter 17: SNMPv3 Configuration

The AT-S62 software supports the MIB tree, starting with the Internet

MIBs, as defined by 1.3.6.1. There are two ways to specify a MIB view. You can enter the OID number of the MIB view or its equivalent text name.

For example, to specify MIBs in the Internet view, you can enter the OID format “1.3.6.1” or the text name “internet.”

In addition, you can define a MIB view that the user can access or a MIB view that the user cannot access. When you want to permit a user to access a MIB view, you include a particular view. When you want to deny a user access to a MIB view, you exclude a particular view.

After you specify a MIB Subtree view you have the option of further restricting a view by defining a Subtree Mask. The relationship between a MIB Subtree View and a Subtree Mask is analogous to the relationship between an IP address and a subnet mask. The switch uses the subnet mask to determine which portion of an IP address represents the network address and which portion represents the node address. In a similar way, the Subtree Mask further refines the Subtree View and enables you to restrict a MIB view to a specific row of the OID MIB table.

Naturally, you need a thorough understanding of the OID MIB table to define a Subtree Mask.

SNMPv3 Storage

Types

Each SNMPv3 table entry has its own storage type. You can choose between NonVolatile storage which allows you to save the table entry or

Volatile storage which does not allow you to save an entry. If you select the Volatile storage type, when you power off the switch your SNMPv3 configuration is lost and cannot be recovered.

At each SNMPv3 menu, you are prompted to configure a storage type.

You do not have to configure the same storage type value for each table entry.

SNMPv3

Message

Notification

When you generate an SNMPv3 message from the switch, there are three basic pieces of information included in the message:

❑ The type of message

❑ The destination of the message

❑ SNMP security information

To configure the type of message, you need to define if you are sending a Trap or Inform message. Basically, the switch expects the authoritative entity (or NMS) to respond to an Inform message. The switch does not expect the authoritative entity to respond to a Trap message. These two message types are defined in the SNMPv3 (RFC 2571-6).

Section III: SNMPv3 Operations 226

AT-S62 User’s Guide

To determine the destination of the message, you configure the IP address of the host. This configuration is similar to the SNMPv1 and

SNMPv2c configuration.

The SNMP security information consists of information about the following:

❑ User

❑ View of the MIB Tree

❑ Security Level

❑ Security Model

❑ Authentication Level

❑ Privacy Protocol

❑ Group

To configure the SNMP security information, you associate a user and its related information—View, Security Level, Security Model,

Authentication Level, Privacy Protocol and Group—with the type of message and the host IP address.

SNMPv3 Tables

The SNMPv3 configuration is neatly divided into configuring SNMPv3 user information and configuring the message notification. You must configure all seven tables to successfully configure the SNMPv3 protocol. You use the following tables for user configuration:

❑ Configure SNMPv3 User Table

❑ Configure SNMPv3 View Table

❑ Configure SNMPv3 Access Table

❑ Configure SNMPv3 SecurityToGroup Table

Section III: SNMPv3 Operations 227

Chapter 17: SNMPv3 Configuration

First, you create a user in the Configure SNMPv3 User Table. Then you define the MIB view this user has access to in the Configure SNMPv3

View Table. To configure a security group and associate a MIB view to a security group, you configure the Configure SNMPv3 Access Table.

Finally, configure the Configure SNMPv3 SecurityToGroup Menu to

associate a user to a security group. See Figure 69 for an illustration of

how the user configuration tables are linked.

SNMPv3 User Table

SNMPv3 View Table

Linked by View Name

Linked by User

Name/Security

Name

SNMPv3 Access Table

Linked by Group Name

SNMPv3 Security To Group Table

Section III: SNMPv3 Operations

Figure 69 SNMPv3 User Configuration Process

In general, you focus on configuring security groups and then add and delete users from the groups as needed. For example, you may want to have two groups—one for manager privileges and a second one for

operator privileges. See Appendix B, SNMPv3 Configuration on page 222

for an example of manager and operator configurations.

After you configure an SNMPv3 user, you need to configure SNMPv3 message notification. This configuration is accomplished with the following tables:

❑ Configure SNMPv3 Notify Table

❑ Configure SNMPv3 Target Address Table

❑ Configure SNMPv3 Target Parameters Table

You start the message notification configuration by defining the type of message you want to send with the SNMPv3 Notify Table. Then you define a IP address that is used for notification in the Configure SNMPv3

Target Address Table. This is the IP address of the SNMPv3 manager.

Finally, you associate the trap information with a user by configuring the

Configure SNMPv3 Target Parameters Table.

228

AT-S62 User’s Guide

See Figure 70 for an illustration of how the message notification tables

are linked.

SNMPv3 Notify Table

Linked by Notify Tag

SNMPv3 Target Address Table

Linked by Target Parameter Name

SNMPv3 Target Parameter Table

Linked by User Name or Security Name

SNMPv3 User Table

SNMPv3 View Table

Linked by View Name

Linked by

Security Name and

Security Model

SNMPv3 Access Table

Linked by Group Name

SNMPv3 SecurityToGroup Table

Figure 70 SNMPv3 Message Notification Process

For a more detailed description of the SNMPv3 Tables, see the following subsections:

❑ SNMPv3 User Table on page 230

❑ SNMPv3 View Table on page 230

❑ SNMPv3 SecurityToGroup Table on page 231

❑ SNMPv3 Notify Table on page 231

❑ SNMPv3 Target Address Table on page 231

❑ SNMPv3 Target Parameters Table on page 231

❑ SNMPv3 Community Table on page 232

Section III: SNMPv3 Operations 229

Chapter 17: SNMPv3 Configuration

SNMPv3 User Table

The Configure SNMPv3 User Table menu allows you to create an

SNMPv3 user and provides the options of configuring authentication and privacy protocols. With an authentication protocol configured, users are authenticated when they send and receive messages. In addition, you can configure a privacy protocol and password so messages a user sends and receives are encrypted. The DES privacy algorithm uses the privacy password and the Engine ID to generate a key that is used for encryption. Lastly, you can configure a storage type for this table entry which allows you to save this user and its related configuration to flash memory.

SNMPv3 View Table

The Configure SNMPv3 View Table Menu allows you to create a view of the MIB OID Table. First, you configure a view of a subtree. Then you have the option of configuring a Subtree Mask that further refines the subtree view. For example, you can use a Subtree Mask to restrict a user’s view to one row of the MIB OID Table. In addition, you can chose to include or exclude a view. As a result, you can let a user see a particular view or prevent a user from seeing a particular view. Lastly, you can configure a storage type for this table entry which allows you to save this view to flash memory.

SNMPv3 Access Table

The Configure SNMPv3 Access Table Menu allows you to configure a security group. After you create a security group, you assign a set of users with the same access privileges to this group using the SNMPv3

SecurityToGroup Table. It is useful to consider the types of groups you want to create and the types of access privileges each group will have. In this way, it is easy to keep track of your users as belonging to one or two groups.

For each group, you can assign read, write, and notify views of the MIB table. The views you assign here have been previously defined in the

Configure SNMPv3 View Table Menu. For example, the Read View allows group members to view the specified portion of the OID MIB table. The

Write View allows group members to write to, or modify, the MIBs in the specified MIB view. The Notify View allows group members to send trap messages defined by the MIB view. Lastly, you can configure a storage type for this table entry which allows you to save this view to flash memory.

Section III: SNMPv3 Operations 230

Section III: SNMPv3 Operations

AT-S62 User’s Guide

SNMPv3 SecurityToGroup Table

The Configure SNMPv3 SecurityToGroup Table Menu allows you to associate a User Name with a security group called a Group Name. The

User Name is previously configured with the Configure SNMPv3 User

Table Menu. The security group is previously configured with the

Configure SNMPv3 Access Table Menu. Lastly, you can configure a storage type for this table entry which allows you to save the entry to flash memory.

SNMPv3 Notify Table

The Configure SNMPv3 Notify Table Menu allows you to define the type of message that is sent from the switch (or non-authoritative entity) to the authoritative entity. You have the option of defining the message type as either an Inform or a Trap message. When a switch sends an

Inform message, it expects a response from the authoritative entity. In comparison, when the switch sends a Trap message, it does not require a response from the authoritative entity.

In addition, you define a Notify Tag that links an SNMPv3 Notify Table entry to the host IP address defined in the Configure SNMPv3 Target

Address Table Menu. Lastly, you can configure a storage type for this table entry which allows you to save the entry to flash memory.

SNMPv3 Target Address Table

The Configure SNMPv3 Target Address Table Menu allows you to configure the IP address of the host. Also, in an SNMPv3 Target Address

Table entry, you configure the values of the Tag List parameter with the previously defined Notify Tag parameter values. The Notify Tag parameter is configured in the Configure SNMPv3 Notify Table. In this way, the Notify and Target Address tables are linked. Lastly, you can configure a storage type for this table entry which allows you to save the entry to flash memory.

SNMPv3 Target Parameters Table

The Configure SNMPv3 Target Parameters Table Menu allows you to define which user can send messages to the host IP address defined in the Configure SNMPv3 Target Address Table. The user and its associated information is previously configured in the Configure SNMPv3 User

Table, SNMPv3 View Table, SNMPv3 Access Table, and SNMPv3

SecurityToGroup Table. Lastly, you can configure a storage type for this table entry which allows you to save the entry to flash memory.

231

Chapter 17: SNMPv3 Configuration

SNMPv3 Community Table

The Configure SNMPv3 Community Table Menu allows you to configure

SNMPv1 and SNMPv2c communities. If you are going to use the SNMPv3

Tables to configure SNMPv1 and SNMPv2c communities, start with the

SNMPv3 Community Table. See Configuring the SNMPv3 Community

Table on page 309.

Note

Allied Telesyn recommends that you use the procedures described

in Chapter 5: SNMPv1 and SNMPv2c Configuration on page 81 to

configure the SNMPv1 and SNMPv2c protocols.

SNMPv3

Configuration

Example

You may want to have two classes of SNMPv3 users—Managers and

Operators. In this scenario, you would configure one group, called

Managers, with full access privileges. Then you would configure a second group, called Operators, with monitoring privileges only. For a

detailed example of this configuration, see Appendix B, SNMPv3

Configuration Examples on page 843.

Section III: SNMPv3 Operations 232

AT-S62 User’s Guide

Configuring the SNMPv3 Protocol

This section describes how to configure the SNMPv3 protocol using the

SNMPv3 Tables. To successfully configure this protocol, you must perform the procedures in the order given. For overview information

about SNMPv3, see the SNMPv3 Overview on page 223.

In order to allow an NMS to access the switch, you need to enable SNMP access. In addition, to allow the switch to send a trap when it receives a request message, you need to enable authentication failure traps. See

Enabling or Disabling SNMP Management on page 85.

The following SNMPv3 tables are described in this chapter:

❑ Configuring the SNMPv3 User Table on page 234

❑ Configuring the SNMPv3 View Table on page 244

❑ Configuring the SNMPv3 Access Table on page 253

❑ Configuring the SNMPv3 SecurityToGroup Table on page 268

❑ Configuring the SNMPv3 Notify Table on page 276

❑ Configuring the SNMPv3 Target Address Table on page 283

❑ Configuring the SNMPv3 Target Parameters Table on page 296

❑ Configuring the SNMPv3 Community Table on page 309

The SNMPv3 User, View, Access, and SecurityToGroup tables are concerned with setting up a user, determining authentication and privacy, and associating a user to a security group. The SNMPv3 Notify,

Target Address, and Target Parameters tables are concerned with message notification. You use the SNMPv3 Community Table to configure SNMPv1 and SNMPv2 communities.

Due to the complexity of the SNMPv3 configuration, Allied Telesyn recommends that you configure the SNMPv3 protocol with the procedures listed above, in the order they are listed. However, it is possible to configure the SNMPv3 protocol using the above procedures in any order.

Note

New entries to the SNMPv3 tables are added alphabetically.

Section III: SNMPv3 Operations 233

Chapter 17: SNMPv3 Configuration

Configuring the SNMPv3 User Table

This section contains a description of the SNMPv3 User Table and how to create, delete, and modify table entries. Configure the SNMPv3 User

Table first. Creating this table, allows you to create an entry in an

SNMPv3 User Table for a User Name. In addition, this table allows you to associate a User Name with the following parameters:

❑ Authentication Protocol

❑ Authentication Password

❑ Privacy Protocol

❑ Privacy Password

Note

You are prompted to configure the Privacy Protocol only if you are using the encrypted version of the AT-S62 software.

Creating an

SNMPv3 User

Table Entry

There are three functions you can perform with the SNMPv3 User Table.

❑ Creating an SNMPv3 User Table Entry on page 234

❑ Deleting an SNMPv3 User Table Entry on page 238

❑ Modifying an SNMPv3 User Table Entry on page 238

To create an entry in the SNMPv3 User Table, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 5 to select SNMP

Configuration.

The SNMP Configuration menu is shown in Figure 16 on page 85.

3. From the SNMP Configuration menu, type 5 to select Configure

SNMPv3 Table.

Section III: SNMPv3 Operations 234

AT-S62 User’s Guide

The Configure SNMPv3 Table Menu is shown in Figure 71.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure SNMPv3 Table

1 - SNMP Engine...............80:00:00:CF:31:00:30:84:FD:57:DA

2 - Configure SNMPv3 User Table

3 - Configure SNMPv3 View Table

4 - Configure SNMPv3 Access Table

5 - Configure SNMPv3 SecurityToGroup Table

6 - Configure SNMPv3 Notify Table

7 - Configure SNMPv3 Target Address Table

8 - Configure SNMPv3 Target Parameters Table

9 - Configure SNMPv3 Community Table

R - Return to Previous Menu

Enter your selection?

Figure 71 Configure SNMPv3 Table Menu

Note

The SNMP Engine field is a read-only field. You cannot change the setting. The field displays the SNMP engine identifier that is assigned automatically to the switch.

4. From the Configure SNMPv3 Table Menu, type 2 to select Configure

SNMPv3 User Table. The Configure SNMPv3 User Table Menu is

shown in Figure 72.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Configure SNMPv3 User Table

Engine ID ................. 80:00:00:CF:03:00:30:84:FD:57:DA

User Name ................. jenny

Authentication Protocol ... MD5

Privacy Protocol .......... DES

Storage Type .............. NonVolatile

Row Status ................ Active

1 - Create SNMPv3 Table Entry

2 - Delete SNMPv3 Table Entry

3 - Modify SNMPv3 Table Entry

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 72 Configure SNMPv3 User Table Menu

Section III: SNMPv3 Operations 235

Chapter 17: SNMPv3 Configuration

5. To create a new user table, type 1 to select Create SNMPv3 Table

Entry.

The following prompt is displayed:

Enter User (Security) Name:

6. Enter a descriptive name of the user.

You can enter a name that consists of up to 32-alphanumeric characters.

The following prompt is displayed:

Enter Authentication Protocol [M-MD5, S-SHA,

N-None]:

7. Enter one of the following:

M-MD5

This value represents the MD5 authentication protocol. With this selection, users are authenticated with the MD5 authentication protocol after a message is received. This algorithm generates the message digest. The user is authenticated when the authentication protocol checks the message digest. With the MD5 selection, you can configure a Privacy Protocol.

S-SHA

This value represents the SHA authentication protocol. With this selection, users are authenticated with the SHA authentication protocol after a message is received. This algorithm generates the message digest. The user is authenticated when the authentication protocol checks the message digest. With the SHA selection, you can configure a Privacy Protocol.

N-None

This value represents no authentication protocol. When messages are received, users are not authenticated. With the None selection, you cannot configure a Privacy Protocol.

If you select NONE, you are prompted for the Storage Type. Go to

Step 13.

If you select MD5 or SHA, the following prompt is displayed:

Enter Authentication Password:

8. Enter an authentication password of up to 32-alphanumeric characters and press Return.

You are prompted to re-enter the password.

The following prompt is displayed:

Enter Privacy Protocol [D-DES, N-None]:

Section III: SNMPv3 Operations 236

Section III: SNMPv3 Operations

AT-S62 User’s Guide

Note

If you have the non encrypted version of the AT-S62 software, then the Privacy Protocol field is read-only.

Note

You can only configure the Privacy Protocol if you have configured the Authentication Protocol with the MD5 or SHA values.

9. Select one of the following options:

D -DES

Select this value to make the DES privacy (or encryption) protocol the privacy protocol for this User Table entry. With this selection, messages transmitted between the host and the switch are encrypted with the DES protocol.

N -None

Select this value if you do not want a privacy protocol for this User

Table entry. With this selection, messages transmitted between the host and the switch are not encrypted.

If you select NONE, you are prompted for the Storage Type. Go to

Step 13.

If you select DES, the following prompt is displayed:

Enter Privacy Password:

10. Enter a privacy password of up to 32-alphanumeric characters.

You are prompted to re-enter the password.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

11. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 User Table to nonvolatile memory. After making changes to an SNMPv3 User Table entry with a Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 User Table to nonvolatile memory. After making changes to an SNMPv3 User Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

237

Chapter 17: SNMPv3 Configuration

Note

The Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active value indicates the SNMPv3 User Table entry takes effect immediately.

12. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Deleting an

SNMPv3 User

Table Entry

You may want to delete an entry from the SNMPv3 User Table. When you delete an entry in the SNMPv3 User Table, there is no way to undelete, or recover it.

To delete an entry in the SNMPv3 User Table, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71.

2. From the Configure SNMPv3 Table Menu, type 2 to select Configure

SNMPv3 User Table.

The SNMPv3 User Table is shown in Figure 72.

3. From the SNMPv3 User Table, type 2 to select Delete SNMPv3 Table

Entry.

The following prompt is displayed:

Enter User (Security) Name:

4. Enter the User Name of the User Table entry you want to delete.

The following prompt is displayed:

Do you want to delete this table entry? (Y/N):

[Yes/No]->

5. Enter Y to delete the user or N to save the user.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying an

SNMPv3 User

Table Entry

This section describes how to modify parameters in an SNMPv3 Notify

Table entry. See the following procedures:

❑ Modifying the Authentication Protocol and Password on page

239

❑ Modifying the Privacy Protocol and Password on page 241

❑ Modifying the Storage Type on page 242

Section III: SNMPv3 Operations 238

AT-S62 User’s Guide

Modifying the Authentication Protocol and Password

To modify the Authentication Protocol and Password in an SNMPv3 User

Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71.

2. From the Configure SNMPv3 Table Menu, type 2 to select Configure

SNMPv3 User Table.

The SNMPv3 User Table is shown in Figure 72.

3. From the SNMPv3 User Table, type 3 to select Modify SNMPv3 Table

Entry.

The Modify SNMPv3 User Table is shown in Figure 73.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Modify SNMPv3 User Table

Engine ID ................. 80:00:00:CF:03:00:30:84:FD:57:DA

User Name ................. wilson

Authentication Protocol ... SHA

Privacy Protocol .......... DES

Storage Type .............. NonVolatile

Row Status ................ Active

1 - Set Authentication Protocol & Password

2 - Set Privacy Protocol & Password

3 - Set Storage Type

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 73 Modify SNMPv3 User Table Menu

4. To change the authentication protocol and password, type 1 to select

Set Authentication Protocol & Password.

The following prompt is displayed:

Enter User Name:

5. Enter the User Name of the User Table you want to modify.

The following prompt is displayed:

Enter Authentication Protocol [M-MD5, S-SHA,

N-None]:

Section III: SNMPv3 Operations 239

Chapter 17: SNMPv3 Configuration

6. Enter one of the following:

M-MD5

This value represents the MD5 authentication protocol. With this selection, users are authenticated with the MD5 authentication protocol after a message is received. This algorithm generates the message digest. The user is authenticated when the authentication protocol checks the message digest. With the MD5 selection, you can configure a Privacy Protocol.

S-SHA

This value represents the SHA authentication protocol. With this selection, users are authenticated with the SHA authentication protocol after a message is received. This algorithm generates the message digest. The user is authenticated when the authentication protocol checks the message digest. With the SHA selection, you can configure a Privacy Protocol.

N-None

This value represents no authentication protocol. When messages are received, users are not authenticated. With the None selection, you cannot configure a Privacy Protocol.

If you select None, go to step 9.

If you select MD5 or SHA, the following prompt is displayed:

Enter Authentication Password:

7. Enter an authentication password of up to 32-alphanumeric characters.

The following prompt is displayed:

Re-enter Authentication password:

8. Re-enter the password.

The following message is displayed:

Authentication protocol algorithm has been changed.

The following prompt is displayed:

Please enter privacy password to regenerate privacy key.

9. Enter the Privacy Password for this User Name.

The following prompt is displayed:

Re-enter Privacy password:

10. Re-enter the password.

11. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 240

Section III: SNMPv3 Operations

AT-S62 User’s Guide

Modifying the Privacy Protocol and Password

To modify the Privacy Protocol and Password in an SNMPv3 User Table entry, perform the following procedure.

Note

You can only configure the Privacy Protocol if you have configured the Authentication Protocol with the MD5 or SHA values.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71.

2. From the Configure SNMPv3 Table Menu, type 2 to select Configure

SNMPv3 User Table.

The SNMPv3 User Table is shown in Figure 72 on page 235.

3. From the SNMPv3 User Table, type 3 to select Modify SNMPv3 Table

Entry.

The Modify SNMPv3 Table Menu is shown in Figure 73 on page

239.

4. Type 2 to select Privacy Protocol & Password.

The following prompt is displayed:

Enter User (Security) Name:

5. Enter the User Name.

The following prompt is displayed:

Enter Privacy Protocol [D-DES, N-None]:

6. Choose one of the following Privacy Protocols:

D -DES

Select this value to make the DES privacy (or encryption) protocol the privacy protocol for this User Table entry. With this selection, messages transmitted between the host and the switch are encrypted with the DES protocol.

N -None

Select this value if you do not want a privacy protocol for this User

Table entry. With this selection, messages transmitted between the host and the switch are not encrypted.

If you select None, proceed to step 9.

If you select DES, the following prompt is displayed:

Enter Privacy Password:

241

Chapter 17: SNMPv3 Configuration

7. Enter a privacy password of up to 32-alphanumeric characters.

The following prompt is displayed:

Re-enter Authentication password:

8. Re-enter the password.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Storage Type

To modify the Storage Type in an SNMPv3 User Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 2 to select Configure

SNMPv3 User Table.

The SNMPv3 User Table is shown in Figure 72 on page 235.

3. From the SNMPv3 User Table, type 3 to select Modify SNMPv3 Table

Entry.

The Modify SNMPv3 Table Menu is shown in Figure 73 on page

239.

4. To change the storage type, type 3 to select Set Storage Type.

The following prompt is displayed:

Enter User (Security) Name:

5. Enter the User Name.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

6. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 User Table to nonvolatile memory. After making changes to an SNMPv3 User Table entry with a Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

Section III: SNMPv3 Operations 242

AT-S62 User’s Guide

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 User Table to nonvolatile memory. After making changes to an SNMPv3 User Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 243

Chapter 17: SNMPv3 Configuration

Configuring the SNMPv3 View Table

Creating an

SNMPv3 View

Table Entry

This section contains a description of the SNMPv3 View Table and how to create, delete, and modify table entries. Creating this table, allows you to specify a view using the following parameters:

❑ Subtree OID

❑ Subtree Mask

❑ MIB OID Table View

To configure the SNMPv3 View Table, you need to be very familiar with the MIB tree. You can be very specific about the view a user can or cannot access—down to a column or row of the tree. AT-S62 supports the Internet subtree of the MIB tree. See RFC 2575 for detailed information about defining a view.

There are three functions you can perform with the SNMPv3 User Table.

❑ Creating an SNMPv3 View Table Entry on page 244

❑ Deleting an SNMPv3 View Table Entry on page 247

❑ Modifying an SNMPv3 View Table Entry on page 248

To create an entry in the SNMPv3 View Table, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 3 to select Configure

SNMPv3 View Table.

Section III: SNMPv3 Operations 244

AT-S62 User’s Guide

The Configure SNMPv3 View Table Menu is shown in Figure 74.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Configure SNMPv3 View Table

View Name ................. internet

Subtree OID ............... 1.3.6.1

Subtree Mask ..............

View Type ................. Included

Storage Type .............. NonVolatile

Row Status ................ Active

1 - Create SNMPv3 Table Entry

2 - Delete SNMPv3 Table Entry

3 - Modify SNMPv3 Table Entry

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 74 Configure SNMPv3 View Table Menu

3. From the Configure SNMPv3 View Table Menu, type 1 to select Create

SNMPv3 Table Entry.

The following prompt is displayed:

Enter View Name:

4. Enter a descriptive name of this View.

Enter a unique name of up to 32-alphanumeric characters.

Note

The “defaultViewAll” value is the default entry for the SNMPv1 and

SNMPv2c configuration. You cannot use the default value for an

SNMPv3 View Table entry.

The following prompt is displayed:

Enter View Subtree (OID format/Text Name):

5. Enter subtree that this view will or will not be permitted to display.

You can enter either a numeric value in hex format or the equivalent text name. For example, the OID hex format for TCP/IP is:

1.3.6.1.2.1.6

The text format is for TCP/IP is: tcp

Section III: SNMPv3 Operations 245

Chapter 17: SNMPv3 Configuration

The following prompt is displayed:

Enter Subtree Mask (Hex format):

6. Enter a subtree mask.

This is an optional parameter that is used to further refine the value in the View Subtree parameter. This parameter is in binary format.

The View Subtree parameter defines a MIB View and the Subtree

Mask further restricts a user’s view, for example, to a specific row of the MIB tree. The value of the Subnet Mask parameter is dependent on the subtree you select. See RFC 2575 for detailed information about defining a subnet mask.

The following prompt is displayed:

Enter View Type [I-Included, E-Excluded]:

7. Enter one of the following view types:

I - Included

Enter this value to permit the View Name to see the subtree specified above.

E - Excluded

Enter this value to not permit the View Name to see the subtree specified above.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

8. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 View Table to the configuration file. After making changes to an SNMPv3 View Table entry with a Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 View Table to the configuration file. After making changes to an SNMPv3 View Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

Note

The Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active value indicates the SNMPv3 View Table entry takes effect immediately.

Section III: SNMPv3 Operations 246

AT-S62 User’s Guide

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Deleting an

SNMPv3 View

Table Entry

You may want to delete an entry from the SNMPv3 View Table. After you delete an SNMPv3 View Table entry, there is no way to undelete, or recover it.

To delete an entry in the SNMPv3 View Table, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 3 to select Configure

SNMPv3 View Table.

The SNMPv3 View Table is shown in Figure 74 on page 245.

3. From the SNMPv3 View Table, type 2 to select Delete SNMPv3 Table

Entry.

The following prompt is displayed:

Enter View Name:

4. Enter the View Name of the View Table entry you want to delete.

The following prompt is displayed:

Enter View Subtree (OID format/Text Name):

5. Enter the subtree for this view.

Do you want to delete this table entry? (Y/N):

[Yes/No]->

6. Enter Y to delete the view or N to save the view.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 247

Chapter 17: SNMPv3 Configuration

Modifying an

SNMPv3 View

Table Entry

This section describes how to modify parameters in an SNMPv3 Notify

Table entry. See the following procedures:

❑ Modifying a Subtree Mask on page 248

❑ Modifying a View Type on page 250

❑ Modifying a Storage Type on page 251

Modifying a Subtree Mask

To modify the Subtree Mask parameter in an SNMPv3 View Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 3 to select Configure

SNMPv3 View Table.

The Configure SNMPv3 View Table Menu is shown in Figure 74 on page 245.

3. From the Configure SNMPv3 View Table Menu, type 3 to select

Modify SNMPv3 Table Entry.

Section III: SNMPv3 Operations 248

AT-S62 User’s Guide

The Modify SNMPv3 View Table Menu is shown in Figure 75.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify SNMPv3 View Table

View Name ................. tcp

Subtree OID ............... 1.3.6.1.2.1.6

Subtree Mask .............. ff:ff

View Type ................. Included

Storage Type .............. NonVolatile

Row Status ................ Active

1 - Set Subtree Mask

2 - Set View Type

3 - Set Storage Type

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 75 Modify SNMPv3 View Table Menu

4. To modify the Subtree Mask for this view, type 1 to select Set Subtree

Mask.

The following prompt is displayed:

Enter View Name:

5. Enter an existing View Name.

The following prompt is displayed:

Enter View Subtree (OID format/Text Name):

6. Enter Subtree that this view will or will not be permitted to display.

You can enter either a numeric value in hex format or the equivalent text name. For example, the OID hex format for TCP/IP is:

1.3.6.1.2.1.6

The text format is for TCP/IP is: tcp

The following prompt is displayed:

Enter Subtree Mask (Hex format):

7. Enter a Subtree Mask.

This is an optional parameter that is used to further refine the value in the View Subtree parameter. This parameter is in binary format.

Section III: SNMPv3 Operations 249

Chapter 17: SNMPv3 Configuration

The View Subtree parameter defines a MIB View and the Subtree

Mask further restricts a user’s view, for example, to a specific row of the MIB tree. The value of the Subnet Mask parameter is dependent on the subtree you select. See RFC 2575 for detailed information about defining a subnet mask.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying a View Type

To modify the View Type parameter in an SNMPv3 View Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 3 to select Configure

SNMPv3 View Table.

The Configure SNMPv3 View Table Menu is shown in Figure 74 on page 245.

3. From the Configure SNMPv3 View Table Menu, type 3 to select

Modify SNMPv3 Table Entry.

The Modify SNMPv3 Table Menu is shown in Figure 75 on page

249.

4. To modify the View Type, type 2 to select Set View Type.

The following prompt is displayed:

Enter View Name:

5. Enter a View Name that was previously configured.

The following prompt is displayed:

Enter View Subtree (OID format/Text Name):

6. Enter the View Subtree value for this View Name.

You can enter either a numeric value in hex format or the equivalent text name. For example, the OID hex format for TCP/IP is:

1.3.6.1.2.1.6

The text format is for TCP/IP is: tcp

Section III: SNMPv3 Operations 250

Section III: SNMPv3 Operations

AT-S62 User’s Guide

The following prompt is displayed:

Enter View Type [I-Included, E-Excluded]:

7. Choose one of the following view types:

I - Included

Enter this value to permit the View Name to see the subtree specified above.

E - Excluded

Enter this value to not permit the View Name to see the subtree specified above.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying a Storage Type

To modify the Storage Type parameter in an SNMPv3 View Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 3 to select Configure

SNMPv3 View Table.

The Configure SNMPv3 View Table Menu is shown in Figure 74 on page 245.

3. From the Configure SNMPv3 View Table Menu, type 3 to select

Modify SNMPv3 Table Entry.

The Modify SNMPv3 Table Menu is shown in Figure 75 on page

249.

4. To modify the storage type, type 3 to select Set Storage Type.

The following prompt is displayed:

Enter View Name:

5. Enter the View Name you want to modify.

The following prompt is displayed:

Enter View Subtree (OID format/Text Name):

6. Enter the View Subtree for this View Name.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-Nonvolatile]:

251

Chapter 17: SNMPv3 Configuration

7. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 View Table to the configuration file. After making changes to an SNMPv3 View Table entry with a Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 View Table to the configuration file. After making changes to an SNMPv3 View Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 252

AT-S62 User’s Guide

Configuring the SNMPv3 Access Table

Creating an

SNMPv3 Access

Table Entry

This section contains a description of the SNMPv3 Access Table and how to create, delete, and modify table entries. The SNMPv3 Access Table allows you to configure a security group. Each user must belong to a security group. After you have configured a security group, use the

SecurityToGroup Table to assign users to security groups. See Creating an SNMPv3 SecurityToGroup Table Entry on page 268.

For each security group, you can assign the following attributes:

❑ a Security Model (SNMPv1, SNMPv2c, SNMPv3)

❑ Read, write, and notify views

❑ A security level

❑ A storage type

Before you begin this procedure, you will need to configure entries in the View Table. These values are used to configure the Read, Write, and

Notify View parameters in this procedure. See Configuring the SNMPv3

View Table on page 244.

There are three functions you can perform with the SNMPv3 Access

Table.

❑ Creating an SNMPv3 Access Table Entry on page 253

❑ Deleting an SNMPv3 Access Table Entry on page 257

❑ Modifying an SNMPv3 Access Table Entry on page 259

To create an entry in the SNMPv3 Access Table, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 4 to select Configure

SNMPv3 Access Table.

Section III: SNMPv3 Operations 253

Chapter 17: SNMPv3 Configuration

The Configure SNMPv3 Access Table Menu is shown in Figure 76.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Configure SNMPv3 Access Table

Group Name .... softwareengineering

Context Prefix.

Read View...... internet

Write View .... tcp

Notify View ... tcp

Security Model . v3

Security Level . AuthPriv

Context Match .. Exact

Storage Type ... NonVolatile

Row Status ..... Active

1 - Create SNMPv3 Table Entry

2 - Delete SNMPv3 Table Entry

3 - Modify SNMPv3 Table Entry

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 76 Configure SNMPv3 Access Table Menu

3. To create a group in the SNMPv3 Access Table, type 1 to select Create

SNMPv3 Table Entry.

The following prompt is displayed:

Enter Group Name:

4. Enter a descriptive name of the group. The Group Name can consist of up to 32-alphanumeric characters.

The Group Name can consist of up to 32-alphanumeric characters.

You are not required to enter a unique value here because the

SNMPv3 Access Table entry is index with the Group Name,

Security Model, and Security Level parameter values. However, unique group names makes it easier to tell the groups apart.

There are four default values for this field:

❑ defaultV1GroupReadOnly

❑ defaultV1GroupReadWrite

❑ defaultV2cGroupReadOnly

❑ defaultV2cGroupReadWrite

These values are reserved for SNMPv1 and SNMPv2c implementations.

Section III: SNMPv3 Operations 254

Section III: SNMPv3 Operations

AT-S62 User’s Guide

Note

The Context Prefix and the Context Match fields are a read only fields. The Context Prefix field is always set to null. The Context

Match field is always set to exact.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

5. Select one of the following SNMP protocols as the Security Model for this Group Name.

1-v1

Select this value to associate the Group Name with the SNMPv1 protocol.

2-v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

3-v3

Select this value to associate the Group Name with the SNMPv3 protocol. The SNMPv3 protocol allows you to configure the group to authenticate SNMPv3 users and encrypt messages.

The following prompt is displayed:

Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv,

P-AuthPriv]:

6. Select one of the following security levels:

N-NoAuthNoPriv

This option represents no authentication and no privacy protocol.

Select this security level if you do not want to authenticate SNMP users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the only security level you can select.

A-AuthNoPriv

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

P-AuthPriv

This option represents authentication and the privacy protocol.

Select this security level to encrypt messages using a privacy protocol and authenticate SNMP users. This level provides the

255

Chapter 17: SNMPv3 Configuration greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

The following prompt is displayed:

Enter Read View Name:

7. Enter a value that you configured with the View Name parameter in the SNMPv3 View Table.

A Read View Name allows the users assigned to this Group Name to view the information specified by the View Table entry. This value does not need to be unique.

The following prompt is displayed:

Enter Write View Name:

8. Enter a value that you configured with the View Name parameter in the SNMPv3 View Table.

A Write View Name allows the users assigned to this Security

Group to write, or modify, the information in the specified View

Table. This value does not need to be unique.

The following prompt is displayed:

Enter Notify View Name:

9. Enter a value that you configured with the View Name parameter in the SNMPv3 View Table.

A Notify View Name allows the users assigned to this Group Name to send traps permitted in the specified View. This value does not need to be unique.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

10. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Access Table to the configuration file. After making changes to an SNMPv3 Access Table entry with a Volatile storage type, the

S - Save Configuration Changes option does not appear on the

Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Access Table to the configuration file. After making changes to an SNMPv3 Access Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

Section III: SNMPv3 Operations 256

AT-S62 User’s Guide

Note

The Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active value indicates the SNMPv3 Access Table entry will take effect immediately.

11. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Deleting an

SNMPv3 Access

Table Entry

You may want to delete an entry from the SNMPv3 Access Table. After you delete an SNMPv3 Access Table, there is no way to undelete, or recover, it.

To delete an entry in the SNMPv3 Access Table, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 4 to select Configure

SNMPv3 Access Table.

The SNMPv3 Access Table is shown in Figure 76 on page 254.

Note

To display a particular Group Name and its associated parameters from the Configure SNMPv3 Access Table Menu, type N to display the Next Page and P to display the previous page.

3. From the SNMPv3 Access Table, type 2 to select Delete SNMPv3 Table

Entry.

The following prompt is displayed:

Enter Group Name:

4. Enter the Group Name that you want to delete.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

5. Enter the Security Model of this Group Name.

Select one of the following security levels:

1-v1

Select this value to associate the Group Name with the SNMPv1 protocol.

Section III: SNMPv3 Operations 257

Chapter 17: SNMPv3 Configuration

2-v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

3-v3

Select this value to associate the Group Name with the SNMPv3 protocol. The following prompt is displayed:

Enter the Security Level [N-NoAuthNoPriv,

A-AuthNoPriv, P-AuthPriv]:

6. Enter the Security Level of this Group Name.

Select one of the following Security Levels:

N-NoAuthNoPriv

This option represents no authentication and no privacy protocol.

Select this security level if you do not want to authenticate SNMP users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the only security level you can select.

A-AuthNoPriv

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

P-AuthPriv

This option represents authentication and the privacy protocol.

Select this security level to encrypt messages using a privacy protocol and authenticate SNMP users. This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

The following prompt is displayed:

Do you want to delete this table entry? (Y/N):

[Yes/No]->

7. Enter Y to delete the view or N to save the view.

The following prompt is displayed:

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 258

AT-S62 User’s Guide

Modifying an

SNMPv3 Access

Table Entry

This section describes how to modify parameters in an SNMPv3 Access

Table entry. For each entry in the SNMPv3 Access Table, you can modify the following parameters:

❑ Read View Name

❑ Write View Name

❑ Notify View Name

❑ Storage Type

Configure the values of the Read View Name, Write View Name, and

Notify View Name parameters with values previously configured with the View Name parameter in the SNMPv3 View Table. This is the only

way to associate a Group Name with these Views. See Creating an

SNMPv3 View Table Entry on page 244.

See the following procedures:

❑ Modifying the Read View Name on page 259

❑ Modifying the Write View Name on page 262

❑ Modifying the Notify View Name on page 264

❑ Modifying the Storage Type on page 266

Modifying the Read View Name

To modify the Read View Name parameter in an SNMPv3 Access Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 4 to select Configure

SNMPv3 Access Table.

The Configure SNMPv3 Access Table is shown in Figure 76 on page 254.

3. From the Configure SNMPv3 Access Table, type 3 to select Modify

SNMPv3 Table Entry.

Section III: SNMPv3 Operations 259

Chapter 17: SNMPv3 Configuration

The Modify SNMPv3 Access Table is shown in Figure 77.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify SNMPv3 Access Table

Group Name .... sales

Context Prefix.

Read View...... systemmanagers

Write View .... salespeople

Notify View ... salespeople

Security Model . v3

Security Level . AuthNoPriv

Context Match .. Exact

Storage Type ... Volatile

Row Status ..... Active

1 - Set Read View Name

2 - Set Write View Name

3 - Set Notify View Name

4 - Set Storage Type

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 77 Modify SNMPv3 Access Table Menu

4. To modify the Read View Name parameter, type 1 to select Set Read

View Name.

The following prompt is displayed:

Enter Group Name:

5. Enter a Group Name that was previously configured.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

6. Enter the Security Model configured for this Group Name. You cannot change the value of the Security Model parameter.

Select one of the following SNMP protocols:

1-v1

Select this value to associate the Group Name with the SNMPv1 protocol.

2-v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

3-v3

Select this value to associate the Group Name with the SNMPv3 protocol.

Section III: SNMPv3 Operations 260

Section III: SNMPv3 Operations

AT-S62 User’s Guide

The following prompt is displayed:

Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv,

P-AuthPriv]:

7. Select one of the following security levels:

N-NoAuthNoPriv

This option represents no authentication and no privacy protocol.

Select this security level if you do not want to authenticate SNMP users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the only security level you can select.

A-AuthNoPriv

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

P-AuthPriv

This option represents authentication and the privacy protocol.

Select this security level to encrypt messages using a privacy protocol and authenticate SNMP users. This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

The following prompt is displayed:

Enter Read View Name:

8. Enter a value that you configured with the View Name parameter in

the SNMPv3 View Table. See Creating an SNMPv3 View Table Entry on page 244.

A Read View Name allows the users assigned to this Security

Group to view the information specified in the View Table. This value does not need to be unique.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

261

Chapter 17: SNMPv3 Configuration

Modifying the Write View Name

To modify the Write View Name parameter in an SNMPv3 Access Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 4 to select Configure

SNMPv3 Access Table.

The Configure SNMPv3 Access Table is shown in Figure 76 on page 254.

3. From the Configure SNMPv3 Access Table, type 3 to select Modify

SNMPv3 Table Entry.

The Modify SNMPv3 Table Menu is shown in Figure 77 on page

260.

4. To modify the Write View Name parameter, type 2 to select Set Write

View Name.

The following prompt is displayed:

Enter Group Name:

5. Enter a Group Name that was previously configured.

The following prompt is displayed:

Enter Security Model[1-v1, 2-v2c, 3-v3]:

6. Enter the Security Model configured for this Group Name. You cannot change the value of the Security Model parameter.

Select one of the following SNMP protocols:

1-v1

Select this value to associate the Group Name with the SNMPv1 protocol.

2-v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

3-v3

Select this value to associate the Group Name with the SNMPv3 protocol.

The following prompt is displayed:

Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv,

P-AuthPriv]:

Section III: SNMPv3 Operations 262

Section III: SNMPv3 Operations

AT-S62 User’s Guide

7. Enter the Security Level configured for this Group Name. You cannot change the value of the Security Level parameter.

Select one of the following security levels:

N-NoAuthNoPriv

This option represents no authentication and no privacy protocol.

Select this security level if you do not want to authenticate SNMP users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the only security level you can select.

A-AuthNoPriv

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

P-AuthPriv

This option represents authentication and the privacy protocol.

Select this security level to encrypt messages using a privacy protocol and authenticate SNMP users. This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

The following prompt is displayed:

Enter Write View Name:

8. Enter a value that you configured with the View Name parameter in the SNMPv3 View Table.

A Write View Name allows the people assigned to this Security

Group to write, or modify, to the information in the specified View

Table. This value does not need to be unique.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

263

Chapter 17: SNMPv3 Configuration

Modifying the Notify View Name

To modify the Notify View Name parameter in an SNMPv3 Access Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 4 to select Configure

SNMPv3 Access Table.

The Configure SNMPv3 Access Table is shown in Figure 76 on page 254.

3. From the Configure SNMPv3 Access Table, type 3 to select Modify

SNMPv3 Table Entry.

The Modify SNMPv3 Table Menu is shown in Figure 77 on page

260.

4. To modify the Notify View Name parameter, type 3 to select Set Notify

View Name.

The following prompt is displayed:

Enter Group Name:

5. Enter a Group Name that was previously configured.

The following prompt is displayed:

Enter Security Model[1-v1, 2-v2c, 3-v3]:

6. Enter the Security Model configured for this Group Name. You cannot change the value of the Security Model parameter.

Select one of the following SNMP protocols:

1-v1

Select this value to associate the Group Name with the SNMPv1 protocol.

2-v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

3-v3

Select this value to associate the Group Name with the SNMPv3 protocol.

The following prompt is displayed:

Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv,

P-AuthPriv]:

Section III: SNMPv3 Operations 264

Section III: SNMPv3 Operations

AT-S62 User’s Guide

7. Enter the Security Level configured for this Group Name. You cannot change the value of the Security Level parameter.

Select one of the following security levels:

N-NoAuthNoPriv

This option represents no authentication and no privacy protocol.

Select this security level if you do not want to authenticate SNMP users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the only security level you can select.

A-AuthNoPriv

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

P-AuthPriv

This option represents authentication and the privacy protocol.

Select this security level to encrypt messages using a privacy protocol and authenticate SNMP users. This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

The following prompt is displayed:

Enter Notify View Name:

8. Enter a value that you configured with the View Name parameter in the SNMPv3 View Table.

A Notify View Name permits the users assigned to this Security

Group to send traps specified in this view of the MIB tree. This value does not need to be unique.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

265

Chapter 17: SNMPv3 Configuration

Modifying the Storage Type

To modify the Storage Type parameter in an SNMPv3 Access Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 4 to select Configure

SNMPv3 Access Table.

The Configure SNMPv3 Access Table is shown in Figure 76 on page 254.

3. From the Configure SNMPv3 Access Table, type 3 to select Modify

SNMPv3 Table Entry.

The Modify SNMPv3 Table Menu is shown in Figure 77 on page

260.

4. To modify the Storage Type parameter, type 4 to select Set Storage

Type.

The following prompt is displayed:

Enter Group Name:

5. Enter a Group Name that was previously configured.

The following prompt is displayed:

Enter Security Model[1-v1, 2-v2c, 3-v3]:

6. Enter the Security Model configured for this Group Name. You cannot change the value of the Security Model parameter.

Select one of the following SNMP protocols:

1-v1

Select this value to associate the Group Name with the SNMPv1 protocol.

2-v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

3-v3

Select this value to associate the Group Name with the SNMPv3 protocol.

The following prompt is displayed:

Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv,

P-AuthPriv]:

Section III: SNMPv3 Operations 266

Section III: SNMPv3 Operations

AT-S62 User’s Guide

7. Enter the Security Level configured for this Group Name. You cannot change the value of the Security Level parameter.

Select one of the following security levels:

N-NoAuthNoPriv

This option represents no authentication and no privacy protocol.

Select this security level if you do not want to authenticate SNMP users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the only security level you can select.

A-AuthNoPriv

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

P-AuthPriv

This option represents authentication and the privacy protocol.

Select this security level to encrypt messages using a privacy protocol and authenticate SNMP users. This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

8. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Access Table to the configuration file. After making changes to an SNMPv3 Access Table entry with a Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Access Table to the configuration file. After making changes to an SNMPv3 Access Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

267

Chapter 17: SNMPv3 Configuration

Configuring the SNMPv3 SecurityToGroup Table

Creating an

SNMPv3

SecurityToGroup

Table Entry

This section contains a description of the SNMPv3 SecurityToGroup

Table and how to create, delete, and modify table entries. The SNMPv3

SecurityToGroup Table allows you to associate a User Name with a

Group Name. The User Name is configured in the Configure SNMPv3

User Table Menu while the Group Name is configured in the Configure

SNMPv3 Access Table Menu. In addition, the configuration in the

Configure SNMPv3 Access Table Menu defines which MIB views this User can read, write (modify), and send traps from. For each User Name, you can assign:

❑ A Security Model (SNMPv1, SNMPv2c, SNMPv3)

❑ A Group Name

❑ A Storage Type

There are three functions you can perform with the SNMPv3 Access

Table.

❑ Creating an SNMPv3 SecurityToGroup Table Entry on page 268

❑ Deleting an SNMPv3 SecurityToGroup Table Entry on page 271

❑ Modifying an SNMPv3 SecurityToGroup Table Entry on page 272

To create an entry in the SecurityToGroup Table, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 5 to select Configure

SNMPv3 SecurityToGroup Table.

Section III: SNMPv3 Operations 268

AT-S62 User’s Guide

The Configure SNMPv3 SecurityToGroup Table Menu is shown in

Figure 78.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Configure SNMPv3 SecurityToGroup Table

Security Model................. v3

Security Name ................. spike

Group Name .................... marketing

Storage Type .................. NonVolatile

Row Status .................... Active

1 - Create SNMPv3 Table Entry

2 - Delete SNMPv3 Table Entry

3 - Modify SNMPv3 Table Entry

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 78 Configure SNMPv3 SecurityToGroup Table Menu

3. To configure a group in the SNMPv3 SecurityToGroup Table, type 1 to select Create SNMPv3 Table Entry.

The following prompt is displayed:

Enter User (Security) Name:

4. Enter the User Name that you want to associate with a group.

Enter a User Name that you configured in Creating an SNMPv3

User Table Entry on page 234.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

5. Select the SNMP protocol that was configured for this User Name.

Choose from the following:

1-v1

Select this value to associate the Group Name with the SNMPv1 protocol.

2-v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

3-v3

Select this value to associate the Group Name with the SNMPv3 protocol.

Section III: SNMPv3 Operations 269

Chapter 17: SNMPv3 Configuration

The following prompt is displayed:

Enter Group Name:

6. Enter a Group Name that you configured in the SNMPv3 Access Table.

See. Creating an SNMPv3 Access Table Entry on page 253.

There are four default values for this field:

❑ defaultV1GroupReadOnly

❑ defaultV1GroupReadWrite

❑ defaultV2cGroupReadOnly

❑ defaultV2cGroupReadWrite

These values are reserved for SNMPv1 and SNMPv2c implementations.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

7. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 SecurityToGroup Table to the configuration file. After making changes to an SNMPv3 SecurityToGroup Table entry with a Volatile storage type, the S - Save Configuration

Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 SecurityToGroup Table to the configuration file. After making changes to an SNMPv3 SecurityToGroup Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

Note

The Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active value indicates the SNMPv3 SecurityToGroup

Table entry will take effect immediately.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 270

AT-S62 User’s Guide

Deleting an

SNMPv3

SecurityToGroup

Table Entry

You may want to delete an entry from the SNMPv3 SecurityToGroup

Table. When you delete an SNMPv3 SecurityToGroup Table entry, there is no way to undelete, or recover, it.

To delete an entry in the SNMPv3 SecurityToGroup Table, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 5 to select Configure

SNMPv3 SecurityToGroup Table.

The SNMPv3 SecurityToGroup Table is shown in Figure 78 on page 269.

Note

To display a Group Name and its associated parameters from the

Configure SNMPv3 SecurityToGroup Table Menu, type N to display the Next Page and P to display the previous page.

3. From the SNMPv3 SecurityToGroup Table, type 2 to select Delete

SNMPv3 Table Entry.

The following prompt is displayed:

Enter User (Security) Name:

4. Enter a User Name.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

5. Enter the Security Model of this User Name.

Choose from the following:

1-v1

Select this value to associate the Group Name with the SNMPv1 protocol.

2-v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

3-v3

Select this value to associate the Group Name with the SNMPv3 protocol.

Section III: SNMPv3 Operations 271

Chapter 17: SNMPv3 Configuration

The following prompt is displayed:

Do you want to delete this table entry? (Y/N):

[Yes/No]->

6. Enter Y to delete this SecurityToGroup entry or N to save it.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying an

SNMPv3

SecurityToGroup

Table Entr

y

This section describes how to modify parameters in an SNMPv3

SecurityToGroup Table entry. See the following procedures:

❑ Modifying the Group Name on page 272

❑ Modifying the Storage Type on page 274

Modifying the Group Name

To modify the Group Name in an SNMPv3 SecurityToGroup Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 5 to select Configure

SNMPv3 SecurityToGroup Table.

The Configure SNMPv3 SecurityToGroup Table is shown in Figure

76 on page 254.

3. From the Configure SNMPv3 SecurityToGroup Table, type 3 to select

Modify SNMPv3 Table Entry.

Section III: SNMPv3 Operations 272

AT-S62 User’s Guide

The Modify SecurityToGroup Table is displayed as shown Figure

78.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify SNMPv3 SecurityToGroup Table

Security Model................. v3

Security Name ................. cleo72

Group Name .................... engineering

Storage Type .................. Volatile

Row Status .................... Active

1 - Set Group Name

2 - Set Storage Type

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 79 Modify SNMPv3 SecurityToGroup Table Menu

4. To modify the Group Name, type 1 to select Set Group Name.

The following prompt is displayed:

Enter User (Security) Name:

5. Enter a User Name.

The User Name must be previously configured in the Configure

SNMPv3 User Table Menu. See Creating an SNMPv3 User Table

Entry on page 234.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

6. Enter the Security Model configured for this User Name. You cannot change the value of the Security Model parameter.

Select one of the following SNMP protocols:

1-v1

Select this value if this User Name is configured with the SNMPv1 protocol.

2-v2c

Select this value to associate the User Name with the SNMPv2c protocol.

Section III: SNMPv3 Operations 273

Chapter 17: SNMPv3 Configuration

3-v3

Select this value to associate the User Name with the SNMPv3 protocol.

The following prompt is displayed:

Enter Group Name:

7. Enter the new Group Name.

This value must match a value configured in the Group Name

parameter in the Configure SNMPv3 Access Table. See Creating an

SNMPv3 Access Table Entry on page 253.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Storage Type

To modify the Storage Type in an SNMPv3 SecurityToGroup Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 5 to select Configure

SNMPv3 SecurityToGroup Table.

The Configure SNMPv3 SecurityToGroup Table is shown in Figure

76 on page 254.

3. From the Configure SNMPv3 SecurityToGroup Table, type 3 to select

Modify SNMPv3 Table Entry.

4. To modify the storage type, type 2 to select Set Storage Type.

The following prompt is displayed:

Enter User (Security) Name:

5. Enter a User Name.

The User Name must be previously configured in the Configure

SNMPv3 User Table Menu. See Creating an SNMPv3 User Table

Entry on page 234.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

6. Enter the Security Model configured for this User Name. You cannot change the value of the Security Model parameter.

Section III: SNMPv3 Operations 274

Section III: SNMPv3 Operations

AT-S62 User’s Guide

Select one of the following SNMP protocols:

1-v1

Select this value if this User Name is configured with the SNMPv1 protocol.

2-v2c

Select this value if this User Name is configured with the SNMPv2c protocol.

3-v3

Select this value if this User Name is configured with the SNMPv3 protocol.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

7. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 SecurityToGroup Table to the configuration file. After making changes to an SNMPv3 SecurityToGroup Table entry with a Volatile storage type, the S - Save Configuration

Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 SecurityToGroup Table to the configuration file. After making changes to an SNMPv3 SecurityToGroup Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

275

Chapter 17: SNMPv3 Configuration

Configuring the SNMPv3 Notify Table

Creating an

SNMPv3 Notify

Table Entry

This section contains a description of the SNMPv3 Notify Table Menu and how to create, delete, and modify table entries. The Configure

SNMPv3 Notify Table Menu allows you to define a name for sending traps. In each Notify Table entry, you define if the switch sends a trap or an inform message. The two message types, trap and inform, have different packet formats.

For each Notify group, you can configure:

❑ Notify Name

❑ Notify Tag

❑ Notify Type

❑ Storage Type

The value of the Notify Tag is linked with the Tag List parameter in the

Configure SNMPv3 Target Address Table Menu. After you configure a value for the Notify Tag parameter, you use the same value in the Target

List parameter that is located on the Target Address Table Menu. As a result of this connection between the two tables, the Notify Tag parameter assigns a Target IP address to the Notify Table internally.

There are three functions you can perform with the Configure SNMPv3

Notify Table Menu.

❑ Creating an SNMPv3 Notify Table Entry on page 276

❑ Deleting an SNMPv3 Notify Table Entry on page 278

❑ Modifying an SNMPv3 Notify Table Entry on page 279

To create an entry in the SNMPv3 Notify Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 6 to select Configure

SNMPv3 Notify Table.

Section III: SNMPv3 Operations 276

AT-S62 User’s Guide

The Configure SNMPv3 Notify Table Menu is shown in Figure 80.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Configure SNMPv3 Notify Table

Notify Name ...................... hardwareengineeringTrap

Notify Tag ....................... hardwareengineeringtag

Notify Type ...................... Trap

Storage Type ..................... NonVolatile

Row Status ....................... Active

1 - Create SNMPv3 Table Entry

2 - Delete SNMPv3 Table Entry

3 - Modify SNMPv3 Table Entry

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 80 Configure SNMPv3 Notify Table Menu

3. To create an entry in the table, type 1 to select Create SNMPv3 Table

Entry.

The following prompt is displayed:

Enter Notify Name:

4. Enter the name associated with this trap message.

Enter a name of up to 32-alphanumeric characters. For example, you might want to define a trap message for hardware engineering and enter a value of “hardwareengineeringtrap” for the Notify Name.

The following prompt is displayed:

Enter Notify Tag:

5. Enter the name of the Notify Tag.

Enter a name of up to 32 alphanumeric characters. The following prompt is displayed:

Enter Notify Type [T-Trap, I-Inform]:

6. Enter one of the following message types:

T-Trap

Indicates this notify table is used to send traps. With this message type, the switch does not expects a response from the authoritative entity.

Section III: SNMPv3 Operations 277

Chapter 17: SNMPv3 Configuration

I-Inform

Indicates this notify table is used to send inform messages. With this message type, the switch expects a response from the authoritative entity.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

7. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Notify Table to the configuration file. After making changes to an SNMPv3 Notify Table entry with a Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Notify Table to the configuration file. After making changes to an SNMPv3 Notify Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

Note

The Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active value indicates the SNMPv3 Notify Table entry takes effect immediately.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Deleting an

SNMPv3 Notify

Table Entry

You may want to delete an entry from the Configure SNMPv3 Notify

Table Menu. When you delete a Configure SNMPv3 Notify Table entry, there is no way to undelete, or recover, it.

To delete an entry in the Configure SNMPv3 Notify Table Menu, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 6 to select Configure

SNMPv3 Notify Table.

The Configure SNMPv3 Notify Table Menu is shown in Figure 80 on page 277.

Section III: SNMPv3 Operations 278

AT-S62 User’s Guide

Note

To display a Group Name and its associated parameters from the

Configure SNMPv3 SecurityToGroup Table Menu, type N to display the Next Page and P to display the previous page.

3. To delete an SNMPv3 Notify Table entry, type 2 to select Delete

SNMPv3 Table Entry.

The following prompt is displayed:

Enter Notify Name:

4. Enter a Notify Name.

The following prompt is displayed:

Do you want to delete this table entry? (Y/N):

[Yes/No]->

5. Enter Y to delete the SNMPv3 Notify Table entry or N to save it.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying an

SNMPv3 Notify

Table Entry

This section describes how to modify parameters in an SNMPv3 Notify

Table entry. See the following procedures:

❑ Modifying a Notify Tag on page 279

❑ Modifying a Notify Type on page 281

❑ Modifying a Storage Type on page 282

Modifying a Notify Tag

To modify the Notify Tag parameter in an SNMPv3 Notify Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 6 to select Configure

SNMPv3 Notify Table.

The Configure SNMPv3 Notify Table Menu is shown in Figure 80 on page 277.

3. From the Configure SNMPv3 Notify Table Menu, type 3 to select

Modify SNMPv3 Table Entry.

Section III: SNMPv3 Operations 279

Chapter 17: SNMPv3 Configuration

The Modify SNMPv3 Notify Table Menu is displayed as shown in

Figure 81.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify SNMPv3 Notify Table

Notify Name ................... softwareeengineering

Notify Tag..................... softwareeengineeringtag

Notify Type.................... Inform

Storage Type .................. NonVolatile

Row Status .................... Active

1 - Set Notify Tag

2 - Set Notify Type

3 - Set Storage Type

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 81 Modify SNMPv3 Notify Table Menu

Note

To display a Group Name and its associated parameters from the

Configure SNMPv3 SecurityToGroup Table Menu, type N to display the Next Page and P to display the previous page.

4. To modify the Notify Tag, type 1 to select Set Notify Tag.

The following prompt is displayed:

Enter Notify Name:

5. Enter a Notify Name.

The following prompt is displayed:

Enter Notify Tag:

6. Enter the new Notify Tag.

Enter an alphanumeric value of up to 32 characters.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 280

Section III: SNMPv3 Operations

AT-S62 User’s Guide

Modifying a Notify Type

To modify the Notify Type parameter in an SNMPv3 Notify Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 6 to select Configure

SNMPv3 Notify Table.

The Configure SNMPv3 Notify Table Menu is shown in Figure 80 on page 277.

3. From the Configure SNMPv3 Notify Table Menu, type 3 to select

Modify SNMPv3 Table Entry.

The Modify SNMPv3 Notify Table is shown in Figure 81 on page

280.

4. To modify the Notify Type, type 2 to select Set Notify Type.

The following prompt is displayed:

Enter Notify Name:

5. Enter a Notify Name.

The following prompt is displayed:

Enter Notify Type [T-Trap, I-Inform]:

6. Enter one of the following message types:

T-Trap

Indicates this notify table is used to send traps. With this message type, the switch does not expect a response from the host.

I-Inform

Indicates this notify table is used to send inform messages. With this message type, the switch expects a response from the host.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

281

Chapter 17: SNMPv3 Configuration

Modifying a Storage Type

To modify the Storage Type parameter in an SNMPv3 Notify Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 6 to select Configure

SNMPv3 Notify Table.

The Configure SNMPv3 Notify Table Menu is shown in Figure 80 on page 277.

3. From the Configure SNMPv3 Notify Table Menu, type 3 to select

Modify SNMPv3 Table Entry.

The Modify SNMPv3 Notify Table is shown in Figure 81 on page

280.

4. To modify the Storage Type, type 3 to select Set Storage Type.

The following prompt is displayed:

Enter Notify Name:

5. Enter a Notify Name.

The following prompt is displayed:

Enter Storage type [V-Volatile, N-NonVolatile]:

6. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Notify Table to the configuration file. After making changes to an SNMPv3 Notify Table entry with a Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Notify Table to the configuration file. After making changes to an SNMPv3 Notify Table entry with a NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 282

AT-S62 User’s Guide

Configuring the SNMPv3 Target Address Table

This section contains a description of the SNMPv3 Target Address Table

Menu and how to create, delete, and modify table entries. You use the

SNMPv3 Target Address Table Menu to assign the IP address of a host that is used for generating notifications. The Configure SNMPv3 Target

Address Table Menu is linked internally to the Configure SNMPv3 Notify

Table through the Tag List parameter. The Configure SNMPv3 Notify

Table Menu receives the host IP address through the configuration of the SNMPv3 Target Address Table Menu.

For each Target Address Table entry, you can configure the following parameters:

❑ Target Address Name

❑ Target IP Address

❑ UDP Port

❑ Timeout Value

❑ Number of Retries

❑ Tag List

❑ Target Parameters

❑ Storage Type

You must configure the Tag List parameter with values previously configured in the Notify Tag parameter. The Notify Tag parameter is

located on the Notify Table Menu. See Creating an SNMPv3 Notify Table

Entry on page 276.

There are three functions you can perform with the Configure SNMPv3

Target Address Table Menu.

❑ Creating an SNMPv3 Target Address Table Entry on page 284

❑ Deleting an SNMPv3 Target Address Table Entry on page 286

❑ Modifying an SNMPv3 Target Address Table Entry on page 287

Section III: SNMPv3 Operations 283

Chapter 17: SNMPv3 Configuration

Creating an

SNMPv3 Target

Address Table

Entry

To create an entry in the Configure SNMPv3 Target Address Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 82.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Configure SNMPv3 Target Address Table

Target Addr Name ... host451

Target Parameters .. SNMPmanagerPC

IP Address ......... 198.35.11.1

Timeout ..... 1500

Retries ..... 3

UDP Port# ... 162

Storage Type ....... NonVolatile Row Status .. Active

Tag List ........... hwengTrap hwengInform swengTrap swengInform

1 - Create SNMPv3 Table Entry

2 - Delete SNMPv3 Table Entry

3 - Modify SNMPv3 Table Entry

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 82 Configure SNMPv3 Target Address Table Menu

3. To create an entry in the SNMPv3 Target Address Table, type 1 to select Create SNMPv3 Table Entry.

The following prompt is displayed:

Enter Target Address Name:

4. Enter the name of the SNMP manager, or host, that manages the

SNMP activity on your switch.

You can enter a name of up to 32-alphanumeric characters.

The following prompt is displayed:

Enter IP Address:

5. Enter the IP address of the host.

Section III: SNMPv3 Operations 284

Section III: SNMPv3 Operations

AT-S62 User’s Guide

Use the following format for an IP address:

XXX.XXX.XXX.XXX

The following prompt is displayed:

Enter UDP Port#: [0 to 65535]-> 162

6. Enter a UDP port.

You can enter a UDP port in the range of 0 to 65,535. The default

UDP port is 162.

The following prompt is displayed:

Enter Timeout (10mS): [0 to 2147483647]-> 1500

7. Enter a timeout value in milliseconds.

When an Inform message is generated, it requires a response from the switch. The timeout value determines how long the switch considers the Inform message an active message. This parameter applies to Inform messages only. The range is from 0 to

2,147,483,647 milliseconds. The default value is 1500 milliseconds.

The following prompt is displayed:

Enter Retries:[0 to 255]-> 3

8. Enter the number of times the switch will retry, or resend, an Inform message.

When an Inform message is generated, it requires a response from the switch. This parameter determines how many times the switch resends an Inform message. The Retries parameter applies to Inform messages only. The range is 0 to 255 retries. The default is 3 retries.

The following prompt is displayed:

Enter Tag List:

9. Enter a Tag List.

This list consists of a tag or list of tags you configured in a

Configure SNMPv3 Notify Table entry with the Notify Tag

parameter. See Creating an SNMPv3 Notify Table Entry on page

276. Enter a Tag List of up to 256 alphanumeric characters. Use a

space to separate entries, for example: hwengtag swengtag testengtag

The following prompt is displayed:

Enter Target Parameters:

10. Enter a Target Parameters name.

285

Chapter 17: SNMPv3 Configuration

This name can consist of up to 32-alphanumeric characters. The value configured here must match the value configured with the

Target Parameters Name parameter in the Configure SNMPv3

Target Parameters Table.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

11. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Target Address Table to the configuration file. After making changes to an SNMPv3 Target Address Table entry with a Volatile storage type, the S - Save Configuration

Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Target Address Table to the configuration file. After making changes to an SNMPv3 Target Address entry with a

NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

Note

The Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active value indicates the SNMPv3 Target Address

Table entry will take effect immediately.

12. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Deleting an

SNMPv3 Target

Address Table

Entry

You may want to delete an entry from the SNMPv3 Target Address Table.

After you delete an SNMPv3 Target Address Table entry, there is no way to undelete, or recover, it.

To delete an entry in the SNMPv3 Target Address Table, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

Section III: SNMPv3 Operations 286

AT-S62 User’s Guide

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 84 on page 297.

Note

To display a Group Name and its associated parameters from the

Configure SNMPv3 SecurityToGroup Table Menu, type N to display the Next Page and P to display the previous page.

3. To delete an SNMPv3 Target Address Table entry, type 2 to select

Delete SNMPv3 Table Entry.

The following prompt is displayed:

Enter Target Address Name:

4. Enter a Target Address Name.

The following prompt is displayed:

Do you want to delete this table entry? (Y/N):

[Yes/No]->

5. Enter Y to delete the SNMPv3 Target Address Table entry or N to save it.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying an

SNMPv3 Target

Address Table

Entry

This section describes how to modify parameters in an SNMPv3 Target

Address Table entry. See the following procedures:

❑ Modifying a Target IP Address on page 288

❑ Modifying the Target Address UDP Port on page 289

❑ Modifying the Target Address Timeout on page 290

❑ Modifying the Target Address Retries on page 291

❑ Modifying the Target Address Tag List on page 292

❑ Modifying the Target Parameters Field on page 293

❑ Modifying the Storage Type on page 294

Note

You cannot modify the Target Address Name parameter.

Section III: SNMPv3 Operations 287

Chapter 17: SNMPv3 Configuration

Modifying a Target IP Address

To modify the target IP address in an SNMPv3 Target Address Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 82 on page 284.

3. From the Configure SNMPv3 Target Address Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Address Table Menu is shown in

Figure 83.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify SNMPv3 Target Address Table

Target Addr Name ... host451

Target Parameters .. SNMPmanagerPC

IP Address ......... 198.35.11.1

Storage Type ....... NonVolatile

Timeout ..... 1500

Retries ..... 3

UDP Port# ... 162

Row Status .. Active

Tag List ........... hwengTrap hwengInform swengTrap swengInform

1 - Set Target IP Address

2 - Set Target Address UDP Port

3 - Set Target Address Timeout

4 - Set Target Address Retries

5 - Set Target Address TagList

6 - Set Target Parameters

7 - Set Storage Type

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 83 Modify SNMPv3 Target Address Table Menu

Section III: SNMPv3 Operations 288

Section III: SNMPv3 Operations

AT-S62 User’s Guide

4. To change the Target IP Address, type 1 to select Set Target IP

Address.

The following prompt is displayed:

Enter Target Address Name:

5. Enter a previously configured Target Address Name.

This is the name of the SNMP manager, or host, that manages the

SNMP activity on your switch. You can enter a name of up to 32alphanumeric characters.

The following prompt is displayed:

Enter IP Address:

6. Enter the IP address of the host.

Use the following format for an IP address:

XXX.XXX.XXX.XXX

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Target Address UDP Port

To modify the Target Address UDP Port parameter in an SNMPv3 Target

Address Table entry, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 82 on page 284.

3. From the Configure SNMPv3 Target Address Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Address Table Menu is shown in

Figure 83 on page 288.

4. To change the Target Address UDP Port, type 2 to select Set Target

Address UDP Port.

The following prompt is displayed:

Enter Target Address Name:

5. Enter a previously configured Target Address Name.

289

Chapter 17: SNMPv3 Configuration

Section III: SNMPv3 Operations

This is the name of the SNMP manager, or host, that manages the

SNMP activity on your switch. You can enter a name of up to 32alphanumeric characters.

The following prompt is displayed:

Enter UDP Port#: [0 to 65535]-> 162

6. Enter a UDP port.

You can enter a UDP port in the range of 0 to 65,535. The default

UDP port is 162.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Target Address Timeout

The Target Address Timeout parameter only applies when the message type is an Inform message. To modify the Target Address Timeout parameter in an SNMPv3 Target Address Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 82 on page 284.

3. From the Configure SNMPv3 Target Address Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Address Table Menu is shown in

Figure 83 on page 288.

4. To modify the Target Address Timeout, type 3 to select Set Target

Address Timeout.

The following prompt is displayed:

Enter Target Address Name:

5. Enter a previously configured Target Address Name.

This is the name of the SNMP manager, or host, that manages the

SNMP activity on your switch. You can enter a name of up to 32alphanumeric characters.

The following prompt is displayed:

Enter Timeout (10mS): [0 to 2147483647]-> 1500

290

Section III: SNMPv3 Operations

AT-S62 User’s Guide

6. Enter a timeout value in milliseconds.

When an Inform message is generated, it requires a response from the switch. The timeout value determines how long the switch considers the Inform message an active message. This parameter applies to Inform messages only. The range is from 0 to

2,147,483,647 milliseconds. The default value is 1500 milliseconds.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Target Address Retries

The Target Address Retries parameter only applies when the message type is an Inform message. To modify the Target Address Retries parameter in an SNMPv3 Target Address Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 82 on page 284.

3. From the Configure SNMPv3 Target Address Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Address Table Menu is shown in

Figure 83 on page 288.

4. To modify the Target Address Retries, type 4 to select Set Target

Address Retries.

The following prompt is displayed:

Enter Target Address Name:

5. Enter a previously configured Target Address Name.

This is the name of the SNMP manager, or host, that manages the

SNMP activity on your switch. You can enter a name of up to 32alphanumeric characters.

The following prompt is displayed:

Enter Retries:[0 to 255]-> 3

291

Chapter 17: SNMPv3 Configuration

6. Enter the number of times the switch will retry, or resend, the Inform message.

The range is 0 to 255 retries. The default is 3 retries.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Target Address Tag List

To modify the Target Address Tag List parameter in an SNMPv3 Target

Address Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 82 on page 284.

3. From the Configure SNMPv3 Target Address Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Address Table Menu is shown in

Figure 83 on page 288.

4. To modify the Target Address Tag List, type 5 to select Set Target

Address TagList.

The following prompt is displayed:

Enter Target Address Name:

5. Enter a previously configured Target Address Name.

This is the name of the SNMP manager, or host, that manages the

SNMP activity on your switch. You can enter a name of up to 32alphanumeric characters.

The following prompt is displayed:

Enter Tag List:

Enter a Tag List of up to 256 alphanumeric characters. Use a space to separate entries. This list consists of a tag or list of tags you configured in a Configure SNMPv3 Notify Table entry with the

Notify Tag parameter. See Creating an SNMPv3 Notify Table Entry on page 276.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 292

Section III: SNMPv3 Operations

AT-S62 User’s Guide

Modifying the Target Parameters Field

To modify the Target Parameters field in an SNMPv3 Target Address

Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 82 on page 284.

3. From the Configure SNMPv3 Target Address Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Address Table Menu is shown in

Figure 83 on page 288.

4. To modify the Target Parameters field, type 6 to select Set Target

Parameters.

The following prompt is displayed:

Enter Target Address Name:

5. Enter a previously configured Target Address Name.

This is the name of the SNMP manager, or host, that manages the

SNMP activity on your switch. You can enter a name of up to 32alphanumeric characters.

The following prompt is displayed:

Enter Target Parameters:

6. Enter a Target Parameters Name.

The value configured here must match the value configured with the Target Parameters Name parameter in the Configure SNMPv3

Target Parameters Table. This name can consist of up to 32alphanumeric characters.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

293

Chapter 17: SNMPv3 Configuration

Modifying the Storage Type

To modify the Storage Type parameter in an SNMPv3 Target Address

Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 7 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Address Table Menu is shown in

Figure 82 on page 284.

3. From the Configure SNMPv3 Target Address Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Address Table Menu is shown in

Figure 83 on page 288.

4. To modify the Storage Type, type 7 to select Set Storage Type.

The following prompt is displayed:

Enter Target Address Name:

5. Enter a previously configured Target Address Name.

This is the name of the SNMP manager, or host, that manages the

SNMP activity on your switch. You can enter a name of up to 32alphanumeric characters.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

6. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Target Address Table to the configuration file. After making changes to an SNMPv3 Target Address Table entry with a Volatile storage type, the S - Save Configuration

Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Target Address Table to the configuration file. After making changes to an SNMPv3 Target Address entry with a

NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

Section III: SNMPv3 Operations 294

AT-S62 User’s Guide

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 295

Chapter 17: SNMPv3 Configuration

Configuring the SNMPv3 Target Parameters Table

This section contains a description of the SNMPv3 Target Parameters

Table and how to create, delete, and modify table entries. The SNMPv3

Target Parameters Table links the user security information with the message notification information configured in the Configure SNMPv3

Notify Table Menu and Configure SNMPv3 Target Address Table Menu.

In the SNMPv3 Target Parameters Table, you specify the SNMP parameters that are used when a message is generated to a target, or host, IP address. The SNMPv3 Target Parameters Table also links a User

Name and its related security information, called user security

information, with a host. The user security information consists of the following parameters listed in the SNMPv3 tables where they are configured:

❑ User Name parameter configured in the SNMPv3 User Table Menu

❑ View Name parameter configured in the SNMPv3 View Table

Menu

❑ Group Name, Security Model, and Security Level parameters configured in the SNMPv3 Access Table

❑ User Name, Security Model, and Group Name configured in the

SNMPv3 SecurityToGroup Table

When you enter user security information in an SNMPv3 Target

Parameters Table entry, it must match the configuration in the SNMPv3 tables listed above. If the user security information in the SNMPv3 Target

Parameters Table entry does not match the configuration in the tables listed above, messages are not sent on behalf of the user.

Note

In the SNMPv3 Target Parameters Table, the Security Name parameter is the equivalent to the User Name parameter in the

SNMPv3 User Table.

For each Target Address Table entry, you can configure:

❑ Target Parameters Name

❑ Security Name (User Name)

❑ Security Model

❑ Security Level

❑ Storage Type

Section III: SNMPv3 Operations 296

AT-S62 User’s Guide

Creating an

SNMPv3 Target

Parameters

Table Entry

There are three functions you can perform with the Configure SNMPv3

Target Parameters Table Menu.

❑ Creating an SNMPv3 Target Parameters Table Entry on page 297

❑ Deleting an SNMPv3 Target Parameters Table Entry on page 300

❑ Modifying an SNMPv3 Target Parameters Table Entry on page 301

To create an entry in the Configure SNMPv3 Target Parameters Table, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 8 to select Configure

SNMPv3 Target Parameters Table Menu.

The Configure SNMPv3 Target Parameters Table Menu is shown in

Figure 84.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Configure SNMPv3 Target Parameters Table

Target Parameters Name ... host125parm

Message Processing Model . v3

Security Model............ v3

Security Name ............ murthy

Security Level ........... AuthPriv

Storage Type ............. NonVolatile

Row Status ............... Active

1 - Create SNMPv3 Table Entry

2 - Delete SNMPv3 Table Entry

3 - Modify SNMPv3 Table Entry

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 84 Configure SNMPv3 Target Parameters Table Menu

Section III: SNMPv3 Operations 297

Chapter 17: SNMPv3 Configuration

3. To create an SNMPv3 Target Parameters Table, type 1 to select Create

SNMPv3 Table Entry.

The following prompt is displayed:

Enter Target Parameters Name:

4. Enter a name of the Target Parameters.

Enter a value of up to 32-alphanumeric characters.

Note

You are prompted to enter a value for the Message Processing

Model parameter only if you select SNMPv1 or SNMPv2c as the

Security Model. If you select the SNMPv3 protocol as the Security

Model, then the Message Processing Model is automatically assigned to SNMPv3.

The following prompt is displayed:

Enter User (Security) Name:

5. Enter a User Name.

The value of this parameter is previously configured with the

Configure SNMPv3 User Table. See Creating an SNMPv3 User

Table Entry on page 234.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

6. Select one of the following SNMP protocols as the Security Model for this Security Name, or User Name.

1-v1

Select this value to associate the Security Name, or User Name, with the SNMPv1 protocol.

2-v2c

Select this value to associate the Security Name, or User Name, with the SNMPv2c protocol.

3-v3

Select this value to associate the Security Name, or User Name, with the SNMPv3 protocol. The SNMPv3 protocol allows you to configure the group to authenticate SNMPv3 users and to encrypt messages.

The following prompt is displayed:

Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv,

P-AuthPriv]:

Section III: SNMPv3 Operations 298

Section III: SNMPv3 Operations

AT-S62 User’s Guide

7. Select one of the following Security Levels:

Note

The value you configure for the Security Level must match the value configured for the User Name in the Configure SNMPv3 User Table

Menu. See Creating an SNMPv3 User Table Entry on page 234.

N-NoAuthNoPriv

This option represents no authentication and no privacy protocol.

Select this security level if you do not want to authenticate SNMP users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the only security level you can select.

A-AuthNoPriv

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

P-AuthPriv

This option represents authentication and the privacy protocol.

Select this security level to encrypt messages using a privacy protocol and authenticate SNMP users. This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

8. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Target Parameters Table to the configuration file. After making changes to an SNMPv3 Target Parameters Table entry with a Volatile storage type, the S - Save Configuration

Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Target Parameters Table to the configuration file.

After making changes to an SNMPv3 Target Parameters Table

299

Chapter 17: SNMPv3 Configuration entry with a NonVolatile storage type, the S - Save Configuration

Changes option appears on the Main Menu, allowing you to save your changes.

Note

The Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active value indicates the SNMPv3 Target

Parameters Table entry will take effect immediately.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Deleting an

SNMPv3 Target

Parameters

Table Entry

You may want to delete an entry from the SNMPv3 Target Parameters

Table. When you delete an SNMPv3 Target Parameters Table entry, there is no way to undelete, or recover, it.

To delete an entry in the SNMPv3 Target Parameters Table, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 8 to select Configure

SNMPv3 Target Parameters Table.

The Configure SNMPv3 Parameters Table Menu is shown in Figure

84 on page 297.

Note

To display a Group Name and its associated parameters from the

Configure SNMPv3 SecurityToGroup Table Menu, type N to display the Next Page and P to display the previous page.

3. To delete an SNMPv3 Target Parameters Table entry, type 2 to select

Delete SNMPv3 Table Entry.

The following prompt is displayed:

Enter Target Parameters Name:

4. Enter a Target Parameters Name.

The following prompt is displayed:

Do you want to delete this table entry? (Y/N):

[Yes/No]->

Section III: SNMPv3 Operations 300

AT-S62 User’s Guide

5. Enter Y to delete the SNMPv3 Target Address Table entry or N to save it.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying an

SNMPv3 Target

Parameters

Table Entry

This section provides procedures for modifying parameters in an

SNMPv3 Target Parameters Table entry. The parameter values configured in the Target Parameters Table must match those configured

in the other tables. For a more detailed explanation, see Creating an

SNMPv3 Target Parameters Table Entry on page 297.

In an SNMPv3 Target Parameters Table entry, the Security Name parameter is linked to the User Name parameter on the SNMPv3 User

Table. In an SNMPv3 User Table entry, the User Name parameter is used as an index for the entry. Because the User Name and Security Name parameters are linked, the information you configure that relates to a

User Table entry must match the information you configure in the

SNMPv3 Target Parameters Table entry. In addition, the values configured for the following parameters in an SNMPv3 Target

Parameters Table entry must match those configured in the corresponding table entry:

❑ User Name parameter in the SNMPv3 User Table

❑ View Name parameter in the SNMPv3 View Table

❑ Group Name, Security Model, and Security Level parameters in the SNMPv3 Access Table

❑ User Name, Security Model, Group Name parameters in the

SNMPv3 SecurityToGroup Table

See the following procedures:

❑ Modifying the Security Name (User Name) on page 302

❑ Modifying the Security Model on page 304

❑ Modifying the Security Level on page 305

❑ Modifying the Message Process Model on page 306

❑ Modifying the Storage Type on page 307

Note

You cannot modify the Target Params Name parameter.

Section III: SNMPv3 Operations 301

Chapter 17: SNMPv3 Configuration

Note

You cannot modify an entry in the SNMPv3 Target Parameter Table that contains a value of “default” in the Target Parameters Name field.

Modifying the Security Name (User Name)

In the AT-S62 implementation of the SNMPv3 protocol, the Security

Name and the User Name parameters are equivalent. In the SNMPv3

Target Parameters Table Menu, the Security Name and the User Name parameters are used interchangeably.

When you modify the Security Name parameter, you must use a value that you configured with the User Name parameter in the Configure

SNMPv3 User Table Menu. If you do not use a value configured with the

User Name parameter, messages are not sent on behalf of this User

Name. See Creating an SNMPv3 User Table Entry on page 234.

To modify the Security Name parameter in an SNMPv3 Target Parameter

Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 8 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Parameters Table Menu is shown in

Figure 84 on page 297.

3. From the Configure SNMPv3 Target Parameters Table Menu, type 3 to select Modify SNMPv3 Table Entry.

Section III: SNMPv3 Operations 302

AT-S62 User’s Guide

The Modify SNMPv3 Target Parameters Table Menu is shown in

Figure 85.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify SNMPv3 Target Parameters Table

Target Parameters Name ... host27

Message Processing Model . v3

Security Model............ v3

Security Name ............ hoa

Security Level ........... AuthNoPriv

Storage Type ............. NonVolatile

Row Status ............... Active

1 - Set Security Name

2 - Set Security Model

3 - Set Security Level

4 - Set Message Processing Model

5 - Set Storage Type

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 85 Modify SNMPv3 Target Parameters Table Menu

4. To change the Security Name parameter, type 1 to select Set Security

Name.

The following prompt is displayed:

Enter Target Parameters Name:

5. Enter a previously configured Target Parameters Name.

Enter a value of up to 32-alphanumeric characters.

The following prompt is displayed:

Enter User (Security) Name:

6. Enter a User Name.

Enter a value that you previously configured with the Configure

SNMPv3 User Table Menu. You can enter a value of up to 32alphanumeric characters.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 303

Chapter 17: SNMPv3 Configuration

Section III: SNMPv3 Operations

Modifying the Security Model

For the Security or User Name you have selected, the value of the

Security Model parameter in an SNMPv3 Target Parameter Table entry must match the value of the Security Model parameter in the SNMPv3

Access Table entry.

Caution

If the values of the Security Model parameter in the SNMPv3 User

Table and the SNMPv3 Target Parameter Table entry do not match, notification messages are not generated on behalf of this User

(Security) Name.

To modify the Security Model parameter in an SNMPv3 Target Parameter

Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 8 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Parameters Table Menu is shown in

Figure 84.

3. From the Configure SNMPv3 Target Parameters Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Parameters Table Menu is shown in

Figure 85 on page 303.

4. To change the Security Model, type 2 to select Security Model.

The following prompt is displayed:

Enter Target Parameters Name:

5. Enter a previously configured Target Parameters Name.

Enter a value of up to 32-alphanumeric characters.

The following prompt is displayed:

Enter Security Model [1-v1, 2-v2c, 3-v3]:

6. Select one of the following SNMP protocols that was previously configured as the Security Model for this Security Name, or User

Name.

1-v1

Select this value if this User Name is associated with the SNMPv1 protocol.

304

Section III: SNMPv3 Operations

AT-S62 User’s Guide

2-v2c

Select this value if this User Name is associated with the SNMPv2c protocol.

3-v3

Select this value if this User Name is associated with the SNMPv3 protocol.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Security Level

For the Security or User Name you have selected, the value of the

Security Level parameter in an SNMPv3 Target Parameter Table entry must match the value of the Security Level parameter in the SNMPv3

User Table entry.

To modify the Security Level parameter in an SNMPv3 Target Parameter

Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 8 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Parameters Table Menu is shown in

Figure 84.

3. From the Configure SNMPv3 Target Parameters Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Parameters Table Menu is shown in

Figure 85 on page 303.

4. To modify the Security Level, type 3 to select Set Security Level.

The following prompt is displayed:

Enter Target Parameters Name:

5. Enter a previously configured Target Parameters Name.

Enter a value of up to 32-alphanumeric characters.

The following prompt is displayed:

Enter Security Level [N-NoAuthNoPriv, A-AuthNoPriv,

P-AuthPriv]:

6. Enter the Security Level.

305

Chapter 17: SNMPv3 Configuration

Select one of the following Security Levels:

Note

The value you configure for the Security Level must match the value configured for the User Name in the Configure SNMPv3 User Table

Menu. See Creating an SNMPv3 User Table Entry on page 234.

N-NoAuthNoPriv

This option represents no authentication and no privacy protocol.

Select this security level if you do not want to authenticate SNMP users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the only security level you can select.

A-AuthNoPriv

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

P-AuthPriv

This option represents authentication and the privacy protocol.

Select this security level to encrypt messages using a privacy protocol and authenticate SNMP users. This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Message Process Model

You can modify the Message Process Model for SNMPv1 and SNMPv2c protocol configurations only. When you configure the SNMPv3 protocol, the Message Process Model is automatically assigned to the SNMPv3 protocol.

To modify the Message Process Model parameter in an SNMPv3 Target

Parameter Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

Section III: SNMPv3 Operations 306

Section III: SNMPv3 Operations

AT-S62 User’s Guide

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 8 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Parameters Table Menu is shown in

Figure 84.

3. From the Configure SNMPv3 Target Parameters Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Parameters Table Menu is shown in

Figure 85 on page 303.

4. To modify the Message Process Model, type 4 to select Set Message

Processing Model.

The following prompt is displayed:

Enter Target Parameters Name:

5. Enter a previously configured Target Parameters Name.

Enter a value of up to 32-alphanumeric characters.

The following prompt is displayed:

Enter Message Processing Model[1-v1,2-v2c,3-v3]:

6. Select one of the following SNMP protocols that is used to process, or send messages:

1-v1

Select this value to process messages with the SNMPv1 protocol.

2-v2c

Select this value to process messages with the Security Name, or

User Name, with the SNMPv2c protocol.

3-v3

Select this value to process messages with the SNMPv3 protocol.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Storage Type

To modify the Storage Type parameter in an SNMPv3 Target Parameter

Table entry, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

307

Chapter 17: SNMPv3 Configuration

2. From the Configure SNMPv3 Table Menu, type 8 to select Configure

SNMPv3 Target Address Table.

The Configure SNMPv3 Target Parameters Table Menu is shown in

Figure 84.

3. From the Configure SNMPv3 Target Parameters Table Menu, type 3 to select Modify SNMPv3 Table Entry.

The Modify SNMPv3 Target Parameters Table Menu is shown in

Figure 85 on page 303.

4. To modify the Storage Type, type 5 to select Storage Type.

The following prompt is displayed:

Enter Target Parameters Name:

5. Enter a previously configured Target Parameters Name.

Enter a value of up to 32-alphanumeric characters.

The following prompt is displayed:

Enter Storage Type [V-Volatile, N-NonVolatile]:

6. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Target Parameters Table to the configuration file. After making changes to an SNMPv3 Target Parameters Table entry with a Volatile storage type, the S - Save Configuration

Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Target Parameters Table to the configuration file.

After making changes to an SNMPv3 Target Parameters Table entry with a NonVolatile storage type, the S - Save Configuration

Changes option appears on the Main Menu, allowing you to save your changes.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 308

AT-S62 User’s Guide

Configuring the SNMPv3 Community Table

This section contains a description of the SNMPv3 Community Table and how to create, delete, and modify table entries. The SNMPv3 Community

Table allows you to create SNMPv1 and SNMPv2c Communities using the SNMPv3 Tables.

Allied Telesyn does not recommend that you use the menu described in this section to configure SNMPv1 and SNMPv2c communities. Instead,

use the procedures described in Chapter 5: SNMPv1 and SNMPv2c

Configuration on page 81.

However, if you want to configure SNMPv1 and SNMPv2c with the

SNMPv3 Tables you need to start your configuration with the SNMPv3

Community Table and then create entries in the following tables:

❑ SNMPv3 View Table—See Creating an SNMPv3 View Table Entry on page 244.

❑ SNMPv3 Access Table—See Creating an SNMPv3 Access Table

Entry on page 253.

❑ SNMPv3 SecurityToGroup Table—See Creating an SNMPv3

SecurityToGroup Table Entry on page 268.

❑ SNMPv3 Notify Table—See Configuring the SNMPv3 Notify Table on page 276.

❑ SNMPv3 Target Address Table—See Creating an SNMPv3 Target

Address Table Entry on page 284.

❑ SNMPv3 Target Parameters Table—See Creating an SNMPv3

Target Parameters Table Entry on page 297.

It is important to note that you do not create an entry in the SNMPv3

User Table when you are configuring SNMPv1 and SNMPv2c with the

SNMPv3 Tables. When you configure the SNMPv3 protocol, the various tables are linked with the User Name parameter and its related information. With the SNMPv1 and SNMPv2c configuration, the Security

Name parameter and its related information (configured in the SNMPv3

Community Table Menu) links an SNMPv3 Community Table entry to the other SNMPv3 Table entries.

Note

In the SNMPv3 Community Table entry, the Security Name parameter is not related to the User Name parameter.

Section III: SNMPv3 Operations 309

Chapter 17: SNMPv3 Configuration

Creating an

SNMPv3

Community

Table Entry

For each SNMPv3 Community Table entry, you can configure the following parameters:

❑ Community Index

❑ Community Name

❑ Security Name

❑ Transport Tag

❑ Storage Type

In addition, you can display the entries configured with the Configure

SNMPv1 & SNMPv2c Community Menu in the Configure SNMPv3

Community Table Menu. However, you cannot modify an SNMPv1 &

SNMPv2c Community Table entry with the Configure SNMPv3

Community Table Menu.

There are three functions you can perform with the Configure SNMPv3

Target

Parameters Table Menu.

❑ Creating an SNMPv3 Community Table Entry on page 310

❑ Deleting an SNMPv3 Community Table Entry on page 313

❑ Modifying an SNMPv3 Community Table Entry on page 314

To create an entry in the Configure SNMPv3 Community Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 9 to select Configure

SNMPv3 Community Table.

Section III: SNMPv3 Operations 310

AT-S62 User’s Guide

The Configure SNMPv3 Community Table Menu is shown in

Figure 86.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Configure SNMPv3 Community Table

Community Index ............... ATIIndex1

Community Name ................ 451engineering75

Security Name ................. debashi48

Transport Tag ................. sampletag

Storage Type .................. NonVolatile

Row Status .................... Active

1 - Create SNMPv3 Table Entry

2 - Delete SNMPv3 Table Entry

3 - Modify SNMPv3 Table Entry

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 86 Configure SNMPv3 Community Table Menu

3. To create an entry in the SNMPv3 Community Table, type 1 to select

Create SNMPv3 Table Entry.

The following prompt is displayed:

Enter Community Index:

4. Enter the name of this Community Index.

This parameter describes the name of this community. It is used to index the other parameters in an SNMPv3 Community Table entry. Enter a value of up to 32-alphanumeric characters.

The following prompt is displayed:

Enter Community Name:

5. Enter a Community Name of up to 64 alphanumeric characters.

The value of the Community Name parameter acts as a password for the SNMPv3 Community Table entry. This parameter is case sensitive.

Note

Allied Telesyn recommends that you select SNMP Community

Names carefully to ensure these names are known only to authorized personnel.

Section III: SNMPv3 Operations 311

Chapter 17: SNMPv3 Configuration

The following prompt is displayed:

Enter Security Name:

6. Enter the name of an SNMPv1 and SNMPv2c user.

This name must be unique. Enter a value of up to 32alphanumeric characters.

Note

Do not use a value configured with the User Name parameter in the

SNMPv3 User Table.

The following prompt is displayed:

Enter Transport Tag:

7. Enter a name of up to 32-alphanumeric characters for the Transport

Tag.

The Transport Tag parameter is similar to the Notify Tag parameter in the SNMPv3 Notify Table. Add the value you configure for the Transport Tag parameter to the Tag List parameter in the Target Address Table. In this way, the Transport

Tag parameter links an SNMPv3 Community Table entry with an

entry in the SNMPv3 Target Address Table. See SNMPv3 Target

Address Table on page 231.

The following prompt is displayed:

Enter Storage type [V-volatile, N-NonVolatile]:

8. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Community Table to the configuration file.

After making changes to an SNMPv3 Community Table entry with a Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Community Table to the configuration file. After making changes to an SNMPv3 Community Table entry with a

NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

Note

The Row Status parameter is a read-only field in the Telnet and Local interfaces. The Active value indicates the SNMPv3 Community Table entry takes effect immediately.

Section III: SNMPv3 Operations 312

AT-S62 User’s Guide

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Deleting an

SNMPv3

Community

Table Entry

You may want to delete an entry from the SNMPv3 Community Table.

When you delete an entry in the SNMPv3 Community Table, there is no way to undelete or recover it.

To delete an entry in the SNMPv3 Community Table, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 9 to select Configure

SNMPv3 Community Table.

The Configure SNMPv3 Community Table Menu is shown in

Figure 86 on page 311.

3. To delete an entry in the SNMPv3 Community Table, type 2 to select

Delete SNMPv3 Table Entry.

The following prompt is displayed:

Enter Community Index:

4. Enter the Community Index that you want to delete.

The following prompt is displayed:

Do you want to delete this table entry? (Y/N):

[Yes/No]->

5. Choose one of the following:

Y

Type Y to delete an SNMPv3 Community table entry.

N

Type N to retain the SNMPv3 Community table entry.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 313

Chapter 17: SNMPv3 Configuration

Modifying an

SNMPv3

Community

Table Entry

For each entry in the SNMPv3 Community Table, you can modify the following parameters:

❑ Community Name

❑ Security Name

❑ Transport Tag

❑ Storage Type

However, you cannot modify the Community Index parameter.

Although you can display the SNMPv1 and SNMPv2c configuration

created with the procedures described in Chapter 5: SNMPv1 and

SNMPv2c Configuration on page 81, you cannot modify these

Community Table entries with the SNMPv3 Tables.

See the following procedures:

❑ Modifying the Community Name on page 314

❑ Modifying the Security Name on page 316

❑ Modifying the Transport Tag on page 316

❑ Modifying the Storage Type on page 317

Modifying the Community Name

To modify the Community Name parameter in an SNMPv3 Community

Table entry, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 9 to select Configure

SNMPv3 Community Table.

The Configure SNMPv3 Community Table Menu is shown in

Figure 86 on page 311.

3. From the Configure SNMPv3 Community Table, type 3 to select

Modify SNMPv3 Table Entry.

Section III: SNMPv3 Operations 314

AT-S62 User’s Guide

The Modify SNMPv3 Community Table Menu is shown in Figure

87.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Modify SNMPv3 Community Table

Community Index ............... alliedtelesynindex

Community Name ................ 789bothel23wa

Security Name ................. buster

Transport Tag ................. 72

Storage Type .................. Volatile

Row Status .................... Active

1 - Set Community Name

2 - Set Security Name

3 - Set Transport Tag

4 - Set Storage Type

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 87 Modify SNMPv3 Community Table Menu

4. To change the Community Name, type 1 to select Set Community

Name.

The following prompt is displayed:

Enter Community Index:

5. Enter the Community Index that you want to modify.

The following prompt is displayed:

Enter Community Name:

6. Enter the new Community Name.

The value of the Community Name parameter acts as a password for the SNMPv3 Community Table entry. This parameter is case sensitive. Enter a value of up to 64 alphanumeric characters.

Note

Allied Telesyn recommends that you select SNMP Community

Names carefully to ensure these names are known only to authorized personnel.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 315

Chapter 17: SNMPv3 Configuration

Modifying the Security Name

To modify the Security Name parameter in an SNMPv3 Community Table entry, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 9 to select Configure

SNMPv3 Community Table.

The Configure SNMPv3 Community Table Menu is shown in

Figure 86 on page 311.

3. From the Configure SNMPv3 Community Table, type 3 to select

Modify SNMPv3 Table Entry.

The Modify SNMPv3 Community Table Menu is shown in Figure

87 on page 315.

4. To change the Security Name, type 2 to select Set Security Name.

The following prompt is displayed:

Enter Community Index:

5. Enter the Community Index of the Security Name you want to change.

The following prompt is displayed:

Enter Security Name:

6. Enter the new Security Name.

Enter a value of up to 32-alphanumeric characters.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Transport Tag

To modify the Transport Tag parameter in an SNMPv3 Community Table entry, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

Section III: SNMPv3 Operations 316

Section III: SNMPv3 Operations

AT-S62 User’s Guide

2. From the Configure SNMPv3 Table Menu, type 9 to select Configure

SNMPv3 Community Table.

The Configure SNMPv3 Community Table Menu is shown in

Figure 86 on page 311.

3. From the Configure SNMPv3 Community Table, type 3 to select

Modify SNMPv3 Table Entry.

The Modify SNMPv3 Community Table Menu is shown in Figure

87 on page 315.

4. To change the Transport Tag, type 3 to select Set Transport Tag.

The following prompt is displayed:

Enter Community Index:

5. Enter the Community Index of the Transport Tag you want to change.

The following prompt is displayed:

Enter Transport Tag:

6. Enter the new value for the Transport Tag.

Enter a name of up to 32-alphanumeric characters.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying the Storage Type

To modify the Storage Type parameter in an SNMPv3 Community Table entry, perform the following procedure:

1. Follow steps 1 through 3 in the procedure described in Creating an

SNMPv3 User Table Entry on page 234. Or, from the Main Menu type

5->5->5.

The Configure SNMPv3 Table Menu is shown in Figure 71 on page

235.

2. From the Configure SNMPv3 Table Menu, type 9 to select Configure

SNMPv3 Community Table.

The Configure SNMPv3 Community Table Menu is shown in

Figure 86 on page 311.

3. From the Configure SNMPv3 Community Table, type 3 to select

Modify SNMPv3 Table Entry.

The Modify SNMPv3 Community Table Menu is shown in Figure

87 on page 315.

4. To change the Storage Type, type 4 to select Set Storage Type.

317

Chapter 17: SNMPv3 Configuration

The following prompt is displayed:

Enter Community Index:

5. Enter the Community Index of the Storage Type you want to change.

The following prompt is displayed:

Enter Storage type [V-volatile, N-NonVolatile]:

6. Select one of the following storage types for this table entry:

V - Volatile

Select this storage type if you do not want the ability to an entry in the SNMPv3 Community Table to the configuration file. After making changes to an SNMP Community Table entry with a

Volatile storage type, the S - Save Configuration Changes option does not appear on the Main Menu.

N-NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Community Table to the configuration file. After making changes to an SNMPv3 Community Table entry with a

NonVolatile storage type, the S - Save Configuration Changes option appears on the Main Menu, allowing you to save your changes.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section III: SNMPv3 Operations 318

AT-S62 User’s Guide

Displaying SNMPv3 Table Menus

The procedures in this section describe how to display the SNMPv3

Tables. The following procedures are provided:

❑ Displaying the Display SNMPv3 User Table Menu on page 319

❑ Displaying the Display SNMPv3 View Table Menu on page 321

❑ Displaying the Display SNMPv3 Access Table Menu on page 322

❑ Displaying the Display SNMPv3 SecurityToGroup Table Menu on page 323

❑ Displaying the Display SNMPv3 Notify Table Menu on page 324

❑ Displaying the Display SNMPv3 Target Address Table Menu on page 325

❑ Displaying the Display SNMPv3 Target Parameters Table Menu on page 326

❑ Displaying the Display SNMPv3 Community Table Menu on page

327

Displaying the

Display SNMPv3

User Table

Menu

This section describes how to display the Display SNMPv3 User Table

Menu. For information about the SNMPv3 User Table, see Creating an

SNMPv3 User Table Entry on page 234.

To display the Display SNMPv3 User Table Menu, perform the following procedure.

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 5 to select SNMP

Configuration.

The SNMP Configuration menu is shown in Figure 16 on page 85.

3. From the SNMP Configuration menu, type 5 to select Configure

SNMPv3 Table.

The Configure SNMP Menu is shown in Figure 71 on page 235.

4. From the Configure SNMP Menu, type 6 to select Display SNMPv3

Table.

Section III: SNMPv3 Operations 319

Chapter 17: SNMPv3 Configuration

The Display SNMPv3 Table Menu is shown in Figure 88.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Display SNMPv3 Table

1 - Display SNMPv3 User Table

2 - Display SNMPv3 View Table

3 - Display SNMPv3 Access Table

4 - Display SNMPv3 SecurityToGroup Table

5 - Display SNMPv3 Notify Table

6 - Display SNMPv3 Target Address Table

7 - Display SNMPv3 Target Parameters Table

8 - Display SNMPv3 Community Table

R - Return to Previous Menu

Enter your selection?

Figure 88 Display SNMPv3 Table Menu

5. From the Display SNMPv3 Table Menu, type 1 to select Display

SNMPv3 User Table.

The Display SNMPv3 User Table is shown in Figure 89.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Display SNMPv3 User Table

Engine Id ................. 80:00:00:CF:31:00:30:84:FD:57:DA

User Name ................. spike

Authentication Protocol ... MD5

Privacy Protocol .......... DES

Storage Type .............. NonVolatile

Row Status ................ Active

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 89 Display SNMPv3 User Table Menu

Section III: SNMPv3 Operations 320

AT-S62 User’s Guide

Displaying the

Display SNMPv3

View Table

Menu

This section describes how to display the Display SNMPv3 View Table

Menu. For information about the SNMPv3 View Table parameters, see

Creating an SNMPv3 View Table Entry on page 244.

To display the Display SNMPv3 View Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Displaying the

Display SNMPv3 User Table Menu on page 319. Or, from the Main

Menu type 5->5->6.

2. From the Display SNMPv3 Table Menu, type 2 to select Display

SNMPv3 View Table.

The Display SNMPv3 View Table Menu is shown in Figure 90.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 00:14:33 15-Jan-2004

Display SNMPv3 View Table

View Name ................... tcp

Subtree OID ................. 1.3.6.1

Subtree Mask ................

View Type ................... Included

Storage Type ................ NonVolatile

Row Status .................. Active

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 90 Display SNMPv3 View Table Menu

Section III: SNMPv3 Operations 321

Chapter 17: SNMPv3 Configuration

Displaying the

Display SNMPv3

Access Table

Menu

This section describes how to display the Display SNMPv3 Access Table

Menu. For information about the SNMPv3 Access Table parameters, see

Creating an SNMPv3 Access Table Entry on page 253.

To display the Display SNMPv3 Access Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Displaying the

Display SNMPv3 User Table Menu on page 319. Or, from the Main

Menu type 5->5->6.

2. From the Display SNMPv3 Table Menu, type 3 to select Display

SNMPv3 Access Table.

The Display SNMPv3 Access Table Menu is shown in Figure 91.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display SNMPv3 Access Table

Group Name .... technicalsales

Context Prefix.

Read View...... internet

Write View ....

Notify View ...

Security Model . v3

Security Level . AuthPriv

Context Match .. Exact

Storage Type ... NonVolatile

Row Status ..... Active

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 91 Display SNMPv3 Access Table Menu

Section III: SNMPv3 Operations 322

AT-S62 User’s Guide

Displaying the

Display SNMPv3

SecurityToGroup

Table

Menu

This section describes how to display the Display SNMPv3

SecurityToGroup Table Menu. For more information about the

parameters in the SNMPv3 SecurityToGroup Table Menu, see Creating an SNMPv3 SecurityToGroup Table Entry on page 268.

To display the Display SNMPv3 SecurityToGroup Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Displaying the

Display SNMPv3 User Table Menu on page 319. Or, from the Main

Menu type 5->5->6.

2. From the Display SNMPv3 Table Menu, type 4 to select Display

SNMPv3 SecurityToGroup Table.

The Display SNMPv3 SecurityToGroup Table Menu is shown in

Figure 92.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display SNMPv3 SecurityToGroup Table

Security Model................. v3

Security Name ................. praveen

Group Name .................... hardwareengineering

Storage Type .................. NonVolatile

Row Status .................... Active

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 92 Display SNMPv3 SecurityToGroup Table Menu

Section III: SNMPv3 Operations 323

Chapter 17: SNMPv3 Configuration

Displaying the

Display SNMPv3

Notify Table

Menu

This section describes how to display the Display SNMPv3 Notify Table

Menu. For information about the SNMPv3 Notify Table parameters, see

Creating an SNMPv3 Notify Table Entry on page 276.

To display the Display SNMPv3 Notify Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Displaying the

Display SNMPv3 User Table Menu on page 319. Or, from the Main

Menu type 5->5->6.

2. From the Display SNMPv3 Table Menu, type 5 to select Display

SNMPv3 Notify Table.

The Display SNMPv3 Notify Table Menu is shown in Figure 92.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display SNMPv3 Notify Table

Notify Name ...................... testengineeringTrap

Notify Tag ....................... testengineeringtag

Notify Type ...................... Inform

Storage Type ..................... NonVolatile

Row Status ....................... Active

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 93 Display SNMPv3 Notify Table Menu

Section III: SNMPv3 Operations 324

AT-S62 User’s Guide

Displaying the

Display SNMPv3

Target Address

Table Menu

This section describes how to display the Display SNMPv3 Target

Address Table Menu. For information about the SNMPv3 Target Address

Table parameters, see Creating an SNMPv3 Target Address Table Entry on page 284.

To display the Display SNMPv3 Target Address Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Displaying the

Display SNMPv3 User Table Menu on page 319. Or, from the Main

Menu type 5->5->6.

2. From the Display SNMPv3 Table Menu, type 6 to select Display

SNMPv3 Target Address Table.

The Display SNMPv3 Target Address Table Menu is shown in

Figure 92.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display SNMPv3 Target Address Table

Target Addr Name ... host99

Target Parameters .. SNMPmanagerPC

IP Address ......... 198.35.11.1

Timeout ..... 1500

Retries ..... 5

UDP Port# ... 162

Storage Type ....... NonVolatile

Tag List ........... engTrap engInform

Row Status .. Active

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 94 Display SNMPv3 Target Address Table Menu

Section III: SNMPv3 Operations 325

Chapter 17: SNMPv3 Configuration

Displaying the

Display SNMPv3

Target

Parameters

Table Menu

This section describes how to display the Display SNMPv3 Target

Parameters Table Menu. For information about the SNMPv3 Target

Parameters Table parameters, see Creating an SNMPv3 Target

Parameters Table Entry on page 297.

To display the Display SNMPv3 Target Parameters Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Displaying the

Display SNMPv3 User Table Menu on page 319. Or, from the Main

Menu type 5->5->6.

2. From the Display SNMPv3 Table Menu, type 7 to select Display

SNMPv3 Target Parameters Table.

The Display SNMPv3 Target Parameters Table Menu is shown in

Figure 92.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display SNMPv3 Target Parameters Table

Target Parameters Name ... TargetIndex21

Message Processing Model . v3

Security Model ........... v3

Security Name ............ wilson

Security Level ........... AuthPriv

Storage Type ............. NonVolatile

Row Status ............... Active

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 95 Display SNMPv3 Target Parameters Table Menu

Section III: SNMPv3 Operations 326

AT-S62 User’s Guide

Displaying the

Display SNMPv3

Community

Table Menu

This section describes how to display the Display SNMPv3 Community

Table Menu. For information about the SNMPv3 Community Table

parameters, see Creating an SNMPv3 Community Table Entry on page

310.

To display the Display SNMPv3 Community Table Menu, perform the following procedure.

1. Follow steps 1 through 3 in the procedure described in Displaying the

Display SNMPv3 User Table Menu on page 319. Or, from the Main

Menu type 5->5->6.

2. From the Display SNMPv3 Table Menu, type 8 to select Display

SNMPv3 Community Table.

The Display SNMPv3 Community Table Menu is shown in Figure

92.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display SNMPv3 Community Table

Community Index ........ atiindex14

Community Name ......... sunnyvale

Security Name .......... hoa

Transport Tag........... sampletag14

Storage Type ........... NonVolatile

Row Status ............. Active

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 96 Display SNMPv3 Community Table Menu

Section III: SNMPv3 Operations 327

Section IV

Spanning Tree Protocols

The chapters in this section explain the spanning tree protocols. The chapters include:

❑ Chapter 18: Spanning Tree and Rapid Spanning Tree Protocols on page 329

❑ Chapter 19: Multiple Spanning Tree Protocol on page 352

328

Chapter 18

Spanning Tree and Rapid

Spanning Tree Protocols

This chapter provides background information on the Spanning Tree

Protocol (STP) and Rapid Spanning Tree Protocol (RSTP). The chapter also contains procedures on how to adjust the STP and RSTP bridge and port parameters. The sections in this chapter include:

❑ STP and RSTP Overview on page 330

❑ Enabling or Disabling a Spanning Tree Protocol on page 340

❑ Configuring STP on page 342

❑ Configuring RSTP on page 347

Note

For detailed information on the Spanning Tree Protocol, refer to IEEE

Std 802.1D. For detailed information on the Rapid Spanning Tree

Protocol, refer to IEEE Std 802.1w.

The switch also supports the Multiple Spanning Tree Protocol. For

information, refer to Chapter 19 on page 352.

329

Chapter 18: STP and RSTP

STP and RSTP Overview

The performance of a Ethernet network can be severely impaired by the existence of a data loop in the network topology. A data loop exists when two or more nodes on a network can transmit data to each other over more than one data path. The problem that data loops pose is that

Ethernet packets can become caught in repeating cycles, referred to as broadcast storms, that needlessly consume network bandwidth and can significantly reduce network performance.

STP and RSTP prevent data loops from forming by ensuring that only one path exists between the end nodes in your network. Where multiple paths exist, these protocols place the extra paths in a standby or blocking mode, leaving only one main active path.

STP and RSTP can also activate a redundant path if the main path goes down. They maintain network connectivity by activating a backup redundant path in the event a main link fails or is taken off-line.

The principal different between the two protocols lies in the time each takes to complete the process referred to as convergence. When a change is made to the network topology, such as the addition of a new bridge, a spanning tree protocol must determine whether there are redundant paths that must be blocked to prevent data loops, or activated to maintain communications between the various network segments. This is the process of convergence.

With STP, convergence can take up to a minute to complete in a large network. This can result in the loss of communication between various parts of the network during the convergence process, and the subsequent lost of network traffic.

RSTP is much faster. It can complete a convergence in seconds, and so greatly diminish the possible impact the process can have on your network.

The AT-S62 management software features both spanning tree protocols. Only one spanning tree protocol can be active on a switch at a time. The default active spanning tree is RSTP.

The STP implementation on the AT-S62 management software complies with the IEEE 802.1d standard. The RSTP implementation complies with the IEEE 802.1w standard. The following subsections provide a basic overview on how STP and RSTP operate and define the different parameters that you can adjust.

Section IV: Spanning Tree Protocols 330

AT-S62 User’s Guide

Bridge Priority and the Root

Bridge

The first task that bridges running spanning tree perform is the selection of a root bridge. A root bridge distributes network topology information to the other network bridges and is used by the other bridges to determine if there are redundant paths in the network.

A root bridge is selected by the bridge priority number, also referred to as the bridge identifier, and sometimes the bridge’s MAC address. The bridge with the lowest bridge priority number in the network is selected as the root bridge. If two or more bridges have the same bridge priority number, of those bridges the one with the lowest MAC address is designated as the root bridge.

6

7

4

5

2

3

0

1

You can change the bridge priority number in the AT-S62 software. You can designate which switch on your network you want as the root bridge by giving it the lowest bridge priority number. You might also consider which bridge should function as the backup root bridge in the event you need to take the primary root bridge offline, and assign that bridge the second lowest bridge identifier number.

The bridge priority has a range 0 to 61440 in increments of 4096. To make this easier for you, the management software divides the range into increments. You specify the increment that represents the desired bridge priority value. The range is divided into sixteen increments, as

shown in Table 12.

Table 12 Bridge Priority Value Increments

Increment

Bridge

Priority

Increment

Bridge

Priority

0

4096

8192

12288

16384

20480

24576

28672

12

13

14

15

8

9

10

11

32768

36864

40960

45056

49152

53248

57344

61440

Section IV: Spanning Tree Protocols 331

Chapter 18: STP and RSTP

Path Costs and Port Costs

After the root bridge has been selected, the bridges must determine if the network contains redundant paths. If one is found, they must select a preferred path while placing the redundant paths in a backup or blocking state.

Where there is only one path between a bridge and the root bridge, the bridge is referred to as the designated bridge and the port through which the bridge is communicating with the root bridge is referred to as the

root port.

If redundant paths exist, the bridges that are a part of the paths must determine which path will be the primary, active path, and which path(s) will be placed in the standby, blocking mode. This is accomplished by an determination of path costs. The path offering the lowest cost to the root bridge becomes the primary path and all redundant paths are placed into blocking state.

Path cost is determined through an evaluation of port costs. Every port on a bridge participating in STP has a cost associated with it. The cost of a port on a bridge is typically based on port speed. The faster the port, the lower the port cost. The exception to this is the ports on the root bridge, where all ports have a port cost of 0.

Path cost is simply the sum of the port costs between a bridge and the root bridge.

The port cost of a port on an AT-8524M switch is adjustable through the management software. For STP, the range is 0 to 65,535. For RSTP, the range is 0 to 20,000,000.

Port cost also has an Auto-Detect feature. This feature allows spanning tree to automatically set the port cost according to the speed of the port, assigning a lower value for higher speeds. Auto-Detect is the default

setting. Table 13 lists the STP port costs with Auto-Detect.

Table 13 STP Auto-Detect Port Costs

Port Speed

10 Mbps

100 Mbps

1000 Mbps

Port Cost

100

10

4

Section IV: Spanning Tree Protocols 332

Section IV: Spanning Tree Protocols

AT-S62 User’s Guide

Table 14 lists the STP port costs with Auto-Detect when a port is part of a

port trunk.

Table 14 STP Auto-Detect Port Trunk Costs

Port Speed

10 Mbps

Port Cost

4

100 Mbps

1000 Mbps

4

2

Table 15 lists the RSTP port costs with Auto-Detect.

Table 15 RSTP Auto-Detect Port Costs

Port Speed

10 Mbps

Port Cost

2,000,000

100 Mbps

1000 Mbps

200,000

20,000

Table 16 lists the RSTP port costs with Auto-Detect when the port is part

of a port trunk.

Table 16 RSTP Auto-Detect Port Trunk Costs

Port Speed

10 Mbps

Port Cost

20,000

100 Mbps

1000 Mbps

20,000

2,000

You can override Auto-Detect and set the port cost manually.

333

Chapter 18: STP and RSTP

Port Priority

If two paths have the same cost, the bridges must choose between them to select a preferred path. In some instances this can involve the use of the port priority parameter. This parameter is used as a tie-breaker when two paths have the same cost. The lower the value, the higher the priority given to the port.

The range for port priority is 0 to 240. As with bridge priority, this range is broken into increments, in this case multiples of 16. To select a port

priority for a port, you enter the increment of the desired value. Table 17

lists the values and increments. The default value is 128, which is increment 8.

Table 17 Port Priority Value Increments

Increment

Port

Priority

Increment

Port

Priority

6

7

4

5

2

3

0

1

64

80

96

112

0

16

32

48

12

13

14

15

8

9

10

11

192

208

224

240

128

144

160

176

Forwarding Delay and Topology Changes

If there is a change in the network topology due to a failure, removal, or addition of any active components, the active topology also changes.

This may trigger a change in the state of some blocked ports. However, a change in a port state is not activated immediately.

It might take time for the root bridge to notify all bridges that a topology change has occurred, especially if it is a large network. If a topology change is made before all bridges have been notified, a temporary data loop could occur, and that could adversely impact network performance.

Section IV: Spanning Tree Protocols 334

Section IV: Spanning Tree Protocols

AT-S62 User’s Guide

To forestall the formation of temporary data loops during topology changes, a port designated to change from blocking to forwarding passes through two additional states—listening and learning—before it begins to forward frames. The amount of time a port spends in these states is set by the forwarding delay value. This value states the amount of time that a port spends in the listening and learning states prior to changing to the forwarding state.

The forwarding delay value is adjustable in the AT-S62 management software. The appropriate value for this parameter depends on a number of variables, the size of your network being a primary factor. For large networks, you should specify a value large enough to allow the root bridge sufficient time to propagate a topology change throughout the entire network. For small networks, you should not specify a value so large that a topology change is unnecessarily delayed, which could result in the delay or loss of some network traffic.

Note

The forwarding delay parameter applies only to ports on the switch that are operating STP-compatible mode.

Hello Time and Bridge Protocol Data Units (BPDU)

The bridges that are part of a spanning tree domain communicate with each other using a bridge broadcast frame that contains a special section devoted to carrying STP or RSTP information. This portion of the frame is referred to as the bridge protocol data unit (BPDU). When a bridge is brought online, it issues a BPDU in order to determine whether a root bridge has already been selected on the network, and if not, whether it has the lowest bridge priority number of all the bridges and should therefore become the root bridge.

The root bridge periodically transmits a BPDU to determine whether there have been any changes to the network topology and to inform other bridges of topology changes. The frequency with which the root bridge sends out a BPDU is called the hello time. This is a value that you can set in the AT-S62 software. The interval is measured in seconds and the default is two seconds. Consequently, if an AT-8524M switch is selected as the root bridge of a spanning tree domain, it transmits a

BPDU every two seconds.

335

Chapter 18: STP and RSTP

Point-to-Point Ports and Edge Ports

Note

This section applies only to RSTP and MSTP.

Part of the task of configuring RSTP is defining the port types on the bridge. This relates to the device(s) connected to the port. With the port types defined, RSTP can reconfigure a network much quicker than STP when a change in network topology is detected.

There are two possible selections:

❑ Point-to-point port

❑ Edge port

If a bridge port is operating in full-duplex mode, than the port is

functioning as a point-to-point port. Figure 97 illustrates two AT-8524M

switches that have been connected with one data link. With the link operating in full-duplex, the ports are point-to-point ports.

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Point-to-Point Ports

(Full-duplex Mode)

LINK

MODE

LINK

MODE

Figure 97 Point-to-Point Ports

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Section IV: Spanning Tree Protocols 336

AT-S62 User’s Guide

If a port is operating in half-duplex mode and is not connected to any further bridges participating in STP or RSTP, then the port is an edge

port. Figure 98 illustrates an edge port on an AT-8524M switch. The port

is connected to an Ethernet hub, which in turn is connected to a series of

Ethernet workstations. This is an edge port because it is connected to a device operating at half-duplex mode and there are no participating STP or RSTP devices connected to it.

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Edge Port

8 7

6

5

4 3

2

1

Figure 98 Edge Port

A port can be both a point-to-point and an edge port at the same time. It operates in full-duplex and has no STP or RSTP devices connected to it.

Figure 99 illustrates a port functioning as both a point-to-point and edge

port.

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Point-to-Point and Edge Port

Section IV: Spanning Tree Protocols

Workstation

(Full-duplex Mode)

Figure 99 Point-to-Point and Edge Port

Determining whether a bridge port is point-to-point, edge, or both, can be a bit confusing. For that reason, do not change the default values for this RSTP feature unless you have a good grasp of the concept. In most cases, the default values work well.

337

Chapter 18: STP and RSTP

Mixed STP and

RSTP Network

RSTP IEEE 802.1w is fully compliant with STP IEEE 802.1d. Your network can consist of bridges running both protocols. STP and RSTP in the same network can operate together to create a single spanning tree domain.

There is no reason not to activate RSTP on an AT-8524M switch even when all other switches are running STP. The switch can combine its

RSTP with the STP of the other switches. The switch monitors the traffic on each port for BPDU packets. Ports that receive RSTP BPDU packets operates in RSTP mode while ports receiving STP BPDU packets operate in STP mode.

Spanning Tree and VLANs

The STP and RSTP implementations in the AT-S62 software is a singleinstance spanning tree. The protocols support just one spanning tree.

The single spanning tree encompasses all ports on the switch. If the ports are divided into different VLANs, the spanning tree crosses the

VLAN boundaries. This point can pose a problem in networks containing multiple VLANs that span different switches and are connected with untagged ports. In this situation, STP or RSTP might block a data link because it detects a data loop. This can cause fragmentation of your

VLANs.

This issue is illustrated in Figure 100. Two VLANs, Sales and Production,

span two AT-8524M switches. Two links consisting of untagged ports connect the separate parts of each VLAN. If STP or RSTP is activated on the switches, one of the links is disabled. In the example, the port on the top switch that links the two parts of the Production VLAN is changed to the block state. This leaves the two parts of the Production VLAN unable to communicate with each other.

Sales

VLAN

Production

VLAN

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Blocked Port

Blocked Data Link

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Production

VLAN

LINK

MODE

LINK

MODE

Sales

VLAN

Figure 100 VLAN Fragmentation

Section IV: Spanning Tree Protocols 338

AT-S62 User’s Guide

You can avoid this problem by not activating spanning tree or by connecting VLANs using tagged instead of untagged ports. (For

information on tagged and untagged ports, refer to Chapter 20, Tagged and Port-based Virtual LANs on page 385.) Another approach is to use

the Multiple Spanning Tree Protocol, explained in Chapter 19 on page

352, which allows you to create multiple spanning trees within a

network.

Section IV: Spanning Tree Protocols 339

Chapter 18: STP and RSTP

Enabling or Disabling a Spanning Tree Protocol

The AT-S62 software supports STP, RSTP, and MSTP. (MSTP is explained

in Chapter 19 on page 352.) Only one spanning tree protocol can be

active on the switch at a time. Before you can enable a spanning tree protocol, you must first select it as the active spanning tree protocol on the switch. After you have selected it as the active protocol, you can then configure it and enable or disable it.

To select and activate a spanning tree protocol, or to disable spanning tree, perform the following procedure:

1. From the Main Menu, type 3 to select Spanning Tree Configuration.

The Spanning Tree Configuration menu is shown in Figure 101.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Spanning Tree Configuration

1 - Spanning Tree Status ...... Disabled

2 - Active Protocol Version ... RSTP

3 - Configure Active Protocol

R - Return to Previous Menu

Enter your selection?

Figure 101 Spanning Tree Configuration Menu

Note

Do not enable spanning tree on the switch until after you have selected an activate spanning tree protocol and configured the settings. To disable spanning tree, go to Step 5.

2. To change the active version of spanning tree on the switch, type 2 to select Active Protocol Version.

The following prompt is displayed:

Enter new value (S-STP, R-RSTP, M-MSTP):

3. Type S to select STP, R to select RSTP, or M to select MSTP.

Note

A change to the active spanning tree is automatically saved on the switch.

Section IV: Spanning Tree Protocols 340

AT-S62 User’s Guide

4. If you selected STP as the active spanning tree protocol, go to

Configuring STP on page 342 for further instructions. If you selected

RSTP, go to Configuring RSTP on page 347. If you selected MSTP, go

to Chapter 19 on page 352.

Note

Once you have configured the spanning tree parameters, perform

Steps 5 through 7 to enable spanning tree.

5. To enable or disable spanning tree, type 1 to select Spanning Tree

Status.

The following prompt is displayed:

Enter new value (E-Enable, D-Disable):

6. Type E to enable spanning tree or D to disable it. The default is disabled.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section IV: Spanning Tree Protocols 341

Chapter 18: STP and RSTP

Configuring STP

Configuring STP

Bridge Settings

This section contains the following procedures:

❑ Configuring STP Bridge Settings, next

❑ Configuring STP Port Settings on page 344

This section contains the procedure for configuring a bridge’s STP settings.

Caution

The default STP parameters are adequate for most networks.

Changing them without prior experience and an understanding of how STP works might have a negative effect on your network. You should consult the IEEE 802.1d standard before changing any of the

STP parameters.

To configure the bridge settings, do the following:

1. From the Spanning Tree Configuration menu, type 3 to select

Configure Active Protocol.

The STP Menu is shown in Figure 102.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

STP Menu

1 - Bridge Priority ..... 32768

2 - Bridge Hello Time ... 2

3 - Bridge Forwarding ... 15

4 - Bridge Max Age ...... 20

5 - Bridge Identifier ... 00:30:84:00:00:00

P - STP Port Settings

D - Reset STP to Defaults

R - Return to Previous Menu

Enter your selection?

Figure 102 STP Menu

Section IV: Spanning Tree Protocols 342

Section IV: Spanning Tree Protocols

AT-S62 User’s Guide

2. Adjust the bridge STP settings as needed. The parameters are described below.

1 - Bridge Priority

The priority number for the bridge. This number is used to determine the root bridge for RSTP. The bridge with the lowest priority number is selected as the root bridge. If two or more bridges have the same priority value, the bridge with the numerically lowest MAC address becomes the root bridge. When a root bridge goes offline, the bridge with the next priority number automatically takes over as the root bridge. This parameter can be from 0 (zero) to 61,440 in increments of 4096, with 0 being the highest priority. For a list of the increments, refer

to Table 12, Bridge Priority Value Increments on page 331.

2 - Bridge Hello Time

The time interval between generating and sending configuration messages by the bridge. This parameter can be from 1 to 10 seconds. The default is 2 seconds.

3 - Bridge Forwarding

The waiting period in seconds before a bridge changes to a new state, for example, becomes the new root bridge after the topology changes. If the bridge transitions too soon, not all links may have yet adapted to the change, resulting in network loops.

The range is 4 to 30 seconds. The default is 15 seconds.

4 - Bridge Max Age

The length of time after which stored bridge protocol data units

(BPDUs) are deleted by the bridge. All bridges in a bridged LAN use this aging time to test the age of stored configuration messages called bridge protocol data units (BPDUs). For example, if you use the default value 20, all bridges delete current configuration messages after 20 seconds. This parameter can be from 6 to 40 seconds.

When you select a value for maximum age, observe the following rules:

MaxAge must be greater than (2 x (HelloTime + 1))

MaxAge must be less than (2 x (ForwardingDelay - 1))

Note

The aging time for BPDUs is different from the aging time used by the MAC address table.

5 - Bridge Identifier

The MAC address of the switch. This value cannot be changed.

343

Chapter 18: STP and RSTP

3. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

4. To change STP port settings, go to the next procedure.

Configuring STP

Port Settings

To adjust STP port parameters, perform the following procedure:

1. From the Spanning Tree Configuration menu, type 3 to select STP

Configuration.

The STP Menu is shown in Figure 102 on page 342.

2. From the STP Menu, type P to select STP Port Parameters.

The STP Port Parameters menu is shown in Figure 103.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

User: Manager 11:20:02 02-Jan-2004

STP Port Parameters

1 - Configure STP Port Settings

2 - Display STP Port Configuration

R - Return to Previous Menu

Enter your selection?

Figure 103 STP Port Parameters Menu

3. Type 1 to select Configure STP Port Settings.

The following prompt is displayed:

Start Port to Configure [1 to 26] ->

4. Enter the number of the port you want to configure. To configure a range of ports, enter the first port of the range.

The following prompt is displayed:

End Port to Configure [1 to 24] ->

5. To configure just one port, enter the same port number here as you entered in the previous step. To configure a range of ports, enter the last port of the range.

Section IV: Spanning Tree Protocols 344

Section IV: Spanning Tree Protocols

AT-S62 User’s Guide

The Configure STP Port Settings menu is shown in Figure 104.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure STP Port Settings

Configuring Ports 4-4

1 - Port Priority ..... 128

2 - Port Cost ......... Automatic-Update

R - Return to Previous Menu

Enter your selection?

Figure 104 Configure STP Port Settings Menu

6. Adjust the settings as desired. The parameters are described below.

1 - Port Priority

This parameter is used as a tie breaker when two or more ports are determined to have equal costs to the root bridge. The range is 0 to 240 in increments of 16. The default value is 8 (priority value

128). For a list of the increments, refer to Table 17, Port Priority

Value Increments on page 334.

2 - Port Cost

The spanning tree algorithm uses the cost parameter to decide which port provides the lowest cost path to the root bridge for that LAN. The range is 0 to 65,535. The default setting is Automatic

Update, which sets port cost depending on the speed of the port.

For the default values used by Automatic Update, refer Table 13 on page 332 and Table 14 on page 333.

All changes are immediately activated on the switch.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

345

Chapter 18: STP and RSTP

Displaying STP

Port Settings

To display STP port settings, perform the following procedure:

1. From the Spanning Tree Configuration menu, type 3 to select STP

Configuration.

The STP Menu is shown in Figure 102 on page 342.

2. From the STP Menu, type P to select STP Port Parameters.

The STP Port Parameters menu is shown in Figure 103 on page

344.

3. From the STP Port Parameters menu, type 2 to select Display STP Port

Configuration.

The Display STP Port Configuration menu is shown in Figure 105.

Allied Telesyn AT-8400 Series AT-8524M - AT-S60

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display STP Port Configuration

5

6

3

4

7

8

1

2

Port State Cost Priority

----------------------------------------------

Enabled

Enabled

Auto-Update

Auto-Update

128

128

Enabled

Enabled

Enabled

Enabled

Enabled

Enabled

Auto-Update

Auto-Update

Auto-Update

Auto-Update

Auto-Update

Auto-Update

128

128

128

128

128

128

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 105 Display STP Port Configuration Menu

The information in the menu is as follows:

Port - The port number.

State - Current state of the port. The possible states are Enabled or Disabled.

Cost - Port cost of the port. The default is Auto-Update.

Priority - The number used as a tie-breaker when two or more ports have equal costs to the root bridge.

Section IV: Spanning Tree Protocols 346

AT-S62 User’s Guide

Configuring RSTP

Configuring

RSTP Bridge

Settings

This section contains the following procedures:

❑ Configuring RSTP Bridge Settings, next

❑ Configuring RSTP Port Settings on page 349

This section contains the procedure for configuring a bridge’s RSTP settings.

Caution

The default RSTP parameters are adequate for most networks.

Changing them without prior experience and an understanding of how RSTP works might have a negative effect on your network. You should consult the IEEE 802.1w standard before changing any of the

RSTP parameters.

To configure the RSTP bridge settings, do the following

1. From the Spanning Tree Configuration menu, type 3 to select

Configure Active Protocol.

The RSTP Menu is shown in Figure 106.

Allied Telesyn Ethernet Switch AT-8524M - AT-8024

Production Switch

User: Manager 11:20:02 02-Jan-2004

RSTP Menu

1 - Force Version .......... RSTP

2 - Bridge Priority ........ 32768 (In multiples of 4096: 8)

3 - Bridge Hello Time ...... 2

4 - Bridge Forwarding ...... 15

5 - Bridge Max Age ......... 20

6 - Bridge Identifier ...... 00:30:84:00:00:00

P - RSTP Port Parameters

D - Reset RSTP to Defaults

R - Return to Previous Menu

Enter your selection?

Figure 106 RSTP Menu

Section IV: Spanning Tree Protocols 347

Chapter 18: STP and RSTP

Section IV: Spanning Tree Protocols

2. Adjust the parameters as needed. The parameters are defined below.

1 - Force Version

This selection determines whether the bridge will operate with

RSTP or in an STP-compatible mode. If you select RSTP, the bridge will operate all ports in RSTP, except for those ports that receive

STP BPDU packets. If you select Force STP Compatible, the bridge will operate in RSTP, using the RSTP parameter settings, but it will send only STP BPDU packets out the ports.

2 - Bridge Priority

The priority number for the bridge. This number is used in determining the root bridge for RSTP. The bridge with the lowest priority number is selected as the root bridge. If two or more bridges have the same priority value, the bridge with the numerically lowest MAC address becomes the root bridge. When a root bridge goes off-line, the bridge with the next priority number automatically takes over as the root bridge. This parameter can be from 0 (zero) to 61,440 in increments of 4096, with 0 being the highest priority. For a list of the increments, refer

to Table 12, Bridge Priority Value Increments on page 331.

3 - Bridge Hello Time

The time interval between generating and sending configuration messages by the bridge. This parameter can be from 1 to 10 seconds. The default is 2 seconds.

4 - Bridge Forwarding

The waiting period before a bridge changes to a new state, for example, becomes the new root bridge after the topology changes. If the bridge transitions too soon, not all links may have yet adapted to the change, possibly resulting in a network loop.

The range is 4 to 30 seconds. The default is 15 seconds. This setting applies only to ports running in the STP-compatible mode.

5 - Bridge Max Age

The length of time after which stored bridge protocol data units

(BPDUs) are deleted by the bridge. All bridges in a bridged LAN use this aging time to test the age of stored configuration messages called bridge protocol data units (BPDUs). For example, if you use the default 20, all bridges delete current configuration messages after 20 seconds. This parameter can be from 6 to 40 seconds. The default is 20 seconds.

When you select a value for maximum age, observe the following rules:

MaxAge must be greater than (2 x (HelloTime + 1))

MaxAge must be less than (2 x (ForwardingDelay - 1))

348

AT-S62 User’s Guide

6 - Bridge Identifier

The MAC address of the bridge. The bridge identifier is used as a tie breaker in the selection of the root bridge when two or more bridges have the same bridge priority value. This value cannot be changed.

3. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Configuring

RSTP Port

Settings

To adjust RSTP port parameters, perform the following procedure:

1. From the Spanning Tree Configuration menu, type 3 to select STP

Configuration.

The STP Menu is shown in Figure 102 on page 342.

2. From the STP Menu, type P to select RSTP Port Parameters.

The RSTP Port Parameters menu is shown in Figure 107.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

RSTP Port Parameters

1 - Configure RSTP Port Settings

2 - Display RSTP Port Configuration

3 - Display RSTP Port State

R - Return to Previous Menu

Enter your selection?

Figure 107 RSTP Port Parameters Menu

3. Type 1 to select Configure RSTP Port Settings.

The following prompt is displayed:

Starting Port to Configure [1 to 24] ->

4. Enter the number of the port you want to configure. To configure a range of ports, enter the first port of the range.

The following prompt is displayed:

Ending Port to Configure [1 to 24] ->

5. To configure just one port, enter the same port number here as you entered in the previous step. To configure a range of ports, enter the last port of the range.

Section IV: Spanning Tree Protocols 349

Chapter 18: STP and RSTP

The Configure RSTP Port Settings menu is shown in Figure 108.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure RSTP Port Settings

Configuring Ports 4-4

1 - Port Priority ...... 128

2 - Port Cost .......... Automatic Update

3 - Point-to-Point ..... Auto Detect

4 - Edge Port .......... Yes

R - Return to Previous Menu

Enter your selection?

Figure 108 Configure RSTP Port Settings Menu

6. Adjust the settings as needed. The parameters are explained below.

1 - Port Priority

This parameter is used as a tie breaker when two or more ports are determined to have equal costs to the root bridge. The range is 0 to 240 in increments of 16. The default value is 8 (priority value

128). For a list of the increments, refer to Table 17, Port Priority

Value Increments on page 334.

2 - Port Cost

The spanning tree algorithm uses the cost parameter to decide which port provides the lowest cost path to the root bridge for that LAN. The range is 0 to 20,000,000. The default setting is

Automatic Update, which sets port cost depending on the speed of the port. For the default values used by Automatic Update, refer

Table 15 on page 333 and Table 16 on page 333.

3 - Point-to-Point

This parameter defines whether the port is functioning as a point-

to-point port. For an explanation of this parameter, refer to Pointto-Point Ports and Edge Ports on page 336.

4 - Edge Port

This parameter defines whether the port is functioning as an edge

port. For an explanation of this parameter, refer to Point-to-Point

Ports and Edge Ports on page 336.

7. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section IV: Spanning Tree Protocols 350

AT-S62 User’s Guide

Displaying Port

RSTP Status

The RSTP Port Parameters menu has two selections for displaying a variety of RSTP port information. The two menu selections are discussed below.

2 - Display RSTP Port Configuration

This selection displays a menu that contains the current port settings for the following RSTP parameters:

Port - The port number.

Edge-Port - Whether or not the port is operating as an edge port. The possible settings are Yes and No.

Point-to-Point - Whether or not the port is functioning as a point-topoint port.

Cost - Port cost of the port. The default is Auto-Update.

Priority - The number used as a tie-breaker when two or more ports have equal costs to the root bridge.

3 - Display RSTP Port State

This selection displays a menu that contains the following RSTP operating status for a port:

Port - The port number.

State - Identifies the RSTP state of the port. Possible states are: discarding, learning, and forwarding. A state of disabled means the port has not established a link with its end node.

Role - Indicates the RSTP role of the port. Possible roles are: root, alternate, backup, and designated.

P2P - Whether or not the port is functioning as a point-to-point port.

Version - Indicates whether the port is operating in RSTP mode or STPcompatible mode.

Port Cost - Indicates the port cost of the port.

Section IV: Spanning Tree Protocols 351

Chapter 19

Multiple Spanning Tree Protocol

This chapter provides background information on the Multiple Spanning

Tree Protocol (MSTP). The chapter also explains how to adjust spanning tree bridge and port parameters. The sections in this chapter include:

❑ MSTP Overview on page 353

❑ Configuring MSTP Bridge Settings on page 369

❑ Configuring the CIST Priority on page 372

❑ Creating, Deleting, and Modifying MSTI IDs on page 374

❑ Associating VLANs to MSTI IDs on page 377

❑ Configuring MSTP Port Settings on page 380

❑ Displaying MSTP Port Settings and Status on page 383

Note

For detailed information on the Multiple Spanning Tree Protocol, refer to IEEE Std 802.1s.

Note

You cannot configure MSTP parameters until you have selected the protocol as the active spanning tree protocol on the switch. For

instructions, refer to Enabling or Disabling a Spanning Tree Protocol on page 340.

352

AT-S62 User’s Guide

MSTP Overview

As explained in the previous chapter, STP and RSTP are single-instance spanning trees that search for physical loops across all VLANs in a bridged network. When loops are detected, the protocols stop the loops by placing one or more bridge ports in a blocking state.

As explained in Spanning Tree and VLANs on page 338, activating STP or

RSTP can result in VLAN fragmentation when VLANs that span multiple bridges are interconnected with untagged ports. The untagged ports creating the links can represent a physical loop in the network, which will be blocked by spanning tree. The result can be a loss of communication between different parts of the same VLAN.

One way to resolve this, other than by not activating spanning tree on your network, is to link the switches using tagged ports, which can handle traffic from multiple VLANs simultaneously. The drawback is that the link formed by the tagged ports can create a bottleneck to your

Ethernet traffic, resulting in reduced network performance.

Another approach is to use the Multiple Spanning Tree Protocol (MSTP).

This spanning tree shares many of the same characteristics as RSTP. It features rapid convergence and has many of the same parameters. But the main difference is that while RSTP, just like STP, supports only a single-instance spanning tree, MSTP supports multiple spanning trees within a network.

The following sections describe the terms and concepts of MSTP. If you are not familiar with spanning tree or RSTP, you should first review the

section STP and RSTP Overview on page 330.

Note

Do not activate MSTP on an AT-8524M switch without first familiarizing yourself with the following concepts and guidelines.

Unlike STP and RSTP, you cannot activate this spanning tree protocol on a switch without first configuring the protocol parameters.

Note

The AT-S62 implementation of MSTP complies with the IEEE 802.1s standard and is compatible with versions from other vendors that conform to the standard.

Section IV: Spanning Tree Protocols 353

Chapter 19: Multiple Spanning Tree Protocol

Multiple

Spanning Tree

Instance (MSTI)

The individual spanning trees in MSTP are referred to as Multiple

Spanning Tree Instances (MSTIs). A MSTI can span any number of switches. An AT-8524M switch can support up to 16 MSTIs at a time.

To create a MSTI, you first assign it a number, referred to as the MSTI ID.

The range is 1 to 15. (The switch comes with a default MSTI with an MSTI

ID of 0. This default spanning tree instance is discussed later in Common and Internal Spanning Tree (CIST) on page 362.)

Once you have selected an MSTI ID, you need to define its scope by assigning one or more VLANs to it. An instance can contain any number of VLANs, but a VLAN can belong to only one MSTI at a time.

Here are a couple of examples. Figure 109 illustrates two AT-8524M

switches, each containing the two VLANs Sales and Production. The two parts of each VLAN are connected with a direct link using untagged ports on both switches.

Section IV: Spanning Tree Protocols 354

Section IV: Spanning Tree Protocols

AT-S62 User’s Guide

If the switches were running STP or RSTP, one of the links would be blocked because the links constitute a physical loop. Which link would be blocked would depend on the STP or RSTP bridge settings. In the example, the link between the two parts of the Production VLAN is blocked, resulting in a loss of communications between the two parts of the Production VLAN.

Sales

VLAN

Production

VLAN

Untagged

Ports

LINK

MODE

LINK

MODE

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Blocked

Port

Untagged

Ports

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Figure 109 VLAN Fragmentation with STP or RSTP

355

Chapter 19: Multiple Spanning Tree Protocol

Figure 110 illustrates the same two AT-8524M switches and the same

two virtual LANs. But in this example, the two switches are running MSTP and the two VLANs have been assigned to different spanning tree instances. Both links remain active now that they reside in different

MSTIs, enabling the VLANs to forward traffic over their respective direct link.

Sales

VLAN in

MSTI 1

Production

VLAN in

MSTI 2

Untagged

Ports

LINK

MODE

LINK

MODE

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Untagged

Ports

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Figure 110 MSTP Example of Two Spanning Tree Instances

Section IV: Spanning Tree Protocols 356

Section IV: Spanning Tree Protocols

AT-S62 User’s Guide

A MSTI can contain more than one VLAN. This is illustrated in Figure 111

where there are two AT-8524M switches with four VLANs. There are two

MSTIs, each containing two VLANs. MSTI 1 contains the Sales and

Presales VLANs and MSTI 2 contains the Design and Engineering VLANs.

MSTI 1 MSTI 2

Tagged

Ports

LINK

MODE

LINK

MODE

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

LINK

MODE

LINK

MODE

Tagged

Ports

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

Presales

VLAN

Sales

VLAN

Design

VLAN

Engineering

VLAN

Figure 111 Multiple VLANs in a MSTI

You should note in this example that since an MSTI contains more than one VLAN, the links between the VLAN parts is made with tagged, not untagged, ports so that they can carry traffic from more than one virtual

LAN. Referring again to Figure 111, the tagged link in MSTI 1 is carrying

traffic for both the Presales and Sales VLANs while the tagged link in

MSTI 2 is carrying traffic for the Design and Engineering VLANs.

357

Chapter 19: Multiple Spanning Tree Protocol

VLAN and MSTI

Associations

Part of the task to configuring MSTP involves assigning VLANs to spanning tree instances. The mapping of VLANs to MSTIs is called

associations. A VLAN, either port-based or tagged, can belong to only one instance at a time, but an instance can contain any number of

VLANs.

Multiple

Spanning Tree

Regions

MSTI Guidelines

Here are several guidelines to keep in mind about MSTIs:

❑ An AT-8524M can support up to 16 spanning tree instances, including the CIST, at a time.

❑ A MSTI can contain any number of VLANs.

❑ A VLAN can belong to only one MSTI at a time.

❑ A switch port can belong to more than one spanning tree instance at a time. This allows you to assign a port as a tagged and untagged member of VLANs that belong to different MSTIs. What makes this possible is a port’s ability to be in different MSTP states for different MSTIs. For example, a port can be in the MSTP blocking state for one MSTI and the forwarding state for another spanning tree instance, simultaneously.

❑ A router or Layer 3 network device is required to forward traffic between different VLANs.

Another important concept of MSTP is regions. A MSTP region is defined as a group of bridges that share exactly the same MSTI characteristics.

Those characteristics are:

❑ Configuration name

❑ Revision level

❑ VLANs

❑ VLAN to MSTI ID associations

A configuration name is a name you assign to a region to help you identify it. You must assign each bridge in a region exactly the same name; even the same upper and lowercase lettering. Identifying the regions in your network is easier if you choose names that are characteristic of the functions of the nodes and bridges of the region.

Examples are Sales Region and Engineering Region.

Section IV: Spanning Tree Protocols 358

AT-S62 User’s Guide

The revision level is an arbitrary number you assign to a region. You can use the number to keep track of the revision level of a region’s configuration. For example, you might use this value to maintain the number of times you revise a particular MSTP region. It is not important that you maintain this number, only that each bridge in a region have the same number.

The bridges of a particular region must also have the same VLANs. The names of the VLANs and the VIDs must be same on all bridges of a region.

Finally, the VLANs in the bridges must be associated to the same MSTIs.

If any of the above information is different on two bridges, MSTP considers the bridges as residing in different regions.

Section IV: Spanning Tree Protocols 359

Chapter 19: Multiple Spanning Tree Protocol

Figure 112 illustrates the concept of regions. It shows one MSTP region

consisting of two AT-8524M switches. Each switch in the region has the same configuration name and revision level. The switches also have the same five VLANs and the VLANs are associated with the same MSTIs.

Configuration Name: Marketing Region

Revision Level: 1

VLAN to MSTI Associations:

MSTI ID 1

VLAN: Sales (VID 2)

VLAN: Presales (VID 3)

MSTI ID 2

VLAN: Accounting (VID 4)

MSTI ID 3

VLAN: Marketing (VID 5)

VLAN: Sales Support (VID 6)

Configuration Name: Marketing Region

Revision Level: 1

VLAN to MSTI Associations:

MSTI ID 1

VLAN: Sales (VID 2)

VLAN: Presales (VID 3)

MSTI ID 2

VLAN: Accounting (VID 4)

MSTI ID 3

VLAN: Marketing (VID 5)

VLAN: Sales Support (VID 6)

AT-8524M

AT-8524M

Figure 112 Multiple Spanning Tree Region

Section IV: Spanning Tree Protocols 360

AT-S62 User’s Guide

Section IV: Spanning Tree Protocols

The AT-8524M switch determines regional boundaries by examining the

MSTP BPDUs received on the ports. A port that receives a MSTP BPDU from another bridge with regional information different from its own is considered to be a boundary port and the bridge connected to the port as belonging to another region.

The same is true for any ports connected to bridges running the singleinstance spanning tree STP or RSTP. Those ports are also considered as part of another region.

Each MSTI functions as an independent spanning tree within a region.

Consequently, each MSTI must have a root bridge to locate physical loops within the spanning tree instance. An MSTI’s root bridge is called a

regional root. The MSTIs within a region may share the same regional root or they can have different regional roots.

A regional root for an MSTI must be within the region where the MSTI is located. An MSTI cannot have a regional root that is outside its region.

A regional root is selected by a combination of the MSTI priority value and the bridge’s MAC address. The MSTI priority is analogous to the RSTP bridge priority value. Where they differ is that while the RSTP bridge priority is used to determine the root bridge for an entire bridged network, MSTI priority is used only to determine the regional root for a particular MSTI.

The range for this parameter is the same as the RSTP bridge priority; from 0 to 61,440 in sixteen increments of 4,096. To set the parameter, you specify the increment that represents the desired MSTI priority

value. Table 12 on page 331 lists the increments.

Region Guidelines

Here are several points to remember about regions.

❑ A network can contain any number of regions and a region can contain any number of switches that support MSTP.

❑ An AT-8524M switch can belong to only one region at a time.

❑ A region can contain any number of VLANs.

❑ All of the bridges in a region must have the same configuration name, revision level, VLANs, and VLAN to MSTI associations.

❑ An MSTI cannot span multiple regions.

❑ Each MSTI must have a regional root for locating loops in the instance. MSTIs can share the same regional root or have different roots. A regional root is determined by the MSTI priority value and a bridge’s MAC address.

361

Chapter 19: Multiple Spanning Tree Protocol

❑ The regional root of a MSTI must be in the same region as the

MSTI.

Common and Internal Spanning Tree (CIST)

MSTP has a default spanning tree instance called the Common and

Internal Spanning Tree (CIST). This instance has an MSTI ID of 0.

This instance has unique features and functions that make it different from the MSTIs that you create yourself. First, you cannot delete this instance and you cannot change its MSTI ID.

Second, when you create a new port-based or tagged VLAN, it is by default associated with the CIST and is automatically given an MSTI ID of

0. The Default_VLAN is also associated by default with CIST.

Another critical difference is that when you assign a VLAN to another

MSTI, it still partially remains a member of CIST. This is because CIST is used by MSTP to communicate with other MSTP regions and with any

RSTP and STP single-instance spanning trees in the network. MSTP uses

CIST to participate in the creation of a spanning tree between different regions and between regions and single-instance spanning tree, to form one spanning tree for the entire bridged network.

The reason MSTP uses CIST to form the spanning tree of an entire bridged network is because CIST can cross regional boundaries, while a

MSTI cannot. If a port is a boundary port, that is, if it is connected to another region, that port automatically belongs solely to CIST, even if it was assigned to an MSTI, because only CIST is active outside of a region.

As mentioned earlier, every MSTI must have a root bridge, referred to as a regional root, in order to locate loops within the instance. CIST must also have a regional root. However, the CIST regional root communicates with the other MSTP regions and single-instance spanning trees in the bridged network.

The CIST regional root is set with the CIST Priority parameter. This parameter, which functions similar to the RSTP bridge priority value, is used to select the root bridge for the entire bridged network. If an

AT-8524M has the lowest CIST Priority value among all the spanning tree bridges, it functions as the root bridge for all the MSTP regions and STP and RSTP single-instance spanning trees in the network.

Section IV: Spanning Tree Protocols 362

AT-S62 User’s Guide

MSTP with STP and RSTP

MSTP is fully compatible with STP and RSTP. If a port on an AT-8524M running MSTP receives STP BPDUs, the port sends only STP BPDU packets. If a port receives RSTP BPDUs, the port sends MSTP BPDUs since

RSTP can process MSTP BPDUs.

A port connected to a bridge running STP or RSTP is considered a boundary port of the MSTP region and the bridge as belonging to a different region.

An MSTP region can be considered as a virtual bridge. The implication is that other MSTP regions and STP and RSTP single-instance spanning trees cannot discern the topology or constitution of a MSTP region. The only bridge they are aware of is the regional root of the CIST instance.

Summary of

Guidelines

Careful planning is essential for the successful implementation of MSTP.

This section reviews all the rules and guidelines mentioned in earlier sections, plus a few new ones:

❑ An AT-8524M switch can support up to 16 spanning tree instances, including the CIST, at a time.

❑ A MSTI can contain any number of VLANs.

❑ A VLAN can belong to only one MSTI at a time.

❑ An MSTI ID can be from 1 to 15.

❑ The CIST ID is 0. You cannot change this value.

❑ A switch port can belong to more than one spanning tree instance at a time. This allows you to assign a port as a tagged and untagged member of VLANs that belong to different MSTIs. What makes this possible is a port’s ability to be in different MSTP states for different MSTIs. For example, a port can be in the MSTP blocking state for one MSTI and the forwarding state for another spanning tree instance, simultaneously.

❑ A router or Layer 3 network device is required to forward traffic between VLANs.

❑ A network can contain any number of regions and a region can contain any number of AT-8400 Series switches.

❑ An AT-8524M switch can belong to only one region at a time.

❑ A region can contain any number of VLANs.

❑ All of the bridges in a region must have the same configuration name, revision level, VLANs, and VLAN to MSTI associations.

Section IV: Spanning Tree Protocols 363

Chapter 19: Multiple Spanning Tree Protocol

❑ An MSTI cannot span multiple regions.

❑ Each MSTI must have a regional root for locating loops in the instance. MSTIs can share the same regional root or have different roots. A regional root is determined by the MSTI priority value and a bridge’s MAC address.

❑ The regional root of a MSTI must be in the same region as the

MSTI.

❑ The CIST must have a regional root for communicating with other regions and single-instance spanning trees.

❑ MSTP is compatible with STP and RSTP.

❑ A port transmits CIST information even when it’s associated with another MSTI ID. However, in determining network loops, MSTI

takes precedence over CIST. (This is explained more in Associating

VLANs to MSTIs on page 364.

Note

The AT-S62 implementation of MSTP complies with the IEEE 802.1s standard and is compatible with versions from other vendors that conform to the standard.

Associating VLANs to MSTIs

Allied Telesyn recommends that you assign all VLANs on a switch to an

MSTI. You should not leave a VLAN assigned to just the CIST, including the Default_VLAN. This is to prevent the blocking of a port that should be in the forwarding state. The reason for this guideline is explained below.

An MSTP BPDU contains the instance to which the port transmitting the packet belongs. By default, all ports belong to the CIST instance. So CIST would be included in the BPDU. If the port is a member of a VLAN that has been assigned to another MSTI, that information is also included in the BPDU.

Section IV: Spanning Tree Protocols 364

AT-S62 User’s Guide

This is illustrated in Figure 113. Port 8 in Switch A is a member of a VLAN

assigned to MSTI ID 7 while Port 1 is a member of a VLAN assigned to

MSTI ID 10. The BPDUs transmitted by port 8 to Switch B would indicate that the port is a member of both CIST and MSTI 7, while the BPDUs from

Port 1 would indicate the port is a member of the CIST and MSTI 10.

BPDU Packet

Instance: CIST 0 and MSTI 10

Port 1

Switch A Port 8

AT-8524M

AT-8524M

Switch B

BPDU Packet

Instances: CIST 0 and MSTI 7

Figure 113 CIST and VLAN Guideline - Example 1

At first glance, it might appear that since both ports belong to CIST, a loop would exist between the switches and that MSTP would block a port to stop the loop. However, within a region, MSTI takes precedence over CIST. When Switch B receives a packet from Switch A, it uses MSTI, not CIST, to determine whether a loop exists. And since both ports on

Switch A belong to different MSTIs, Switch B determines that no loop exists.

Section IV: Spanning Tree Protocols 365

Chapter 19: Multiple Spanning Tree Protocol

A problem can arise if you assign some VLANs to MSTIs while leaving

others just to CIST. The problem is illustrated in Figure 114. The network

is the same as the previous example. The only difference is that the VLAN containing Port 8 on Switch A has not been assigned to an MSTI, and belongs only to CIST with its MSTI ID 0.

BPDU Packet

Instance: CIST 0 and MSTI 10

Port 1

Switch A

Port 8

Port 15

AT-8524M

Port 3

AT-8524M

Switch B

BPDU Packet

Instances: CIST 0

Figure 114 CIST and VLAN Guideline - Example 2

When port 3 on Switch B receives a BPDU, the switch notes the port sending the packet belongs only to CIST. Consequently, Switch B uses

CIST in determining whether a loop exists. The result would be that the switch would determine that a loop exists because the other port is also receiving BPDU packets from CIST 0. Switch B would block a port to cancel the loop.

To avoid this issue, always assign all VLANs on a switch, including the

Default_VLAN, to an MSTI. This guarantees that all ports on the switch have an MSTI ID and that helps to ensure that loop detection is based on

MSTI, not CIST.

Connecting VLANs Across Different Regions

Special consideration needs to be taken into account when connecting different MSTP regions or an MSTP region and a single-instance STP or

RSTP region. Unless planned properly, VLAN fragmentation can occur between the VLANS of your network.

As mentioned previously, only the CIST can span regions. A MSTI cannot.

Consequently, you may run into a problem if you use more than one physical data link to connect together various parts of VLANs that reside in bridges in different regions. The result can be a physical loop, which spanning tree disables by blocking ports.

Section IV: Spanning Tree Protocols 366

AT-S62 User’s Guide

This is illustrated in Figure 115. The example show two switches, each

residing in a different region. Port 5 in Switch A is a boundary port. It is an untagged member of the Accounting VLAN, which has been associated with MSTI 4. Port 15 is a tagged and untagged member of three different VLANs, all associated to MSTI 12.

If both switches were a part of the same region, there would be no problem since the ports reside in different spanning tree instances.

However, the switches are part of different regions and MSTIs do not cross regions. Consequently, the result would be that spanning tree would determine that a loop exists between the regions, and Switch B would block a port.

Region 2

Region 1

Port 5

MSTI 4

VLAN (untagged) port: Accounting

AT-8524M

Switch A

AT-8524M

Switch B

Port 15

MSTI 12

VLAN (untagged port): Sales

VLAN (tagged port): Presales

VLAN (tagged port): Marketing

Figure 115 Spanning Regions - Example 1

There are several ways to address this issue. One is to have only one

MSTP region for each subnet in your network.

Another approach is to group those VLANs that need to span regions into the same MSTI. Those VLANs that do not span regions can be assigned to other MSTIs.

Section IV: Spanning Tree Protocols 367

Chapter 19: Multiple Spanning Tree Protocol

Here is an example. Let’s assume that you have two regions that contain the following VLANS:

Region 1 VLANs

Sales

Presales

Marketing

Advertising

Technical Support

Product Management

Project Management

Accounting

Region 2 VLANs

Hardware Engineering

Software Engineering

Technical Support

Product Management

CAD Development

Accounting

The two regions share three VLANs: Technical Support, Product

Management, and Accounting. You could group those VLANs into the same MSTI in each region. For instance, for Region 1 you might group the three VLANs in MSTI 11 and in Region 2 you could group them into

MSTI 6. Once grouped, you can connect the VLANs across the regions using a link of tagged ports.

Section IV: Spanning Tree Protocols 368

AT-S62 User’s Guide

Configuring MSTP Bridge Settings

This section contains the procedure for configuring a bridge’s MSTP settings.

Note

You cannot configure the MSTP parameters until you have selected the protocol as the active spanning tree protocol on the switch. For

instructions, refer to Enabling or Disabling a Spanning Tree Protocol on page 340.

1. From the Main Menu, type 3 to select Spanning Tree Menu.

The Spanning Tree Menu is shown in Figure 101 on page 340.

2. From the Spanning Tree Menu, type 3 to select Configure Active

Protocol.

The MSTP Menu is shown in Figure 116.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

MSTP Menu

1 - Force Version .......... MSTP

2 - Hello Time ............. 2

3 - Forwarding Delay ....... 15

4 - Max Age ................ 20

5 - Max Hops ............... 20

6 - Configuration Name .....

7 - Revision Level ......... 0

8 - Bridge Identifier ...... 00:30:24:1E:EE:11

C - CIST Menu

M - MSTI Menu

V - VLAN-MSTI Association Menu

P - MSTP Port Parameters

D - Reset MSTP to Defaults

R - Return to Previous Menu

Enter your selection?

Figure 116 MSTP Menu

Menu selections 1 to 8 are described below. Selections C, M, V, and

P are described in later sections in this chapter.

Section IV: Spanning Tree Protocols 369

Chapter 19: Multiple Spanning Tree Protocol

3. Adjust the MSTP settings as needed. Changes are immediately activated on the switch. The selections are described below.

1 - Force Version

This selection determines whether the bridge operates with MSTP or in an STP-compatible mode. If you select MSTP, the bridge operates all ports in MSTP, except for those ports that receive STP or RSTP BPDU packets. If you select Force STP Compatible, the bridge uses its MSTP parameter settings, but sends only STP BPDU packets from the ports.

2 - Hello Time

The time interval between generating and sending configuration messages by the bridge. The range of this parameter is 1 to 10 seconds. The default is 2 seconds. This value is active only if the bridge is selected as the root bridge of the network.

3 - Forwarding Delay

The waiting period before a bridge changes to a new state, for example, becomes the new root bridge after the topology changes. If the bridge transitions too soon, not all links may have yet adapted to the change, possibly resulting in a network loop.

The range is 4 to 30 seconds. The default is 15 seconds. This setting applies only to ports running in the STP-compatible mode.

4 - Max Age

The length of time after which stored bridge protocol data units

(BPDUs) are deleted by the bridge. This parameter applies only if the bridged network contains an STP or RSTP single-instance spanning tree. Otherwise, the bridges use the Max Hop counter to delete BPDUs.

All bridges in a single-instance bridged LAN use this aging time to test the age of stored configuration messages called bridge protocol data units (BPDUs). For example, if you use the default of

20, all bridges delete current configuration messages after 20 seconds. The range of this parameter is 6 to 40 seconds. The default is 20 seconds.

In selecting a value for maximum age, the following must be observed:

MaxAge must be greater than (2 x (HelloTime + 1))

MaxAge must be less than (2 x (ForwardingDelay - 1))

Section IV: Spanning Tree Protocols 370

Section IV: Spanning Tree Protocols

AT-S62 User’s Guide

5 - Max Hops

MSTP regions use this parameter to discard BPDUs. The Max Hop counter in a BPDU is decremented every time the BPDU crosses an

MSTP region boundary. Once the counter reaches zero, the BPDU is deleted. The range is 1 to 40 hops. The default is 20.

6 - Configuration Name

The name of the MSTP region. The range is 0 (zero) to 32 alphanumeric characters in length. The name, which is casesensitive, must be the same on all bridges in a region. Examples include Sales Region and Production Region.

7 - Revision Level

The revision level of an MSTP region. The range is 0 (zero) to 255.

This is an arbitrary number that you assign to a region. The revision level must be the same on all bridges in a region.

Different regions can have the same revision level without conflict.

8 - Bridge Identifier

The MAC address of the bridge. The bridge identifier is used as a tie breaker in the selection of a root bridge when two or more bridges have the same bridge priority value. This value cannot be changed.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

371

Chapter 19: Multiple Spanning Tree Protocol

Configuring the CIST Priority

This procedure explains how to adjust the bridge’s CIST priority.

Note

You cannot configure MSTP parameters until you have selected the protocol as the active spanning tree protocol on the switch. For

instructions, refer to Enabling or Disabling a Spanning Tree Protocol on page 340.

This procedure starts from the MSTP Menu. If you do not know how to

access the menu, perform steps 1 and 2 in Configuring MSTP Bridge

Settings on page 369.

To change the CIST priority, do the following:

1. From the MSTP Menu, type to select C to select CIST Menu.

The CIST Menu is shown in Figure 117.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

CIST Menu

CIST Priority ............. 32768

Associated VLANs .......... 1,2,4,11

1 - Modify CIST Priority

R - Return to Previous Menu

Enter your selection?

Figure 117 CIST Menu

The CIST Priority field in the menu displays the current value for this MSTP parameter. This number is used in determining the root bridge of the network spanning tree. This number is analogous to the RSTP bridge priority value. The bridge in the network with the lowest priority number is selected as the root bridge. If two or more bridges have the same bridge or CIST priority values, the bridge with the numerically lowest MAC address becomes the root bridge.

The Associated VLANs field displays the VIDs of the VLANs that are currently associated with CIST and have not been assigned to a

MSTI.

Section IV: Spanning Tree Protocols 372

AT-S62 User’s Guide

2. To change the CIST priority, type 1.

The following prompt is displayed:

Enter new priority [the value will be multiplied by

4096]: [0 to 15] ->

3. Enter the increment that represents the new CIST priority value. The range is 0 (zero) to 61,440 in increments of 4,096, with 0 being the

highest priority. For a list of the increments, refer to Table 12, Bridge

Priority Value Increments on page 331.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section IV: Spanning Tree Protocols 373

Chapter 19: Multiple Spanning Tree Protocol

Creating, Deleting, and Modifying MSTI IDs

The following procedures explain how to create, delete, and modify

MSTI IDs.

Note

You cannot configure MSTP parameters until you have selected the protocol as the active spanning tree protocol on the switch. For

instructions, refer to Enabling or Disabling a Spanning Tree Protocol on page 340.

This procedure starts from the MSTP Menu. If you do not know how to

access the menu, perform steps 1 and 2 in Configuring MSTP Bridge

Settings on page 369.

1. From the MSTP Menu, type M to select MSTI Menu.

The MSTI Menu is shown in Figure 118.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

MSTI Menu

MSTI | Priority | Regional Root ID| Path Cost | Associated VLANs

---------------------------------------------------------------

1

2

32768

32768

00A0D2 1454B3

00A0D2 1454B3

0

0

1,2

4,11

1 - Create MSTI

2 - Delete MSTI

3 - Modify MSTI

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 118 MSTI Menu

The fields in the table are defined below:

MSTI

Lists the MSTI IDs existing on the switch.

Priority

Specifies the MSTI priority value for the MSTI. The steps in this procedure explain how you can assign this value when you create an MSTI ID and how to modify the value for an existing MSTI ID.

Section IV: Spanning Tree Protocols 374

AT-S62 User’s Guide

Regional Root ID

Identifies the regional root for the MSTI by its MAC address.

Path Cost

Specifies the path cost from the bridge to the regional root. If the bridge is the regional root, the value is 0.

Associated VLANs

Specifies the VIDs of the VLANs that have been associated with the MSTI ID.

The table does not include the CIST. The table is empty if no MSTI

IDs have been created.

Creating an

MSTI ID

To create an MSTI ID, do the following:

1. From the MSTI Menu, type 1 to select Create MSTI.

The following prompt is displayed:

Enter the MSTI ID to be created: [1 to 15] ->

2. Enter the new MSTP ID. The MSTI IDs range is from 1 to 15. You can specify only one MSTI ID at a time.

The following prompt is displayed:

Success...Do you want to associate VLANs with this

MSTI ID: [Yes/No] ->

3. If you want to associate VLANs to the MSTI now, type Y for yes. If you want to do it later, type N for no. (To add or remove VLANs from an

existing MSTI, go to Associating VLANs to MSTI IDs on page 377.)

If you respond with yes, this prompt appears:

Enter the list of VLANs:

4. Enter the VIDs of the VLANs that you want to associate with the MSTI

ID. You can specify more than one VLAN at a time (for example, 4,6,11)

To view VIDs, refer to Displaying VLANs on page 410.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Deleting an

MSTI ID

To delete an MSTI ID, do the following:

1. From the MSTI Menu, type 2 to select Delete MSTI.

The following prompt is displayed:

Enter the MSTI ID to be deleted: [1 to 15] ->

2. Enter the MSTP IDs that you want to delete. The range is 1 to 15. (You cannot delete CIST, which has a value of 0.)

All VLANs associated with a deleted MSTP ID are returned to CIST.

Section IV: Spanning Tree Protocols 375

Chapter 19: Multiple Spanning Tree Protocol

3. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Modifying an

MSTI ID

To change the MSTI priority value for an MSTI, do the following:

1. From the MSTI Menu, type 3 to select MSTI Configuration Menu.

The following prompt is displayed:

Enter the MSTI ID to be modified: [1 to 15] ->

2. Enter the MSTP IDs that you want to modify. The range is 1 to 15. You can specify only one MSTI ID at a time.

The following prompt is displayed:

Enter new priority [the value will be multiplied by

4096] [0 to 15] -> 8

3. Enter a new MSTI priority number for this MSTI on the bridge. This parameter is used in selecting a regional root for the MSTI. The range is 0 (zero) to 61,440 in increments of 4,096, with 0 being the highest priority. This parameter is used in selecting a regional root for the

MSTI. For a list of the increments, refer to Table 12, Bridge Priority

Value Increments on page 331.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section IV: Spanning Tree Protocols 376

AT-S62 User’s Guide

Associating VLANs to MSTI IDs

When you create a new MSTI ID, you are given the opportunity of associating VLANs to it. But, once a MSTI ID is created, there might come a time when you want to add more VLANs to it, or perhaps remove

VLANs. This procedure explains how to associate VLANs on the switch to an existing MSTI ID and also how to remove VLANs. Before performing this procedure, note the following:

❑ You must create a MSTI ID before you can assign VLANs to it. To

create a MSTI ID, refer to Creating, Deleting, and Modifying MSTI

IDs on page 374.

❑ You can assign a VLAN to only one MSTI. By default, a VLAN, when created, is associated with the CIST instance, which has a MSTI ID of 0.

❑ An MSTI can contain any number of VLANs.

Note

You cannot configure MSTP parameters until you have selected the protocol as the active spanning tree protocol on the switch. For

instructions, refer to Enabling or Disabling a Spanning Tree Protocol on page 340.

This procedure starts from the MSTP Menu. If you do not know how to

access the menu, perform steps 1 and 2 in Configuring MSTP Bridge

Settings on page 369.

To add or remove a VLAN from an MSTI ID, do the following:

1. From the MSTP Menu, type V to select VLAN-MSTI Association Menu.

Section IV: Spanning Tree Protocols 377

Chapter 19: Multiple Spanning Tree Protocol

The VLAN-MSTI Association Menu is shown in Figure 119.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

VLAN-MSTI Association Menu

MSTI/CIST Associated VLANs

------------------------------------------------------------

0

4

5

7

1,2

6

7,22

1 - Add VLANs to MSTI

2 - Delete VLANs from MSTI

3 - Set VLAN to MSTI association

4 - Clear VLAN to MSTI association

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 119 VLAN-MSTI Association Menu

The fields in the table are defined below:

MSTI / CIST

Lists the CIST and current MSTI IDs on the switch.

Associated VLANs

Specifies the VIDs of the VLANs associated with the CIST and MSTI

IDs. For instance, referring to the figure above, the VLANs with the

VIDs 7 and 22 are assigned to MSTI 7.

Associating a

VLAN to an

MSTI ID

To associate a VLAN to an MSTP ID, do the following:

1. From the VLAN-MSTI Association Menu, type 1 to select Add VLANs to

MSTI.

The following prompt is displayed:

Enter the MSTI ID <enter 0 for CIST> [0 to 15] ->

2. Enter the MSTI ID to which you want to associate a VLAN.

A prompt similar to the following is displayed:

Enter the list of VLANs:

3. Enter the VLAN ID of the virtual LAN you want to associate with the

MSTI ID. You can enter more than one VLAN at a time (for example,

2,4,7). To view VIDs, refer to Displaying VLANs on page 410.

Section IV: Spanning Tree Protocols 378

AT-S62 User’s Guide

The MSTI ID retains any VLANs already associated with it when new VLANs are added.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Removing a

VLAN from an

MSTI ID

To remove a VLAN from an MSTP ID, do the following:

1. From the VLAN-MSTI Association Menu, type 2 to select Delete VLANs from MSTI.

The following prompt is displayed:

Enter the MSTI ID <enter 0 for CIST> [0 to 15] ->

2. Enter the MSTI ID to which you want to associate a VLAN.

A prompt similar to the following is displayed:

Enter the list of VLANs:

3. Enter the VLAN ID of the virtual LAN that you want to remove from the

MSTI ID. You can enter more than one VLAN at a time (for example,

2,4,7) To view VIDs, refer to Displaying VLANs on page 410.

A removed VLAN is returned to CIST.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Associating

VLANs to an

MSTI ID and

Deleting All

Associated

VLANs

To associate VLANs to an MSTP ID while deleting all VLANs that are already associated with it, do the following:

1. From the VLAN-MSTI Association Menu, type 1 to select Add VLANs to

MSTI.

The following prompt is displayed:

Enter the MSTI ID <enter 0 for CIST> [0 to 15] ->

2. Enter the MSTI ID to which you want to associate a VLAN.

3. A prompt similar to the following is displayed:

Enter the list of VLANs:

4. Enter the VLAN ID of the virtual LAN that you want to associate with the MSTI ID. You can enter more than one VLAN at a time (for

example, 2,4,7) (To view VIDs, refer to Displaying VLANs on page 410.)

The VLANs already associated with the MSTI ID are removed when the new VLANs are added. The removed VLANs are returned to

CIST.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section IV: Spanning Tree Protocols 379

Chapter 19: Multiple Spanning Tree Protocol

Configuring MSTP Port Settings

To configure a port’s MSTP parameters, perform the following procedure:

1. From the MSTP Menu, type P to select MSTP Port Parameters.

The MSTP Port Parameters menu is shown in Figure 120.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

MSTP Port Parameters

1 - Configure MSTP Port Settings

2 - Display MSTP Port Configuration

3 - Display MSTP Port State

R - Return to Previous Menu

Enter your selection?

Figure 120 MSTP Port Parameters Menu

2. Type 1 to select Configure MSTP Port Settings.

The following prompt is displayed:

Enter port-list:

3. Enter the port to configure.

The Configure MSTP Port Settings menu is shown in Figure 121.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure MSTP Port Settings

1 - Port Priority ............... 128

2 - Port Internal Path Cost ..... Auto Update

3 - Port External Path Cost ..... 200000

4 - Point-to-Point .............. Auto Detect

5 - Edge Port ................... Yes

C - Check Migration to RSTP on Selected Ports (MCHECK)

R - Return to Previous Menu

Enter your selection?

Figure 121 Configure MSTP Port Settings Menu

Section IV: Spanning Tree Protocols 380

Section IV: Spanning Tree Protocols

AT-S62 User’s Guide

4. Adjust the port settings as needed. The selections are described below:

1 - Port Priority

This parameter is used as a tie breaker when two or more ports are determined to have equal costs to the regional root bridge. The range is 0 to 240 in increments of 16. The default value is 8 (priority

value 128). For a list of the increments, refer to Table 17, Port

Priority Value Increments on page 334.

2- Port Internal Path Cost

The port cost of the port if the port is connected to a bridge which is part of the same MSTP region. The range is 0 to 200,000,000. The default setting is Auto-detect, which sets port cost depending on the speed of the port.

Table 18 lists the MSTP port costs with Auto-Detect.

Table 18 MSTP Auto-Detect Port Costs

Port Speed

10 Mbps

Port Cost

2,000,000

100 Mbps

1000 Mbps

200,000

20,000

Table 19 lists the MSTP port costs with Auto-Detect when the port

is part of a port trunk.

Table 19 MSTP Auto-Detect Port Trunk Costs

Port Speed

10 Mbps

Port Cost

20,000

100 Mbps

1000 Mbps

20,000

2,000

3- Port External Path Cost

The port cost of the port if the port is connected to a bridge which is a member of another MSTP region or is running STP or RSTP. The range is 0 to 200,000,000. The default setting is 200,000.

4 - Point-to-Point

This parameter defines whether the port is functioning as a point-

to-point port. For an explanation of this parameter, refer to Pointto-Point Ports and Edge Ports on page 336.

381

Chapter 19: Multiple Spanning Tree Protocol

5 - Edge Port

This parameter defines whether the port is functioning as an edge

port. For an explanation of this parameter, refer to Point-to-Point

Ports and Edge Ports on page 336.

C - Check Migration To RSTP on Selected Ports (MCHECK)

The MCHECK parameter appears only when MSTP is enabled. This parameter resets a RSTP port, allowing it to send RSTP BPDUs.

When an RSTP bridge receives STP BPDUs on an RSTP port, the port transmits STP BPDUs. The RSTP port continues to transmit

STP BPDUs indefinitely. Type C to reset the RSTP port to transmit

RSTP BPDUs.

Each time a RSTP port is reset by receiving STP BPDUs, you need to type C to reset the RSTP port, allowing it to send RSTP BPDUs.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section IV: Spanning Tree Protocols 382

AT-S62 User’s Guide

Displaying MSTP Port Settings and Status

The MSTP Port Parameters menu, shown in Figure 120 on page 380, has

two selections for displaying a variety of MSTP port information. The two menu selections are described below. (To display the menu, from the

MSTP Menu, type P to select MSTP Port Parameters.)

2 - Display MSTP Port Configuration

This selection displays a menu that contains the current port settings for the following MSTP parameters:

❑ Edge-Port

❑ Point-to-Point Port

❑ External or Internal Port Cost

❑ Port Priority

3 - Display MSTP Port State

This selection displays a menu that contains the following MSTP operating status for a port:

❑ State - Identifies the MSTP state of the port. Possible states are: discarding, learning, and forwarding. A state of disabled means the port has not established a link with its end node.

❑ MSTI-ID - The MSTI ID of the VLAN containing the port. (The MSTI

ID for a regional boundary port is always 0, even if the VLAN containing the port has been associated with a MSTI other than

CIST.)

❑ Role - Indicates the MSTP role of the port. Possible roles are: root, alternate, backup, and designated.

❑ Internal Port Cost - The port cost when the port is connected to a bridge in the same region.

❑ Version - Indicates whether the port is operating in MSTP mode or

STP-compatible mode.

Section IV: Spanning Tree Protocols 383

Section V

Virtual LANs

The chapters in this section explain virtual LANs (VLANs). The chapters include:

❑ Chapter 20: Tagged and Port-based Virtual LANs on page 385

❑ Chapter 21: GARP VLAN Registration Protocol on page 420

❑ Chapter 22: Multiple VLAN Modes on page 446

384

Chapter 20

Tagged and Port-based Virtual

LANs

This chapter contains background information on tagged and portbased virtual LANs (VLANs). It also contains the procedures for creating, modifying, and deleting VLANs from a local or Telnet management session.

This chapter contains the following sections:

❑ VLAN Overview on page 386

❑ Port-based VLAN Overview on page 388

❑ Tagged VLAN Overview on page 395

❑ Creating a Port-based or Tagged VLAN on page 400

❑ Example of Creating a Port-based VLAN on page 404

❑ Example of Creating a Tagged VLAN on page 405

❑ Modifying a VLAN on page 406

❑ Displaying VLANs on page 410

❑ Deleting a VLAN on page 411

❑ Deleting All VLANs on page 414

❑ Displaying PVIDs and Port Priorities on page 415

❑ Enabling or Disabling Ingress Filtering on page 416

❑ Specifying a Management VLAN on page 418

385

Chapter 20: Tagged and Port-based Virtual LANs

VLAN Overview

A VLAN is a group of ports on an Ethernet switch that form a logical

Ethernet segment. The ports of a VLAN form an independent traffic domain where the traffic generated by the nodes of a VLAN remains within the VLAN.

With VLANs, you can segment your network through the switch’s management software and so be able to group nodes with related functions into their own separate, logical LAN segments. These VLAN groupings can be based on similar data needs or security requirements.

For example, you could create separate VLANs for the different departments in your company, such as one for Sales and another for

Accounting.

VLANs offer several important benefits:

❑ Improved network performance

Network performance often suffers as networks grow in size and as data traffic increases. The more nodes on each LAN segment vying for bandwidth, the greater the likelihood overall network performance will decrease.

VLANs improve network performance because VLAN traffic stays within the VLAN. The nodes of a VLAN receive traffic only from nodes of the same VLAN. This reduces the need for nodes to handle traffic not destined for them. It also frees up bandwidth within all the logical workgroups.

Additionally, because each VLAN constitutes a separate broadcast domain, broadcast traffic remains within the VLAN. This too can improve overall network performance.

❑ Increased security

Since data traffic generated by a node in a VLAN is restricted only to the other nodes of the same VLAN, VLANs can be used to control the flow of packets in your network and prevent packets from flowing to unauthorized end nodes.

❑ Simplified network management

VLANs can also simplify network management. Before the advent of VLANs, physical changes to the network often had to been made at the switches in the wiring closets. For example, if an employee changed departments, changing the employee’s LAN segment assignment might require a change to the wiring at the switches.

Section V: Virtual LANs

386

AT-S62 User’s Guide

But with VLANS, you can change the LAN segment assignment of an end node connected to the switch through the switch’s AT-S62 management software. VLAN memberships can be changed any time through the management software without moving the workstations physically, or having to change group memberships by moving cables from one switch port to another.

Additionally, a virtual LAN can span more than one switch. This means that the end nodes of a VLAN do not need to be connected to the same switch and so are not restricted to being in the same physical location.

The AT-8524M switch supports the following types of VLANs you can create yourself:

❑ Port-based VLANs

❑ Tagged VLANs

These VLANs are described in the following sections.

Section V: Virtual LANs

387

Chapter 20: Tagged and Port-based Virtual LANs

Port-based VLAN Overview

As explained in the VLAN Overview on page 386, a VLAN consists of a

group of ports on one or more Ethernet switches that form an independent traffic domain. Traffic generated by the end nodes of a

VLAN remains within the VLAN and does not cross over to the end nodes of other VLANs unless there is an interconnection device, such as a router or Layer 3 switch.

A port-based VLAN is a group of ports on a Fast Ethernet Switch that form a logical Ethernet segment. Each port of a port-based VLAN can belong to only one VLAN at a time.

A port-based VLAN can have as many or as few ports as needed. The

VLAN can consist of all the ports on an Ethernet switch, or just a few ports. A port-based VLAN can also span switches and consist of ports from multiple Ethernet switches.

Note

The AT-8524M switch is preconfigured with one port-based VLAN.

All ports on the switch are members of this VLAN, called the

Default_VLAN.

The parts that make up a port-based VLAN are:

❑ VLAN name

❑ VLAN Identifier

❑ Untagged ports

❑ Port VLAN Identifier

VLAN Name

To create a port-based VLAN, you must give it a name. The name should reflect the function of the network devices that are be members of the

VLAN. Examples include Sales, Production, and Engineering.

VLAN Identifier

Each VLAN in a network must have a unique number assigned to it. This number is called the VLAN identifier (VID). This number uniquely identifies a VLAN in the switch and the network.

If a VLAN consists only of ports located on one physical switch in your network, you assign it a VID different from all other VLANs in your network.

Section V: Virtual LANs

388

Section V: Virtual LANs

AT-S62 User’s Guide

If a VLAN spans multiple switches, then the VID for the VLAN on the different switches should be the same. The switches are then able to recognize and forward frames belonging to the same VLAN even though the VLAN spans multiple switches.

For example, if you had a port-based VLAN titled Marketing that spanned three AT-8524M switches, you would assign the Marketing

VLAN on each switch the same VID.

You can assign this number manually or allow the management software to do it automatically. If you allow the management software to do it automatically, it will select the next available VID. This is acceptable when you are creating a new, unique VLAN.

If you are creating a VLAN on a switch that will be part of a larger VLAN that spans several switch, then you will need to assign the number yourself so that the VLAN has the same VID on all switches.

Untagged Ports

You need to specify which ports on the switch are to be members of a port-based VLAN. Ports in a port-based VLAN are referred to as untagged

ports and the frames received on the ports as untagged frames. The names derive from the fact that the frames received on a port will not contain any information that indicates VLAN membership, and that

VLAN membership will be determined solely by the port’s PVID. (There is another type of VLAN where VLAN membership is determined by information within the frames themselves, rather than by a port’s PVID.

This type of VLAN is explained in Tagged VLAN Overview on page 395.)

A port on a switch can be an untagged member of only one port-based

VLAN at a time. An untagged port cannot be assigned to two port-based

VLANs simultaneously.

Port VLAN Identifier

Each port in a port-based VLAN must have a port VLAN identifier (PVID).

The switch associates a frame to a port-based VLAN by the PVID assigned to the port on which the frame is received, and forwards the frame only to those ports with the same PVID. Consequently, all ports of a port-based VLAN must have the same PVID. Additionally, the PVID of the ports in a VLAN must match the VLAN’s VID.

389

Chapter 20: Tagged and Port-based Virtual LANs

For example, if you were creating a port-based VLAN on a switch and you had assigned the VLAN the VID 5, the PVID for each port in the VLAN would need to be assigned the value 5.

Some switches and switch management programs require that you assign the PVID value for each port manually. However, the AT-S62 management software performs this task automatically. The software automatically assigns a PVID to a port, making it identical to the VID of the VLAN to which the port is a member, when you assign the port as an untagged member to a VLAN.

General Rules for Creating a

Port-based

VLAN

Below is a summary of the general rules to observe when creating a portbased VLAN.

❑ Each port-based VLAN must be assigned a unique VID. If a particular VLAN spans multiples switches, each part of the VLAN on the different switches should be assigned the same VID.

❑ A port can be an untagged member of only one port-based VLAN at a time.

❑ Each port must be assigned a PVID. This value must be the same for all ports in a port-based VLAN and it must match the VLAN’s

VID. This value is automatically assigned by the AT-S62 management software.

❑ A port-based VLAN that spans multiple switches requires a port on each switch where the VLAN is located to function as an interconnection between the switches where the various parts of the VLAN reside.

❑ If there are end nodes in different VLANs that need to communicate with each other, a router or Layer 3 switch is required to interconnect the VLANs.

Drawbacks of

Port-based

VLANs

There are several drawbacks to port-based VLANs:

❑ It is not easy to share network resources, such as servers and printers, across multiple VLANs. A router or Layer 3 switch must be added to the network to provide a means for interconnecting the port-based VLANs. The introduction of a router into your network could create security issues from unauthorized access to your network.

❑ A VLAN that spans several switches requires a port on each switch for the interconnection of the various parts of the VLAN. For example, a VLAN that spans three switches would require one port on each switch to interconnect the various sections of the

VLAN. In network configurations where there are many individual

Section V: Virtual LANs

390

AT-S62 User’s Guide

VLANs that span switches, many ports could end up being used ineffectively just to interconnect the various VLANs.

Port-based

Example 1

Figure 122 illustrates an example of one AT-8524M Fast Ethernet Switch

with three port-based VLANs. (For purposes of the following examples, the Default_VLAN is not shown.)

Engineering VLAN

(VID 3)

Sales VLAN

(VID 2)

AT-8524M Ethernet Switch

Production VLAN

(VID 4)

Port 4

Port 12

LINK

MODE

LINK

MODE

Port 22

MODE

AT-8524M Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

AT-8524M Switch

WAN

Router

Figure 122 Port-based VLAN - Example 1

The table below lists the port assignments for the Sales, Engineering, and Production VLANs on the switch.

Sales VLAN

(VID 2)

Ports 1 - 4 (PVID 2)

Engineering VLAN

(VID 3)

Production VLAN

(VID 4)

Ports 9, 11 - 13 (PVID 3) Ports 21 - 24 (PVID 4)

Section V: Virtual LANs

391

Chapter 20: Tagged and Port-based Virtual LANs

Each VLAN has been assigned a unique VID. You assign this number when you create a VLAN.

The ports have been assigned PVID values. The management software automatically assigns the PVIDs when you create the VLAN. The PVID of a port is the same as the VID to which the port is an untagged member.

In the example, each VLAN has one port connected to the router. The router interconnects the various VLANs and functions as a gateway to the WAN.

Section V: Virtual LANs

392

AT-S62 User’s Guide

Port-based

Example 2

Figure 123 illustrates more port-based VLANs. In this example, two

VLANs, Sales and Engineering, span two Ethernet switches.

Engineering VLAN

(VID 3)

Sales VLAN

(VID 2)

LINK

MODE

LINK

MODE

LINK

MODE

LINK

MODE

Production VLAN

(VID 4)

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

AT-8524M

Ethernet Switch

WAN

Router

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

AT-8524M

Ethernet Switch

Section V: Virtual LANs

Sales VLAN

(VID 2)

Engineering VLAN

(VID 3)

Figure 123 Port-based VLAN - Example 2

393

Chapter 20: Tagged and Port-based Virtual LANs

The table below lists the port assignments for the Sales, Engineering, and Production VLANs on the switches:

Sales VLAN

(VID 2)

Engineering VLAN

(VID 3)

Production VLAN

(VID 4)

AT-8524M Switch (top) Ports 1 - 6, 18 (PVID 2) Ports 9 - 11, 14, 20

(PVID 3)

AT-8524M Switch (bottom) Ports 1 - 6 (PVID 2)

Ports 21 - 24 (PVID 4)

Ports 13, 19-24 (PVID 3) none

❑ Sales VLAN - This VLAN spans both switches. It has a VID value of

2 and consists of seven untagged ports on the top switch and six untagged ports on the bottom switch.

The two parts of the VLAN are connected by a direct link from port

6 on the top switch to port 5 on the bottom switch. This direct link allows the two parts of the Sales VLAN to function as one logical

LAN segment.

Port 18 on the top switch connects to the router. This port allows the Sales VLAN to exchanged Ethernet frames with the other

VLANs and to access the WAN.

❑ Engineering VLAN - The workstations of this VLAN are connected to ports 9 to 11 on the top switch and ports 19 to 24 on the bottom switch.

Since this VLAN spans multiple switches, it needs a direct connection between its various parts to provide a communications path. This is provided in the example with a direct connection from port 14 on the top switch to port 13 on the bottom switch.

This VLAN uses port 20 on the top switch as a connection to the router and the WAN.

❑ Production VLAN - This is the final VLAN in the example. It has the

VLAN of 4 and its ports have been assigned the PVID also of 4.

The nodes of this VLAN are connected only to the top switch. So this VLAN does not require a direct connection to the bottom

VLAN. However, it uses port 22 as a connection to the router.

Section V: Virtual LANs

394

AT-S62 User’s Guide

Tagged VLAN Overview

The second type of user-configured VLAN is the tagged VLAN. VLAN membership in a tagged VLAN is determined by information within the frames that are received on a port. This differs from a port-based VLAN, where the PVIDs assigned to the ports determine VLAN membership.

The VLAN information within an Ethernet frame is referred to as a tag or

tagged header. A tag, which follows the source and destination addresses in a frame, contains the VID of the VLAN to which the frame belongs (IEEE 802.3ac standard). As explained earlier in this chapter in

VLAN Identifier on page 388, this number uniquely identifies each VLAN

in a network.

When a switch receives a frame with a VLAN tag, referred to as a tagged

frame, the switch forwards the frame only to those ports that are members of the VLAN whose VID matches the tag in the frame.

A port receiving or transmitting tagged frames is referred to as a tagged

port. Any network device connected to a tagged port must be IEEE

802.1Q-compliant. This is the standard that outlines the requirements and standards for tagging. The device must be able to process the tagged information on received frames and add tagged information to transmitted frames.

The benefit of a tagged VLAN is that the tagged ports can belong to more than one VLAN at one time. This can greatly simplify the task of adding shared devices to the network. For example, a server can be configured to accept and return packets from many different VLANs simultaneously.

Tagged VLANs are also useful where multiple VLANs span across switches. You can use one port per switch to connect all VLANs on the switch to another switch.

The IEEE 802.1Q standard deals with how this tagging information is used to forward the traffic throughout the switch. The handling of frames tagged with VIDs coming into a port is straightforward. If the incoming frame’s VID tag matches one of the VIDs of a VLAN of which the port is a tagged member, the frame is accepted and forwarded to the appropriate ports. If the frame’s VID does not match any of the

VLANs that the port is a member of, the frame is discarded.

The parts of a tagged VLAN are much the same as those for a port-based

VLAN. They are:

❑ VLAN Name

❑ VLAN Identifier

Section V: Virtual LANs

395

Chapter 20: Tagged and Port-based Virtual LANs

❑ Tagged and Untagged Ports

❑ Port VLAN Identifier

Note

For an explanation of VLAN name and VLAN identifier, refer back to

VLAN Name and VLAN Identifier on page 388.

Tagged and Untagged Ports

You need to specify which ports will be members of the VLAN. In the case of a tagged VLAN, this will usually be a combination of both untagged ports and tagged ports. You specify which ports are tagged and which untagged when you create the VLAN.

An untagged port, whether a member of a port-based VLAN or a tagged

VLAN, can be in only one VLAN at a time. However, a tagged port can be a member of more than one VLAN. A port can also be an untagged member of one VLAN and a tagged member of different VLANs simultaneously.

Port VLAN Identifier

As explained earlier in the discussion on port-based VLANs, the management software automatically assigns a PVID to each port when a port is made a member of a VLAN. The PVID is always identical to the

VLAN’s VID, and that in a port-based VLAN packets are forwarded based on the PVID.

Because a tagged port determines VLAN membership by examining the tagged header within the frames that it receives, you might conclude that there is no need for a PVID. However, the PVID is used if a tagged port receives an untagged frame—a frame without any tagged information. The port forwards the frame based on the port’s PVID. This is only in cases where an untagged frame arrives on a tagged port.

Otherwise, the PVID of a port is ignored on a tagged port.

Section V: Virtual LANs

396

AT-S62 User’s Guide

General Rules for Creating a

Tagged VLAN

Below is a summary of the rules to observe when creating a tagged

VLAN.

❑ Each tagged VLAN must be assigned a unique VID. If a particular

VLAN spans multiple switches, each part of the VLAN on the different switches must be assigned the same VID.

❑ A tagged port can be a member of multiple VLANs.

❑ An untagged port can be an untagged member of only one VLAN at a time.

❑ The AT-8524M can support up to 255 tagged VLANS.

Section V: Virtual LANs

397

Chapter 20: Tagged and Port-based Virtual LANs

Tagged VLAN

Example

Figure 124 illustrates how tagged ports can be used to interconnect IEEE

802.1Q-based products.

Engineering VLAN

(VID 3)

Legacy Server

Sales VLAN

(VID 2)

IEEE 802.1Q

Compliant Server

LINK

MODE

LINK

MODE

LINK

MODE

LINK

MODE

Production VLAN

(VID 4)

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

AT-8524M

Ethernet Switch

WAN

Router

MODE

AT-8524M

Fast Ethernet Switch

STATUS

FAULT

MASTER

RPS

PWR

AT-8524M

Ethernet Switch

Section V: Virtual LANs

Sales VLAN

(VID 2)

Engineering VLAN

(VID 3)

Figure 124 Example of a Tagged VLAN

398

AT-S62 User’s Guide

The port assignments for the VLANs are as follows:

Sales VLAN (VID 2) Engineering VLAN (VID 3) Production VLAN (VID 4)

AT-8524M

Switch

(top)

Untagged Ports Tagged Ports Untagged Ports Tagged Ports Untagged Ports Tagged Ports

1 to 5, 18

(PVID 2)

8, 16 9 to 11, 20

(PVID 3)

8, 16 21 to 24 (PVID 4) 8

AT-8524M

Switch

(bottom)

1 to 5 (PVID 2) 15 19 to 24

(PVID 3)

15 none none

This example is nearly identical to the Port-based Example 2 on page

393. Tagged ports have been added to simplify network implementation

and management.

One of the tagged ports is port 8 on the top switch. This port has been made a tagged member of the three VLANs. It is connected to an IEEE

802.1Q-compliant server, meaning the server can handle frames from multiple VLANs. Now all three VLANs can access the server without having to go through a router or other interconnection device.

It is important to note that even though the server is accepting frames from and transmitting frames to more than one VLAN, data separation and security remain.

Two other tagged ports are used to simplify network design in the example. They are port 16 on the upper switch and port 15 on the lower switch. These ports have been made tagged members of the Sales and

Engineering VLANs. They provide a connection between the different parts of these two VLANs.

In the Port-based Example 2 on page 393, each VLAN needed its own

data link between the switches to connect the different parts of the

VLANs. But with tagged ports, you can use one data link to carry data traffic from several VLANs, while still maintaining data separation and security. The tagged frames, when received by the switch, are delivered only to those ports that belong to the VLAN from which the tagged frame originated.

Section V: Virtual LANs

399

Chapter 20: Tagged and Port-based Virtual LANs

Creating a Port-based or Tagged VLAN

To create a new port-based or tagged VLAN, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

VLAN Configuration

1 - Ingress Filtering Status ........ Enabled

2 - VLANs Mode ...................... User Configured VLANs

3 - Management VLAN ................. 1 (Default_VLAN)

4 - Configure VLANs

5 - Show VLANs

6 - Show PVIDs & Priorities

7 - Configure GARP-GVRP

R - Return to Previous Menu

Enter your selection?

Figure 125 VLAN Configuration Menu

2. From the VLAN Configuration menu, type 4 to select Configure

VLANs.

Note

If option “4 - Configure VLANs” is not displayed in the menu, the switch is running in a multiple VLAN mode. To change a switch’s

VLAN mode, refer to Selecting a VLAN Mode on page 451.

Section V: Virtual LANs

400

Section V: Virtual LANs

AT-S62 User’s Guide

The Configure VLANs menu is shown in Figure 126.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure VLANs

1 - Create VLAN

2 - Modify VLAN

3 - Delete VLAN

4 - Reset to Default VLAN

R - Return to Previous Menu

Enter your selection?

Figure 126 Configure VLANs Menu

3. From the Configure VLANs menu, type 1 to select Create VLAN.

The Create VLAN menu is shown in Figure 127.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Create VLAN

1 - VLAN Name ............

2 - VLAN ID (VID) ........ 2

3 - Tagged Ports .........

4 - Untagged Ports .......

C - Create VLAN

R - Return to Previous Menu

Enter your selection?

Figure 127 Create VLAN Menu

4. Type 1 to select VLAN Name and enter a name for the new VLAN.

The name can be from one to fifteen alphanumeric characters in length. The name should reflect the function of the nodes that will be a part of the VLAN (for example, Sales or Accounting). The name cannot contain spaces or special characters, such as asterisks (*) or exclamation points (!).

If the VLAN will be unique in your network, then the name should be unique as well. If the VLAN will be part of a larger VLAN that spans multiple switches, then the name for the VLAN should be the same on each switch where nodes of the VLAN are connected.

401

Chapter 20: Tagged and Port-based Virtual LANs

Note

A VLAN must be assigned a name.

5. Type 2 to select VLAN ID (VID) and enter a VID value for the new VLAN.

The permitted range of the VID value is 1 to 4094.

Note

A VLAN must have a VID.

The management software will use the next available VID number on the switch as the default value. If this VLAN will be unique in your network, then its VID should also be unique. If this VLAN will be part of a larger VLAN that spans multiple switches, than the VID value for the VLAN should be the same on each switch. For example, if you are creating a VLAN called Sales that will span three switches, the Sales

VLAN on each switch should be assigned the same VID value.

The switch is only aware of the VIDs of the VLANs that exist on the device, and not those that might already be in use in the network. For example, if you add a new AT-8524M switch to a network that already has VLANs using VIDs 2 through 24, the AT-S62 software will still use

VID 2 as the default value for the first VLAN you create on the new switch, even though that VID number is already being used by another VLAN on the network. To prevent inadvertently using the same VID for two different VLANs, you should keep a list of all your network VLANs and their VID values.

6. If the VLAN will contain tagged ports, type 3 to select Tagged Ports and specify the ports. If this VLAN will not contain any tagged ports, leave this field empty.

You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-9), or both (e.g., 2,5,7-9).

7. Type 4 to select Untagged Ports and specify the ports on the switch to function as untagged ports in the VLAN. If this VLAN will not contain any untagged ports, leave this field empty.

You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-9), or both (e.g., 2,5,7-9).

8. Type C to select Create VLAN.

The following message is displayed:

SUCCESS - Press any key to continue.

The AT-S62 software creates the new VLAN. The new VLAN is now ready for network use.

Section V: Virtual LANs

402

Section V: Virtual LANs

AT-S62 User’s Guide

9. Press any key.

The VLAN Configuration menu in Figure 125 on page 400 is

redisplayed.

10. To verify that the VLAN was created correctly, type 5 to select Show

VLANs.

11. Check to see that the VLAN contains the appropriate ports.

12. Repeat this procedure to create additional VLANs.

13. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Note

When you create a new VLAN, ports designated as untagged ports of the new VLAN are automatically removed from their current untagged VLAN assignment. For example, if you are creating a new

VLAN on a switch that contains only the Default_VLAN, the ports that you specify as untagged ports of the new VLAN are automatically removed from the Default_VLAN.

Tagged ports are not removed from any current VLAN assignments because tagged ports can belong to more than one VLAN at a time.

403

Chapter 20: Tagged and Port-based Virtual LANs

Example of Creating a Port-based VLAN

The following procedure creates the Sales VLAN illustrated in Port-based

Example 1 on page 391. This VLAN will be assigned a VID of 2 and will

consist of four untagged ports, Ports 1 to 4. The VLAN will not contain any tagged ports.

To create the Sales VLAN, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 4 to select Configure

VLANs.

The Configure VLANs menu is shown in Figure 126 on page 401.

3. From the Configure VLANs menu, type 1 to select Create VLAN.

The Create VLAN menu is shown in Figure 127 on page 401.

4. Type 1 to select VLAN Name and enter “Sales”.

5. Type 2 to select VLAN ID (VID) and enter “2”. This is the VID value for the new VLAN.

6. Type 4 to select Untagged Ports and enter “1-4”. These are the untagged ports of the VLAN. Press Return.

7. Type C to select Create VLAN.

8. After the switch displays the prompt notifying you that it created the

VLAN, press any key.

The new Sales VLAN has now been created.

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section V: Virtual LANs

404

AT-S62 User’s Guide

Example of Creating a Tagged VLAN

The following procedure creates the Engineering VLAN in the top switch

illustrated in Tagged VLAN Example on page 398. This VLAN will be

assigned a VID of 3. It will consist of four untagged ports, Ports 9, 10, 11, and 20, and two untagged ports, Ports 8 and 16.

To create the example Engineering VLAN, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 4 to select Configure

VLANs.

The Configure VLANs menu is shown in Figure 126 on page 401.

3. From the Configure VLANs menu, type 1 to select Create VLAN.

The Create VLAN menu is shown in Figure 127 on page 401.

4. Type 1 to select VLAN Name and enter “Engineering”.

5. Type 2 to select VLAN ID (VID) and enter “3”. This is the VID value for the new VLAN.

6. Type 3 to select Tagged Ports and enter “8,16”. These are the tagged ports of the VLAN on the switch.

7. Type 4 to select Untagged Ports and enter “9-11, 20”. These are the untagged ports of the VLAN.

8. Type C to select Create VLAN.

9. After the switch displays the prompt notifying you that it created the

VLAN, press any key.

The new Engineering VLAN has now been created.

10. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section V: Virtual LANs

405

Chapter 20: Tagged and Port-based Virtual LANs

Modifying a VLAN

You can use this procedure to add or remove ports from a port-based or tagged VLAN. You can also use this procedure to change a VLAN’s name.

Note

To modify a VLAN, you need to know its VID. To view VLAN VIDs,

refer to Displaying VLANs on page 410.

To modify a VLAN, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 4 to select Configure

VLANs.

The Configure VLANs menu is shown in Figure 126 on page 401.

Note

If option “4 - Configure VLANs” is not displayed in the menu, the switch is running a multiple VLAN mode. To change a switch’s VLAN

mode, refer to Selecting a VLAN Mode on page 451.

3. From the Configure VLANs menu, type 2 to select Modify VLAN.

The Modify VLAN menu is shown in Figure 128.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

Modify VLAN

1 - VLAN ID (VID) ........

2 - Change GARP VLAN

R - Return to Previous Menu

Enter your selection?

Figure 128 Modify VLAN Menu

Option 2 - Change GARP VLAN is described in Converting a Dynamic

GVRP VLAN on page 435.

4. Type 1 to select VLAN ID (VID).

Section V: Virtual LANs

406

Section V: Virtual LANs

AT-S62 User’s Guide

The following prompt is displayed:

Enter new value -> [1 to 4096] ->

5. Enter the VID of the VLAN you want to modify.

The Modify VLAN menu expands to contain all relevant information

about the VLAN, as shown in Figure 129.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

Modify VLAN

1 - VLAN Name .............. Sales

2 - VLAN ID (VID) .......... 3

3 - Tagged Ports ........... 7,9

4 - Untagged Ports ......... 20-24

M - Modify VLAN

R - Return to Previous Menu

Enter your selection?

Figure 129 Expanded Modify VLAN Menu

6. Change the VLAN’s information as desired.

The selections in the menu are described below:

1 - VLAN Name

Use this selection to change the name of a VLAN. The name can be from one to fifteen characters in length. The name should reflect the function of the nodes that will be a part of the VLAN (for example,

Sales or Accounting). The name cannot contain spaces or special characters, such as asterisks (*) or exclamation points (!).

When changing a VLAN’s name, observe the following guidelines:

❑ A VLAN’s new name cannot be the same as the name of another

VLAN on the same switch. For example, if the switch already contains a VLAN called Sales, you cannot change an existing

VLAN’s name to Sales.

❑ You cannot change the name of the Default_VLAN.

Note

A VLAN must have a name.

2 - VLAN ID (VID)

This is the VLAN’s VID value. You cannot change this value.

407

Chapter 20: Tagged and Port-based Virtual LANs

3 - Tagged Ports

Use this selection to add or remove tagged ports from the VLAN. You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-9), or both (e.g., 2,5,7-9).

When adding or removing tagged ports, observe the following guidelines:

❑ The new list of tagged ports will replace the existing tagged ports.

❑ If the VLAN contains tagged ports and you want to remove them all, enter 0 (zero) for this value.

4 - Untagged Ports

Use this selection to add or remove untagged ports from the VLAN.

You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-9), or both (e.g., 2,5,7-9).

When adding or removing untagged ports, observe the following guidelines:

❑ The new list of untagged ports will replace the existing untagged ports.

❑ If you want to remove all untagged ports from the VLAN, enter 0

(zero) for this value.

❑ You cannot change the name of the Default_VLAN, nor can you directly remove untagged ports from the Default_VLAN. Instead, you must assign the port as an untagged port to another VLAN.

An untagged port removed from a VLAN is automatically returned to the Default_VLAN as an untagged port.

7. After making the desired changes, type M to select Modify VLAN.

The following message is displayed:

SUCCESS

Please make sure to manually update any static multicast MAC address(es) entries for this VLAN.

Press any key to continue...

The VLAN has been modified and is now ready for network operations.

Any untagged ports removed from a VLAN are automatically returned to the Default_VLAN as untagged ports.

Section V: Virtual LANs

408

AT-S62 User’s Guide

If you added or removed from the VLAN a port with one or more static

MAC addresses assigned to it, you must update the static addresses by deleting their entries from the MAC address table and reentering them again using the VID of the VLAN to which the port has been moved to. For information on how to add static MAC addresses, refer

to Adding Static Unicast and Multicast MAC Addresses on page 116.

For instructions on how to delete addresses, refer to Deleting Unicast and Multicast MAC Addresses on page 118.

8. Press any key.

The Modify VLAN menu in Figure 128 on page 406 is displayed again.

9. Repeat this procedure starting with Step 4 to modify other VLANs, or return to the Main Menu and type S to select Save Configuration

Changes.

Section V: Virtual LANs

409

Chapter 20: Tagged and Port-based Virtual LANs

Displaying VLANs

To view the name, VID number, and member ports of all the VLANs on a switch, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 5 to select Show VLANs.

An example of the Show VLANs menu is shown in Figure 130.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

Show VLANs

User: Manager 11:20:02 02-Jan-2004

VID VLAN Name VLAN Type Protocol Untagged (U) / Tagged (T)

----------------------------------------------------------------

1

2

3

Default_VLAN

Sales

Production

Port Based

Port Based

Port Based

U: 20-24

T: 7,9

U: 1-7

T: 9

U: 8-19

T: 7

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 130 Show VLANs Menu

The menu contains the following columns of information:

VID - The VLAN ID.

VLAN Name - The name of the VLAN.

VLAN Type - If this column contains Port Based, the VLAN is a portbased or tagged VLAN. If it contains GARP, the VLAN was created automatically by GVRP.

Protocol - If this column is blank, the VLAN is a port-based or tagged

VLAN. If it contains GARP, the VLAN or the port is a dynamic GVRP

VLAN or a dynamic GVRP port of a static VLAN.

Untagged (U) / Tagged (T) - The ports of the VLAN. Tagged ports are designated with a “T” and untagged ports with a “U.”

Section V: Virtual LANs

410

AT-S62 User’s Guide

Deleting a VLAN

This procedure deletes port-based and tagged VLANs from the switch.

All untagged ports in a deleted VLAN are returned to the Default_VLAN.

Note

To delete a VLAN, you need to know its VID. To view VLAN VIDs, refer

to Displaying VLANs on page 410.

To delete a VLAN, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 4 to select Configure

VLANs.

The Configure VLANs menu is shown in Figure 126 on page 401.

Note

If option “4 - Configure VLANs” is not displayed in the menu, the switch is running a multiple VLAN mode. To change a switch’s VLAN

mode, refer to Selecting a VLAN Mode on page 451.

3. From the Configure VLANs menu, type 3 to select Delete VLAN.

The Delete VLAN menu is shown in Figure 131.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Delete VLAN

1 - VLAN ID (VID) ........

R - Return to Previous Menu

Enter your selection?

Figure 131 Delete VLAN Menu

4. Type 1 to select VLAN ID (VID).

The following prompt is displayed:

Enter new value -> [2 to 4094] ->

5. Enter the VID of the VLAN you want to delete. You can specify only one VID at a time.

Section V: Virtual LANs

411

Chapter 20: Tagged and Port-based Virtual LANs

Note

You cannot delete the Default_VLAN, which has a VID of 1.

The Delete VLAN menu expands to contain all relevant information

about the VLAN, as shown in Figure 132.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

Delete VLAN

1 - VLAN Name .............. Sales

2 - VLAN ID (VID) .......... 3

3 - Tagged Ports ........... 7,9

4 - Untagged Ports ......... 20-24

D - Delete VLAN

R - Return to Previous Menu

Enter your selection?

Figure 132 Expanded Delete VLAN Menu

6. Type D to delete the VLAN or R to cancel the procedure.

If you select to delete the VLAN, the following confirmation prompt is displayed:

Are you sure you want to delete this VLAN [Yes/No] ->

7. Type Y to delete the VLAN or N to cancel the procedure. Press Return.

If you select Yes, the VLAN is deleted and the following message is displayed:

SUCCESS

Please make sure to manually delete any static multicast MAC address(es) entries for this VLAN

Press any key to continue ...

All untagged ports in the deleted VLAN are returned to the

Default_VLAN as untagged ports.

Any static addresses assigned to the ports of the VLAN are now obsolete, since the VLAN has been deleted. Those addresses should be deleted from the MAC address table. For instructions on how to

delete addresses, refer to Deleting Unicast and Multicast MAC

Addresses on page 118.

8. Press any key.

Section V: Virtual LANs

412

AT-S62 User’s Guide

9. Repeat this procedure starting with Step 4 to delete other VLANs.

10. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section V: Virtual LANs

413

Chapter 20: Tagged and Port-based Virtual LANs

Deleting All VLANs

This section contains the procedure for deleting all port-based and tagged VLANs, except the Default_VLAN, on a switch. To delete selected

VLANs, perform the procedure Deleting a VLAN on page 411.

To delete all VLANs on a switch, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 4 to select Configure

VLANs.

The Configure VLANs menu is shown in Figure 126 on page 401.

Note

If option “4 - Configure VLANs” is not displayed in the menu, the switch is running in a multiple VLAN mode. To change a switch’s

VLAN mode, refer to Selecting a VLAN Mode on page 451.

3. From the Configure VLANs menu, type 4 to select Reset to Default

VLAN.

The following prompt is displayed:

This operation deletes ALL user created VLANs!

Do you want to continue [Yes/No] ->

4. Type Y to delete all VLANs or N to cancel the procedure. Press Return.

If you select Yes, all port-based and tagged VLANs are deleted and the following message is displayed:

SUCCESS

Please make sure to manually update any static multicast MAC address(es) entries.

Press any key to continue...

All tagged and untagged ports are returned to the Default_VLAN as untagged ports.

Any static addresses assigned to the ports of the VLANs are now obsolete, except for the Default_VLAN, since the VLANs have been deleted. Those addresses should be deleted from the MAC address

table. For instructions on how to delete addresses, refer to Deleting

Unicast and Multicast MAC Addresses on page 118.

5. Press any key.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section V: Virtual LANs

414

AT-S62 User’s Guide

Displaying PVIDs and Port Priorities

The following procedure displays a menu that lists the PVIDs for all the ports on the switch. The menu also contains the current priority queue settings for each port. To display the PVID settings on the switch, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 6 to select Show PVIDs.

The Show PVIDs menu is shown in Figure 133.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager

Show PVIDs

11:20:02 02-Jan-2004

Port PVID

---------------

01

02

03

04

05

06

07

1

1

1

1

1

1

1

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 133 Show PVIDs & Priorities Menu

The PVID column displays the current PVID value for each switch port.

Section V: Virtual LANs

415

Chapter 20: Tagged and Port-based Virtual LANs

Enabling or Disabling Ingress Filtering

There are rules a switch follows when it receives and forwards an

Ethernet frame. There are rules for frames as they enter a port (called

ingress rules) and rules for when a frame is transmitted out a port (called

egress rules). A switch does not accept and forward a frame unless the frame passes the ingress and egress rules.

There are quite a few ingress and egress rules for Fast Ethernet switches.

Fortunately, this discussion need only review the rules as they apply to tagged frames, because ingress filtering does not apply to untagged frames.

First, as a reminder, a tagged frame is an Ethernet frame that contains a tagged header. The header contains the VID of the VLAN to which the

frame originated. For further information, refer to Tagged VLAN

Overview on page 395.

The ingress rules are applied to tagged frames when ingress filtering is activated. The switch examines the tagged header of each tagged frame that enters a port and determines whether the tagged frame and the port that received the frame are members of the same VLAN. If they belong to the same VLAN, the port accepts the frame. If they belong to different VLANs, the port discards the frame.

As an example, assume that a tagged frame with a VID of 4 is received on a port that is a member of a VLAN also with a VID of 4. In this case, the port accepts the frame, because both the frame and the port belong to the same VLAN. If the frame and port belong to different VLANs, the frame is discarded.

How do the egress rules apply when ingress filtering is disabled? First, any tagged frame is accepted on any port on the switch. It does not matter whether the frame and the port belong to the same or different

VLANs.

After the tagged frame is received, the switch examines the tagged header and determines if the VID in the header corresponds to any

VLANs on the switch. If there is no corresponding VLAN, the switch discards the frame. If there is, the switch transmits the frame out the port to the destination node, assuming that the destination node’s MAC address is in the MAC address table, or floods the port to all ports on the

VLAN if the MAC address is not in the table.

In addition, each tagged frame contains a priority tag that informs the switch about the importance of the frame. Frames with a high priority are handled ahead of frames with a low priority.

Section V: Virtual LANs

416

Section V: Virtual LANs

AT-S62 User’s Guide

Activating or deactivating ingress filtering has no effect on the switch’s handling of priority tags. A switch will always examines a priority tag in a tagged frame, without regard to the status of ingress filtering.

In most cases, you will probably want to leave ingress filtering activated on the switch, which is the default. You can enable or disable ingress filtering on a per switch basis. You cannot set this per port.

To enable or disable ingress filtering, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 1 to select Ingress Filtering

Status.

The following prompt is displayed:

Enter Ingress Filtering Status (E-Enable, D-

Disable) ->

3. Type E to activate ingress filtering or D to disable the feature on the switch.

A change to the status of ingress filtering is immediately activated on the switch.

4. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

417

Chapter 20: Tagged and Port-based Virtual LANs

Specifying a Management VLAN

The management VLAN is the VLAN on which an AT-8524M switch expects to receive management packets. This VLAN is important if you will be managing a switch remotely or using the enhanced stacking feature of the switch.

Management packets are packets generated by a management workstation when you manage a switch using the Telnet application protocol or a web browser. The switch will act upon the management packets only if they are received on the management VLAN.

The default management VLAN on an AT-8524M switch is the

Default_VLAN. If you do not create any additional VLANs and link the switches together using untagged ports, then there will be no need to specify a new management VLAN in order to remotely manage the devices.

However, if you create additional VLANs on your switches, it may be necessary for you to create a management communications path and then specify that path as the new management VLAN.

Below are several rules to observe when using this feature:

❑ The management VLAN must exist on each AT-8524M switch that you want to manage.

❑ Using the following procedure, you must specify the management VLAN in the AT-S62 software on each slave and master switch of an enhanced stack.

❑ The uplink and downlink ports on each switch that are functioning as the tagged or untagged data links between the switches must be either tagged or untagged members of the management VLAN.

❑ The port on the switch to which the management station is connected must be a member of the management VLAN. (This rule does not apply when managing the switch locally through the RS-232 terminal port.)

As an example, assume that you have an enhanced stack of seven

AT-8524M switches with one master switch. If the uplink and downlink ports between the various switches are members of the Default_VLAN and if the management station is connected to a port of the

Default_VLAN, you can manage all the switches because the

Default_VLAN is the default management VLAN.

Section V: Virtual LANs

418

Section V: Virtual LANs

AT-S62 User’s Guide

Now assume that you decide to create a VLAN called NMS with a VID of

24 for the sole purpose of remote network management. For this, you need to create the NMS VLAN on each AT-8524M switch that you want to manage remotely, being sure to assign each NMS VLAN the VID of 24.

Then you need to be sure that the uplink and downlink ports connecting the switches together are either tagged or untagged members of the

NMS VLAN. You also need to specify the NMS VLAN as the management

VLAN on each switch using the management software. Finally, you must be sure to connect your management station to a port on a switch that is a tagged or untagged member of the management VLAN.

Note

You cannot specify a management VLAN when the switch is operating in a multiple VLAN mode.

Note

To change the management VLAN on the switch’s of an enhanced stack, your best policy is probably to establish a local management session with each switch and change it through the local session, rather than through enhanced stacking. Changing a switch’s management VLAN through enhanced stacking will prematurely end your management session, which you will not be able to reestablish, at least until you change the management VLAN on the master switch.

To specify a management VLAN, do the following:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 3 to select Management

VLAN.

The following prompt is displayed:

Enter Management VLAN ID [1 to 4094] ->

3. Specify the VID of the VLAN that is to function as the management

VLAN. This VLAN must already exist on the switch.

The following prompt is displayed:

SUCCESS

Press any key to continue ...

4. Press any key.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

419

Chapter 21

GARP VLAN Registration Protocol

This chapter describes the GARP VLAN Registration Protocol (GVRP). It contains the following sections:

❑ Basic Overview of GARP VLAN Registration Protocol (GVRP) on page 421

❑ Technical Overview of Generic Attribute Registration Protocol

(GARP) on page 426

❑ Configuring GVRP on page 430

❑ Enabling or Disabling GVRP on a Port on page 432

❑ Converting a Dynamic GVRP VLAN on page 435

❑ Displaying GVRP Parameters and Statistics on page 436

420

AT-S62 User’s Guide

Basic Overview of GARP VLAN Registration Protocol (GVRP)

The GARP VLAN Registration Protocol (GVRP) allows network devices to share VLAN information. The main purpose of GVRP is to allow switches to automatically discover some of the VLAN information that would otherwise have to be manually configured in each switch.

This can be helpful in networks where VLANs span more than one switch. Without GVRP, you must manually configure your switches to ensure that the various parts of a VLAN can communicate across the different switches. GVRP, which is an application of the Generic Attribute

Registration Protocol (GARP), can perform this for you automatically.

The AT-S62 management software uses GVRP protocol data units (PDUs) to share VLAN information among GVRP-active devices. The PDUs contain the VID numbers of the VLANs on the switch. A PDU contains the

VIDs of all the VLANs on the switch, not just the VID to which the transmitting port is a member.

When a switch receives a GVRP PDU on a port, it examines the PDU to determine the VIDs of the VLANs on the device that sent it. It then does the following:

❑ If a VLAN does not exist on the switch, it creates the VLAN and adds the port as a tagged member to the VLAN. A VLAN created by GVRP is called a dynamic GVRP VLAN.

❑ If the VLAN already exists on the switch but the port is not a member, the switch adds the port as a tagged member. A port that has been added by GVRP to a static VLAN (that is a usercreated VLAN) is called a dynamic GVRP port.

You cannot modify a dynamic GVRP VLAN. Once created, only GVRP can modify or delete it. A dynamic GVRP VLAN exists only so long as there are active nodes in the network that belong to the VLAN. If all nodes of a dynamic GVRP VLAN are shutdown and there are no active links, the

VLAN is deleted from the switch.

A dynamic GVRP port in a static VLAN remains a member of the VLAN as long as there are active VLAN members. If all members of the VLAN become inactive or there are no active links, GVRP removes the dynamic port from the VLAN, but does not delete the VLAN if the VLAN is a static

VLAN (i.e., user created).

Section V: Virtual LANs 421

Chapter 21: GARP VLAN Registration Protocol

Figure 134 provides an example of how GVRP works.

Switch #1

Static VLAN

Sales VID=11

Port 1

AT-8524M

Port 4

AT-8524M

Switch #2

Port 15

Port 17

Switch #3

Static VLAN

Sales VID=11

AT-8524M

Figure 134 GVRP Example

Switches #1 and #3 contain the Sales VLAN, but Switch #2 does not.

Consequently, the end nodes of the two parts of the Sales VLANs are unable to communicate with each other.

Without GVRP, you would need to configure Switch #2 by creating the

Sales VLAN on the switch and adding ports 4 and 15 on the switch as members of the VLAN. If you happen to have a large network with a large number of VLANs, such manual configurations can be cumbersome and time consuming.

GVRP can make the configurations for you. Here is how GVRP would resolve the problem in the example.

1. Port 1 on Switch #1 sends a PDU to Port 4 on Switch #2, containing the

VIDs of all the VLANs on the switch. One of the VIDs in the PDU would be that of the Sales VLAN, VID 11.

2. Switch #2 examines the PDU it receives on Port 4 and notes that it does not have a VLAN with a VID 11. So it creates the VLAN as a dynamic GVRP VLAN and assigns it a VID 11 and the name

GVRP_VLAN_11. (The name of a dynamic GVRP VLAN has the prefix

“GVRP_VLAN_”, followed by the VID number.) The switch then adds

Port 4, the port that received the PDU, as a tagged member of the

VLAN.

Section V: Virtual LANs 422

AT-S62 User’s Guide

3. Switch #2 sends a PDU out port 15 containing all of the VIDs of the

VLANs on the switch, including the new GVRP_VLAN_11 VLAN with its

VID of 11. (It should be noted that port 15 is not yet a member of the

VLAN. Ports are added to VLANs when they receive, not send a PDU.)

4. Switch #3 receives the PDU on port 17 and, after examining it, notes that one of the VLANs on Switch #2 has the VID 11, which matches the

VID of an already existing VLAN on the switch. So it does not create the VLAN since it already exists. It then determines whether the port that received the PDU, in this case port 17, is a member of the VLAN.

If it is not a member, it automatically adds the port to the VLAN as an tagged dynamic GVRP port. If the port is already a member of the

VLAN, then no change is made.

5. Switch #3 sends a PDU out port 17 to Switch #2.

6. Switch #2 receives the PDU on port 15 and then adds the port as a tagged dynamic GVRP port to the dynamic GVRP_VLAN_11 VLAN.

There is now a communications path for the end nodes of the Sales

VLAN on Switches #1 and #3. GVRP created a new dynamic GVRP VLAN,

GVRP_VLAN_11, with a VID of 11 on Switch #2 and added ports 4 and 15 to the VLAN as tagged dynamic GVRP ports.

Guidelines

Here are guidelines to observe when using this feature:

❑ GVRP is supported with STP and RSTP, or without spanning tree.

GVRP is not supported with MSTP.

❑ GVRP is supported when the switch is operating in the userconfigure VLAN mode, which is the VLAN mode for creating your own tagged and port-based VLANs. GVRP is not supported in either of the Multiple VLAN modes.

❑ Both ports that constitute a data link between the switch and the other device must be running GVRP.

❑ You cannot modify or delete a dynamic GVRP VLAN.

❑ You cannot remove a dynamic GVRP port from a static or dynamic

VLAN.

❑ GVRP is only aware of those VLANs that have active nodes, or where at least one end node of a VLAN has established a valid link with a switch. GVRP is not aware of a VLAN if there are no active end nodes or if no end nodes have established a link with the switch.

Section V: Virtual LANs 423

Chapter 21: GARP VLAN Registration Protocol

❑ Resetting a switch erases all dynamic GVRP VLANs and dynamic

GVRP port assignments. The switch relearns the dynamic assignments as it receives PDUs from the other switches.

❑ GVRP has three timers that you can set: join timer, leave timer, and leave all timer. The values for these timers must be set the same on all switches running GVRP. Timers with different values on different switches can result in GVRP compatibility problems.

❑ You can convert dynamic GVRP VLANs and dynamic GVRP port assignments to static VLANs and static port assignments. The

procedure for this is found in Modifying a VLAN on page 406.

❑ The default port settings on the switch for GVRP is active, meaning that the ports participate in GVRP. Allied Telesyn recommends disabling GVRP on those ports that are connected to GVRPinactive devices, which are nodes that do not feature GVRP.

❑ PDUs are transmitted from only those switch ports where GVRP is enabled.

GVRP and

Network

Security

GVRP should be used with caution because it can expose your network to unauthorized access. A network intruder could access restricted parts of the network by connecting to a switch port running GVRP and transmitting a bogus GVRP PDU containing VIDs of restricted VLANs.

GVRP would make the switch port a member of the VLANs and that could give the intruder access to restricted areas of your network.

To protect against this type of network intrusion, you should consider the following:

❑ Activating GVRP only on those switch ports that are connected to other devices that support GVRP. Do not activate GVRP on ports connected to GVRP-inactive devices, or on ports that are not being used.

❑ Converting all dynamic GVRP VLANs and dynamic GVRP ports to static assignments, and then turning off GVRP on all switches. This preserves the new VLAN assignments while protecting against network intrusion. The procedure for converting dynamic VLANs

to static VLANs is found in Converting a Dynamic GVRP VLAN on page 435.

Section V: Virtual LANs 424

AT-S62 User’s Guide

GVRP-inactive

Intermediate

Switches

The presence of a GVRP-inactive switch between GVRP-active devices may impact the ability of GVRP to automatically configure the VLANs in your switches. You may need to take this into account when implementing GVRP in your network.

One of the problems poised by the introduction of a GVRP-inactive device is that an GVRP-inactive device will probably not forward PDUs, thus preventing the GVRP-active switches from sharing VLAN information. This is because PDUs are management packets, intended for a switch’s CPU. In all likelihood, a GVRP-inactive switch will simply discard the PDUs it receives on its ports because the CPU will not recognize their function.

Another issue is that even if the GVRP-inactive switch does forward GVRP

PDUs, it will not automatically create the VLANs. Consequently, even if

GVRP-active switches on either side of a GVRP-inactive switch receive the PDUs and create the necessary VLANs, the intermediate switch may block the VLAN traffic, unless you manually modify its VLANs and port assignments.

Section V: Virtual LANs 425

Chapter 21: GARP VLAN Registration Protocol

Technical Overview of Generic Attribute Registration

Protocol (GARP)

The purpose of the Generic Attribute Registration Protocol (GARP) is to provide a generic framework whereby devices in a bridged LAN, for example, end stations and switches, can register and de-register

attribute values, such as VLAN Identifiers, with each other. In doing so, the attributes are propagated to devices in the bridged LAN, and these devices form a “reachability” tree that is a subset of an active topology.

For a bridged LAN, the active topology is normally that created and maintained by the Spanning Tree Protocol (STP).

To use GARP, a GARP application must be defined. The AT-S62 management software has one GARP application presently implemented, GVRP.

The GARP application specifies what the attribute represents.

GARP defines the architecture, rules of operation, state machines and variables for the registration and de-registration of attribute values. By itself, GARP is not directly used by devices in a bridged LAN. It is the applications of GARP that perform meaningful actions. The use of GVRP allows dynamic filter entries for VLAN membership to be distributed among the forwarding databases of VLAN-active switches.

A GARP Participant in a switch or an end station consists of a GARP

Application component, and a GARP Information Declaration (GID) component associated with each port of the switch. One such GARP

Participant exists per port, per GARP Application. The propagation of information between GARP Participants for the same Application in a switch is carried out by the GARP Information Propagation (GIP) component. Protocol exchanges take place between GARP Participants by means of LLC Type 1 services, using the group MAC address and PDU format defined for the GARP Application concerned.

Every instance of a GARP application includes a database to store the values of the attributes. Within GARP, attributes are mapped to GID indexes.

Section V: Virtual LANs 426

Section V: Virtual LANs

The architecture of GARP is shown in Figure 135.

Switch

AT-S62 User’s Guide

GARP Participant

GARP Application

GID

GIP

GARP Participant

GARP Application

GID

LLC

LLC

MAC Layer:

Port 1

MAC Layer:

Port 2

Figure 135 GARP Architecture

The GARP Application component of the GARP Participant is responsible for defining the semantics associated with the parameter values and operators received in GARP PDUs, and for generating GARP PDUs for transmission. The Application makes use of the GID component, and the state machines associated with the operation of GID, in order to control its protocol interactions.

427

Chapter 21: GARP VLAN Registration Protocol

An instance of GID consists of the set of state machines that define the current registration and declaration state of all attribute values associated with the GARP Participant. Separate state machines exist for

the Applicant and Registrar. This is shown in Figure 136.

GID

Attribute ... state:

Attribute C state:

Attribute B state:

Attribute A state:

Applicant

State

Registrar

State

Figure 136 GID Architecture

GARP registers and de-registers attribute values through GARP messages sent at the GID level. A GARP Participant that wishes to make a declaration (an Applicant registering an attribute value) sends a JoinIn or

JoinEmpty message. An Applicant that wishes to withdraw a declaration

(de-registering an attribute value) sends a LeaveEmpty or LeaveIn message. Following the de-registration of an attribute value, the

Applicant sends a number of Empty messages. The purpose of the

Empty message is to prompt other Applicants to send JoinIn/JoinEmpty messages. For the GARP protocol to be resilient against multiple lost messages, a LeaveAll message is available. Timers are used in the state machines to generate events and control state transitions.

The job of the Applicant is twofold:

❑ To ensure that this Participant’s declarations are registered by other Participants’ Registrars

❑ To ensure that other Participants have a chance to re-declare

(rejoin) after anyone withdraws a declaration (leaves).

Section V: Virtual LANs 428

Section V: Virtual LANs

AT-S62 User’s Guide

The Applicant is therefore looking after the interests of all would-be

Participants. This allows the Registrar to be very simple.

The job of the Registrar is to record whether an attribute is registered, in the process of being de-registered, or is not registered for an instance of

GID.

To control the Applicant state machine, an Applicant Administrative

Control parameter is provided. This parameter determines whether or not the Applicant state machine participates in GARP protocol exchanges. The default value has the Applicant participating in the exchanges.

To control the Registrar state machine, a Registrar Administrative

Control parameter is provided. Basically, this parameter determines whether or not the Registrar state machine listens to incoming GARP messages. The default value has the Registrar listening to incoming

GARP messages.

The propagation of information between GARP Participants for the same

Application in a switch is carried out by the GIP component. The operation of GIP is dependent upon STP being enabled on a port, as only ports in the STP Forwarding state are eligible for membership to the GIP connected ring. Ports in the GIP connected ring propagate GID Join and

Leave requests to notify each other of attribute registrations and deregistrations. The operation of GIP allows ports in the switch to share information between themselves and the LANs/end stations to which the ports are connected.

If a port enters the STP Forwarding state and the GARP application that the port belongs to is enabled, then the port is added to the GIP connected ring for the GARP application. All attributes registered by other ports in the GIP connected ring is propagated to the recently connected port. All attributes registered by the recently connected port is propagated to all other ports in the GIP connected ring.

Similarly, if a port leaves the STP Forwarding state and the GARP application that the port belongs to is enabled, then the port is removed from the GIP connected ring for the GARP application. Prior to removal,

GID leave requests are propagated to all other ports in the GIP connected ring if the port to be removed has previously registered an attribute and no other port in the GIP connected ring has registered that attribute. The operations of GIP can be enabled or disabled by user command.

429

Chapter 21: GARP VLAN Registration Protocol

Configuring GVRP

This section contains the procedure for configuring GVRP. The timers in the following menus are in increments of centi seconds, which are hundredths of a second.

To configure GVRP, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page

400.

2. From the VLAN Configuration menu, type 8 to select Configure GARP-

GVRP.

The GARP-GVRP Menu is shown in Figure 137.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

GARP-GVRP Menu

1 - GVRP Status ........... Disabled

2 - GVRP GIP Status ....... Enabled

3 - GVRP Join Timer ....... 20

4 - GVRP Leave Timer ...... 60

5 - GVRP Leave All Timer .. 1000

P - GVRP Port Parameters

O - Other GVRP Parameters Menu

D - Reset GVRP to Defaults

R - Return to Previous Menu

Enter your selection?

Figure 137 GARP-GVRP Menu

3. Type 1 - GVRP Status to enable or disable GVRP.

The following prompt is displayed:

Enter your new value (E-Enabled, D-Disabled):

4. Choose one of the following:

E to enable GVRP.

D to disable GVRP. This is the default setting.

5. Type 2 - GVRP GIP Status to enable or disable GIP.

Enter your new value (E-Enabled, D-Disabled):

Section V: Virtual LANs 430

Section V: Virtual LANs

AT-S62 User’s Guide

6. Choose one of the following:

E to enable GIP.

D to disable GIP.

Note

Do not disable GIP if you intend to use GVRP. GIP is required to propagate VLAN information among the ports of the switch.

Caution

The following steps change the three GVRP timers. The settings for these timers must be the same on all GVRP-active devices in your network.

7. Type 3 - GVRP Join Timer to change the value of the Join Timer.

The following prompt is displayed:

Enter new value (in centi seconds): [10 to 60] -> 20

8. Enter a new value for the Join Timer field in centi seconds which are one hundredths of a second. The default is 20 centiseconds.

If you change this field, it must in relation to the GVRP Leave Timer according to the following equation:

Join Timer <= (2 x (GVRP Leave Timer))

9. Type 4 - GVRP Leave Timer to enter a new value for this field.

The following prompt is displayed:

Enter new value (in centi seconds): [30 to 180] -> 60

10. Type 5 - GVRP Leave All Timer to enter a new value for this field. The default is 60 centiseconds.

The following prompt is displayed:

Enter new value (in centi seconds): [500 to 3000] -

> 1000

11. Enter a value in centiseconds. The default is 1000 centiseconds.

431

Chapter 21: GARP VLAN Registration Protocol

Enabling or Disabling GVRP on a Port

This procedure enables and disables GVRP on a switch port. The default setting for GVRP on a port is enabled. Only those ports where GVRP is enabled transmit PDUs.

Note

Allied Telesyn recommends disabling GVRP on unused ports and those ports that are connected to GVRP-inactive devices. This will protect against unauthorized access to restricted areas of your

network. For further information, refer to GVRP and Network

Security on page 424.

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page

400.

2. From the VLAN Configuration menu, type 8 to select Configure GARP-

GVRP.

The GARP-GVRP menu is shown in Figure 137 on page 430.

3. Type P - GVRP Port Parameters to configure the switch ports.

The GVRP Port Parameters Menu is shown in Figure 138.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

GVRP Port Parameters

1 - Configure GVRP Port Settings

2 - Display GVRP Port Configuration

R - Return to Previous Menu

Enter your selection?

Figure 138 GVRP Port Parameters Menu

4. Type 1 to configure GVRP Port Settings.

The following prompt is displayed:

Enter port-list:

Section V: Virtual LANs 432

AT-S62 User’s Guide

5. Enter a port. You can configure more than one port at a time.

The Configure GVRP Port Settings Menu is shown in Figure 139.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure GVRP Port Settings

Configuring Port 1-2

1 - Port Mode ............. Normal

R - Return to Previous Menu

Enter your selection?

Figure 139 Configure GVRP Port Settings Menu

6. Type 1 - Port Mode.

The following prompt is displayed:

Enter mode (0-Normal, 1-None): [0 to 1] -> 0

7. Type either 0 to select Normal or 1 to select None. A setting of Normal means the port processes and propagates GVRP information. This is the default setting. A setting of None prevents the port from processing GVRP information and from transmitting PDUs.

A change to GVRP port mode is immediately activated on a port.

8. If you want to view the current port settings, from the GVRP Port

Parameters menu, type 2 to display the GVRP port configuration.

The Display GVRP Port Configuration Menu is shown in

Figure 140.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display GVRP Port Configuration

GARP Port Parameters

Mode Normal ............. 1-2

Mode None ............... 3-26

U - Update

R - Return to Previous Menu

Enter your selection?

Figure 140 Display GVRP Port Configuration Menu

Section V: Virtual LANs 433

Chapter 21: GARP VLAN Registration Protocol

9. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Your changes are saved.

Section V: Virtual LANs 434

AT-S62 User’s Guide

Converting a Dynamic GVRP VLAN

This procedure converts a dynamic GVRP VLAN into a static VLAN. You can perform this procedure to permanently retain the VLANs the switch learned through GVRP.

Note

This procedure cannot convert a dynamic GVRP port in a static VLAN into a static port. For that you must manually modify the static VLAN, specifying the dynamic port as either a tagged or untagged member of the VLAN.

To convert a dynamic GVRP VLAN to a static VLAN, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 4 to select Configure

VLANs.

The Configure VLANs menu is shown in Figure 126 on page 401.

Note

If option “4 - Configure VLANs” is not displayed in the menu, the switch is running a multiple VLAN mode. To change a switch’s VLAN

mode, refer to Selecting a VLAN Mode on page 451.

3. From the Configure VLANs menu, type 2 to select Modify VLAN.

The Modify VLAN menu is shown in Figure 128 on page 406.

4. Type 2 to select Change GARP VLAN.

The following prompt is displayed:

Enter VLAN ID: [1 to 4096] ->

5. Enter the VID of the dynamic GVRP VLAN you want to convert into a static VLAN. You can specify only one VLAN at a time.

The dynamic GVRP VLAN is changed to a static VLAN. To confirm

this, refer to Displaying VLANs on page 410.

6. Return to the Main Menu and type S to select Save Configuration

Changes.

Section V: Virtual LANs 435

Chapter 21: GARP VLAN Registration Protocol

Displaying GVRP Parameters and Statistics

To display GVRP counters, database, state machine, and GIP connected ports ring, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page

400.

2. From the VLAN Configuration menu, type 8 to select Configure GARP-

GVRP.

The GARP-GVRP Menu is shown in Figure 137 on page 430.

3. From the GARP-GVRP Menu, select O - Other GVRP Parameters Menu.

The Other GARP Port Parameters Menu is shown in Figure 141.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Other GARP Port Parameters

1 - Display GVRP Counters

2 - Display GVRP Database

3 - Display GIP Connected Ports Ring

4 - Display GVRP State Machine

R - Return to Previous Menu

Enter your selection?

Figure 141 Other GARP Port Parameters Menu

Each option is reviewed in a separate subsection below.

Section V: Virtual LANs 436

AT-S62 User’s Guide

GVRP Counters

Option 1 - Display GVRP Counters in the Other GARP Port Parameters

displays the GVRP Counters Menu (page 1) as shown in Figure 142.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

GVRP Counters

Receive: Transmit:

----------------

Total GARP Packets

Invalid GARP Packets

41

0

Total GARP Packets 166

Discarded:

-----------

GARP Disabled

Port Not Listening

Invalid Port

Invalid Protocol

Invalid Format

Database Full

N - Next Page

U - Updated Display

R - Return to Previous Menu

Enter your selection?

0

0

0

0

0

0

GARP Disabled

Port Not Sending

0

3117

Figure 142 GVRP Counters Menu (page 1)

The statistics span two menus. To display the second menu, type N to

select Next Page. The second menu is shown in Figure 143. The

information in both menus is for display purposes only.

Section V: Virtual LANs 437

Chapter 21: GARP VLAN Registration Protocol

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

GVRP Counters

Receive: Transmit:

--------

GARP Messages:

---------

---------------

LeaveAll

JoinEmpty

JoinIn

7

0

68

LeaveAll

JoinEmpty

JoinIn

LeaveEmpty

LeaveIn

Empty

Bad Message

Bad Attribute

0

0

5

0

0

LeaveEmpty

LeaveIn

Empty

77

58

285

1

0

21

P - Previous Page

U - Updated Display

R - Return to Previous Menu

Enter your selection?

Figure 143 GVRP Counters Menu (page 2)

The GVRP counters in the menus are defined in Table 20.

Table 20 GVRP Counters

Parameter Meaning

Receive: Total GARP

Packets

Total number of GARP PDUs received by this

GARP application.

Transmit: Total GARP

Packets

Total number of GARP PDUs transmitted by this GARP application.

Receive: Invalid GARP

Packets

Number of invalid GARP PDUs received by this GARP application.

Receive Discarded:

GARP Disabled

Transmit Discarded:

GARP Disabled

Number of received GARP PDUs discarded because the GARP application was disabled.

Number of GARP PDUs discarded because the GARP application was disabled. This counter is incremented when ports are added to or deleted from the GARP application arising from port movements in the underlying VLAN or STP.

Section V: Virtual LANs 438

Section V: Virtual LANs

AT-S62 User’s Guide

Table 20 GVRP Counters

Meaning Parameter

Receive Discarded:

Port Not Listening

Transmit Discarded:

Port Not Sending

Receive Discarded:

Invalid Port

Receive Discarded:

Invalid Protocol

Receive Discarded:

Invalid Format

Receive Discarded:

Database Full

Receive GARP

Messages: LeaveAll

Transmit: GARP

Messages: LeaveAll

Receive GARP

Messages: JoinEmpty

Transmit GARP

Messages: JoinEmpty

Receive GARP

Messages: JoinIn

Number of GARP PDUs discarded because the port that received the PDUs was not listening, that is, MODE=NONE was set on the port.

Number of GARP PDUs discarded because the port that the PDUs were to be transmitted on was not sending, that is,

MODE=NONE was set on the port.

Number of GARP PDUs discarded because the port that received the PDU does not belong to the GARP application.

Number of GARP PDUs discarded because the GARP PDU contained an invalid protocol.

Number of GARP PDUs discarded because the format of the GARP PDU was not recognized.

Number of GARP PDUs discarded because the database for the GARP application was full, that is, the maximum number of attributes for the GARP application is in use.

Number of GARP LeaveAll messages received by the GARP application.

Number of GARP LeaveAll messages transmitted by the GARP application.

Total number of GARP JoinEmpty messages received for all attributes in the GARP application.

Total number of GARP JoinEmpty messages transmitted for all attributes in the GARP application.

Total number of GARP JoinIn messages received for all attributes in the GARP application.

439

Chapter 21: GARP VLAN Registration Protocol

Parameter

Transmit GARP

Messages: JoinIn

Receive GARP

Messages:

LeaveEmpty

Transmit GARP

Messages:

LeaveEmpty

Receive GARP

Messages: LeaveIn

Transmit GARP

Messages: LeaveIn

Receive GARP

Messages: Empty

Transmit GARP

Messages: Empty

Receive GARP

Messages: Bad

Message

Receive GARP

Messages: Bad

Attribute

Table 20 GVRP Counters

Meaning

Total number of GARP JoinIn messages transmitted for all attributes in the GARP application.

Total number of GARP LeaveEmpty messages received for all attributes in the

GARP application.

Total number of GARP LeaveEmpty messages transmitted for all attributes in the GARP application.

Total number of GARP LeaveIn messages received for all attributes in the GARP application.

Total number of GARP LeaveIn messages transmitted for all attributes in the GARP application.

Total number of GARP Empty messages received for all attributes in the GARP application.

Total number of GARP Empty messages transmitted for all attributes in the GARP application.

Number of GARP messages that had an invalid Attribute Type value, an invalid

Attribute Length value or an invalid

Attribute Event value.

Number of GARP messages that had an invalid Attribute Value value.

Section V: Virtual LANs 440

AT-S62 User’s Guide

GVRP Database

Option 2 - Display GVRP Database in the Other GARP Port Parameters

displays the GVRP Database Menu as shown in Figure 144.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

GVRP Database

GARP Application: GVRP

GID index VLAN ID Used GID index VLAN ID Used

---------------------------------------------------------------

0

2

1

2

Yes

Yes

1 3 Yes

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 144 GVRP Database Menu

The columns in the menu are defined in Table 21. The information is for

viewing purposes only.

Table 21 GARP Database Parameters

Meaning Parameter

GARP Application

GID index

VLAN ID

Used

Identifies the GARP application, that is,

“GVRP”.

Value of the GID index corresponding to the attribute. GID indexes begin at 0. If the GARP application has no attributes presently registered, “No attributes have been registered” is displayed.

Value of the attribute.

Indicates whether the GID index is currently being used by any port in the GARP application. The definition of “used” is whether the Applicant and Registrar state machine for the GID index are in a noninitialized state, that is, not in {Vo, Mt} state.

The value of this parameter is either “Yes” or

“No”.

Section V: Virtual LANs 441

Chapter 21: GARP VLAN Registration Protocol

GIP Connected

Ports Ring

Option 3 - Display GIP Connected Ports Ring in the Other GARP Port

Parameters displays the GIP Connected Ports Ring Menu as shown in

Figure 145.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

GIP Connected Ports Ring

GARP Application: GVRP

GIP Context ID: 0, STP ID: 0

-------------------------------------------------------------

2 -> 8 -> 4

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 145 GIP Connected Ports Ring Menu

The information in the menu is defined in Table 22. This information is

for viewing purposes only.

Table 22 GIP Connected Ports Ring Parameters

Meaning Parameter

GARP Application

GIP Context ID

STP ID

Connected Ring

Identifies the GARP application, that is,

“GVRP.”

A number assigned to the instance for the

GIP context.

Present if the GARP application is GVRP; identifies the spanning tree instance associated with the GIP context.

Ring of connected ports. Only ports presently in the STP Forwarding state are eligible for membership to the GIP connected ring. If no ports exist in the GIP connected ring, “No ports are connected” is displayed. If the GARP application has no ports, “No ports have been assigned” is displayed.

Section V: Virtual LANs 442

AT-S62 User’s Guide

GVRP State

Machine

Option 4 - Display GVRP State Machine in the Other GARP Port

Parameters displays the GVRP State Machine Menu (page 1) as shown in

Figure 146.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

GVRP State Machine

Enter a VLAN ID for displaying the state machine: [1 to 4094] -> 1

Figure 146 GVRP State Machine Menu (page 1)

Entering a VLAN ID displays the GVRP State Machine Menu (page 2) as

shown in Figure 147.

User: Manager

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

11:20:02 02-Jan-2004

GVRP State Machine

State Machine for VLAN: 1

Port App Reg | Port App Reg | Port App Reg | Port App Reg |

--------------------------------------------------------------------------------

2.1

2.5

3.1

8.1

8.5

Qa

Qa

Qa

Qa

Qa

Fix | 2.2

Fix | 2.6

Fix | 3.2

Fix | 8.2

Fix | 8.6

Qa

Qa

Qa

Qa

Qa

Fix | 2.3

Fix | 2.7

Fix | 3.3

Fix | 8.3

Fix | 8.7

Qa Fix | 2.4

Qa Fix | 2.8

Qa Fix | 3.4

Qa Fix | 8.4

Qa Fix | 8.8

Qa Fix |

Qa Fix |

Qa Fix |

Qa Fix |

Qa Fix |

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 147 Display GVRP State Machine Menu (page 2)

The information in the menu is defined in Table 23. This information is

for viewing purposes only.

Table 23 GVRP State Machine Parameters

Parameter

Port

Meaning

Port number on the switch; this port belongs to the GARP application. If the GARP application has no ports, “No ports have been assigned” is displayed.

Section V: Virtual LANs 443

Chapter 21: GARP VLAN Registration Protocol

Parameter

App

Table 23 GVRP State Machine Parameters

Meaning

Applicant state machine for the GID index on that particular port. One of:

Normal Participant Management state:

“Vo” Very Anxious Observer

“Ao” Anxious Observer

“Qo” Quiet Observer

“Lo” Leaving Observer

“Vp” Very Anxious Passive Member

“Ap” Anxious Passive Member

“Qp” Quiet Passive Member

“Va” Very Anxious Active Member

“Aa” Anxious Active Member

“Qa” Quiet Active Member

“La” Leaving Active Member

Section V: Virtual LANs 444

Section V: Virtual LANs

AT-S62 User’s Guide

Table 23 GVRP State Machine Parameters

Meaning Parameter

App (Continued)

Reg

Non-Participant Management state:

“Von” Very Anxious Observer

“Aon” Anxious Observer

“Qon” Quiet Observer

“Lon” Leaving Observer

“Vpn” Very Anxious Passive Member

“Apn” Anxious Passive Member

“Qpn” Quiet Passive Member

“Van” Very Anxious Active Member

“Aan” Anxious Active Member

“Qan” Quiet Active Member

“Lan” Leaving Active Member

The initialized state for the Applicant is Vo.

Registrar state machine for the GID index on that particular port. One of:

“Mt” Empty

“Lv3” Leaving substate 3 (final Leaving substate)

“Lv2” Leaving substate 2

“Lv1” Leaving substate 1

“Lv” Leaving substate (initial Leaving substate)

“In” In

“Fix” Registration Fixed

“For” Registration Forbidden

The initialized state for the Registrar is Mt.

445

Chapter 22

Multiple VLAN Modes

This chapter describes the multiple VLAN modes and how to select a mode.

This chapter contains the following sections:

❑ Multiple VLAN Mode Overview on page 447

❑ Selecting a VLAN Mode on page 451

❑ Displaying VLAN Information on page 452

446

AT-S62 User’s Guide

Multiple VLAN Mode Overview

The Multiple VLAN modes can simplify the task of configuring the switch in network environments that require a high degree of network segmentation. In a multiple VLAN mode, the ports on a switch are prohibited from forwarding traffic to each other and are only allowed to forward traffic to a user designated uplink port. These configurations isolate the traffic on each port from all other ports, while providing the ports with access to the uplink port.

The AT-S62 software supports two types of multiple VLAN modes:

❑ 802.1Q-compliant Multiple VLAN mode

❑ Multiple VLAN mode (also referred to as non-802.1Q compliant

Multiple VLAN mode)

Each mode uses a different technique for isolating the ports and their traffic. The first method uses VLANs while the second uses port mapping.

The uplink port is also different in each mode. In one the port is a tagged port and in the other untagged. This is explained in the following subsections.

Note

The multiple VLAN mode feature is supported only in single switch

(i.e. edge switch) environments. This means that cascading of switches while in a Multiple VLAN mode is not allowed.

Configuring multiple VLANs on a cascaded switch can possibly result in disconnection of network paths between switches unless the port used to link the switch (being configured for Multiple

VLANs mode) is configured as uplink VLAN port.

Configuring multiple VLANs on cascaded switches can also affect

Enhanced Stacking as the Master switch may not be able to detect member switches beyond the first cascaded switch.

802.1Q-

Compliant

Multiple VLAN mode

In this mode, each port is placed into a separate VLAN as an untagged port. The VLAN names and VID numbers are based on the port numbers.

For example, the VLAN for Port 4 is named Client_VLAN_4 and is given the VID of 4, the VLAN for Port 5 is named Client_VLAN_5 and has a VID of 5, and so on.

The VLAN configuration is accomplished automatically by the switch.

Once you have selected the mode and an uplink port, the switch forms the VLANs. It also assigns the PVID values as well. For example, the PVID for Port 4 is assigned as 4, to match the VID of 4.

Section V: Virtual LANs

447

Chapter 22: Multiple VLAN Modes

A user designated port on the switch functions as an uplink port, which can be connected to a shared device, such as a router for access to a

WAN. This port is placed as a tagged port in each VLAN. Thus, while the switch ports are separated from each other in their individual VLANs, they all have access to the uplink port.

The uplink port also has its own VLAN, where it is an untagged member.

This VLAN is called Uplink_VLAN.

Note

In 802.1Q Multiple VLAN mode, the device connected to the uplink port must be IEEE 802.1Q-compliant.

An example of the 802.1Q-compliant VLAN mode is shown in Table 24.

The table shows the VLANs on an AT-8524M switch where Port 25, a port on an expansion module, has been selected as the uplink port.

Table 24 802.1Q-Compliant Multiple VLAN Example

VLAN Name

Client_VLAN_1

Client_VLAN_2

Client_VLAN_3

Client_VLAN_4

Client_VLAN_5

Client_VLAN_6

Client_VLAN_7

Client_VLAN_8

Client_VLAN_9

Client_VLAN_10

Client_VLAN_11

Client_VLAN_12

Client_VLAN_13

Client_VLAN_14

Client_VLAN_15

VID

13

14

15

9

10

11

12

7

8

5

6

3

4

1

2

Untagged Port

13

14

15

9

10

11

12

7

8

5

6

3

4

1

2

Tagged Port

25

25

25

25

25

25

25

25

25

25

25

25

25

25

25

Section V: Virtual LANs

448

AT-S62 User’s Guide

VLAN Name VID Untagged Port Tagged Port

Client_VLAN_16

Client_VLAN_17

Client_VLAN_18

Client_VLAN_19

Client_VLAN_20

Client_VLAN_21

Client_VLAN_22

Client_VLAN_23

Client_VLAN_24

Uplink_VLAN

Client_VLAN_26

20

21

22

23

16

17

18

19

24

25

26

20

21

22

23

16

17

18

19

24

25

26

25

25

25

25

25

25

25

25

25

25

This highly segmented configuration is useful in situations where traffic generated by each end node or network segment connected to a port on the switch needs to be kept separate from all other network traffic, while still allowing access to an uplink to a WAN. Unicast traffic received by the uplink port is effectively directed to the appropriate port and end node, and is not directed to any other port on the switch.

The 802.1Q Multiple VLAN configuration is appropriate when the device connected to the uplink port is IEEE 802.1Q compatible, meaning that it can handle tagged packets.

When you select the 802.1Q-compliant VLAN mode, you are asked to specify the Uplink VLAN port. You can specify only one uplink port. The switch automatically configures the ports into the separate VLANs.

Note

The uplink VLAN is the management VLAN. Any remote management of the switch must be made through the uplink VLAN.

Non-802.1Q

Compliant

Multiple VLAN

Mode

Unlike the 802.1Q-compliant VLAN mode, which isolates port traffic by placing each port in a separate VLAN, this mode forms one VLAN with a

VID of 1 that encompasses all ports. Traffic isolation is established through port mapping. The result, however, is the same. Ports are permitted to forward traffic only to the designated uplink port and to no other port, even when they receive a broadcast packet.

Section V: Virtual LANs

449

Chapter 22: Multiple VLAN Modes

Another difference with this mode is that the uplink port is untagged.

Consequently, you would want to use this mode when the device connected to the uplink port is not IEEE 802.1Q compatible, meaning that the device cannot handle tagged packets.

Note

When the uplink port receives a packet with a destination MAC address that is not in the MAC address table, the port will broadcast the packet to all switch ports. This can result in ports receiving packets that are not intended for them.

It should also be noted that a switch operating in this mode can be remotely managed through any port on the switch, not just the uplink port.

Section V: Virtual LANs

450

AT-S62 User’s Guide

Selecting a VLAN Mode

The following procedure explains how to select a VLAN mode. Available modes are:

❑ User configured VLAN mode (port-based and tagged VLANs)

❑ IEEE 802.1Q Compliant Multiple VLAN mode

❑ Non-IEEE 802.1Q Compliant Multiple VLAN mode

Note

Any port-based or tagged VLANs you created are not retained when you change the VLAN mode from the user configured mode to a multiple VLAN mode and, at some point, reset the switch. The user configured VLAN information is lost and will need to be recreated if you later return the switch to the user configured VLAN mode.

To select a VLAN mode, perform the following steps:

1. From the Main Menu, type 2 to select VLAN Configuration.

2. From the VLAN Configuration menu, type 2 to select VLAN Mode.

The following prompt is displayed:

Enter VLAN Mode (U-UserConfig, M-Multiple, Q-802.1Q

Multiple VLANs) ->

3. Type Q to activate 802.1Q Multiple VLAN mode, M for Non-802.1Q compliant multiple VLAN mode, or U to create your own port-based and tagged VLANs. User configured is the default setting.

If you enter Q or M, the following prompt is displayed:

Enter Uplink VLAN Port number -> [1 to 26] ->

4. Enter the port number on the switch that will function as the uplink port for the other ports. You can specify only one port.

The following prompt is displayed:

SUCCESS

Press any key to continue ...

The new VLAN mode is now active on the switch.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section V: Virtual LANs

451

Chapter 22: Multiple VLAN Modes

Displaying VLAN Information

To view the VLANs on the switch while the unit is operating in Multiple

VLAN mode, perform the following procedure:

1. From the Main Menu, type 2 to select VLAN Configuration.

The VLAN Configuration menu is shown in Figure 125 on page 400.

2. From the VLAN Configuration menu, type 6 to select Show VLANs.

An example of the Show VLANs menu is shown in Figure 148.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

Show VLANs

User: Manager 11:20:02 02-Jan-2004

VID VLAN Name Untagged (U) / Tagged (T)

----------------------------------------------------------------

1

2

3

4

5

6

7

8

Client_VLAN_1

Client_VLAN_2

Client_VLAN_3

Client_VLAN_4

Client_VLAN_5

Client_VLAN_6

Client_VLAN_5

Client_VLAN_6

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

U: 1, 15

T:

U: 2, 15

T:

U: 3, 15

T:

U: 4, 15

T:

U: 5, 15

T:

U: 6, 15

T:

U: 7, 15

T:

U: 8, 15

T:

Figure 148 Show VLANs Menu, Multiple VLANS

The menu contains the following columns of information:

VID - The VLAN ID.

VLAN Name - The name of the VLAN.

Untagged (U) / Tagged (T) - The untagged and tagged ports that are part of the VLAN.

Section V: Virtual LANs

452

Section VI

Port Security

The chapters in this section explain the port security features of the

AT-8524M switch The chapters include:

❑ Chapter 23: MAC Address Security on page 454

❑ Chapter 24: 802.1x Port-based Access Control on page 463

453

Chapter 23

MAC Address Security

This chapter explains how you can use the dynamic or static MAC addresses learned or assigned on the ports of the switch to control which end nodes can forward packets through the device. The sections in this chapter include:

❑ MAC Address Security Overview on page 455

❑ Configuring MAC Address Port Security on page 458

❑ Displaying Port Security Levels on page 461

Note

This type of port security does not apply to ports located on optional

GBIC modules.

454

AT-S62 User’s Guide

MAC Address Security Overview

This feature can enhance the security of your network. You can use it to control which end nodes can forward frames through the switch, and so prevent unauthorized individuals from accessing your network or particular parts of the network.

This type of network security uses a frame’s source MAC address to determine whether the switch should forward a frame or discard it. The source address is the MAC address of the end node that sent the frame.

There are four levels of port security:

❑ Automatic

❑ Limited

❑ Secured

❑ Locked

You set port security on a per port basis. Only one security level can be active on a port at a time.

Automatic

The Automatic security mode disables port security on a port. This is the default security level for a port.

Limited

The Limited security level allows you to specify the maximum number of dynamic MAC addresses a port can learn. Once a port has learned its maximum number of addresses, it discards all ingress frames with source

MAC addresses not already learned.

When the Limited security mode is initially activated on a port, all dynamic MAC addresses learned by the port are deleted from the MAC address table. The port then begins to learn new addresses, up to the maximum allowed. After the port has learned its maximum number of addresses, it does not learn any new addresses, even when end nodes are inactive.

A dynamic MAC address learned on a port operating in the Limited security mode never times out from the MAC address table, even when the corresponding end node is inactive.

Static MAC addresses are retained by the port and are not included in the count of maximum dynamic addresses. You can continue to add static MAC addresses to a port operating with this security level, even after the port has already learned its maximum number of dynamic MAC addresses. A switch port can have up to 255 dynamic and static MAC addresses.

Section VI: Port Security 455

Chapter 23: MAC Address Security

Secured

The Secured security level instructs a port to forward frames using only static MAC address. The port will not learn any dynamic MAC addresses and will delete any dynamic addressees that it has already learned. Only those end nodes whose MAC addresses have been entered as static addresses will be able to forward frames through the port.

Once you have activated this security level, you must enter the static

MAC addresses of the end nodes that will be allowed to forward frames through the port.

Locked

The Locked security level causes a port to immediately stop learning new dynamic MAC addresses. Frames are forwarded using the dynamic

MAC addresses that the port has already learned and any static MAC addresses assigned to the port.

Dynamic MAC addresses learned by the port prior to the activation of this security level never time out from the MAC address table, even when the corresponding end nodes are inactive. However, the port will not learn new dynamic addresses.

You can continue to add new static MAC addresses to a port operating under this security level.

Note

For background information on MAC addresses and aging time,

refer to MAC Address Overview on page 110.

Security

Violations and

Intrusion

Actions

When a port receives an invalid frame, it has to decide what action it will take. This is referred to as intrusion action.

Before defining the intrusion actions, it helps to understand first what constitutes an invalid frame. This differs for each security level, as explained here:

❑ Limited Security Level - An invalid frame for this security level is an ingress frame with a source MAC address not already learned by a port after the port had reached its maximum number of dynamic

MAC addresses, or that was not assigned to the port as a static address.

❑ Secured Security Level - An invalid frame for this security level is an ingress frame with a source MAC address that was not entered as a static address on the port.

❑ Locked - An invalid frame for this security level is an ingress frame with a source MAC address that the port has not already learned or that was not assigned as a static address.

Section VI: Port Security 456

AT-S62 User’s Guide

Intrusion action defines what a port will do when it receives an invalid frame. For a port operating under either the Secured or Locked security mode, the intrusion action is always the same. The port discards invalid frames.

But with the Limited security mode you can specify an intrusion action.

The options are:

❑ Discard the invalid frame.

❑ Discard the invalid frame and send an SNMP trap. (SNMP must be enabled on the switch for the trap to be sent.)

❑ Discard the invalid frame, send an SNMP trap, and disable the port.

Guidelines

Here are a few general guidelines to keep in mind when using this type of port security:

❑ The filtering of a packet occurs on the ingress port, not on the egress port.

❑ MAC address security can be set from a local or Telnet management session, but not from a web browser management session.

❑ You cannot use MAC address security and 802.1x port-based access control on a port at the same time.

Section VI: Port Security 457

Chapter 23: MAC Address Security

Configuring MAC Address Port Security

To set the port security level, perform the following procedure:

1. From the Main Menu, type 1 to select Port Configuration.

2. From the Port Configuration menu, type 5 to select Port Security.

The Port Security menu is shown in Figure 149.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Security

1 - Configure Port Security

2 - Display Port Security

R - Return to Previous Menu

Enter your selection?

Figure 149 Port Security Menu

3. Type 1 to select Configure Port Security.

The following prompt is displayed:

Enter Port-List:

4. Enter the port where you want to set port security. You can specify one port or a range of ports (for example, 4-8).

The Configure Port Security menu is shown in Figure 150.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure Port Security

Configuring Port Security 4

1 - Security Mode ..................... Automatic

D - Set Default Port Security

R - Return to Previous Menu

Enter your selection?

Figure 150 Configure Port Security Menu #1

Section VI: Port Security 458

Section VI: Port Security

AT-S62 User’s Guide

5. Press 1 to change the port security on your specified port list.

The following prompt appears:

Enter new mode (A-Automatic, L-Limited, S-Secured,

K-locKed):

6. Select the desired security level. For definitions of the security levels,

refer to MAC Address Security Overview on page 455.

If you select Automatic, which disables port security on the port, return to the Main Menu to save your change.

If you selected Limited, several new menu options are added to

the Configure Port Security menu, as shown in Figure 151.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure Port Security

Configuring Port Security 4

1 - Security Mode ..................... Limited

2 - Threshold ......................... 100

3 - Intruder Action ................... Discard

4 - Port Participating ................ No

D - Set Default Port Security

R - Return to Previous Menu

Enter your selection?

Figure 151 Configure Port Security Menu #2

Note

If you selected Limited, go to the next step. If you selected the

Secured or Locked mode, no further steps are required. You can repeat this procedure to configure other ports or go to step 10 to save your changes.

7. If you selected the Limited security mode for the port, do the following to specify the maximum number of dynamic MAC addresses you want the port to be able to learn: a. Type 2 to select Threshold.

The following prompt appears:

Enter port security threshold: [1 to 256] -> 100 b. Enter the maximum number of dynamic MAC addresses you want the port to be able to learn. The range is 1 to 256. The default is

100.

459

Chapter 23: MAC Address Security

8. To set the intrusion action for a port in the limited security mode, do the following: a. Type 3 to select Intruder Action.

The following prompt is displayed:

Enter intruder action: (N-Discard, T-Trap, D-

Disable): b. Select the desired action:

N - Discard: The port discards invalid frames. This is the default.

T - Trap: The port discards invalid frames and sends an SNMP trap.

D - Disable: The port discards invalid frames, sends a SNMP trap, and disables the port.

9. If you selected the trap or disable intrusion action, type 4 to toggle the Port Participating option to Yes.

This option applies only when the intrusion action is set to trap or disable. This option does not apply when intrusion action is set to discard. If this option is set to No when intrusion action is set to trap or disable, the port discards invalid packets, but it does not send the SNMP trap or disable the port. If you want the switch to send a trap and/or disable the port, you must sent this option to

Yes.

Note

The D - Select Default Port Security option in the menu sets the security mode for the port to the default value of Automatic.

10. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

11. If you configured a port for Secure security level, remember to enter the static MAC addresses of the end nodes that can send packets through the port. For instructions on how to add static MAC

addresses, refer to Adding Static Unicast and Multicast MAC

Addresses on page 116.

Section VI: Port Security 460

AT-S62 User’s Guide

Displaying Port Security Levels

To view the current security levels for the ports on the switch, do the following:

1. From the Main Menu, type 1 to select Port Configuration.

2. From the Port Configuration menu, type 5 to select Port Security.

The Port Security menu is shown in Figure 149 on page 458.

3. From the Port Security menu, type 2 to select Display Port Security.

The Display Port Security menu is shown in Figure 152.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Display Port Security

3

4

5

6

Port Security Mode Threshold Intruder Action Participating

----------------------------------------------------------------

1

2

Limited

Limited

6

10

Trap

Trap

Yes

Yes

7

8

Automatic

Locked

Automatic

Automatic

Automatic

Secured

---

---

---

---

---

---

------

Discard

------

------

------

Discard

---

No

---

---

---

No

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 152 Display Port Security Menu

This menu is for viewing purposes only. The columns in the menu are defined below:

Port

The number of the port.

Security Mode

The active security mode on the port.

Threshold

This column specifies the maximum number of dynamic MAC addresses the port will learn. It only applies when a port is operating in the Limited security mode.

Section VI: Port Security 461

Chapter 23: MAC Address Security

Intruder Action

The column specifies the action taken by a port if it receives an invalid frame.

❑ Discard: The port discards invalid frames. This is the default.

❑ Send Trap: The port discards invalid frames and sends a trap. This applies only to the Limited security mode.

❑ Disable Port: The port discards invalid frames, sends a trap, and disables the port. This applies only to the Limited security mode.

Participating

This column applies only when the intrusion action for a port is set to trap or disable. This option does not apply when intrusion action is set to discard. If this option is set to No when intrusion action is set to trap or disable, the port discards invalid packets, but it does not send a trap or disable the port.

Section VI: Port Security 462

Chapter 24

802.1x Port-based Access Control

This chapter explains 802.1x Port-based Access Control and how you can use this feature to restrict access to the ports on the switch. Sections are as follows:

❑ 802.1x Port-based Access Control Overview on page 464

❑ Enabling and Disabling Port-based Access Control on page 473

❑ Setting Port Roles on page 474

❑ Configuring Authenticator Port Parameters on page 476

❑ Configuring Supplicant Port Parameters on page 480

❑ Configuring RADIUS Accounting on page 483

463

Chapter 24: 802.1x Port-based Access Control

802.1x Port-based Access Control Overview

The AT-S62 management software provides you with several different methods for protecting your network and its resources from

unauthorized access. For instance, Chapter 23, MAC Address Security on page 454, explains how you can restrict network access based on the

MAC addresses of the end nodes in your network.

This chapter explains yet another way. This method is referred to as portbased access control (IEEE 802.1x). It uses the RADIUS authentication protocol to control who can send traffic through and receive traffic from a switch port. With this feature, the switch will not allow an end node to send or receive traffic through a port until the user of the node has logged on by entering a username and password that the RADIUS server validates.

The benefit to this type of network security is obvious. Only those users to whom you have assigned valid usernames and passwords will be able to use the switch to access the network. This can prevent an unauthorized individual from connecting a computer to a port or using an unattended workstation to access your network resources.

This port security method uses the RADIUS authentication protocol. The

AT-S62 software comes with RADIUS client software. If you have already

read Chapter 29, RADIUS and TACACS+ Authentication Protocols on page 552, then you know that you can also use the RADIUS client

software on the switch, along with a RADIUS server on your network, to create new manager accounts that control who can manage and change the AT-S62 parameters on the switch.

Note

RADIUS with Extensible Authentication Protocol (EAP) extensions is the only supported authentication server for this feature. This feature is not supported with the TACACS+ authentication protocol.

Since the switch can support only one authentication protocol at a time, you must use the RADIUS protocol if you want to implement

IEEE 802.1 port access control as explained in this chapter, and

create new manager accounts as explained in Chapter 29.

Here are a few terms to keep in mind when using this feature.

❑ Supplicant - A supplicant is an end user or end node that wants to access the network through a port. A supplicant is also referred to as a client.

❑ Authenticator - The authenticator is a port on the switch that prohibits network access by a supplicant until the network user has entered a valid username and password.

Section VI: Port Security

464

AT-S62 User’s Guide

❑ Authentication server - The authentication server is the network device that has the RADIUS server software. This is the device that will do the actual authenticating of the user names and password from the supplicants.

The AT-8524M switch itself does not authenticate the username and passwords from the clients. Rather, it acts as an intermediary between the supplicants and the authentication server during the authentication process.

Authentication

Process

Below is a brief overview of the authentication process that occurs between a supplicant, authenticator, and authentication server. For further details, refer to the IEEE 802.1x standard.

1. Either the authenticator port or the supplicant can initiate an authentication message exchange. The switch initiates an exchange when it detects a change in the status of a port (such as when the port transitions from no link to valid link), or if it receives a packet on the port with a source MAC address not in the MAC address table.

An authenticator starts the exchange by sending an EAP-

Request/Identity packet. A supplicant starts the exchange with an

EAPOL-Start packet, to which the authenticator responds with a EAP-

Request/Identity packet.

2. The supplicant responds with an EAP-Response/Identity packet to the authentication server via the authenticator.

3. The authentication server responds with an EAP-Request packet to the supplicant via the authenticator.

4. The supplicant responds with an EAP-Response/MDS packet containing a username and password.

5. The authentication server sends either an EAP-Success packet or EAP-

Reject packet to the supplicant.

6. Upon successful authorization of the supplicant by the authentication server, the switch adds the supplicant’s MAC address to the MAC address as an authorized address and begins forwarding network traffic to and from the port.

7. When the supplicant sends an EAPOL-Logoff message, the switch removes the supplicant’s MAC address from the MAC address table, preventing the supplicant from sending or receiving any further traffic from the port.

Section VI: Port Security

465

Chapter 24: 802.1x Port-based Access Control

Port Roles

Part of the task to implementing this feature is specifying the roles of the ports on the switch. A port can have one of three roles:

❑ None

❑ Authenticator

❑ Supplicant

None Role

A port in the none role does not participate in port-based access control.

Any device can connect to the port and send traffic through it and receive traffic from it without having to provide a username and password. This is the default setting for a port.

You set a port to this role if you do not want the user or end node to have to log on to use the network. This also happens to be the correct role for a port that’s connected to an authentication server. Since an authentication server cannot authenticate itself, the port to which it is connected must be set to this role.

Authenticator Role

Placing a port in the authenticator role activates port access control on the port. A port in the role of authenticator will not forward network traffic to or from the end node until the client has entered a username and password that the authentication server has validated.

Determining whether a port should be set to the authenticator role is straightforward. If you want the user of the end node connected to the port to log in before using the network, then you should set the port to the authenticator role.

Figure 153 illustrates this concept. Port 2 on the switch has been set to

the authenticator role because it is connected to an end node with

802.1x client software. The end user at the workstation must log on to use the network.

Section VI: Port Security

466

Section VI: Port Security

AT-S62 User’s Guide

Port 2 in

Authenticator

Role

MODE

AT-8524M

Fast Ethernet Switch

STATUS

Port 24 in

None Role

Supplicant with

802.1x Client

Software

RADIUS

Authentication

Server

Figure 153 Example of the Authenticator Role

As mentioned earlier, the switch itself does not authenticate the user names and passwords from the clients. That is the responsibility of the authentication server, which contains the RADIUS server software.

Instead, a switch simply acts as an intermediary for the authentication server by denying access to the network by the client until the client has provided a valid username and password, which the authentication server validates.

Supplicant Role

A port in the supplicant role acts as a client. The port assumes it must log in by providing a valid user name and password to whatever device it is connected to, typically another switch.

Figure 154 illustrates the port role. Port 11 on Switch B has been set to

the supplicant role. Now, whenever Switch B is power cycled or reset and initiates a link with Switch A it will have to log on by providing a username and password. (You enter this information when you configure the port for the supplicant role.)

467

Chapter 24: 802.1x Port-based Access Control

MODE

AT-8524M Fast Ethernet Switch

STATUS

Switch A

Port 6 in

Authenticator

Role

Port 11 in

Supplicant

Role

RADIUS

Authentication

Server

MODE

AT-8524M Fast Ethernet Switch

STATUS

Switch B

Figure 154 Example of the Supplicant Role

Note

The use of this port role should be strictly limited. Otherwise, undesired switch operation may result. The port role should only be used when the link will carry traffic from just one client or only management traffic. Ports used to interconnect switches should typically be set to the none role.

RADIUS

Accounting

The AT-S62 management software supports RADIUS accounting for ports set to the Authenticator role. This feature allows the switch to send information to the RADIUS server about the status of its supplicants. You can view this information on the RADIUS server to monitor network activity and use.

The switch sends accounting information to the RADIUS server whenever one of the following events occur:

❑ Supplicant logs on

❑ Supplicant logs off

❑ A change in the status of an Authenticator port during an active

Supplicant session (for example, the port is reset or is changed from the Authenticator role to None role while a Supplicant is logged on)

Section VI: Port Security

468

AT-S62 User’s Guide

The information sent by the switch to the RADIUS server for an event includes:

❑ The port number where the event occurred.

❑ The date and time when the event occurred.

❑ The number of packets transmitted and received by the port during a supplicant’s session. (This information is sent when the client logs off.)

You can also configure the accounting feature to send interim updates so you can monitor which clients are still active.

Here are the guidelines to using the accounting feature:

❑ The AT-S62 management software supports the Network level of accounting, but not the System or Exec.

❑ This feature is available for ports operating in the Authenticator role. Accounting is not supported for ports operating in the

Supplicant or None role.

❑ You must configure 802.1x Port-based Access Control as explained in this chapter and designate port roles.

❑ You must also specify from one to three RADIUS servers. The

instructions for this are in Configuring Authentication Protocol

Settings on page 557.

For instructions on configuring this feature, refer to Configuring RADIUS

Accounting on page 483.

General Steps

Here are the general steps to implementing 802.1x Port-based Access

Control and RADIUS accounting on the switch:

1. You must install RADIUS server software on one or more of your network servers or management stations. Authentication protocol server software is not available from Allied Telesyn. Funk Software

Steel-Belted Radius and Free Radius have been verified as fully compatible with the AT-S62 management software.

Note

This feature is not supported with the TACACS+ authentication protocol.

2. You need to install 802.1x client software on those workstations that are to be supplicants. Microsoft WinXP client software and Meeting

House Aegis client software have been verified as fully compatible with the AT-S62 management software.

Section VI: Port Security

469

Chapter 24: 802.1x Port-based Access Control

Port-based

Access Control

Guidelines

3. You must configure the RADIUS client software in the AT-S62 management software. You will need to provide the following information:

❑ The IP addresses of up to three RADIUS servers.

❑ The encryption key used by the authentication servers.

The instructions for this step are in Configuring Authentication

Protocol Settings on page 557.

4. You must configure the port access control settings on the switch.

This involves the following:

❑ Specifying the port roles.

❑ Configuring 802.1x port parameters.

❑ Enabling 802.1x port access control.

The instructions for this step are found in this chapter.

5. Finally, if you want to use RADIUS accounting to monitor the supplicants connected to the ports, you must configure the service

on the switch, as explained in Configuring RADIUS Accounting on page 483.

Here are the guidelines to using this feature:

❑ Ports operating under port-based access control do not support port trunking or dynamic MAC address learning.

❑ The appropriate port role for a port on an AT-8524M switch connected to an authentication server is None.

❑ The verification process between a supplicant and the authentication server does not allow for tagged packets.

Consequently, each VLAN that contains clients must have a separate authentication server and the server must be connected to a port that is an untagged member of the VLAN in which the supplicants are members.

❑ If a switch port set to the supplicant role is connected to a port on another switch that is not set to authenticator, the port, after a timeout period, will assume that it can send traffic without having to log on.

❑ Allied Telesyn does not recommend connecting more than one supplicant to an authenticator port on the switch.

Section VI: Port Security

470

Section VI: Port Security

AT-S62 User’s Guide

Note

Connecting multiple supplicants to a port set to the authenticator role does not conform to the IEEE 802.1x standard, can introduce security risks, and can result in undesirable switch behavior. To avoid this, Allied Telesyn recommends not using the authenticator role on a port that is connected to more than one end node, such as a port connected to another switch or a hub.

❑ A username and password combination is not tied to the MAC address of an end node. This allows end users to use the same username and password when working at different workstations.

❑ Once a supplicant has successfully logged on, the MAC address of the end node is added to the switch’s MAC address table as an authenticated address. It remains in the table until the end user logs off the network or does not respond to a reauthentication request. Only then is the address removed. The MAC aging time does not apply to authenticated MAC addresses.

Note

End users of port-based access control should be instructed to always log off when they are finished with a work session. This will prevent unauthorized individuals from accessing the network through unattended network workstations.

❑ You cannot use the MAC address port security feature, described

in Chapter 23, MAC Address Security on page 454, on ports that

are set to the authenticator or supplicant role. A port’s MAC address security level must be Automatic.

❑ There should be only one port in the authenticator role between a supplicant and the authentication server.

❑ The Authentication Menu for configuring the RADIUS client software has the selection “1 - Server-based Authentication.” This option does not apply to the 802.1x port-based access control,

but only to new manager accounts, as described in Chapter 29,

RADIUS and TACACS+ Authentication Protocols on page 552. It

does not need to be toggled to Enabled for the switch to use the

RADIUS configuration information. If you want to use 802.1x portbased access control but not use new manager accounts, the menu selection should be set to disabled.

471

Chapter 24: 802.1x Port-based Access Control

❑ Ports used to interconnect switches should typically be set to the

none role, as illustrated in Figure 155.

MODE

AT-8524M

Fast Ethernet Switch

STATUS

Switch A

Port 6 in

None Role

Port 24 in

None Role

Port 21 in

None Role

MODE

AT-8524M

Fast Ethernet Switch

STATUS

RADIUS

Authentication

Server

Switch B

Ports in

Authenticator

Role

Supplicants with

802.1x Client

Software

Figure 155 Port-based Authentication Across Multiple Switches

Section VI: Port Security

472

AT-S62 User’s Guide

Enabling and Disabling Port-based Access Control

This procedure explains how to enable and disable port-based access control on the switch. If you have not assigned port roles and configured the parameter settings, you should skip this procedure and go first to

Setting Port Roles on page 474.

To enable or disable Port-based Access Control, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page 196.

2. From the Security and Services menu, type 1 to select Port Access

Control (802.1X).

The Port Access Control (802.1X) menu is shown in Figure 156.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Port Access Control (802.1X)

1 - Port Access Control .............. Disabled

2 - Authentication Method ............ RADIUS EAP

3 - Configure Port Access Role

4 - Configure Authenticator

5 - Configure Supplicant

6 - Display Port Access Status

7 - Configure Accounting

R - Return to Previous Menu

Enter your selection?

Figure 156 Port Access Control (802.1X) Menu

Note

Option 2 - Authentication Method cannot be changed.

3. Type 1 to select Port Access Control. The following prompt is displayed:

Port Access Control (E-Enable, D-Disable):

4. Type E to enable port access control, or D to disable port access control. Press Return.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section VI: Port Security

473

Chapter 24: 802.1x Port-based Access Control

Setting Port Roles

This procedure sets port roles. For an explanation of port roles, refer to

Port Roles on page 466.

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page 196.

2. From the Security and Services menu, type 1 to select Port Access

Control (802.1X).

The Port Access Control (802.1X) menu is shown in Figure 156 on page 473.

3. In the Port Access Control (802.1X) menu, type 3 to select Configure

Port Access Role. The following prompt is displayed:

Enter port list ->

4. Enter the port whose role you want to change. You can specify one port or a range of ports (for example, 4-8), but not nonconsecutive ports (for example, 4,6,11).

The Configure Port Access Role menu is shown in Figure 157.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure Port Access Role

Configuring Port 3

1 - Port Role ......... None

R - Return to Previous Menu

Enter your selection?

Figure 157 Configure Port Access Role Menu

5. Type 1 to select Port Role. The following prompt is displayed:

Enter new Port Role [N-None, A-Authenticator, S-

Supplicant] ->

6. If you type N for None, the port will not participate in port access control. This is the default setting. If the port is connected to a supplicant, type A to set the port’s role to Authenticator. If the port is connected to an authenticator, type S to set the port’s roles to

Supplicant.

7. Repeat this procedure starting with Step 3 to configure the role of the other ports on the switch.

Section VI: Port Security

474

AT-S62 User’s Guide

8. Once you have set port roles, you can go to the next procedure to configure port security parameters or, if you do not want to change

the default values, you can go to Enabling and Disabling Port-based

Access Control on page 473 and activate the feature.

Section VI: Port Security

475

Chapter 24: 802.1x Port-based Access Control

Configuring Authenticator Port Parameters

Note

A port must be set to the authenticator role before you can configure its settings. For instructions on how to set a port’s role,

refer to Setting Port Roles on page 474.

To configure authenticator port parameters, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page 196.

2. From the Security and Services menu, type 1 to select Port Access

Control (802.1X).

The Port Access Control (802.1X) menu is shown in Figure 156 on page 473.

3. In the Port Access Control (802.1X) menu, type 4 to select Configure

Authenticator.

The Configure Authenticator menu is shown in Figure 158.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure Authenticator

1 - Configure Authenticator Port Access Parameters

2 - Display Authenticator Port Access Parameters

R - Return to Previous Menu

Enter your selection?

Figure 158 Configure Authenticator Menu

4. Type 1 to select Configure Authenticator Port Access Parameters.

The following prompt is displayed:

Enter port list ->

5. Enter the authenticator port number whose parameters you want to change. You can specify one port or a range of ports (for example, 4-

8), but not nonconsecutive ports (for example, 4,6,11).

Section VI: Port Security

476

Section VI: Port Security

AT-S62 User’s Guide

The Configure Authenticator Port Access Parameters menu is shown

in Figure 159.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure Authenticator Port Access Parameters

Configuring Port 3

1 - Port Control ............. Auto

2 - Quiet Period ............. 60 Seconds

3 - TX Period ................ 30 Seconds

4 - Reauth Period ............ 3600 Seconds

5 - Supplicant Timeout ....... 30 Seconds

6 - Server Timeout ........... 30 Seconds

7 - Max Requests ............. 2

8 - Control Direction ........ INGRESS

R - Return to Previous Menu

Enter your selection?

Figure 159 Configure Authenticator Port Access Parameters Menu

6. Select the parameter you want to modify. The parameters are described below:

1 - Port Control

This parameter can take the following values:

Force-authorized: Disables IEEE 802.1X port-based authentication and causes the port to transition to the authorized state without any authentication exchange required. The port transmits and receives normal traffic without 802.1x-based authentication of the client. This is the default setting

Force-unauthorized: Causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface

Auto: Enables 802.1x port-based authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port changes or the port receives an EAPOL-Start packet from a supplicant. The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server. Each client that attempts to access the network is uniquely identified by the switch using the client's

MAC address.

477

Chapter 24: 802.1x Port-based Access Control

2 - Quiet Period

Sets the number of seconds that the port remains in the quiet state following a failed authentication exchange with the clien t. The default value is 60 seconds. The range is 0 to 65,535 seconds.

3 - TX Period

Sets the number of seconds that the switch waits for a response to an

EAP-request/identity frame from the client before retransmitting the request. The default value is 30 seconds. The range is 1 to 65,535 seconds.

4 - Reauth Period

Enables periodic reauthentication of the client, which is disabled by default. The default value is 3600 seconds. The range is 1 to 65,535 seconds.

5 - Supplicant Timeout

Sets the switch-to-client retransmission time for the EAP-request frame. The default value for this parameter is 30 seconds. The range is

1 to 600 seconds.

6 - Server Timeout

Sets the timer used by the switch to determine authentication server timeout conditions. The default value for this parameter is 30 seconds. The range is 1 to 65,535 seconds.

7 - Max Requests

Specifies the maximum number of times that the switch retransmits an EAP Request packet to the client before it times out the authentication session. The default value for this parameter is 2 retransmissions. The range is 1 to 10 retransmissions.

8 - Control Direction

Specifies how the port is to handle ingress and egress broadcast and multicast packets when in the unauthorized state. When a port is set to the Authenticator role, it remains in the unauthorized state until the client logs on by providing a username and password combination. In the unauthorized state, the port will only accept EAP packets from the client. All other ingress packets that the port might receive from the client, including multicast and broadcast traffic, is discarded until the supplicant has logged on.

You can use this selection to control how an Authenticator port will handle egress broadcast and multicast traffic when in the unauthorized state. You can instruct the port to forward this traffic to the client, even though the client has not logged on, or you can have the port discard the traffic.

Section VI: Port Security

478

AT-S62 User’s Guide

The two selections are:

Ingress - An authenticator port, when in the unauthorized state, will discard all ingress broadcast and multicast packets from the client. while forwarding all egress broadcast and multicast traffic to the same client. This is the default.

Both - An authenticator port, when in the unauthorized state, will not forward ingress or egress broadcast and multicast packets from or to the client until the client has logged on.

7. Repeat this procedure starting with Step 4 to configure additional supplicant ports on the switch.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section VI: Port Security

479

Chapter 24: 802.1x Port-based Access Control

Configuring Supplicant Port Parameters

Note

A port must be set to the supplicant role before you can configure its settings. For instructions on how to set a port’s role, refer to

Setting Port Roles on page 474.

To configure supplicant port parameters, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page 196.

2. From the Security and Services menu, type 1 to select Port Access

Control (802.1X).

The Port Access Control (802.1X) menu is shown in Figure 156 on page 473.

3. In the Port Access Control Menu, type 5 to select Configure

Supplicant.

The Configure Supplicant menu is shown in Figure 158.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure Supplicant

1 - Configure Supplicant Port Access Parameters

2 - Display Supplicant Port Access Parameters

R - Return to Previous Menu

Enter your selection?

Figure 160 Configure Supplicant Menu

4. Type 1 to select Configure Authenticator Port Access Parameters.

The following prompt is displayed:

Enter port list ->

5. Enter the supplicant port number whose parameters you want to change. You can specify one port or a range of ports (for example, 4-

8), but not multiple individual ports (for example, 4,6,11).

Section VI: Port Security

480

Section VI: Port Security

AT-S62 User’s Guide

The Configure Supplicant Port Access Parameters menu is shown in

Figure 159.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Configure Supplicant Port Access Parameters

Configuring Port 5-8

1 - Auth Period........... 30 Seconds

2 - Held Period........... 60 Seconds

3 - Max Start............. 3

4 - Start Period.......... 30 Seconds

5 - User Name.............

6 - User Password.........

R - Return to Previous Menu

Enter your selection?

Figure 161 Configure Supplicant Port Access Parameters Menu

6. Select the parameter that you want to modify. The parameters are described below:

1 - Auth Period

Specifies the period of time in seconds that the supplicant will wait for a reply from the authenticator after sending an EAP-Response frame.

The range is 1 to 60 seconds. The default is 30 seconds.

2 - Held Period

Specifies the amount of time in seconds the supplicant is to refrain from retrying to re-contact the authenticator in the event the end user provides an invalid username and/or password. Once the time period has expired, the supplicant can attempt to log on again. The range is 0 to 65,535. The default value is 60.

3 - Max Start

Specifies the maximum number of times the supplicant will send

EAPOL-Start frames before assuming that there is no authenticator present. The range is 1 to 10. The default is 3.

4 - Start Period

Specifies the time period in seconds between successive attempts by the supplicant to establish contact with an authenticator when there is no reply. The range is 1 to 60. The default is 30.

5 - User Name

Specifies the username for the port. The port sends the name to the authentication server for verification when the port logs on to the

481

Chapter 24: 802.1x Port-based Access Control network. The username can be from 1 to 64 alphanumeric characters

(A to Z, a to z, 1 to 9). Do not use spaces or special characters, such as asterisks or exclamation points. The username is case-sensitive.

6 - User Password

Specifies the password for the port. The port sends the password to the authentication server for verification when the port logs on to the network. The password can contain alphanumeric characters (A to Z, a to z, 1 to 9). Do not use spaces or special characters, such as asterisks or exclamation points. The password is case-sensitive.

7. Repeat this procedure starting with Step 4 to configure additional supplicant ports on the switch.

8. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section VI: Port Security

482

AT-S62 User’s Guide

Configuring RADIUS Accounting

The AT-S62 management software supports RADIUS accounting for ports operating in the Authenticator role. The accounting information sent by the switch to a RADIUS server includes the date and time when clients log on and log off, as well as the number of packets sent and received by a port during a client session. For background information

on this feature, refer to RADIUS Accounting on page 468. This feature is

disabled by default on the switch.

To configure this feature, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page 196.

2. From the Security and Services menu, type 1 to select Port Access

Control (802.1X).

The Port Access Control (802.1X) menu is shown in Figure 156 on page 473.

3. From the Port Access Control (802.1X) menu, type 7 to select

Configuring Accounting.

The RADIUS Accounting menu is shown in Figure 162.

Allied Telesyn Ethernet Switch AT-8524M -

AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Radius Accounting

1 - Status............ Disabled

2 - Port.............. 1813

3 - Type.............. Network

4 - Trigger Type...... Start_Stop

5 - Update Status..... Disabled

6 - Update Interval... 60

R - Return to Previous Menu

Enter your selection?

Figure 162 Radius Accounting Menu

Section VI: Port Security

483

Chapter 24: 802.1x Port-based Access Control

4. Configure the parameters as needed. Changes take affect immediately on the switch. The parameters are defined below.

1 - Status

Activates and deactivate RADIUS accounting on the switch. Select

Enabled to activate the feature or Disabled to deactivate it. The default is Disabled.

2 - Port

Specifies the UDP port for RADIUS accounting. The default is port

1813.

3 - Type

Specifies the type of RADIUS accounting. The default is Network. This value cannot be changed.

4 - Trigger Type

Specifies the action that causes the switch to send accounting information to the RADIUS server. The choices are:

❑ Start Stop - The switch sends accounting information whenever a client logs on or logs off the network. This is the default.

❑ Stop only - The switch sends accounting information only when a client logs off.

5 - Update Status

Controls whether the switch is to send interim accounting updates to the RADIUS server. The default is disabled. If you enable this feature, use the next option in the menu to specify the intervals at which the switch is to send the accounting updates.

6 - Update Interval

Specifies the intervals at which the switch is to send interim accounting updates to the RADIUS server. The range is 30 to 300 seconds. The default is 60 seconds.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section VI: Port Security

484

Section VII

Management Security

The chapters in this section explain the management security features of the AT-S62 software. The chapters include:

❑ Chapter 25: Web Server on page 486

❑ Chapter 26: Encryption Keys on page 492

❑ Chapter 27: Public Key Infrastructure Certificates on page 510

❑ Chapter 28: Secure Shell (SSH) Protocol on page 543

❑ Chapter 29: RADIUS and TACACS+ Authentication Protocols on page 552

❑ Chapter 30: Management Access Control List on page 563

485

Chapter 25

Web Server

The chapter provides an overview of the web server feature and the procedure for configuring the server. It contains the following sections:

❑ Web Server Overview on page 487

❑ Configuring the Web Server on page 490

486

AT-S62 User’s Guide

Web Server Overview

The AT-S62 management software comes with web server software so you can remotely manage a switch with a web browser from a management workstation on your network. (The instructions for managing a switch with a web browser are contained in the chapters in

Section VII, Web Browser Management, of this manual.)

The web server can operate in two modes. The first is referred to as nonsecure HTTP mode. In this mode, packets sent between the switch and the web browser during a management session are transmitted in plaintext. Anyone monitoring your network with a sniffer will be able to view the contents of the management packets.

The web server can also operate in the secure HTTPS mode where all communications between the switch and a web browser are encrypted.

This feature uses the Secure Sockets Layer (SSL) protocol. It can help protect your switch from intruders who might be monitoring your network.

If you intend to use the secure HTTPS mode of the web server, there are several procedures you need to perform before you can configure the

web server. You must create an encryption key, as explained in Chapter

26, Encryption Keys on page 492. You must also create a certificate and

add the certificate to the certificate database. This latter part is explained

in Chapter 27, Public Key Infrastructure Certificates on page 510. For an

overview to the procedures, refer to General Steps to Configuring the

Web Server for Encryption on page 488.

The default setting for the web server is enabled, with the non-secure

HTTP mode as the default active mode.

Note

To use SSL in an enhanced stack, all switches in the stack must use

SSL. For further information, refer to SSL and Enhanced Stacking on page 514.

Supported

Protocols

Section VII: Management Security

The switch supports the following HTTP and HTTPs protocols:

❑ HTTP v1.0 and v1.1 protocols

❑ HTTPS v1.0 and v1.1 protocols running over SSL

The switch supports the following SSL protocols:

❑ SSL version 2.0

❑ SSL version 3.0

❑ TLS (Transmission Layer Security) version 1.0

487

Chapter 25: Web Server

General Steps to

Configuring the

Web Server for

Encryption

There are several procedures you need to perform in order to implement

HTTPS and web browser encryption on the switch. This section is here to provide you with the general steps and the procedures for performing them. There is a section for configuring the web server with a self-signed certificate and another for a public or private CA certificate.

General Steps for a Self-signed Certificate

Below are the general steps to setting up the web server with a selfsigned certificate.

1. Set the switch’s date and time. You must do this before you create a self-signed certificate because the date and time are stamped in the

digital document. For instructions, refer to Setting the System Time on page 67.

2. Create a key pair, as explained in Creating an Encryption Key on page

500.

3. Create a self-signed certificate using the key pair, as explained in

Creating a Self-signed Certificate on page 524.

4. Add the certificate to the certificate database, as explained in Adding a Certificate to the Database on page 528.

5. Configure the web server on the switch by activating HTTPS and specifying the key pair used to create the certificate as the active key.

This step is explained in Configuring the Web Server on page 490.

General Steps for a Public or Private CA Certificate

Below are the steps for setting up the web server with a public or private

CA certificate. This requires generating an enrollment request.

1. Set the switch’s date and time. You must do this before you create the enrollment request. The date and time are stamped in the request.

The instructions for this are in Setting the System Time on page 67.

2. Create a key pair, as explained in Creating an Encryption Key on page

500.

3. Generate an enrollment request, as explained in Generating an

Enrollment Request on page 537.

4. Upload the enrollment request from the AT-S62 file system onto your

management workstation or a TFTP server, as explained in Uploading a System File on page 177.

5. Submit the enrollment request to the public or private CA.

Section VII: Management Security 488

AT-S62 User’s Guide

6. Once you have received the appropriate certificates from the CA, download them into the AT-S62 file system from your management

workstation or a TFTP server, as explained in Downloading a System

File on page 171.

7. Add the certificates to the certificate database, as explained in Adding a Certificate to the Database on page 528.

8. Configure the web server on the switch by activating HTTPS and specifying the key pair used to create the enrollment request as the

active key. This step is explained in Configuring the Web Server on page 490.

Section VII: Management Security 489

Chapter 25: Web Server

Configuring the Web Server

This procedure explains how to enable and disable the web server and how to configure the HTTP and HTTPS settings from a local or Telnet management session. The default setting for the web server is enabled, with the non-secure HTTP mode as the active web server mode.

Before configuring the web server, please note the following:

❑ You cannot make any changes to the HTTP or HTTPS settings while the web server is enabled. You must first disable the server before making changes.

❑ To configure the web server for the HTTPS secure mode, you must first create an encryption key and a certificate, and add the certificate to the certificate database. The management software will not allow you to configure the web server for the HTTPS secure mode until those steps have been completed. For

instructions, refer to Chapter 26, Encryption Keys on page 492 and

Chapter 27, Public Key Infrastructure Certificates on page 510.

❑ To make a change to an HTTP or HTTPS setting, you must perform the entire procedure. For instance, to change the port number for

HTTP, you must first disable the web server and then reselect

HTTP.

To configure the web server, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

2. From the System Administration menu, type 4 to select Web Server

Configuration.

The Web Server Configuration Menu is shown in Figure 163.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Web Server Configuration

1 - Status ................................. Enabled

2 - Mode ................................... HTTPS

3 - Port Number ............................ 80

4 - SSL Key ID ............................. 11

R - Return to Previous Menu

Enter your selection?

Figure 163 Web Server Configuration Menu

Section VII: Management Security 490

Section VII: Management Security

AT-S62 User’s Guide

Menu option 4 is displayed only for HTTPS operation. The option is hidden for HTTP.

3. Type 1 to select Status to toggle the web server between enabled and disabled. To configure the web server, you must first disable it.

Toggle between the following values:

Enabled - Enables the web server. This is the default setting.

Disabled - Disables the web server. (If you are making any changes to the web server settings, you must first disable it.)

4. Type 2 to select Mode to set the mode of the web server.

The following prompt appears:

Enter Web Server Mode (1 - HTTP, 2 - HTTPS):

[1 to 2] ->

5. Choose one of the following:

1 - HTTP to select the non-secure HTTP mode for the web server.

This is the default value.

2 - HTTPS to select the secure HTTPS mode. This setting activates the SSL protocol on the web server.

If you are configuring HTTPS, the following prompt appears:

Enter SSL Key ID ->

6. Enter an SSL Key ID.

Enter the ID number of an encryption key on the switch. (To view

the encryption key IDs, refer to Creating an Encryption Key on page 500.) You must have already created the encryption key and

a certificate using the key. You must also have already added the certificate to the certificate database.

7. To change the protocol port number, type 3 to select Port Number.

The following prompt appears:

Enter Port Number [1 to 65535]-> 80

8. Enter the new protocol port number.

The default port number for HTTP is 80. The default port number for HTTPS is 443.

9. To enable the web server, type 1 to toggle Status to Enabled.

10. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

491

Chapter 26

Encryption Keys

This chapter describes how to improve the security of your switches with encryption keys. Because of the complexity of the feature, two overview sections are provided. The Basic Overview section offers a general review of the purpose of this feature along with relevant guidelines. For additional information, refer to the Technical Overview section. The sections in this chapter include:

❑ Basic Overview on page 493

❑ Technical Overview on page 495

❑ Creating an Encryption Key on page 500

❑ Deleting an Encryption Key on page 504

❑ Modifying an Encryption Key on page 505

❑ Exporting an Encryption Key on page 506

❑ Importing an Encryption Key on page 508

For an overview of the procedures to configuring the switch’s web

server for encryption, refer to General Steps to Configuring the Web

Server for Encryption on page 488.

Note

The feature is not available in all versions of the AT-S62 management software. Contact your sales representative to determine if this feature is available for your locale.

492

AT-S62 User’s Guide

Basic Overview

Protecting your managed switches from unauthorized management access is an important role for a network manager. Network operations and security can be severely compromised should an intruder gain access to critical switch information, such as a manager’s login username and password, and use that information to alter a switch’s configuration settings.

One means by which an intruder could covertly obtain critical switch information is by monitoring network traffic with a network analyzer, such as a sniffer, and capturing management packets from remote

Telnet or web browser management sessions. The payload in the packets exchanged during remote management sessions is transmitted in plaintext, which can be easily decyphered. The information garnered from the management packets could enable an intruder to access a switch.

One means of foiling this type assault is by encrypting the payload in the packets exchanged during a remote management session between a management workstation and a switch. Encryption makes the packets unintelligible to an outside agent. Only the remote workstation and the switch engaged in the management session are able to decode each other’s packets.

The heart of encryption is the encryption key. The key converts plaintext into encrypted text, and vice versa. A key consists of two separate keys: a private key and a public key. Together they create a key pair.

The AT-S62 management software supports encryption for remote web browser management sessions using the Secure Sockets Layer (SSL) protocol. Adding encryption to your web browser management sessions involves creating one key pair and adding the public key of the key pair to a certificate, a digital document stored on the switch. You can have the switch create the certificate itself or you can have a public or private certificate authority (CA) create it for you. For an overview of the steps to adding encryption to your web browser management sessions, refer to

General Steps to Configuring the Web Server for Encryption on page

488.

The Telnet application protocol does not support encryption. To have encryption when you remotely manage a switch using the menu interface, you must first obtain a Secure Shell (SSH) protocol application.

SSH offers the same functionality as Telnet, but with encryption.

Section VII: Management Security 493

Chapter 26: Encryption Keys

SSH encryption requires two key pairs on the switch— a server key pair and a host key pair. You then configure the Secure Shell protocol server

software on the switch, as explained in Chapter 28, Secure Shell (SSH)

Protocol on page 543, by specifying the keys as the host and server SSH

keys.

Encryption Key

Length

To create a key pair, you must specify its length. The length is given in bits. The range is 512 to 1,536 bits, in increments of 256 bits. The default is 512 bits.

The general rule on key lengths is that the longer the key, the more difficult it is for someone to break (decipher). If you are particularly concerned about the safety of your management sessions, you might go with a longer key length than the default, though in all likelihood, the default will be more than sufficient.

It should be pointed out that creating a key is a very CPU intensive operation for the switch. The switch will not stop forwarding packets between the ports, but the process can impact the CPU’s handling of network events, such as the processing of spanning tree BPDU packets.

This can result in unexpected and unwanted switch behavior.

A key with the default length should take the switch less than a minute to create, while longer keys can take upwards of fifteen minutes. You should take this into account when creating a key so as not to impact the operations of your network. If you want a longer key, you might consider creating it before you connect the switch to the network, or during periods of low network traffic.

Encryption Key

Guidelines

Below are guidelines to observe when creating an encryption key pair:

❑ Web browser encryption requires only one key pair.

❑ SSH encryption requires two key pairs. The keys must be of different lengths of at least one increment (256 bits) apart. The recommended size for the server key is 768 bits and the recommended size for the host key is 1024 bits.

❑ An AT-8524M switch can only use those key pairs it has generated itself. The switch cannot use a key created on another system and imported onto the switch.

❑ The AT-S62 management software does not allow you to copy or export a private key from a switch. However, you can export a public key.

❑ The AT-S62 management software uses the RSA public key algorithm.

❑ Web browser and SSH encryption can share a key pair.

Section VII: Management Security 494

AT-S62 User’s Guide

Technical Overview

Data

Encryption

The encryption feature provides the following data security services:

❑ data encryption

❑ data authentication

❑ key exchange algorithms

❑ key creation and storage

Data encryption for switches is driven by the need for organizations to keep sensitive data private and secure. Data encryption operates by applying an encryption algorithm and key to the original data (the plaintext) to convert it into an encrypted form (the ciphertext). The ciphertext produced by encryption is a function of the algorithm used and the key. Since it is easy to discover what type of algorithm is being used, the security of an encryption system relies on the secrecy of its key information. When the ciphertext is received by the remote router, the decryption algorithm and key are used to recover the original plaintext.

Often, a checksum is added to the data before encryption. The checksum allows the validity of the data to be checked on decryption.

There are two main classes of encryption algorithm in use: symmetrical encryption and asymmetrical encryption.

Symmetrical Encryption

Symmetrical encryption refers to algorithms in which a single key is used for both the encryption and decryption processes. Anyone who has access to the key used to encrypt the plaintext can decrypt the ciphertext. Because the encryption key must be kept secret to protect the data, these algorithms are also called private, or secret key algorithms. The key can be any value of the appropriate length.

DES Encryption Algorithms

The most common symmetrical encryption system is the Data Encryption

Standard (DES) algorithm (FIPS PUB 46). The DES algorithm has withstood the test of time and proved itself to be a highly secure encryption algorithm. To fully conform to the DES standard, the actual data encryption operations must be carried out in hardware. Software implementations can only be DES-compatible, not DES-compliant. The

DES algorithm has a key length of 56 bits and operates on 64-bit blocks of data. DES can be used in the following modes:

Section VII: Management Security 495

Chapter 26: Encryption Keys

Section VII: Management Security

Electronic Code Book (ECB) is the fundamental DES function.

Plaintext is divided into 64-bit blocks which are encrypted with the DES algorithm and key. For a given input block of plaintext

ECB always produces the same block of ciphertext.

Cipher Block Chaining (CBC) is the most popular form of DES encryption. CBC also operates on 64-bit blocks of data, but includes a feedback step which chains consecutive blocks so that repetitive plaintext data, such as ASCII blanks, does not yield identical ciphertext. CBC also introduces a dependency between data blocks which protects against fraudulent data insertion and replay attacks. The feedback for the first block of data is provided by a 64-bit Initialization Vector (IV). This is the DES mode used for the switch’s data encryption process.

Cipher FeedBack (CFB) is an additive-stream-cipher method which uses DES to generate a pseudo-random binary stream that is combined with the plaintext to produce the ciphertext. The ciphertext is then fed back to form a portion of the next DES input block.

Output FeedBack (OFB) combines the first IV DES algorithms with the plaintext to form ciphertext. The ciphertext is then used as the next IV.

The DES algorithm has been optimized to produce very high speed hardware implementations, making it ideal for networks where high throughput and low latency are essential.

Triple DES Encryption Algorithms

The Triple DES (3DES) encryption algorithm is a simple variant on the

DES CBC algorithm. The DES function is replaced by three rounds of that function, an encryption followed by a decryption followed by an encryption. This can be done by using either two DES keys (112-bit key) or three DES keys (168-bit key).

The two-key algorithm encrypts the data with the first key, decrypts it with the second key and then encrypts the data again with the first key.

The three-key algorithm uses a different key for each step. The three-key algorithm is the most secure algorithm due to the long key length.

There are several modes in which Triple DES encryption can be performed. The two most common modes are:

Inner CBC mode encrypts the entire packet in CBC mode three times and requires three different initial is at ion vectors (IV’s).

Outer CBC mode triple encrypts each 8-byte block of a packet in

CBC mode three times and requires one IV.

496

AT-S62 User’s Guide

Asymmetrical (Public Key) Encryption

Asymmetrical encryption algorithms use two keys—one for encryption and one for decryption. The encryption key is called the public key because it cannot be used to decrypt a message and therefore does not have to be kept secret. Only the decryption, or private key, needs to be kept secret. The other name for this type of algorithm is public key encryption. The public and private key pair cannot be randomly assigned, but must be generated together. In a typical scenario, a decryption station generates a key pair and then distributes the public key to encrypting stations. This distribution does not need to be kept secret, but it must be protected against the substitution of the public key by a malicious third party. Another use for asymmetrical encryption is as a digital signature. The signature station publishes its public key, and then signs its messages by encrypting them with its private key. To verify the source of a message, the receiver decrypts the messages with the published public key. If the message that results is valid, then the signing station is authenticated as the source of the message.

The most common asymmetrical encryption algorithm is RSA. This algorithm uses mathematical operations which are relatively easy to calculate in one direction, but which have no known reverse solution.

The security of RSA relies on the difficulty of factoring the modulus of the RSA key. Because key lengths of 512 bits or greater are used in public key encryption systems, decrypting RSA encrypted messages is almost impossible using current technology. The AT-S62 software uses the RSA algorithm.

Asymmetrical encryption algorithms require enormous computational resources, making them very slow when compared to symmetrical algorithms. For this reason they are normally only used on small blocks of data (for example, exchanging symmetrical algorithm keys), and not for entire data streams.

Data

Authentication

Data authentication for switches is driven by the need for organizations to verify that sensitive data has not been altered.

Data authentication operates by calculating a message authentication code (MAC), commonly referred to as a hash, of the original data and appending it to the message. The MAC produced is a function of the algorithm used and the key. Since it is easy to discover what type of algorithm is being used, the security of an authentication system relies on the secrecy of its key information. When the message is received by the remote switch, another MAC is calculated and checked against the

MAC appended to the message. If the two MACs are identical, the message is authentic.

Section VII: Management Security 497

Chapter 26: Encryption Keys

Typically a MAC is calculated using a keyed one-way hash algorithm. A keyed one-way hash function operates on an arbitrary-length message and a key. It returns a fixed length hash. The properties which make the hash function one-way are:

❑ it is easy to calculate the hash from the message and the key

❑ it is very hard to compute the message and the key from the hash

❑ it is very hard to find another message and key which give the same hash

The two most commonly used one-way hash algorithms are MD5

(Message Digest 5, defined in RFC 1321) and SHA-1 (Secure Hash

Algorithm, defined in FIPS-180-1). MD5 returns a 128-bit hash and SHA-1 returns a 160-bit hash. MD5 is faster in software than SHA-1, but SHA-1 is generally regarded to be slightly more secure.

HMAC is a mechanism for calculating a keyed Message Authentication

Code which can use any one-way hash function. It allows for keys to be handled the same way for all hash functions and it allows for different sized hashes to be returned.

Another method of calculating a MAC is to use a symmetric block cypher such as DES in CBC mode. This is done by encrypting the message and using the last encrypted block as the MAC and appending this to the original message (plain-text). Using CBC mode ensures that the whole message affects the resulting MAC.

Key Exchange

Algorithms

Key exchange algorithms are used by switches to securely generate and exchange encryption and authentication keys with other switches.

Without key exchange algorithms, encryption and authentication session keys must be manually changed by the system administrator.

Often, it is not practical to change the session keys manually. Key exchange algorithms enable switches to re-generate session keys automatically and on a frequent basis.

The most important property of any key exchange algorithm is that only the negotiating parties are able to decode, or generate, the shared secret. Because of this requirement, public key cryptography plays an important role in key exchange algorithms. Public key cryptography provides a method of encrypting a message which can only be decrypted by one party. A switch can generate a session key, encrypt the key using public key cryptography, transmit the key over an insecure channel, and be certain that the key can only be decrypted by the intended recipient. Symmetrical encryption algorithms can also be used for key exchange, but commonly require an initial shared secret to be manually entered into all switches in the secure network.

Section VII: Management Security 498

AT-S62 User’s Guide

The Diffie-Hellman algorithm, which is used by the AT-S62 management software, is one of the more commonly used key exchange algorithms. It is not an encryption algorithm because messages cannot be encrypted using Diffie-Hellman. Instead, it provides a method for two parties to generate the same shared secret with the knowledge that no other party can generate that same value. It uses public key cryptography and is commonly known as the first public key algorithm. Its security is based on the difficulty of solving the discrete logarithm problem, which can be compared to the difficulty of factoring very large integers.

A Diffie-Hellman algorithm requires more processing overhead than

RSA-based key exchange schemes, but it does not need the initial exchange of public keys. Instead, it uses published and well tested public key values. The security of the Diffie-Hellman algorithm depends on these values. Public key values less than 768 bits in length are considered to be insecure.

A Diffie-Hellman exchange starts with both parties generating a large random number. These values are kept secret, while the result of a public key operation on the random number is transmitted to the other party. A second public key operation, this time using the random number and the exchanged value, results in the shared secret. As long as no other party knows either of the random values, the secret is safe.

Section VII: Management Security 499

Chapter 26: Encryption Keys

Creating an Encryption Key

This section contains the procedure for creating an encryption key pair.

Caution

Key generation is a CPU-intensive process. Because this process may affect switch behavior, Allied Telesyn recommends performing it when the switch is not connected to a network or during periods of low network activity.

To create an encryption key pair, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

2. From the Security and Services menu, type 4 to select

Keys/Certificates Configuration.

The Keys/Certificates Configuration menu is shown in Figure 164.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Keys/Certificates Configuration

1 - Switch Distinguished Name (DN)

2 - Key Management

3 - Public Key Infrastructure (PKI) Configuration

R - Return to Previous Menu

Enter your selection?

Figure 164 Keys/Certificate Configuration Menu

3. Type 2 to select Key Management.

Section VII: Management Security 500

AT-S62 User’s Guide

The Key Management menu is shown in Figure 165.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Key Management

ID Algorithm Length Digest Description

---------------------------------------------------------------

1 RSA-Private 512 642C6FC8 Production Switch key 1

2 RSA-Private 512 5333E64F Production Switch key 2

1 - Create Key

2 - Delete Key

3 - Modify Key

4 - Export Key To File

5 - Import Key To File

N - Next Page

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 165 Key Management Menu

This menu lists the key pairs already existing on the switch. The fields in the menu are described below:

ID

The identification number of the key.

Algorithm

The algorithm used in creating the encryption. This is always RSA

- Private.

Length

The length of the key in bits.

Digest

The CRC32 value of the MD5 digest of the public key.

Description

The key’s description.

4. To create a new encryption key pair, type 1 to select Create Key.

Section VII: Management Security 501

Chapter 26: Encryption Keys

The Create Key menu is shown in Figure 166.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Create Key

1 - Key ID ............. 0

2 - Key Type ........... RSA-Private

3 - Key Length ......... 512

4 - Key Description ....

5 - Generate Key

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 166 Create Key Menu

5. Type 1 to select Key ID.

The following prompt is displayed:

Enter Key Id -> [0 to 65535] -> 0

6. Enter an identification number for the key. This number can be from

0 to 65,535. This number is used only for identification purposes and not in generating the actual encryption key. The ID for each key on the switch must be unique.

Note

You cannot change the value for option 2 - Key Type. This value is always RSA - Private.

7. Type 3 to select Key Length.

The following message is displayed:

Enter Key Length ->[512 to 1536] -> 512

8. Enter a key length. The range is 512 to 1,536 bits, in increments of 256 bits (for example, 512, 768, 1024, etc). Before selecting a key length, note the following

❑ For an encryption key for SSL and web browser encryption, key length can be any valid value within the range.

❑ For SSH host and server key pairs, the two keys must be created separately and be of different lengths of at least one increment

(256 bits) apart. The recommended length for the server key is 768 bits and the recommended length for the host key is 1024 bits.

Section VII: Management Security 502

Section VII: Management Security

AT-S62 User’s Guide

9. Type 4 to create a key description.

The following prompt is displayed:

Enter new Description ->

10. Enter a description for the key. For instance, the description could reflect the key’s function (for example, Sales switch SSL key). You can enter up to 40 alphanumeric characters including spaces.

11. Type 5 to generate the key.

The following message is displayed:

Key generation will take some time. Please wait...

The management software begins to create the key. This process can take from less than a minute to more than fifteen minutes, depending on key length. Once the key is created, you will see this message:

Press any key to continue ...

12. Press any key.

The new key is added to the list of keys in the Key Management menu.

Returning to the Main Menu to save the new key is not necessary with this procedure. This type of change is automatically saved by the management software.

To create a self-signed SSL certificate using the new encryption

key, go to Creating a Self-signed Certificate on page 524. To create

an enrollment request for submission to a CA, go to Generating an

Enrollment Request on page 537.

If you created server and host keys for SSH encryption, go to

Configuring the SSH Server on page 548 to configure the SSH

server software on the switch.

503

Chapter 26: Encryption Keys

Deleting an Encryption Key

This section contains the procedure for deleting an encryption key pair from the switch. Note the following before performing this procedure.

❑ Deleting a key pair from the key management database also deletes the key’s corresponding “.UKF” file from the AT-S62 file system.

❑ You cannot delete a key pair if it is being used by SSL or SSH. You must first either disable the SSL or SSH server software or reconfigure the software by specifying another key.

❑ Deleting a key pair used in creating an SSL certificate voids the certificate.

This procedure starts from the Key Management menu. If you are unsure

how to display the menu, perform steps 1 to 3 in Creating an Encryption

Key on page 500.

To delete a key pair, do the following:

1. From the Key Management menu, type 2 to select Delete Key.

2. When prompted, enter the ID number of the key you want to delete.

The key pair is deleted from the key database.

Returning to the Main Menu to save your changes is not necessary with this procedure. This type of change is automatically saved by the management software.

Section VII: Management Security 504

AT-S62 User’s Guide

Modifying an Encryption Key

The Key Management menu has a selection for modifying the description of an encryption key. This is the only item of a key you can modify.

This procedure starts from the Key Management menu. If you are unsure

how to display the menu, perform steps 1 to 3 in Creating an Encryption

Key on page 500.

To change the description of a key, perform the following procedure:

1. From the Key Management menu, type 3 to select Modify Key.

The following prompt is displayed:

Enter Key Id to modify -> [0 to 65535] -> 0

2. Enter the ID of the key whose description you want to modify.

The following message is displayed.

Enter new Description ->

3. Enter the new description for the key. The description can be up to 40 alphanumeric characters including spaces. To help identify the key, you might make the description the name of the web server the key will be used to protect (for example, Production switch web server).

The following message is displayed:

Press any key to continue ...

The key has been modified.

4. Press any key to return to the Key Management menu.

Returning to the Main Menu to save your changes is not necessary with this procedure. This type of change is automatically saved by the management software.

Section VII: Management Security 505

Chapter 26: Encryption Keys

Exporting an Encryption Key

The following procedure exports the public key of a key pair into the

AT-S62 file system. (The management software does not allow you to export a private key.) Before performing this procedure, please note the following:

❑ The only circumstance in which you are likely to perform this procedure is if you are using an SSH client that does not upload the key automatically when you start an SSH management session. You can use this procedure to export the SSH client key from the key database into the AT-S62 file system, from where you can download it onto the SSH management session and incorporate into your SSH client software.

❑ You should not use this procedure to export an SSL public key.

Typically, an SSL public key only has value when incorporated into a certificate or enrollment request.

This procedure starts from the Key Management menu. If you are unsure

how to display the menu, perform steps 1 to 3 in Creating an Encryption

Key on page 500.

To export a public key into the file system, perform the following procedure:

1. From the Key Management Menu, type 4 to select Export Key to File.

The Export Key to File Menu is shown in Figure 167.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Export Key to File Menu

1 - Key ID ............ 0

2 - Key Type .......... RSA-Public

3 - Key File Format ... HEX

4 - Key File Name

5 - Export Key To File

R - Return to Previous Menu

Enter your selection?

Figure 167 Export Key to File Menu

2. Type 1 to select Key ID and, when prompted, enter the key ID of the public key you want to export into the file system.

Section VII: Management Security 506

Section VII: Management Security

AT-S62 User’s Guide

Note

Key Type is a read-only field. You cannot change this value.

3. Type 3 to toggle Key File Format to specify the format of the key.

Possible settings are:

HEX - Indicates an internal format for storing files. Select this value for SSL configuration. This is the default.

SSH - Indicates a format for a SSH1 environment. This is the correct setting for a key intended for an SSH1 client.

SH2 - Indicates a format for a SSH2 environment. This is the correct setting for a key intended for an SSH2 client.

4. Type 4 to select Key File Name and specify a filename for the key. The filename can be from one to eight alphanumeric characters, not including the extension. Spaces are allowed. You must include the extension “.key”.

5. Type 5 to select Export Key to File to export the key to a file.

The following message is displayed:

Key Export in Progress. Please wait...Done

6. Press any key to return to the Key Management menu.

To view the public key in the switch’s file system, refer to

Displaying System Files on page 158.

You do not need to return to the Main Menu to save your changes for this procedure. This type of change is automatically saved by the management software.

507

Chapter 26: Encryption Keys

Importing an Encryption Key

Use the following procedure to import a public key from the AT-S62 file system into the key management database. If a file contains both public and private keys, only the public key is imported. The private key is ignored.

Note

It is very unlikely you will ever have reason to perform this procedure. The switch can use only those keys it has generated itself.

This procedure starts from the Key Management menu. If you are unsure

how to display the menu, perform steps 1 to 3 in Creating an Encryption

Key on page 500.

To import a public key, perform the following procedure:

1. From the Key Management Menu, type 5 to select Import Key From

File to import a RSA - Public key.

The Import Key From File Menu is shown in Figure 168.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Import Key From File Menu

1 - Key ID ............ 0

2 - Key Type .......... RSA-Public

3 - Key File Format ... HEX

4 - Key File Name .....

5 - Import Key From File

R - Return to Previous Menu

Enter your selection?

Figure 168 Import Key From File Menu

2. Type 1 to select Key ID and, when prompted, enter a unique key ID for the public key you want to import from the file system into the key management database. This must be an unused key ID. It cannot match any of the key IDs that are already in use on the switch.

Note

Option 2 - Key Type cannot be changed.

Section VII: Management Security 508

Section VII: Management Security

AT-S62 User’s Guide

3. Type 3 to select Key File Format to choose the format of the key.

Selections are:

HEX - Indicates an internal format for storing files. Select this value for SSL configuration. This is the default.

SSH - Indicates a format for a SSH1 environment. This is the correct setting for a key intended for an SSH1 client.

SH2 - Indicates a format for a SSH2 environment. This is the correct setting for a key intended for an SSH2 client.

4. Type 4 to select Key File Name and, when prompted, specify the file name of the key.

The key filename must include the “.key” extension. If you are unsure of the filename, display the files in the switch’s file system

by referring to Displaying System Files on page 158.

5. Type 5 to select Import Key From File to import a key to the switch from an external file.

The following message is displayed:

Key Import in Progress. Please wait...Done

After you receive this message, the key is added to the Key

Management database. See the Key Management Menu in Figure

165 on page 501.

You do not need to return to the Main Menu to save your changes for this procedure. This type of change is automatically saved by the management software.

509

Chapter 27

Public Key Infrastructure

Certificates

This chapter contains the procedures for creating Public Key

Infrastructure (PKI) certificates for web server security. Because of the complexity of this feature, two overview sections are provided. The Basic

Overview section offers a general review of the purpose of certificates along with relevant guidelines. For additional information, refer to the

Technical Overview section. This chapter contains the following sections:

❑ Basic Overview on page 511

❑ Technical Overview on page 516

❑ Creating a Self-signed Certificate on page 524

❑ Adding a Certificate to the Database on page 528

❑ Modifying a Certificate on page 531

❑ Deleting a Certificate on page 533

❑ Viewing a Certificate on page 534

❑ Generating an Enrollment Request on page 537

❑ Installing CA Certificates onto a Switch on page 540

❑ Configuring PKI on page 541

❑ Configuring SSL on page 542

Note

The feature is not available in all versions of the AT-S62 management software. Contact your sales representative to determine if this feature is available for your locale.

510

AT-S62 User’s Guide

Basic Overview

This chapter explains how to implement encryption for your web browser management sessions. Encryption can protect your managed switches from unauthorized access by making it impossible for an intruder monitoring network traffic to decipher the contents of the management packets exchanged between your workstation and a switch during a web browser management session.

Web browser encryption involves an encryption key pair and a digital

document called a certificate. The key, as explained in Chapter 26,

Encryption Keys on page 492, consists of two parts, a private key and a

public key. The private key always remains on the switch. The public key is incorporated into a certificate. Your web browser downloads the certificate from the switch when you begin a management session.

Web browser encryption is provided by the Secure Sockets Layer (SSL) protocol. SSL was originally designed to offer security in Internet commerce and other web transactions, so as to provide Internet users a means of protecting their information from prying eyes as it crosses the

Internet.

Of course, managing a switch with a web browser cannot be characterized as Internet commerce. But the sensitive nature of the information contained within the management packets makes protecting the packets a critical component of network security.

Types of

Certificates

The AT-S62 management software supports two types of certificates.

The first is called a self-signed certificate. This is the quickest and easiest to create because the switch creates it itself. For small to medium sized networks, this might be the way to go. The procedure for creating this

kind of certificate is found in Creating a Self-signed Certificate on page

524. To review all the steps to configuring the web server on the switch

for this type of certificate, refer to General Steps for a Self-signed

Certificate on page 488.

The second type of certificate is a CA certificate. Here, you create the encryption key pair on the switch but someone else issues the certificate, which you then load onto the switch. That person, group, or organization that issues the certificate is called a certification authority

(CA).

There are two kinds of CAs: public and private. A public CA issues certificates for other companies and organizations. A well known example is Verisign. A public CA will require proof of the identify of the company or organization that wants a certificate before it will issue it.

Section VII: Management Security 511

Chapter 27: Public Key Infrastructure Certificates

Public CAs issue certificates typically intended for use by the general public. Since a certificate for an AT-8524M switch is not intended for general use, but will only be used by you and other network managers, you might decide that the switch’s certificate need not be issued by this type of CA.

Some large companies have private CAs. This is a person or group within the company given the responsibility of issuing certificates for the company’s network equipment. The value of a private CA is that the company can keep track of the certificates and control access to various network devices.

If your company is large enough, it might have a private CA and you might want that group to issue any AT-8524M certificates, if for no other reason than to follow company policy.

To obtain a CA certificate you have to create a key pair. You then need to generate an digital document called an enrollment request. The request will contain the public key, along with other information you want the

CA to use to create the certificate.

Before you send an enrollment request to a CA, you should first contact the CA to determine what other documents or procedures might be required in order for the CA to create the certificate. This is particularly important with public CAs, which typically have strict guidelines on issuing certificates.

Distinguished

Names

Part of the task to creating a self-signed certificate or enrollment request is selecting a distinguished name. A distinguished name is integrated into a certificate along with the key. A distinguished name can have up to five parts. The parts are:

❑ cn - common name

This can be the name of the person who will use the certificate.

❑ ou - organizational unit

This is the name of a department, such as Network Support or IT.

❑ o - organization

This is the name of the company.

❑ st - state

This is the state.

❑ c - country

This is the country

Section VII: Management Security 512

Section VII: Management Security

AT-S62 User’s Guide

A certificate name does not have to contain all of these parts. You can use as many or as few as you want. You separate the parts with a comma.

You can use alphanumeric characters, as well as spaces in the name strings. You cannot use quotation marks. To use the following special characters {=,+<>#;\<CR>}, type a “\” before the character

Here are a few examples. This distinguished name contains only one part, the name of the switch: cn=Production Switch

This distinguished name omits the common name, but includes everything else: ou=Network Support,o=XYZ Inc.,st=CA,c=US

So what would be a good distinguished name for a certificate for an

AT-8524M switch? If the switch has an IP address, such as a master switch, you could use its address as the name. The following example is a distinguished name for a certificate for a master switch with the IP address 149.11.11.11: cn=149.11.11.11

If your network has a Domain Name System and you mapped a name to the IP address of a switch, you can specify the switch’s name instead of the IP address as the distinguished name.

For those switches that do not have an IP address, such as slave switches, you could assign their certificates a distinguished name using the IP address of the master switch of the enhanced stack.

The benefit to giving a certificate a distinguished name equivalent to a master switch’s IP address or domain name lies in what happens when you start a web browser management session with a switch using SSL.

The web browser on your workstation will check to see if the name to whom the certificate was issued matches the name of the web site. In the case of a master or slave AT-8524M switch, the web site’s name is the master switch’s IP address or domain name. If the names do not match, the web browser displays a security warning. Of course, even if you see the security warning, you can simply close the warning prompt. You will still be able to configure the switch using your web browser and the management session will use encryption.

Note

If the certificate will be issued by a private or public CA, you should check with the CA to see if they have any rules or guidelines on distinguished names for the certificates they issue.

513

Chapter 27: Public Key Infrastructure Certificates

SSL and

Enhanced

Stacking

Secure Sockets Layer (SSL) is supported in an enhanced stack, but only when all switches in the stack are using the feature.

A web server can operate in one of two modes -- HTTP or HTTPS. When a switch’s web server is operating in HTTP, management packets are transmitted in plaintext. When it operates in HTTPS, management packets are sent encrypted.

The web server on an AT-8524M switch, and also the AT-8400 Series switch, can operate in either mode. Enhanced stacking switches that do not support SSL, such as the AT-8000 Series switches, use HTTP exclusively.

A web browser management session of the switches in an enhanced stack cannot change its security mode during a session. The management session assumes that the web server mode that the master switch is using is the same for all the switches in the stack.

As an example, if the master switch is using HTTPS, a web browser management session assumes that all the other switches in the stack are also using HTTPS, and it will not allow you to manage any switches running HTTP.

For those networks that consist of enhanced stacking switches where some switches support SSL and others do not, there are two approaches you can take. One is to create different enhanced stacks for the different switches. You could create one enhanced stack for those switches that support SSL and another stack for those that do not. You create different enhanced stacks by assigning switches to different Management VLANs,

as explained in Specifying a Management VLAN on page 418.

Another approach is to leave the switches in one enhanced stack, but designate two master switches. One master switch could be using HTTP and the other HTTPS. When you want to use your web browser to manage those switches that support SSL, you would start the management session on the master switch whose server mode is set to

HTTPS. To manage those switch not supporting SSL, you would start the management session on the master switch whose web server is set to

HTTP.

In order to implement SSL in an enhanced stack, each switch in the stack must be given its own encryption key pair and certificate. Switches cannot share keys and certificates. When you start a web browser management session on the master switch of an enhanced stack, the management session uses the certificate and key pair on the master switch. When you change to another switch in the stack, the management session starts to use the certificate and key pair on that switch, and so forth.

Section VII: Management Security 514

AT-S62 User’s Guide

Guidelines

Here are guidelines for creating certificates:

❑ A certificate can have only one public key.

❑ A switch can use only those certificates that contain a key that it generated itself.

❑ You can create multiple certificates on a switch, but the device will only use the certificate whose key pair has been designated as the active key pair for the switch’s web server.

❑ Most web browsers support both unsecured (plaintext) and secured (encrypted) operation. These modes are referred to as

HTTP and HTTPS, respectively. If you choose to use encryption when you manage a switch, the web browser you use must support HTTPS.

Section VII: Management Security 515

Chapter 27: Public Key Infrastructure Certificates

Technical Overview

The Secure Sockets Layer (SSL) feature is a security protocol that provides a secure and private TCP connection between a client and server.

SSL can be used with many higher layer protocols including HTTP, File

Transfer Protocol (FTP) and Net News Transfer Protocol (NNTP). Most web browsers and servers support SSL, and its most common deployment is for secure connections between a client and server over the Internet.

The switch supports SSL versions 2.0 (client hello only) and 3.0 which were developed by Netscape, and the Internet Engineering Task Force

(IETF) standard for SSL, known as SSL version 3.1 or Transport Layer

Security (TLS).

Within the Ethernet protocol stack, SSL is a layer 4 protocol that is in between the HTTP and TCP protocol layers. HTTP communicates with

SSL in the same way as with TCP. In other words, TCP processes SSL requests like any other protocol requesting its services.

SSL provides a secure connection over which web pages can be accessed from an HTTP server. The operation of SSL is transparent to the end user who is accessing a web site with the following exceptions:

❑ the site’s URL changes from HTTP to HTTPS

❑ the browser indicates that it is a secured connection by displaying an icon, such as a padlock icon

By default, HTTP and HTTPS use the separate well-known ports 80 and

443, respectively. Secure connections over the Internet are important when transmitting confidential data such as credit card details or passwords. SSL allows the client to verify the server’s identity before either side sends any sensitive information. SSL also prevents a third party from interfering with the message because only trusted devices have access to the unprotected data.

SSL Encryption

SSL uses encryption to ensure the security of data transmission.

Encryption is a process that uses an algorithm to encode data so it can only be accessed by a trusted device. An encrypted message remains confidential.

Section VII: Management Security 516

AT-S62 User’s Guide

All application data messages are authenticated by SSL with a message

authentication code (MAC). The MAC is a checksum that is created by the sender and is sent as part of the encrypted message. The recipient recalculates the MAC, and if the values match, the sender’s identity is verified. The MAC also ensures that the message has not been tampered with by a third party because any change to the message changes the

MAC.

SSL uses asymmetrical (Public Key) encryption to establish a connection between client and server, and symmetrical (Secret Key) encryption for the data transfer phase.

User

Verification

An SSL connection has two phases: handshake and data transfer. The

handshake initiates the SSL session, during which data is securely transmitted between a client and server. During the handshake, the following occurs:

1. The client and server establish the SSL version they are to use.

2. The client and server negotiate the cipher suite for the session, which includes encryption, authentication, and key exchange algorithms.

3. The symmetrical key is exchanged.

4. The client authenticates the server (optionally, the server authenticates the client).

SSL messages are encapsulated by the Record Layer before being passed to TCP for transmission. Four types of SSL messages exist, they are:

❑ Handshake

❑ Change Cipher Spec

❑ Alert

❑ Application data (HTTP, FTP or NNTP)

As discussed previously, the Handshake message initiates the SSL session.

The Change Cipher Spec message informs the receiving party that all subsequent messages are encrypted using previously negotiated security options. The parties use the strongest cryptographic systems that they both support.

The Alert message is used if the client or server detects an error. Alert messages also inform the other end that the session is about to close. In addition, the Alert message contains a severity rating and a description of the alert. For example, an alert message is sent if either party receives an invalid certificate or an unexpected message.

Section VII: Management Security 517

Chapter 27: Public Key Infrastructure Certificates

The Application data message encapsulates the encrypted application data.

Authentication

Authentication is the process of ensuring both the web site and the end user are genuine. In other words, they are not imposters. Both the server and an individual users need to be authenticated. This is especially important when transmitting secure data over the Internet.

To verify the authenticity of a server, the server has a public and private key. The public key is given to the user.

SSL uses certificates for authentication. A certificate binds a public key to a server name. A Certification Authority issues certificates after checking that a public key belongs to its claimed owner. There are several agencies that are trusted to issue certificates. Individual browsers have approved Root CAs that are built in to the browser.

Public Key

Infrastructure

The Public Key Infrastructure (PKI) feature is part of the switch’s suite of security modules, and consists of a set of tools for managing and using certificates. The tools that make up the PKI allow the switch to securely exchange public keys, while being sure of the identity of the key holder.

The switch acts as an End Entity (EE) in a certificate-based PKI. More specifically, the switch can communicate with Certification Authorities

(CAs) and Certificate Repositories to request, retrieve and verify certificates.The switch allows protocols running on the switch, such as

ISAKMP, access to these certificates. The following sections of this chapter summarize these concepts and describe the switch’s implementation of them.

Public Keys

Public key encryption involves the generation of two keys for each user, one private and one public. Material encrypted with a private key can only be decrypted with the corresponding public key, and vice versa. An individual’s private key must be kept secret, but the public key may be distributed as widely as desired, because it is impossible to calculate the private key from the public key. The advantage of public key encryption is that the private key need never be exchanged, and so can be kept secure more easily than a shared secret key.

Message

Encryption

One of the two main services provided by public key encryption is the exchange of encrypted messages. For example, user 1 can send a secure message to user 2 by encrypting it with user 2’s public key. Only user 2 can decrypt it, because only user 2 has access to the corresponding private key.

Section VII: Management Security 518

AT-S62 User’s Guide

Digital

Signatures

The second main service provided by public key encryption is digital signing. Digital signatures both confirm the identity of the message’s supposed sender and protect the message from tampering. Therefore they provide message authentication and non-repudiation. It is very difficult for the signer of a message to claim that the message was corrupted, or to deny that it was sent.

Both the exchange of encrypted messages and digital signatures are secure only if the public key used for encryption or decryption belongs to the message’s expected recipient. If a public key is insecurely distributed, it is possible a malicious agent could intercept it and replace it with the malicious agent’s public key (the Man-in-the-Middle attack).

To prevent this, and other attacks, PKI provides a means for secure transfer of public keys by linking an identity and that identity’s public key in a secure certificate.

Warning

While a certificate binds a public key to a subject to ensure the public key’s security, it does not guarantee that the security of the associated private key has not been breached. A secure system is dependent upon private keys being kept secret, by protecting them from malicious physical and virtual access.

Certificates

A certificate is an electronic identity document. To create a certificate for a subject, a trusted third party (known as the Certification Authority) verifies the subject’s identity, binds a public key to that identity, and digitally signs the certificate. A person receiving a copy of the certificate can verify the Certification Authority’s digital signature and be sure that the public key is owned by the identity in it.

The switch can generate a self-signed certificate but this should only be used with an SSL enabled HTTP server, or where third party trust is not required.

X.509 Certificates

The X.509 specification specifies a format for certificates. Almost all certificates use the X.509 version 3 format, described in RFC 2459,

Internet X.509 Public Key Infrastructure Certificate and CRL Profile. This is the format which is supported by the switch.

An X.509 v3 certificate consists of:

❑ A serial number, which distinguishes the certificate from all others issued by that issuer. This serial number is used to identify the certificate in a Certificate Revocation List, if necessary.

Section VII: Management Security 519

Chapter 27: Public Key Infrastructure Certificates

❑ The owner’s identity details, such as name, company and address.

❑ The owner’s public key, and information about the algorithm with which it was produced.

❑ The identity details of the organization which issued the certificate.

❑ The issuer’s digital signature and the algorithm used to produce it.

❑ The period for which the certificate is valid.

❑ Optional information is included, such as the type of application with which the certificate is intended to be used.

The issuing organization’s digital signature is included in order to authenticate the certificate. As a result, if a certificate is tampered with during transmission, the tampering is detected.

Elements of a

Public Key

Infrastructure

A Public Key Infrastructure is a set of applications which manage the creation, retrieval, validation and storage of certificates. A PKI consists of the following key elements:

❑ At least one Certification Authority (CA), which issues and revokes certificates.

❑ At least one publicly accessible repository, which stores certificates and Certificate Revocation Lists.

❑ At least one End Entity (EE), which retrieves certificates from the repository, validates them and uses them.

End Entities (EE)

End Entities own public keys and may use them for encryption and digital signing. An entity which uses its private key to digitally sign certificates is not considered to be an End Entity, but is a Certification

Authority.

The switch acts as an End Entity.

Certification Authorities

A Certification Authority is an entity which issues, updates, revokes and otherwise manages public keys and their certificates. A CA receives requests for certification, validates the requester’s identity according to the CA’s requirements, and issues the certificate, signed with one of the

CA’s keys. CAs may also perform the functions of End Entities, in that they may make use of other CAs’ certificates for message encryption and verification of digital signatures.

Section VII: Management Security 520

AT-S62 User’s Guide

An organization may own a Certification Authority and issue certificates for use within its own networks. In addition, an organization’s certificates may be accepted by another network, after an exchange of certificates has validated a certificate for use by both parties. As an alternative, an outside CA may be used. The switch can interact with the CA, whether a

CA is part of the organization or not, by sending the CA requests for certification.

The usefulness of certificates depends on how much you trust the source of the certificate. You must be able to trust the issuing CA to verify identities reliably. The level of verification required in a given situation depends on the organization’s security needs.

Certificate

Validation

To validate a certificate, the End Entity verifies the signature in the certificate, using the public key of the CA who issued the certificate.

CA Hierarchies and Certificate Chains

It may not be practical for every individual certificate in an organization to be signed by one Certification Authority. A certification hierarchy may be formed, in which one CA (for example, national headquarters) is declared to be the root CA. This CA issues certificates to the next level down in the hierarchy (for example, regional headquarters), who become subordinate CAs and issue certificates to the next level down, and so on. A hierarchy may have as many levels as needed.

Certificate hierarchies allow validation of certificates through certificate chains and cross-certification. If a switch X, which holds a certificate signed by CA X, wishes to communicate securely with a switch Y, which holds a certificate signed by CA Y, there are two ways in which the switches can validate each other’s certificates. Cross-certification occurs when switch X validates switch Y's CA (CA Y) by obtaining a certificate for switch Y's CA which has been issued by its own CA (CA X). A certificate chain is formed if both CA X and CA Y hold a certificate signed by a root

CA Z, which the switches have verified out of band. Switch X can validate switch Y’s certificate (and vice versa) by following the chain up to CA Z.

Root CA Certificates

A root CA must sign its own certificate. The root CA is the most critical link in the certification chain, because the validity of all certificates issued by any CA in the hierarchy depends on the root CA’s validity.

Therefore, every device which uses the root CA’s certificate must verify it out-of-band.

Section VII: Management Security 521

Chapter 27: Public Key Infrastructure Certificates

Out-of-band verification involves both the owner of a certificate and the user who wishes to verify that certificate generating a one-way hash (a fingerprint) of the certificate. These two hashes must then be compared using at least one non-network-based communication method.

Examples of suitable communication methods are mail, telephone, fax, or transfer by hand from a storage device such as a smartcard or floppy disk. If the two hashes are the same, the certificate can be considered valid.

Certificate

Revocation Lists

(CRLs)

A certificate may become invalid because some of the details in it change (for example, the address changes), because the relationship between the Certification Authority (CA) and the subject changes (for example, an employee leaves a company) or because the associated private key is compromised. Every CA is required to keep a publicly accessible list of its certificates which have been revoked.

PKI

Implementation

The following sections discuss Allied Telesyn’s implementation of PKI for the AT-S62 management software. The following topics are covered:

❑ PKI Standards

❑ Certificate Retrieval and Storage

❑ Certificate Validation

❑ Root CA Certificates

PKI Standards

The following standards are supported by the switch:

❑ draft-ietf-pkix-roadmap-05 — PKIX Roadmap

❑ RFC 1779 — A String Representation of Distinguished Names

❑ RFC 2459 — PKIX Certificate and CRL Profile

❑ RFC 2511 — PKIX Certificate Request Message Format

❑ PKCS #10 v1.7 — Certification Request Syntax Standard

Certificate Retrieval and Storage

Certificates are stored by CAs in publicly accessible repositories for retrieval by end entities. The following repositories used in PKI are commonly accessed via the following protocols: Hypertext Transfer

Protocol (HTTP), File Transfer Protocol (FTP).

Section VII: Management Security 522

AT-S62 User’s Guide

Before the switch can use a certificate, it must be retrieved and manually added to the switch’s Certificate Database, which is stored in RAM memory. The switch attempts to validate the certificate, and if validation is successful the certificate’s public key is available for use.

Root CA Certificate Validation

Root CA certificates are verified out of band by comparing the certificate’s fingerprint (the encrypted one-way hash with which the issuing CA signs the certificate) with the fingerprint which the CA has supplied by a non-network-based method. To view a certificate’s

fingerprint, use the procedure described in Viewing a Certificate on page

534.

Section VII: Management Security 523

Chapter 27: Public Key Infrastructure Certificates

Creating a Self-signed Certificate

This section contains the procedure for creating a self-signed certificate.

Please review the following before you perform the procedure:

❑ For a general review of all the steps to configuring the switch for

a self-signed certificate, refer to General Steps for a Self-signed

Certificate on page 488.)

❑ The switch’s time and date must be set before you create a selfsigned certificate. You can set this manually or you can configure the switch to obtain the date and time from an SNTP server on

your network or the Internet. For instructions, refer to Setting the

System Time on page 67.

❑ You must generate an encryption key pair before you create a

certificate. For instructions, refer to Creating an Encryption Key on page 500.

❑ During this procedure you are prompted to enter the ID number of the encryption key pair you want to use to create the certificate.

If you have forgotten the ID number, refer to Creating an

Encryption Key on page 500 to view key ID numbers.

To create a self-signed certificate, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

The Security and Services menu is shown in Figure 55 on page

196.

2. From the Security and Services menu, type 4 to select

Keys/Certificates Configuration.

The Keys/Certificates Configuration menu is shown in Figure 164 on page 500.

Note

The certificate must have a distinguished name. You can specify the distinguished name for the certificate from this menu by selecting option 1 - Distinguished Name in the Keys/Certificates

Configuration menu and entering the name. Or, you can wait and specify the distinguished name later in this procedure. For

information about distinguished names, refer to Distinguished

Names on page 512.

Section VII: Management Security 524

AT-S62 User’s Guide

3. From the Keys/Certificate menu, select 3 to select Public Key

Infrastructure (PKI) Configuration.

The Public Key Infrastructure (PKI) Configuration menu is shown

in Figure 169.

Allied Telesyn Ethernet Switch AT-8524M - ATS62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Public Key Infrastructure (PKI) Configuration

1 - Maximum Number of Certificates....... 256

2 - X509 Certificate Management

3 - Generate Enrollment Request

R - Return to Previous Menu

Enter your selection?

Figure 169 Public Key Infrastructure (PKI) Configuration Menu

4. Type 2 to select X509 Certificate Management.

The X509 Certificate Management menu is shown in Figure 170.

Allied Telesyn Ethernet Switch AT-8524M - ATS62

Production Switch

User: Manager 11:20:02 02-Jan-2004

X509 Certificate Management

Certificate Database:

Name State MTrust Type Source

----------------------------------------------------------

Switch43cert Trusted False Self Command

1 - Create Self-Signed Certificate

2 - Add Certificate

3 - Delete Certificate

4 - Modify Certificate

5 - View Certificate Details

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 170 X509 Certificate Management Menu

Section VII: Management Security 525

Chapter 27: Public Key Infrastructure Certificates

The Certificate Database portion of the window lists the certificates currently in the database. These could be certificates that you created or had a CA create. The switch’s web server can only use a certificate if it is in the database.

Note

In the X509 Certificate Management Menu, MTrust means manually trusted. This field indicates that you verified the certificate. The

Source field indicates the certificate was generated on the switch.

5. Type 1 to select Create Self-Signed Certificate.

The Create Self-Signed Certificate menu is shown in Figure 171.

Allied Telesyn Ethernet Switch AT-8524M - ATS62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Create Self-Signed Certificate

1 - Certificate Name.............

2 - Key Pair ID.................. 0

3 - Format....................... DER

4 - Serial Number................ 0

5 - Subject DN...................

6 - Create Self-Signed Certificate

R - Return to Previous Menu

Enter your selection?

Figure 171 Create Self-Signed Certificate Menu

6. Type 1 to select Certificate Name to enter a filename for the certificate.

The following message is displayed:

Enter certificate name (24 chars max) ->

7. Enter a filename for the certificate. This is the filename under which the certificate will be stored as in the AT-S62 file system. The name can be up to 24 alphanumeric characters. Spaces are allowed.

Note

The management software automatically adds a “.cer” extension to the filename.

8. Type 2 to select Key Pair ID.

The following message is displayed:

Enter certificate Key Pair ID -> [0 to 65535] ->

Section VII: Management Security 526

Section VII: Management Security

AT-S62 User’s Guide

9. Enter the ID number of the encryption key you want to use to create the certificate. The encryption key must already exist on the switch. (If you have forgotten the key ID number, return to the Key

Management menu to view the keys on the switch.) The value can be from 0 to 65,535.

10. Type 3 to select Format to choose the encoding format for the certificate. Possible settings are:

DER - Indicates the certificate contents are in a binary format. This is the default.

PEM - Indicates the certificate are in the Privacy Enhanced Mail

(PEM) format which is an ASCII format.

11. Type 4 to select Serial Number.

The following message is displayed:

Enter certificate serial number -> [0 to 2147483647]

-> 0

12. Enter a value between 0 and 2,147,483,647.

Self-signed certificates are usually assigned a serial number of 0.

13. Type 5 to select Subject DN and enter a distinguished name for the certificate. (Do not enclose the distinguished name in quotes.)

Note

If you did not enter a distinguished name back in Step 2, then you need to enter one here. A certificate must have a distinguished

name. For further information, refer to Distinguished Names on page 512. If you enter a name both here and in Step 2, the certificate

will contain the name entered here.

14. Type 6 to create the certificate.

The following message is displayed:

Please wait while certificate is generated...Done!

15. Press any key.

The X509 Certificate Management menu is displayed again.

The certificate is automatically saved in the AT-S62 file system.

You do not need to return to the Main Menu to permanently save the new certificate.

16. Go to the next procedure to add the certificate to the certificate database.

527

Chapter 27: Public Key Infrastructure Certificates

Adding a Certificate to the Database

Once you have created a certificate or received a certificate from a public or private CA, you need to add it into the certificate database to make it available for use by the switch’s web server. After you add a certificate to the certificate database, it appears in the X509 Certificate Management menu.

During the procedure, you are asked to specify the certificate’s filename.

If you have forgotten the certificate’s filename, refer to Displaying

System Files on page 158.

To add a certificate to the certificate database, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

2. From the Security and Services menu, type 4 to select

Keys/Certificates Configuration.

3. From the Keys/Certificate menu, type 3 to select Public Key

Infrastructure (PKI) Configuration.

4. From the Public Key Infrastructure (PKI) Configuration menu, type 2 to select X509 Certificate Management.

The X509 Certificate Management menu is shown in Figure 170 on page 525.

5. From the X509 Certificate Management menu, type 2 to select Add

Certificate.

The Add Certificate Menu is shown in Figure 172.

Allied Telesyn Ethernet Switch AT-8524M - ATS62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Add Certificate Menu

1 - Certificate Name .............

2 - State ........................ Trusted

3 - Type ......................... EE

4 - File Name ....................

5 - Add Certificate

R - Return to Previous Menu

Enter your selection?

Figure 172 Add Certificate Menu

Section VII: Management Security 528

Section VII: Management Security

AT-S62 User’s Guide

6. Type 1 to select Certificate Name and enter a name for the certificate.

This is the name for the certificate as it will appear in the certificate database list. You can enter up to 24 alphanumeric characters.

Spaces are allowed. No extension is needed.

You might want to include in the name the filename of the certificate in the file system. This will make it easier for you to match a certificate in the database with its corresponding file in the file system. Here is an example:

Switch 12 - sw12.cer

7. Type 2 to set the certificate state. Possible settings are:

Trusted - This value indicates you have verified that the certificate is from a trusted CA. This is the default.

Untrusted - This value indicates the certificate is from an untrusted CA either because you have not verified the CA or you have verified the CA is untrusted.

Note

This parameter has no affect on the operation of a certificate. The parameter is included only for informational purposes when the certificate is displayed in the certificate database.

8. Type 3 to specify the type of certificate. There are 3 types to choose from:

EE - Indicates the certificate was issued by a public or private CA.

This is the default.

CA - Indicates the certificate belongs to a public or private CA.

Self - This value is a self-signed certificate. Use this value for a selfsigned certificate. The switch treats this type of certificate as its own.

Note

This parameter has no affect on the operation of a certificate. The parameter is included only for informational purposes when the certificate is displayed in the certificate database.

9. Type 4 to select File Name and specify the filename of the certificate.

This is the filename of the certificate in the AT-S62 file system, with the “.cer” extension. For example, if you created a self-signed certificate and gave it the name “webserver127”, the filename of the certificate would be “webserver127.cer”. If you have forgotten

the filename of the certificate, refer to Displaying System Files on page 158.

529

Chapter 27: Public Key Infrastructure Certificates

10. Type 5 to select Add Certificate to add the certificate to the certificate database.

The management software adds the certificate to the database, a process that requires only a few seconds.

11. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section VII: Management Security 530

AT-S62 User’s Guide

Modifying a Certificate

The procedure in this section modifies a certificate. (The certificate to be modified must be in the certificate database.) Here are the certificate items you can modify:

❑ State - trusted or untrusted

❑ Type - EE, CA, or Self

Note

These parameters have no affect on the operation of a certificate.

They are included only for informational purposes when the certificate is displayed in the certificate database.

This procedure starts from the X509 Certificate Management menu. If you are unsure how to access the menu, perform steps 1 to 4 in the

procedure Adding a Certificate to the Database on page 528.

To modify a certificate, perform the following procedure:

1. From the X509 Certificate Management menu, type 4 to select Modify

Certificate. The following message is displayed:

Enter a certificate name ->

2. Enter the name of the certificate you want to modify. (This field is case-sensitive.)

The Modify Certificate Menu is shown in Figure 173.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Modify Certificate Menu

1 - Certificate Name................. Switch12

2 - State ........................... Trusted

3 - Type ............................ Self

4 - Modify Certificate

R - Return to Previous Menu

Enter your selection?

Figure 173 Modify Certificate Menu

Note

Option 1 - Certificate Name cannot be changed.

Section VII: Management Security 531

Chapter 27: Public Key Infrastructure Certificates

3. Type 2 to select State and specify if a certificate is trusted or untrusted.

Trusted - This value indicates you have verified that the certificate is from a trusted CA. This is the default.

Untrusted - This value indicates the certificate is from an untrusted CA either because you have not verified the CA or you have verified the CA is untrusted.

4. Type 3 to specify the type assigned to the certificate. There are 3 types to choose from:

EE - This value indicates the End Entity type. When you specify this type, the switch tags the certificate to indicate that it belongs to another end entity. This is the default.

CA - Use this value for a certificate issued by a public or private CA.

Self - Use this value for a self-signed certificate. This type of certificate is created by the switch itself. The switch treats this type of certificate as its own.

5. Type 4 to select Modify Certificate.

Your changes are implement in the certificate.

The following message is displayed:

Please wait while certificate is updated...Done.

6. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section VII: Management Security 532

AT-S62 User’s Guide

Deleting a Certificate

The procedure in this section deletes a certificate from the certificate database. Please note the following before performing this procedure:

❑ Deleting a certificate from the database does not delete it from the switch. It continues to reside in the AT-S62 file system. To completely remove a certificate from the switch, you must also

delete it from the file system. For instructions, refer to Copying,

Renaming, and Deleting System Files on page 156.

❑ You cannot delete a certificate from the database if you specified its corresponding encryption key as the active key in the web server configuration. The switch will consider the certificate as in use and will not allow you to delete it. You must first configure the web server with another encryption key pair for a different

certificate. For instructions, refer to Configuring the Web Server on page 490.

This procedure starts from the X509 Certificate Management menu. If you are unsure how to access the menu, perform steps 1 to 4 in the

procedure Adding a Certificate to the Database on page 528.

To delete a certificate from the certificate database, perform the following procedure:

1. From the X509 Certificate Management menu, type 3 to delete a certificate.

The following message is displayed:

Enter certificate name (ALL - delete all) ->

2. Enter the name of the certificate you want to delete. (This field is casesensitive.) To delete all the certificates, enter ALL.

3. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section VII: Management Security 533

Chapter 27: Public Key Infrastructure Certificates

Viewing a Certificate

This procedure displays information about a certificate, such as its distinguished name and serial number.

This procedure starts from the X509 Certificate Management menu. If you are unsure how to access the menu, perform steps 1 to 4 in the

procedure Adding a Certificate to the Database on page 528.

To view the details of a certificate, perform the following procedure:

1. From the X509 Certificate Management menu, type 5 to select View

Certificate Details.

The following message is displayed:

Enter certificate name ->

2. Enter a name of the certificate you want to view. (This field is casesensitive.)

The View Certificate Details menu (page 1) is shown in Figure 174.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

View Certificate Details

Certificate Details:

Name ............... Switch12

State .............. Trusted

Manually Trusted ... True

Type ............... Self

Source ............. Command

Version ............ V3 (0X2)

Serial Number ...... 0 (0X0)

Signature Alg ...... md5WithRSAEncryption

Public Key Alg ..... rsaEncryption

Not Valid Before ... Jan 9 01:28:18 2004 GMT

Not Valid After .... Jan 8 01:28:18 2006 GMT

N - Next Page

R - Return to Previous Menu

Enter your selection?

Figure 174 View Certificate Details Menu (page 1)

Section VII: Management Security 534

AT-S62 User’s Guide

3. Type N to see the second page of certificate details.

The View Certificate Details menu (page 2) is shown in Figure 175.

User: Manager

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

11:20:02 02-Jan-2004

View Certificate Details

Subject ......... CN=149.44.44.44

Issuer .......... CN=149.44.44.44

MD5 Fingerprint...4E:76:06:FA:F6:C1:DA:FF:4D:E9:76:02:1D:8F:DA:CB

SHA1 Fingerprint..F8:43:CB:E2:0A:BF:4A:02:CA:C6:B0:47:DF:74:1E:D3:A8:A3:F0:00

N - Previous Page

R - Return to Previous Menu

Enter your selection?

Figure 175 View Certificate Details Menu (page 2)

The fields are defined below:

Name - lists the name of the certificate.

State - Indicates the certificate is Trusted or Untrusted.

Manually Trusted - Indicates you verified the certificate is from a trusted or untrusted authority.

Type - Indicates the type of the certificate. The options are EE,

SELF, and CA.

Source - Indicates the certificate was created on the switch.

Version - Indicates the version number of the software.

Serial Number - Indicates the serial number of the certificate.

Signature Alg - Indicates the signature algorithm of the certificate.

Public Key Alg - Indicates the public key algorithm.

Not Valid Before - Indicates the date the certificate became active.

Not Valid After - Indicates the date the certificate expires. Selfsigned certificates are valid for two years.

Subject - Lists the Subject Distinguished Name.

Issuer - Lists the Distinguished Name of the issuer of the certificate.

Section VII: Management Security 535

Chapter 27: Public Key Infrastructure Certificates

MD5 Fingerprint - Indicates the MD5 algorithm. This value provides a unique sequence for each certificate consisting of 16 bytes.

SHA1 Fingerprint - Indicates the Secure Hash Algorithm. This value provides a unique sequence for each certificate consisting of 20 bytes.

Section VII: Management Security 536

AT-S62 User’s Guide

Generating an Enrollment Request

To request a certificate from a public or private CA, you need to generate an enrollment request. The request contains the public key for the certificate, a distinguished name, and other information. The request is stored as a file with a “.csr” extension in the AT-S62 file system, from where you can upload it onto your management workstation or FTP server for submission to the CA. (For a review of all the steps to creating an enrollment request and downloading a certificate from a CA onto a

switch, refer to General Steps for a Public or Private CA Certificate on page 488.)

Please review the following before you perform the procedure:

❑ You must generate an encryption key pair before you can create

an enrollment request. For instructions, refer to Creating an

Encryption Key on page 500.

❑ During this procedure you are prompted to enter the ID number of the encryption key pair you want to use to create the enrollment request. If you have forgotten the ID number, refer to

Creating an Encryption Key on page 500 to view key ID numbers.

To generate an enrollment request, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

2. From the Security and Services menu, type 4 to select the

Keys/Certificates Configuration menu.

3. From the Keys/Certificates Configuration menu, type 1 to select

Switch Distinguished Name (DN) and, when prompted, enter a name.

An enrollment request must have a distinguished name. For

information, refer to Distinguished Names on page 512.

4. From the Keys/Certificates Configuration menu, type 3 to select

Public Key Infrastructure (PKI) Configuration.

The Public Key Infrastructure (PKI) Configuration menu is shown

in Figure 169 on page 525.

Section VII: Management Security 537

Chapter 27: Public Key Infrastructure Certificates

5. From the Public Key Infrastructure (PKI) Configuration Menu, type 3 to generate an enrollment request. The Generate Enrollment Request

Menu is shown in Figure 176.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Generate Enrollment Request Menu

1 - Request Name....................

2 - KeyPair ID ..................... 0

3 - Format ......................... PEM

4 - Type ........................... PKCS10

5 - Generate Enrollment Request

R - Return to Previous Menu

Enter your selection?

Figure 176 Generate Enrollment Request Menu

6. Type 1 to select Request Name.

The following message is displayed:

Enter enrollment request name (24 chars max) ->

7. Enter a name of up to 24 alphanumeric characters for the enrollment request. Spaces are allowed.

The name is used to create the filename of the enrollment request when it is stored in the AT-S62 file system. The full filename consists of the enrollment request name followed by “.csr” extension, which the management software adds automatically.

For example, if you enter “certificate75” as the enrollment request name, the enrollment request’s filename will be

“certificate75.csr”.

8. Type 2 to select KeyPair ID.

The following message is displayed:

Enter keypair ID -> [0 to 65535] -> 0

9. Enter the ID number of the encryption key you want to use to create the enrollment request. The encryption key must already exist on the switch. (If you have forgotten the key ID number, return to the Key

Management menu to view the keys on the switch.) The value can be from 0 to 65,535.

10. Type 3 to toggle the Format option between the following values:

DER - Creates the certificate in binary format. This is the default.

Section VII: Management Security 538

Section VII: Management Security

AT-S62 User’s Guide

PEM - Creates the certificate in the Privacy Enhanced Mail (PEM) format, which is an ASCII format.

Note

Option 4, Type, cannot be changed. The PKCS10 value indicates the internal format of an enrollment request.

11. Type 5 to select Generate Enrollment Request.

Once the switch has finished generating the request, you will see a message similar to the following.

Enrollment request is being generated. Please wait

...Done.

Enrollment Request available in file [Switch

12.csr].

Press any key to continue ...

The enrollment request is now stored in the AT-S62 file system. To

see the file, refer to Displaying System Files on page 158.

12. Press any key to return to the Public Key Infrastructure (PKI)

Configuration menu.

13. To submit the request to a CA, you must upload the enrollment request from the file system on the switch to your management workstation or to an FTP server on your network. For instructions,

refer to Uploading a System File on page 177. Once you have received

the certificates from the CA, refer to Installing CA Certificates onto a

Switch on page 540 for an overview of the procedures to loading the

certificates onto the switch.

When submitting an enrollment request, be sure to follow the rules and guidelines of the CA. Failure to follow their guidelines may delay the issuing of the certificate.

539

Chapter 27: Public Key Infrastructure Certificates

Installing CA Certificates onto a Switch

This section lists the procedures to installing a certificate created by a public or private CA onto the switch. It should be noted that a CA generated certificate will consist of several certificates, with a minimum of two. All the certificates from the CA must be installed on the switch.

Note

A certificate from a CA can only be used on the switch where you created the encryption key pair and enrollment request. Do not install the certificate on any other switch.

To install CA certificates on a switch, perform the following procedure:

1. Download the certificates from your management workstation or FTP server to the AT-S62 file system on the switch. For instructions, refer

to Downloading a System File on page 171.

2. Load the certificates into the certificate database. For instructions,

refer to Adding a Certificate to the Database on page 528.

3. Activate HTTPS on the switch by configuring the web server and specifying the key pair used to create the enrollment request as the

active key pair. For instructions, refer to Configuring the Web Server on page 490.

Section VII: Management Security 540

AT-S62 User’s Guide

Configuring PKI

Option 1 - Maximum Number of Certificates in the Public Key

Infrastructure (PKI) Configuration menu controls the maximum number of certificates you can add to the certificate database. The range is 12 to

256. The default value is 256. There should be little cause or need for you to adjust this value. To display the Public Key Infrastructure (PKI)

Configuration menu, perform steps 1 to 3 of the procedure Creating a

Self-signed Certificate on page 524.

Section VII: Management Security 541

Chapter 27: Public Key Infrastructure Certificates

Configuring SSL

To configure the SSL protocol, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

2. From the Security and Services menu, type 6 to select Secure Socket

Layer (SSL).

The Secure Socket Layer (SSL) menu is shown in Figure 177.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Secure Socket Layer (SSL)

1 - Maximum Number of Sessions......... 50

2 - Session Cache Timeout.............. 300 seconds

R - Return to Previous Menu

Enter your selection?

Figure 177 Secure Socket Layer (SSL) Menu

3. Select 1 - Maximum number of Sessions to increase the number of sessions.

Enter a value from 1 to 100. The maximum number of sessions is used to speed up a connection. By increasing the number of sessions, you increase HTTPS performance. However, increasing the number of sessions also increases the memory requirements.

The default is 50.

4. Select 2 - Session Cache Timeout to increase or decrease the timer that determines when the session cache times out.

Enter a value, in seconds, from 1 to 600. The default is 300 seconds.

5. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

Section VII: Management Security 542

Chapter 28

Secure Shell (SSH) Protocol

The chapter contains overview information about the Secure Shell (SSH) protocol and the procedure for configuring this protocol on a switch from a local or Telnet management session. It contains the following sections:

❑ SSH Overview on page 544

❑ Configuring the SSH Server on page 548

❑ Displaying SSH Information on page 550

Note

The feature is not available in all versions of the AT-S62 management software. Contact your Allied Telesyn sales representative to determine if this feature is available for your locale.

543

Chapter 28: Secure Shell (SSH) Protocol

SSH Overview

Secure management is increasingly important in modern networks, as the ability to easily and effectively manage switches and the requirement for security are two universal requirements. Switches are often remotely managed using remote sessions via the Telnet protocol.

This method, however, has a serious security problem—it is only protected by plaintext usernames and passwords which are vulnerable to wiretapping and password guessing.

The Secure Shell (SSH) protocol provides encrypted and strongly authenticated remote login sessions, similar to the Telnet and rlogin protocols, between a host running a Secure Shell server and a machine with a Secure Shell client.

The AT-S62 management software features Secure Shell server software to enable network managers to securely manage the switch over an insecure network. It offers the benefit of cryptographic authentication and encryption. Secure Shell can replace Telnet for remote management sessions.

Support for SSH

The AT-S62 management software implementation of the SSH protocol is compliant with SSH1 (versions 1.3 and 1.5) and SSH2 (version 2.0).

In addition, the following SSH options and features are supported:

❑ Inbound SSH connections (server mode) is supported.

❑ The following security algorithms are supported:

— 128-bit Advanced Encryption Standard (AES),

192-bit AES, and 256-bit AES

— Arcfour (RC4) security algorithm is supported.

— Triple-DES (3DES) encryption for SSH sessions is supported.

❑ RSA public keys with lengths of 512 to 2048 bits are supported.

Keys are stored in a format compatible with other Secure Shell implementations, and mechanisms are provided to copy public keys to and from the switch.

❑ Compression of SSH traffic.

The following SSH options and features are not supported:

❑ IDEA or Blowfish encryption

❑ Nonencrypted Secure Shell sessions

Section VII: Management Security

544

AT-S62 User’s Guide

❑ Tunnelling of TCP/IP traffic

Note

Non-encrypted Secure Shell sessions serve no purpose.

SSH Server

The AT-S62 management software includes SSH server software. When the SSH server is activated, your remote management sessions of the switch from a management station that has SSH client software will be encrypted.

Note

If your switch is in a network protected by a firewall, you may need to configure the firewall to permit SSH connections.

An SSH management session uses the same usernames and passwords as the other types of switch management sessions. You can log in using the default manager or operator login account, or as a user configured

with the RADIUS and TACACS+ protocols, as explained in Chapter 29,

RADIUS and TACACS+ Authentication Protocols on page 552.

The Secure Shell server requires two encryption key pairs. The first, called the host key, is the switch’s own RSA key. The recommended length of this key is 1024 bits. The second key, the server key, is used by the SSH server software on the switch. If desired, you can configure the switch to periodically re-generate this key. The two keys cannot be of the same length. For the procedure for creating an encryption key, see

Creating an Encryption Key on page 500.

For information on how to create an encryption key, see Creating an

Encryption Key on page 500.

SSH Clients

The SSH protocol provides a secure connection between the switch and

SSH clients. Once you have configured the SSH server, you need to install

SSH client software on your management workstation. The AT-S62 software supports both SSH1 and SSH2 clients.

You can download client software from the Internet. Two popular SSH clients are PuTTY and CYGWIN. To install SSH client software, follow the directions from the vendor.

Once you have installed the SSH client software on your workstation and configured the server software on the switch, you can use the client software to login to the switch for an encrypted SSH management session.

Section VII: Management Security

545

Chapter 28: Secure Shell (SSH) Protocol

SSH and

Enhanced

Stacking

The AT-S62 management software allows for encrypted SSH management sessions between a management workstation and a master switch of an enhanced stack, but not with slave switches, as explained in this section.

When you remotely manage a slave switch, all management communications are conducted through the master switch using the enhanced stacking feature. Management packets from your workstation are first directed to the master switch before being forwarded to the slave switch. The reverse is true as well. Management packets from a slave switch first pass through the master switch before reaching your management workstation.

Enhanced stacking uses a proprietary protocol. The protocol does not provide for encryption between a master switch and a slave switch. The result is that SSH encryption only occurs between your workstation and the master switch, not between your workstation and a slave switch.

This is illustrated in Figure 178. The figure shows an SSH management

workstation that is managing a slave switch of an enhanced stack. The packets exchanged between the slave switch and the master switch are transmitted in plaintext and those exchanged between the master switch and the SSH management workstation are encrypted.

Slave Switch

Plaintext Management Packets

(Proprietary Enhanced Stacking Protocol)

Master Switch

Encrypted Management Packets

(SSH Protocol)

Section VII: Management Security

SSH Management

Workstation

Figure 178 SSH Remote Management of a Slave Switch

Since enhanced stacking does not allow for SSH encrypted management sessions between a management station and a slave switch, you configure SSH only on the master switch of a stack. Activating SSH on a slave switch has no affect.

546

AT-S62 User’s Guide

Guidelines

Below are the guidelines to observe when configuring SSH:

❑ SSH requires two encryption key pairs. One key pair will function as the host key and the other the server key. For instructions on

creating keys, refer to Creating an Encryption Key on page 500.

❑ The two encryption key pairs must be of different lengths of at least one increment (256 bits) apart. The recommended bit size for a server key is 768 bits. The recommended size for the host key is 1024 bits.

❑ You activate and configure SSH on the master switch of an enhanced stack, not on slave switches.

❑ The AT-S62 software uses well-known port 22 as the SSH default port.

General Steps to

Configuring

SSH

Configuring the SSH server involves several procedures. This section lists the procedures you need to complete to configure the SSH feature.

1. Create two encryption key pairs on the master switch of the enhanced switch. One pair will function as the host key and the other the server key.

2. Configure and activate the Secure Shell server on the switch by specifying the two encryption keys in the server software.

For instructions, see Configuring the SSH Server on page 548.

3. Install SSH client software on your management workstation.

Follow the directions provided with the client software. You can download SSH client software from the Internet. Two popular SSH clients are PuTTY and CYGWIN.

4. Disable the Telnet server.

Although the switch allows the SSH and Telnet servers to be enabled simultaneously, allowing Telnet to be enabled negates the security of the SSH feature. To disable the Telnet server, see

Enabling or Disabling the Telnet Server on page 73.

5. Logon to the switch from your SSH management workstation.

Section VII: Management Security

547

Chapter 28: Secure Shell (SSH) Protocol

Configuring the SSH Server

This section describes how to configure the SSH server software on the switch. For a description of all the steps required to configure an SSH

server, see General Steps to Configuring SSH on page 547.

This procedure assumes that you have already created the two key pairs.

If you have not created the keys, go to Creating an Encryption Key on page 500.

While you are configuring the SSH feature, you must disable the SSH server. When you have completed your configuration changes, enable the SSH server to permit SSH client connections.

Note

Allied Telesyn recommends disabling the Telnet server before activating SSH. Otherwise, the security functions provided by SSH

are lost. See Enabling or Disabling the Telnet Server on page 73.

To configure the SSH server software on the switch, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

2. From the Security and Services menu, type 5 to select Secure Shell

(SSH).

The Secure Shell (SSH) Menu is shown in Figure 179.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Secure Shell (SSH)

1 - SSH Server Status ....... Disabled

2 - Host Key ID.............. <Not Defined>

3 - Server Key ID ........... <Not Defined>

4 - Server Key Expiry Time .. 0 hours

5 - Login Timeout ........... 180 seconds

6 - Show Server Information

R - Return to Previous Menu

Enter your selection?

Figure 179 Secure Shell (SSH) Menu

Section VII: Management Security

548

Section VII: Management Security

AT-S62 User’s Guide

3. Select 1 - SSH Server Status to enable or disable the SSH server.

4. Choose from one of the following:

Disabled - While you are configuring SSH, you must set this field to Disabled. This is the default.

Enabled - Select this value to enable the SSH server. Select this value after you have finished configuring SSH and want to log on to the server.

Note

You cannot disable the SSH server when there is an active SSH connection. Otherwise, you receive a warning message.

5. Type 2 to select Host Key ID and, when prompted, enter the key ID of the key pair which will act as the SSH host key. If you have forgotten

the key ID, refer to Creating an Encryption Key on page 500.

6. Type 3 to select Server Key ID and enter the ID of the key pair which will act as the SSH server key. If you have forgotten the key ID, refer to

Creating an Encryption Key on page 500.

7. Type 4 to select Server Key Expiry Time to set the time, in hours, for the server key to expire.

This timer determines how often the switch generates a new server key. A server key is regenerated for security purposes. A server key is only valid for the time period configured in the Server

Key Expiry (Expiration) Time timer. Allied Telesyn recommends you set this field to 1. With this setting, a new key is generated every hour.

The default is 0 hours which means the server key never expires.

The range is 0 to 5 hours.

8. Select 5 and enter a value for Login Timeout.

This is the time it takes to release the SSH server from an incomplete SSH client connection. Enter a time in seconds. The default is 180 seconds (3 minutes). The range is 60 to 600 seconds.

9. Select 1 to toggle SSH Server Status to Enable.

Note

Allied Telesyn recommends disabling the Telnet server before you enable SSH. Otherwise, the security provided by SSH is lost.

10. After making changes, type R to until you return to the Main Menu.

Then type S to select Save Configuration Changes.

549

Chapter 28: Secure Shell (SSH) Protocol

Displaying SSH Information

To display SSH server information, perform the following procedure:

1. From the Main Menu, type 7 to select Security and Services.

2. From the Security and Services menu, type 5 to select Secure Shell

(SSH).

The Secure Shell (SSH) Menu is shown in Figure 179 on page 548.

3. From the Secure Shell (SSH) menu, select 6 - Show Server information to display the SSH Server data.

The Show Server Information Menu is shown in Figure 180.

Allied Telesyn Ethernet Switch - AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Show Server Information Menu

Versions Supported ....... 1.3, 1.5, 2.0

Server Status ............ Enabled

Server Port .............. 22

Host Key ID .............. 200

Host Key Bits ............ 1024

Server Key ID ............ 250

Server Key Bits .......... 768

Server Key Expiry ........ 0 hours

Login Timeout ............ 180 seconds

Authentication Available . Password

Ciphers Available ........ 3DES, 128 bit AES, 192 bit AES,256 bit AES,

Arcfour (RC4)

MACs Available ........... hmac-sha1, hmac-md5

Data Compression ......... Available

R - Return to Previous Menu

Enter your selection?

Figure 180 Show Server Information Menu

The following information is displayed:

❑ Versions Supported: Indicates the versions of SSH which are supported by the AT-S62 software.

❑ Server Status: Indicates whether or not the SSH server is enabled or disabled.

❑ Server Port: Indicates the well-known port for SSH. The default is port 22.

Section VII: Management Security

550

Section VII: Management Security

AT-S62 User’s Guide

❑ Host Key ID: Indicates the host key ID defined for SSH.

❑ Host Key Bits: Indicates the number of bits in the host key.

❑ Server Key ID: Indicates the server key ID defined for SSH.

❑ Server Key Bits: Indicates the number of bits in the server key.

❑ Server Key Expiry: Indicates the length of time, in hours, until the server key is regenerated. The default is 0 hours which means the server key is not regenerated.

❑ Login Timeout: Indicates the time, in seconds, until a SSH server is released from an incomplete connection with a SSH client.

❑ Authentication Available: Indicates the authentication method available. Currently, password authentication is the only supported method.

❑ Ciphers Available: Indicates the SSH ciphers that are available on the switch.

❑ MACs Available: Indicates the Message Authorization Code (MAC) that is used to validate incoming SSH messages to the server. Two algorithms are supported.

❑ Data Compression: Indicates whether or not data compression is available on the switch. Data compression is useful for networks that have a slow throughput speed.

551

Chapter 29

RADIUS and TACACS+

Authentication Protocols

This chapter explains how to create new manager accounts on a switch using the two authentication protocols RADIUS and TACACS+. Sections in the chapter include:

❑ TACACS+ and RADIUS Overview on page 553

❑ Configuring Authentication Protocol Settings on page 557

552

AT-S62 User’s Guide

TACACS+ and RADIUS Overview

TACACS+ and RADIUS are authentication protocols for enhancing the security of your network. (TACACS+ is an acronym for Terminal Access

Controller Access Control System. RADIUS is an acronym for Remote

Authentication Dial In User Services.) In general terms, these authentication protocols are designed to transfer the task of authenticating network access from a network device to an authentication protocol server.

The AT-S62 software comes with TACACS+ and RADIUS client software.

You can use the client software to add two security features to the switch. The first feature, described in this chapter, involves creating new manager accounts that control who can log onto a switch to change the unit’s parameter settings. The second feature is 802.1x Port-based

Access Control, explained in Chapter 24, 802.1x Port-based Access

Control on page 463, which controls which end users and end nodes can

send packets through the switch.

This chapter explains the new manager accounts feature. The AT-S62 software has two standard manager login accounts: Manager and

Operator. The Manager account lets you change a switch’s parameter settings while the Operator account lets you view the settings, but not change them. Each account has its own password.

For those networks managed by just one or two network managers, the standard accounts may be all you need. However, for larger networks managed by several network managers, you might want to give each manager his or her own management login account rather than have them share an account.

This is where TACACS+ and RADIUS can be useful. You can use them to create additional manager accounts and transfer the task of validating management access from the switch to an authentication protocol server. You use the protocols to create a series of username and password combinations that define who can manage an AT-8524M switch.

There are three basic functions an authentication protocol provides:

❑ Authentication

❑ Authorization

❑ Accounting

Section VII: Management Security 553

Chapter 29: RADIUS and TACACS+ Authentication Protocols

When a network manager logs in to a switch to manage the device, the switch passes the username and password entered by the manager to the authentication protocol server. The server checks to see if the username and password are valid for that switch. This is referred to as authentication.

If the combination is valid, the authentication protocol server notifies the switch and the switch completes the login process, allowing the manager to manage the switch.

If the username and password are invalid, the authentication protocol server notifies the switch and the switch cancels the login.

Authorization defines what a manager can do once logged in to a switch. You assign an authorization level to each username and password combination that you create on the server software. The access level can either Manager or Operator.

The final function of an authentication protocol is accounting, which is used to keep track of user activity on network devices. The AT-S62 management software does not support RADIUS or TACACS+ accounting as part of manager accounts. However, it does support

RADIUS accounting with the 802.1x port-based access control feature,

explained in Chapter 24, 802.1x Port-based Access Control on page 463.

Note

The AT-S62 management software does not support the two earlier versions of the TACACS+ protocol, TACACS and XTACACS.

Guidelines

Here are the main points to using the RADIUS and TACACS+ protocols.

❑ First, you need to install TACACS+ or RADIUS server software on one or more of your network servers or management stations.

Authentication protocol server software is not available from

Allied Telesyn.

Note

The switch communicates with the authentication server via the switch’s management VLAN. Consequently, the node functioning as the authentication server must be communicating with a switch through a port that is a member of that VLAN. The default management VLAN is Default_VLAN. For further information, refer

to Specifying a Management VLAN on page 418.

❑ The authentication protocol server can be on the same subnet or a different subnet as the AT-8524M switch. If the server and switch are on different subnets, be sure to specify a default gateway in

Section VII: Management Security 554

Section VII: Management Security

AT-S62 User’s Guide the Administration Menu so that the switch and server can communicate with each other.

❑ You need to configure the TACACS+ or RADIUS software on the authentication server. This involves the following:

— Specifying the username and password combinations.

— Assigning each combination an authorization level. How this is achieved differs depending on the server software you are using. TACACS+ controls this through the sixteen (0 to

15) different levels of the Privilege attribute. A privilege level of “0” gives the combination Operator status. Any value from

1 to 15 gives the combination Manager status.

For RADIUS, management level is controlled by the Service

Type attribute. This attribute has 11 different values, of which only two apply to the AT-S62 management software.

A value of Administrative for this attribute gives the username and password combination Manager access. A value of NAS Prompt assigns the combination Operator status.

Note

This manual does not explain how to configure TACACS+ or RADIUS server software. For that you need to refer to the documentation that came with the software.

❑ You must activate the TACACS+ or RADIUS client software on the switch using the AT-S62 software and configure the settings, which includes the IP addresses of up to three authentication server. The procedure for this step is found in this chapter.

By default, authentication protocol is disabled in the AT-S62 software.

Once you activate it, you need to provide the following information:

❑ Which authentication protocol, TACACS+ or RADIUS, you want to use. Only one authentication protocol can be active on a switch at a time.

❑ IP addresses of up to three authentication servers.

❑ The encryption key used by the authentication servers.

You can specify up to three TACACS+ or RADIUS servers. Specifying multiple servers adds redundancy to your network. For example, removing an authentication server from the network for maintenance will not prevent network managers from logging into switches if there are one or two other authentication servers on the network.

555

Chapter 29: RADIUS and TACACS+ Authentication Protocols

When a switch receives a username and password combination from a network manager, it sends the combination to the first authentication server in its list. If the server fails to respond, the switch sends the combination to the next server in the list, and so on.

If no authentication server responds or if no servers have been defined and you are managing the switch locally, the management software defaults to the standard manager and operator accounts.

Note

For more information on TACACS+, refer to the RFC 1492 standard.

For more information on RADIUS, refer to the RFC 2865 standard.

Section VII: Management Security 556

AT-S62 User’s Guide

Configuring Authentication Protocol Settings

To configure the RADIUS or TACACS+ settings on the switch, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 6 to select

Authentication Configuration.

The Authentication Menu is shown in Figure 181.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Authentication Menu

1 - Server-based Authentication ..... Disabled

2 - Authentication Method ........... TACACS+

3 - TACACS+ Configuration

4 - RADIUS Configuration

5 - Passwords Configuration

R - Return to Previous Menu

Enter your selection?

Figure 181 Authentication Menu

Note

Option 1 - Server-based Authentication applies only to the manager account feature described in this chapter. This menu selection has no affect on the 802.1x port-based access control feature described

in Chapter 24 on page 463.

3. To select the active authentication protocol, type 2 to select

Authentication Method. The following prompt is displayed:

Enter T-TACACS+, R-RADIUS ->

4. Type T to select TACACS+ or R for RADIUS. The default is TACACS+.

Only one protocol can be active on the switch at a time.

Note

If you selected TACACS+, go to Step 7. If you selected RADIUS, go to

Step 8.

Section VII: Management Security 557

Chapter 29: RADIUS and TACACS+ Authentication Protocols

5. To disable the server-based authentication feature on the switch, do the following: a. Type 1 to select Server-based Authentication.

The following prompt is displayed:

Server Based User Authentication (E-Enabled, D-

Disabled) -> b. Type D to disable the feature. The default is disabled.

c. Return to the Main Menu and type S to save your change.

Now that server-based authenticator is disabled, you must use the standard AT-S62 manager accounts of manager and operator the next time you log on to the switch to manager it.

6. To configure the TACACS+ client software, do the following: a. Type 3 to select TACACS+ Configuration.

The TACACS+ Client Configuration menu is shown in Figure

182.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

User: Manager 11:20:02 02-Jan-2004

TACACS+ Client Configuration

1 - TAC Server 1 .................. 0.0.0.0

2 - TAC Server 2 .................. 0.0.0.0

3 - TAC Server 3 .................. 0.0.0.0

4 - TAC Server Order .............. 1 2 3

5 - TAC Global Secret .............

6 - TAC Timeout ................... 30 seconds

R - Return to Previous Menu

Enter your selection?

Figure 182 TACACS+ Client Configuration Menu b. Configure the settings as needed. The settings are described below:

1 - TAC Server 1

2 - TAC Server 2

3 - TAC Server 3

Use these parameters to specify the IP addresses of up to three network servers containing TACACS+ server software.

After you have entered an IP address, you will see the following prompt:

Section VII: Management Security 558

Section VII: Management Security

AT-S62 User’s Guide

Use per-server secret [Y/N] ->

If you will be specifying more than one TACACS+ server and if all of the servers use the same encryption secret, you can answer No to this prompt and enter the encryption secret using the TAC Global Secret parameter.

However, if you are specifying only one TACACS+ server or if the servers have difference encryption secrets, then respond with Yes to this prompt. You will see:

Enter per-server secret [max 40 characters] ->

Use this prompt to enter the encryption secret for the

TACACS+ server whose IP address you are specifying.

4 - TAC Server Order

You use this selection to indicate the order in which the switch is to query the TACACS+ servers for logon authentication. Of course, you can skip this option if you specified only one IP address. The default is 1, 2, and 3, in that order.

5 - TAC Global Secret

If all of the TACACS+ servers have the same encryption secret, rather then entering the same secret when you enter the IP addresses, you can use this option to enter the secret just once.

3 - TAC Timeout

This parameter specifies the maximum amount of time the switch waits for a response from a TACACS+ server before assuming the server will not respond. If the timeout expires and the server has not responded, the switch queries the next

TACACS+ server in the list. If there are not any more servers, the switch defaults to the standard Manager and Operator accounts. The default is 30 seconds. The range is 1 to 300 seconds.

c. After you have finished configuring the parameters in the

TACACS+ Client Configuration menu, type R to return to the

Authentication Menu, shown in Figure 181 on page 557.

d. From the Authentication Menu, type 1 to select Server-based

Authentication. The following prompt is displayed:

Server Based User Authentication (E-Enabled, D-

Disabled) -> e. Type E to enable server-based authentication on the switch.

The TACACS+ client software is now active on the switch.

559

Chapter 29: RADIUS and TACACS+ Authentication Protocols f.

After making changes, type R until you return to the Main Menu.

Then type S to select Save Configuration Changes.

7. To configure the RADIUS protocol, from the Authentication Menu in

Figure 181 on page 557 do the following:

a. Type 4 to select RADIUS Configuration.

The RADIUS Client Configuration menu is shown in Figure

183.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

RADIUS Client Configuration

1 - Global Encryption Key ............. ATI

2 - Global Server Timeout period....... 30 second(s)

3 - RADIUS Server 1 Configuration ..... 0.0.0.0

4 - RADIUS Server 2 Configuration ..... 0.0.0.0

5 - RADIUS Server 3 Configuration ..... 0.0.0.0

6 - Show Status

R - Return to Previous Menu

Enter your selection?

Figure 183 RADIUS Client Configuration b. Configure the parameters as needed. The parameters are defined below:

Global Encryption Key

This parameter specifies the encryption key for the RADIUS servers. This option is useful if you will be entering more than one RADIUS server and all the servers share the same encryption key. The default is ATI.

Global Server Timeout period

This parameter specifies the maximum amount of time the switch will wait for a response from a RADIUS server before assuming that the server will not respond. If the timeout expires and the server has not responded, the switch queries the next RADIUS server in the list. If there are not any more servers, than the switch will default to the standard Manager and Operator accounts. The default is 30 seconds. The range is

1 to 60 seconds.

Section VII: Management Security 560

AT-S62 User’s Guide

3 - RADIUS Server 1 Configuration

4 - RADIUS Server 1 Configuration

5 - RADIUS Server 1 Configuration

Use these parameters to specify the IP addresses of up to three network servers containing the RADIUS server software.

Selecting one of the options displays the RADIUS Server

Configuration menu, shown in Figure 184.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

RADIUS Server 1 Configuration

1 - Server IP Address ................. 0.0.0.0

2 - Server Authentication UDP Port .... 1812

3 - Server Encryption Key ............. <Not Defined>

R - Return to Previous Menu

Enter your selection?

Figure 184 RADIUS Server Configuration

The options are described below:

1 - Server IP Address

Use this option to specify the IP address of the RADIUS server.

2 - Server Authentication UDP Port

Use this option to specify the UDP port of the RADIUS protocol.

3 - Server Encryption Key

Use this option to specify the encryption key for the RADIUS server. c. After you have finished configuring the parameters in the RADIUS

Client Configuration menu, type R to return to the Authentication

Menu, shown in Figure 181 on page 557.

Note

Steps d. and e. should only be performed to support new manager accounts. If you are configuring the RADIUS client software solely for

the 802.1x port-based access control feature described in Chapter

24 on page 463, leave menu option 1 - Server-based Authentication

as disabled and skip ahead to step f.

Section VII: Management Security 561

Chapter 29: RADIUS and TACACS+ Authentication Protocols

Displaying

RADIUS Status and Settings

d. From the Authentication Menu, type 1 to select Server-based

Authentication. The following prompt is displayed:

Server Based User Authentication (E-Enabled, D-

Disabled) -> e. Type E to enable server-based authentication on the switch.

f.

After making changes, type R until you return to the Main Menu.

Then type S to select Save Configuration Changes.

The RADIUS Client Configuration menu shown in Figure 183 on page

560 has a selection that displays the RADIUS client software settings. The

selection, 6 - Show Status, displays the Show Status menu, as shown in

Figure 185

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Server

User: Manager 11:20:02 02-Jan-2004

Show Status

Global Configuration

--------------------

Encryption Key : ATI

Server Timeout : 30 second(s)

Server IP Address Auth Port Encryption Key Auth Req Auth Resp

-----------------------------------------------------------------

149.11.11.11

149.22.22.22

149.22.22.22

1812

1812

1812

WRRT

LLST

OORT

100

4

0

96

4

0

U - Update Display

R - Return to Previous Menu

Enter your selection?

Figure 185 Show Status Menu

The information in this menu is for viewing purposes only. Most of the columns are self-explanatory, with the possible exceptions of “Auth Req” and “Auth Resp.” The “Auth Req” column displays the number of authentication requests the switch has made to the RADIUS server. The

“Auth Resp” is the number of responses that the switch has received back from the server.

Section VII: Management Security 562

Chapter 30

Management Access Control List

This chapter explains how to create an access control list (ACL) to restrict

Telnet and web browser management access to the switch. Sections in this chapter include:

❑ Management Access Control List Overview on page 564

❑ Creating the Management ACL on page 568

❑ Adding, Deleting, and Viewing ACEs on page 570

563

Chapter 30: Management Access Control List

Management Access Control List Overview

The Management Access Control List (ACL) is a tool for restricting remote management access to a switch. You can use this feature to control which management workstations can remotely manage the device using the Telnet application protocol or a web browser.

The Management ACL filters the remote management packets that a switch receives. The switch accepts and processes only those management packets that meet the criteria stated in the ACL. Those management packets that do not meet the criteria are discarded.

The benefit of this feature is that you can prevent unauthorized management access to the switch by controlling which workstations are to have remote management access. You can even control which method, Telnet or web browser, a remote manager can use. For example, you could create a Management ACL that allows the switch to accept management packets only from the management stations in one particular subnet or from just one or two specific management stations.

An access control list is a list of one or more statements that define which management packets the switch will accept. Each statement, referred to as an access control entry (ACE), contains the criteria the switch uses in making the determination.

An ACE in a Management ACL is an implicit “permit” statement, meaning that a management packet that meets the criteria of an ACE is processed by the switch. Consequently, the ACEs you enter into the Management

ACL must specify which management packets you want the switch to process. Packets that do not meet any of the ACEs in the Management

ACL are discarded.

Parts of a

Management

ACE

An ACE in a Management ACL has the following four parts:

❑ IP address

❑ Subnet mask

❑ Protocol

❑ Interface

IP Address

You can specify the IP address of a specific management workstation or a subnet.

Section VII: Management Security 564

AT-S62 User’s Guide

Mask

You need to enter a mask that indicates the parts of the IP address the switch should filter on. A binary “1” indicates the switch should filter on the corresponding bit of the address, while a “0” indicates that it should not. If you are filtering on a specific IP address, use the mask

255.255.255.255. If you are filtering on a subnet, the mask will depend on the subnet address. For example, to allow any management workstation in the subnet 149.11.11.0 to manage the switch, you would enter the mask 255.255.255.0.

Protocol

The software allows you to choose TCP, UDP, or both as the protocol for the management packets. Since Telnet and web browser management packets for an AT-8524M switch are exclusively TCP, only that protocol should be specified as the protocol.

Interface

This interface parameter allows you control whether the remote management station can manage the switch using Telnet, a web browser, or both. For example, you might create an ACE that states that a particular remote management station can only use a web browser to manage the switch.

Management

ACL Guidelines

Here are guidelines to observe when using the Management ACL:

❑ The default setting for this feature is disabled.

❑ A switch can have only one Management ACL.

❑ A Management ACL can have up to 256 ACEs.

❑ An ACE must have an IP address and mask.

❑ All Management ACEs are implicit “permit” statements. A management packet that meets the criteria of an ACE is accepted by the switch. Consequently, the ACEs you enter into the

Management ACL should specify which management packets you want the switch to process. Management packets that do not meet any of the ACEs in the Management ACL are discarded.

❑ A management packet that meets an ACE is immediately processed by the switch and is not compared against any remaining ACEs in the Management ACL.

❑ The ACEs are performed in the order in which they are entered in the ACL. However, since all ACEs in a Management ACL are implicit permit statements, it does not matter in which order you

Section VII: Management Security 565

Chapter 30: Management Access Control List enter them.

❑ The protocol is always TCP.

❑ The Management ACL does not control local management or

SNMP management.

❑ Activating this feature without specifying any ACEs will prohibit you from managing the switch remotely using a Telnet application or web browser because the switch will discard all

Telnet and web browser management packets.

❑ You can apply Management ACLs to both Master and Slave switches in an enhanced stack. A Management ACL on a Master switch will filter management packets intended for the Master switch as well as those intended for any Slave switches that you manage through the Master switch. A Management ACL applied to a Slave switch will filter only those management packets directed to the Slave switch.

Management

ACL Examples

Here are several examples of Management ACLs and ACEs:.

This ACE allows the management workstation with the IP address

149.11.11.11 to remotely manage the switch using either the Telnet application protocol or a web browser:

IP Address

Mask

Protocol

Interface

149.11.11.11

255.255.255.255

TCP

All

If the Management ACL contained only the above ACE, then only the management workstation specified in the ACE would be allowed to remotely manage the switch.

This ACE allows all management workstations in the subnet 149.11.11.0 to remotely manage the switch using either the Telnet application protocol or a web browser:

IP Address

Mask

Protocol

Interface

149.11.11.0

255.255.255.0

TCP

All

This ACE allows all management workstations in the subnet 149.11.11.0 to remotely manage the switch using a web browser, but not the Telnet application protocol:

IP Address

Mask

149.11.11.0

255.255.255.0

Section VII: Management Security 566

Section VII: Management Security

AT-S62 User’s Guide

Protocol

Interface

TCP

Web

A Management ACL can contain multiple ACEs. The two ACEs in this ACL allow all management packets from the subnets 149.11.11.0 and

149.22.22.0 to manage the switch using the Telnet application protocol, but not a web browser:

ACE #1

IP Address

Subnet Mask

Protocol

Interface

149.11.11.0

255.255.255.0

TCP

Telnet

ACE #2

IP Address

Subnet Mask

Protocol

Interface

149.22.22.0

255.255.255.0

TCP

Telnet

The two ACEs in this Management ACL permit remote management from the workstation with the IP address 149.11.11.11 and all management workstations in the subnet 149.22.22.0:

ACE #1

IP Address

Mask

Protocol

Interface

149.11.11.11

255.255.255.255

TCP

All

ACE #2

IP Address

Mask

Protocol

Interface

149.22.22.0

255.255.255.0

TCP

All

567

Chapter 30: Management Access Control List

Creating the Management ACL

To create a Management ACL, perform the following procedure:

1. From the Main Menu, type 5 to select System Administration.

The System Administration menu is shown in Figure 7 on page 59.

2. From the System Administration menu, type 7 to select Management

ACL.

The Management ACL menu is shown in Figure 186.

Allied Telesyn Ethernet Switch AT-8524M - AT-S62

Production Switch

User: Manager 11:20:02 02-Jan-2004

Management ACL Menu

Configuring Management ACL

1 - Management ACL Status ........... Disabled

2 - Add Management ACL Entry

3 - Delete Management ACL Entry

4 - Display all Management ACL Entries

R - Return to Previous Menu

Enter your selection?

Figure 186 Management ACL Menu

Note

If you activate this feature without specifying any ACEs, all Telnet and web browser management packets are discarded by the switch, making it impossible for you to remotely manage the device.

3. Type 2 to select Add Management ACL Entry.

The following prompt is displayed:

Enter the IP address:

4. Enter the IP address of a specific management workstation (for example, 149.11.11.11) or a subnet (for example, 149.11.11.0). You must enter an IP address.

The following prompt is displayed:

Enter the Mask:

5. Enter a mask that indicates the parts of the IP address the switch should filter on. A binary “1” indicates the switch should filter on the corresponding bit of the address, while a “0” indicates that it should not. If you are filtering on a specific IP address, use the mask

255.255.255.255. If you are filtering on a subnet, the mask will depend

Section VII: Management Security 568

Section VII: Management Security

AT-S62 User’s Guide on the address. For example, to allow all management workstations in the subnet 149.11.11.0 to manage the switch, you would enter the mask 255.255.255.0.

This prompt is displayed:

Enter the Protocol [TCP/UDP/ALL]:

6. Enter either TCP or ALL.

The software allows you to select UDP. But since AT-S62 management packets from Telnet and web browser management sessions are TCP, you must specify TCP or ALL.

This prompt is displayed:

Enter the Interface [TELNET/WEB/ALL]:

7. Specify which interface you want a remote management workstation to be able to use when managing the switch. Your choices are:

❑ Telnet - Permits Telnet management.

❑ Web - Permits web browser management.

❑ All - Permits both Telnet and web browser management.

8. If needed, repeat this procedure starting with Step 3 to add more

ACEs to the Management ACL.

9. After you have added all of the ACEs, type 1 to select Management

ACL Status and toggle the selection to Enabled.

Note

If you activate this feature without specifying any ACEs, all Telnet and web browser management packets are discarded by the switch, making it impossible for you to remotely manage the device.

The Management ACL is now active on the switch.

10. After making changes, type R until you return to the Main Menu. Then type S to select Save Configuration Changes.

569

Chapter 30: Management Access Control List

Adding, Deleting, and Viewing ACEs

You can add or delete an ACE from the Management ACL at any time. To

add an ACE, simply repeat the procedure in Creating the Management

ACL on page 568. The new ACEs that you enter are added to the ACEs

that are already in the Management ACL.

To delete an ACE, you perform the same procedure, but instead of selecting option 2 - Add Management ACL Entry from the Management

ACL Menu, you select option 3 - Delete Management ACL Entry. The management software prompts you to enter the specifics of the ACE that you want to delete.

It can help to first display the contents of the Management ACL and jot down on paper the IP address, mask, protocol, and Interface information on the ACE you want to delete. That way you will have the information when the software prompts you for it.

There is also an option in the Management ACL Menu, Option 4, for displaying all of the ACEs in the Management ACLs. The option lists the

ACEs along with the specifics of each ACE.

Section VII: Management Security 570

Section VIII

Web Browser Management

The chapters in this section explain how to manage an AT-8524M switch using a web browser. The chapters include:

❑ Chapter 31, Starting a Web Browser Management Session on page 573

❑ Chapter 32, Enhanced Stacking on page 579

❑ Chapter 33, Basic Switch Parameters on page 585

❑ Chapter 34, SNMPv1 and SNMPv2c Community Strings on page

598

❑ Chapter 35, Port Parameters on page 609

❑ Chapter 36, MAC Address Table on page 621

❑ Chapter 37, Port Trunking on page 628

❑ Chapter 38, Port Mirroring on page 637

❑ Chapter 39, File Downloads and Uploads on page 644

❑ Chapter 40, Event Log on page 650

❑ Chapter 41, Quality of Service on page 657

❑ Chapter 42, IGMP Snooping on page 667

❑ Chapter 43, Denial of Service Defense on page 673

❑ Chapter 44, SNMPv3 Protocol on page 678

❑ Chapter 45, STP, RSTP, and MSTP on page 742

❑ Chapter 46, Virtual LANs on page 761

571

Section III: Web Browser Management

❑ Chapter 47, GARP VLAN Registration Protocol on page 775

❑ Chapter 48, MAC Address Security on page 782

❑ Chapter 49, 802.1x Port-based Access Control on page 785

❑ Chapter 50, Secure Shell Protocol on page 797

❑ Chapter 51, Encryption Keys, PKI, and SSL on page 802

❑ Chapter 52, RADIUS and TACACS+ Authentication Protocols on page 808

❑ Chapter 53, Management Access Control List on page 815

572

Chapter 31

Starting a Web Browser

Management Session

This chapter contains the procedure for starting a web browser management session on an AT-8524M switch. Sections in the chapter include:

❑ Starting a Web Browser Management Session on page 574

❑ Saving Your Parameter Changes on page 577

❑ Quitting a Web Browser Management Session on page 578

573

Chapter 31: Starting a Web Browser Management Session

Starting a Web Browser Management Session

To establish a web browser management session with an AT-8524M switch, there must be at least one switch in the subnet with an IP address and whose stacking status has been changed to master switch. Once you have started a web browser management session on the master switch, you can manage all the enhanced stacking switches that reside in the same enhanced stack.

Note

For background information on enhanced stacking, refer to

Enhanced Stacking Overview on page 49.

To start a web browser management session, perform the following procedure:

1. Start your web browser.

Note

If your PC with the web browser is connected directly to the switch to be managed or is on the same side of a firewall as the switch, you must configure your browser’s network options not to use proxies.

Consult your web browser’s documentation on how to configure the switch’s web browser not to use proxies.

2. In the URL field of the browser, enter the IP address of the switch you want to manage or of the master switch of the enhanced stack.

Switch’s IP Address

Figure 187 Entering a Switch’s IP Address in the URL Field

Section VIII: Web Browser Management 574

AT-S62 User’s Guide

The AT-S62 software displays the login page, as shown in Figure 188.

Figure 188 AT-S62 Login Page

3. Enter a user name and password. For manager access, enter

“manager” as the user name. The default password is “friend”. For operator access, enter “operator” as the user name. The default password is “operator”. Login names and passwords are casesensitive. (For information on the two access levels, refer to

Management Access Levels on page 38.)

The user names cannot be changed. To change a password, refer

to Configuring the Manager and Operator Passwords on page

592.

The Home page is shown in Figure 189.

Section VIII: Web Browser Management

Figure 189 Home Page

575

Chapter 31: Starting a Web Browser Management Session

The main menu is on the left side of the Home page. It consists of the following selections:

❑ Enhanced Stacking

❑ Configuration

❑ Monitoring

❑ Logout

Note

The Enhanced Stacking selection is included in the menu only on master switches.

A web browser management session remains active even if you link to other sites. You can return to the management web pages anytime as long as you do not quit the browser.

Browser Tools

You can use the browser tools to move around the management pages.

Selecting Back on your browser’s toolbar returns you to the previous display. You can also use the browser’s bookmark feature to save the link to the switch.

Section VIII: Web Browser Management 576

AT-S62 User’s Guide

Saving Your Parameter Changes

When you make a change to a switch parameter, the change is, in most cases, immediately activated as soon as you click the Apply button.

However, a change to a switch parameter is initially saved only to temporary memory. It is lost the next time you reset or power cycle the unit. To permanently save a change, you must click the Save Changes button. This button is located on the General tab.

To locate the button, from the Home Page click Configuration. The

General tab is displayed. The Save Changes button is at the bottom of the page. If the button is not visible, there are no changes for the switch to save.

Section VIII: Web Browser Management

Save Changes Button

Figure 190 Save Changes Button in the General Tab (Configuration)

577

Chapter 31: Starting a Web Browser Management Session

Quitting a Web Browser Management Session

To exit a web browser management session, select Logout from the main menu.

Section VIII: Web Browser Management 578

Chapter 32

Enhanced Stacking

This chapter contains the following procedures:

❑ Setting a Switch’s Enhanced Stacking Status on page 580

❑ Selecting a Switch in an Enhanced Stack on page 582

❑ Displaying the Enhanced Stacking Status on page 584

Note

For background information on enhanced stacking, refer to

Enhanced Stacking Overview on page 49.

579

Chapter 32: Enhanced Stacking

Setting a Switch’s Enhanced Stacking Status

The enhanced stacking status of the switch can be master, slave, or unavailable. Each status is described below:

❑ Master - A master switch of a stack can be used to manage other switches in an enhanced stack. Once you have established a local or remote management session with a master switch, you can access and manage the other enhanced stacking switches.

A master switch must have a unique IP address. You can manually assign a master switch an IP address or activate the

BOOTP and DHCP client software on the switch so that the switch automatically obtains an IP address from a BOOTP or

DHCP server on your network.

❑ Slave - A slave switch can be remotely managed through a master switch. It does not need an IP address or subnet mask. This is the default setting.

❑ Unavailable - A switch with an unavailable stacking status cannot be remotely managed through a master switch. A switch with this designation can be managed locally. To be managed remotely, a switch with an unavailable stacking status must be assigned a unique IP address.

Note

The only switch whose stacking status you can change through a web browser management session is the switch on which you started the management session, typically a master switch. You cannot change the stacking status of a switch accessed through enhanced stacking. If the switch does not have an IP address and subnet mask, the only way to change its stacking status is through a local management session.

To adjust a switch’s enhanced stacking status, perform the following procedure:

1. From the Home page, select Configuration.

The Configuration System page is displayed with the General tab

selected by default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select the Layer 2 option.

The Layer 2 page is displayed with the MAC Address tab selected

by default, as shown in Figure 208 on page 622.

3. Select the Enhanced Stacking tab.

Section VIII: Web Browser Management 580

AT-S62 User’s Guide

Note

If the window does not have an Enhanced Stacking tab, you are attempting to change the stacking status of a switch accessed through enhanced stacking. This is not allowed. The only stacking status you can change remotely from a web browser management session is the switch on which you started the session.

The Enhanced Stacking tab is shown in Figure 191.

Section VIII: Web Browser Management

Figure 191 Enhanced Stacking Tab (Configuration)

4. Click the desired enhanced stacking status for the switch. The default is Slave.

5. Click Apply.

The new enhanced stacking status is immediately activated on the switch.

6. To permanently save the change, click Save Changes in the General

tab of the System page. For directions, refer to Saving Your Parameter

Changes on page 577.

581

Chapter 32: Enhanced Stacking

Selecting a Switch in an Enhanced Stack

The first thing that you should do before you perform any procedure on a switch in an enhanced stack is check to be sure that you are performing it on the correct switch. If you assigned system names to your switches, identifying your switches should be easy. The management software displays the name of the switch being managed at the top of every management menu.

When you start a web browser management session on the master switch of the enhanced stack, you are by default addressing that particular switch. The management tasks that you perform effect only the master switch.

To manage a slave switch or another master switch in the same stack, you need to select it from the management software.

To select a switch to manage in an enhanced stack, perform the following procedure:

1. From the Home Page, select Enhanced Stacking.

Note

If the Home page does not have an Enhanced Stacking menu selection, the switch’s enhanced stacking status is either slave or unavailable. For instructions on how to change a switch’s stacking status, refer to the previous procedure.

The master switch polls the network for the slave and master enhanced stacking switches in the enhanced stack and displays a list of the switches in the Enhanced Stacking page. An example is

shown in Figure 192.

Section VIII: Web Browser Management

Figure 192 Enhanced Stacking Page

582

AT-S62 User’s Guide

Note

The master switch on which you started the management session is not included in the list, nor are any switches with an enhanced stacking status of Unavailable.

You can sort the switches in the list by switch name or MAC address by clicking on the column headers. By default, the list is sorted by MAC address.

You can refresh the list by clicking Refresh. This instructs the master switch to again poll the subnet for all switches.

2. To manage another switch in an enhanced stack, click the button to the left of the appropriate switch in the list. You can select only one switch at a time.

Note

If the web server on the master switch is operating in the secure

HTTPS mode, you can manage only those enhanced stacking switches that are also operating HTTPS.

3. Click Connect.

4. Enter a user name and password for the switch when prompted.

The Home page of the selected switch is displayed. You can now manage the switch.

Returning to the Master

Switch

When you are finished managing a slave switch and want to manage another switch in the stack, return to the Home page of the switch and select Disconnect from the menu. This returns you to the Enhanced

Stacking page in Figure 192 on page 582. When you see that page, you

are again addressing the master switch from which you started the management session.

You can select another switch in the list to manage or, if you want to manage the master switch, return to the master switch’s Home page by selecting Home.

Section VIII: Web Browser Management 583

Chapter 32: Enhanced Stacking

Displaying the Enhanced Stacking Status

To display the enhanced stacking status of a switch, do the following:

1. From the Home page, select Monitoring.

2. From the Monitoring page, select the Layer 2 menu option.

3. From the Layer 2 page, select the Enhanced Stacking tab.

The tab is shown Figure 193.

Figure 193 Enhanced Stacking Tab (Monitoring)

The information in the tab states the current enhanced stacking status of the switch as master, slave, or unavailable.

Section VIII: Web Browser Management 584

Chapter 33

Basic Switch Parameters

This chapter contains the following sections:

❑ Configuring an IP Address and Switch Name on page 586

❑ Activating the BOOTP and DHCP Client Software on page 589

❑ Displaying System Information on page 590

❑ Configuring the Manager and Operator Passwords on page 592

❑ Rebooting a Switch on page 594

❑ Pinging a Remote System on page 595

❑ Returning the AT-S62 Software to the Factory Default Values on page 596

585

Chapter 33: Basic Switch Parameters

Configuring an IP Address and Switch Name

Note

For guidelines on when to assign an IP address, subnet address, and

gateway address to an AT-8524M switch, refer to When Does a

Switch Need an IP Address? on page 57.

To set basic switch parameters for an AT-8524M switch, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194.

Section VIII: Web Browser Management

Figure 194 General Tab (Configuration)

586

Section VIII: Web Browser Management

AT-S62 User’s Guide

Note

This procedure describes the parameters in the Administration

section of the tab. The Passwords section is described in Configuring the Manager and Operator Passwords on page 592. The

DHCP/BOOTP option is described in Activating the BOOTP and

DHCP Client Software on page 589. The maximum aging timer

option is described in Changing the Aging Time on page 627.

Note

The Defaults button returns all parameters in this tab to their default settings. To return all switch parameters to the default values, refer

to Returning the AT-S62 Software to the Factory Default Values on page 596

The Reset button resets the switch, as explained in Rebooting a

Switch on page 594.

2. Change the parameters as desired.

The parameters in the Administration section are described below:

System Name

This parameter specifies a name for the switch (for example, Sales

Ethernet switch). The name is displayed at the top of the AT-S62 management pages and tabs. The name can be from 1 to 20 characters. The name can include spaces and special characters, such as exclamation points and asterisks. The default is no name.

This parameter is optional.

Note

Allied Telesyn recommends assigning each switch a name. Names can make it easier for you to identify the various switches when you manage them and help you avoid performing a configuration procedure on the wrong switch.

Administrator

This parameter specifies the name of the network administrator responsible for managing the switch. The name can be from 1 to

20 characters. It can include spaces and special characters, such as dashes and asterisks. The default is no name. This parameter is optional.

587

Chapter 33: Basic Switch Parameters

Comments

This parameter specifies the location of the switch, (for example,

4th Floor - rm 402B). The location can be from 1 to 20 characters.

The location can include spaces and special characters, such as dashes and asterisks. The default is no location. This parameter is optional.

IP address

This parameter specifies the IP address of the switch. You must specify an IP address if you want the switch to function as the

Master switch of an enhanced stack. The IP address must be entered in the format: xxx.xxx.xxx.xxx. The default value is 0.0.0.0.

Subnet mask

This parameter specifies the subnet mask for the switch. You must specify a subnet mask if you assigned an IP address to the switch.

The subnet mask must be entered in the format: xxx.xxx.xxx.xxx.

The default value is 255.255.0.0.

Gateway address

This parameter specifies the default router’s IP address. This address is required if you intend to remotely manage the switch from a management station that is separated from the switch by a router. The address must be entered in the format: xxx:xxx:xxx:xxx. The default value is 0.0.0.0.

3. Click the Apply button to activate your changes on the switch.

Note

A change to any of the above parameters is immediately activated on the switch.

A change to the IP address of the switch will result in the loss of a remote management session. You can restart the management session using the switch’s new IP address.

4. Click Save Changes to permanently save your changes. (This button does not appear if there are no changes to save.)

Section VIII: Web Browser Management 588

AT-S62 User’s Guide

Activating the BOOTP and DHCP Client Software

For background information on BOOTP and DHCP, refer to the section

Activating the BOOTP and DHCP Client Software on page 62.

To activate or deactivate the BOOTP and DHCP client software on the switch from a web browser management session, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. In the BOOTP/DHCP section of the tab, click either Enable to activate the client software or Disable to disable it. The default is disabled.

3. Click Apply to activate your change on the switch.

Note

If you activated BOOTP/DHCP, the switch immediately begins to query the network for a BOOTP or DHCP server. The switch continues to query the network for its IP configuration until it receives a response. If you manually assigned the switch and IP address, that address is deleted and replaced by the IP address received from the BOOTP/DHCP server.

4. Click Save Changes to permanently save your changes. (This button does not appear if there are no changes to save.)

Section VIII: Web Browser Management 589

Chapter 33: Basic Switch Parameters

Displaying System Information

To view basic information about the switch, perform the following procedure:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195.

Section VIII: Web Browser Management

Figure 195 General Tab (Monitoring)

This tab is for viewing purposes only. You cannot change any of the values from this tab. The information in the tab is defined below:

System Name

The name of the switch.

Administrator

The name of the network administrator responsible for managing the switch.

590

Section VIII: Web Browser Management

AT-S62 User’s Guide

Comments

The location of the switch, (for example, 4th Floor - rm 402B).

DHCP/BOOTP

The status of the DHCP and BOOTP client software. If enabled, the switch is obtaining its IP information from a DHCP and BOOTP server on the network. If disabled, the IP address must be manually entered.

MAC Address Aging Timer

The time interval an inactive dynamic MAC address can remain in the MAC address table before it is deleted.

IP Address

The switch’s IP address.

Subnet mask

The switch’s subnet mask.

Default Gateway

The IP address of a router for remote management.

System Up Time

The length of time since the switch was last reset or power cycled.

Application Software

The version number and build date of the AT-S62 software.

Bootloader

The version number and build date of the AT-S62 bootloader.

591

Chapter 33: Basic Switch Parameters

Configuring the Manager and Operator Passwords

There are two levels of management access on an AT-8524M switch: manager and operator. When you log in as a manager, you can view and configure all of a switch’s operating parameters. When you log in as an operator, you can only view the operating parameters; you cannot change any values.

You log in as a manager or an operator by entering the appropriate username and password when you start an AT-S62 management session. The default password for manager access is “friend”. The default password for operator access is “operator”. Passwords are case-sensitive.

To change the Manager or Operator password, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. In the Passwords section, enter the new values. The parameters are described below.

Manager Password

Manager Confirm Password

These parameters are used to change the manager’s login password for the switch. The password can be from 0 to 16 characters in length. The same password is used for both local and remote management sessions. To create a new password, enter the new password into both fields. The default password is

“friend”. The password is case-sensitive.

Caution

You should not use spaces or special characters, such as asterisks (*) and exclamation points (!), in a password. Many web browsers cannot handle special characters in passwords.

Operator Password

Operator Confirm Password

These parameters are used to change the operator’s login password for the switch. The password can be from 0 to 16 characters in length. The same password is used for both local and remote management sessions. To create a new password, enter the new password into both fields. The default password for operator is “operator”. The password is case-sensitive.

Section VIII: Web Browser Management 592

AT-S62 User’s Guide

Caution

You should not use spaces or special characters, such as asterisks (*) and exclamation points (!), in a password. Many web browsers cannot handle special characters in passwords.

Note

A change to a password is immediately activated on the switch. You will be prompted for the new password the next time you log on.

3. Click Apply to activate your change on the switch.

4. Click Save Changes to permanently save your change. (This button does not appear if there are no changes to save.)

Section VIII: Web Browser Management 593

Chapter 33: Basic Switch Parameters

Rebooting a Switch

Note

Any parameters changes that have not been saved will be discarded

when a system is reset. To save parameter changes, refer to Saving

Your Parameter Changes on page 577.

To reboot a switch, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Click Reset.

A confirmation prompt is displayed.

3. Click OK to reset the switch or Cancel to cancel the procedure.

Note

The switch does not forward packets while it initializes the AT-S62 management software, a process that takes approximately 20 seconds to complete.

Resetting the switch ends your web browser management session. You must restart the session to continue managing the switch.

Section VIII: Web Browser Management 594

AT-S62 User’s Guide

Pinging a Remote System

You can instruct the switch to ping a node on your network. This procedure is useful in determining whether a valid link exists between the switch and another device.

To ping a network device, perform the following procedure:

1. From the Home Page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. Select the Ping Client tab.

The Ping Client tab is shown in Figure 196.

Section VIII: Web Browser Management

Figure 196 Ping Client Tab

3. Enter the IP address of the end node you want the switch to ping.

4. Click OK.

The results of the ping are displayed in a popup window.

5. To stop the ping, click OK.

595

Chapter 33: Basic Switch Parameters

Returning the AT-S62 Software to the Factory Default Values

The procedure in this section returns all AT-S62 software parameters, including IP address and subnet mask, if assigned, to their default values.

Please note the following before performing this procedure:

❑ Returning all parameter settings to their default values also deletes any port-based or tagged VLANs you created on the switch.

❑ This procedure does not delete files from the AT-S62 file system.

To delete files, refer to Chapter 11, File System on page 146.

❑ This procedure does not delete encryption keys stored in the key

database. To delete encryption keys, refer to Deleting an

Encryption Key on page 504.

❑ Returning a switch to its default values does not alter the contents of the active boot configuration file. To reset the file back to the default settings, you must select the Save Changes button from the System tab after the switch reboots and you have reestablished your management session. Otherwise the switch will revert back to the previous configuration the next time you reset the unit.

Note

The AT-S62 software default values can be found in Appendix A,

AT-S62 Default Settings on page 820.

To return the AT-S62 management software to the default settings, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Select the System Utilities tab.

Section VIII: Web Browser Management 596

The System Utilities tab is shown in Figure 197.

AT-S62 User’s Guide

Section VIII: Web Browser Management

Figure 197 System Utilities Tab

3. Click the Reboot Switch After Resetting to Defaults checkbox.

4. Click Apply.

5. Follow the prompts.

Note

The bottom portion of the System Utilities tab is used to download

and upload files from the switch. For instructions, refer to Chapter

39, File Downloads and Uploads on page 644.

597

Chapter 34

SNMPv1 and SNMPv2c

Community Strings

This chapter explains how to activate SNMP management on the switch and how to create, modify, and delete SNMPv1 and SNMPv2c community strings.

This chapter contains the following procedures:

❑ Enabling or Disabling SNMP Management on page 599

❑ Creating a New SNMPv1 or SNMPv2c Community String on page

601

❑ Modifying a Community String on page 604

❑ Deleting a Community String on page 606

❑ Displaying the SNMP Status and Community Strings on page 607

Note

For background information on SNMP, refer to SNMPv1 and

SNMPv2c Overview on page 82.

598

AT-S62 User’s Guide

Enabling or Disabling SNMP Management

To enable or disable SNMP management on the switch, perform the following procedure:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Select the SNMP tab.

The SNMP tab is shown in Figure 198.

Section VIII: Web Browser Management

Figure 198 SNMP Tab (Configuration)

3. Click Enable SNMP Access to enable or disable SNMP management.

A check in the box indicates that the feature is enabled, meaning that the switch can be managed from an SNMP management workstation.

No check indicates that the feature is disabled. The default is disabled.

599

Chapter 34: SNMPv1 and SNMPv2 Community Strings

4. If you want the switch to send authentication failure traps, click

Enable Authentication Failure Traps. A check in the box indicates that the switch will send the trap.

5. Click Apply.

A change to SNMP access is immediately activated on the switch.

6. To permanently save the changes, use the Save Changes button in

the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

Section VIII: Web Browser Management 600

AT-S62 User’s Guide

Creating a New SNMPv1 or SNMPv2c Community String

To create a new SNMPv1 or SNMPv2c community string, perform the following procedure:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Select the SNMP tab.

The SNMP tab is shown in Figure 198 on page 599.

3. Click Configure in the SNMPv1/v2c section of the tab.

The SNMP tab for SNMPv1 and SNMPv2c community strings is

shown in Figure 199.

Section VIII: Web Browser Management

Figure 199 SNMP (SNMPv1 and SNMPv2c) Tab

The community strings already existing on the switch are displayed in the table. The columns are defined below:

Community Name

The name of a community string.

Access Mode

Whether the string’s access is read/write or read only.

Manager Stations

The IP addresses of management stations that can use the community string to access the switch. This only applies if the string has a closed access status.

Trap Receivers

The IP addresses of management stations to receive SNMP traps from the switch.

601

Chapter 34: SNMPv1 and SNMPv2 Community Strings

Open Access

Displays the opened or closed access status of the string:

Yes - The string’s status is open, meaning any management workstation can use it.

No - The string’s status is closed, meaning only those workstations whose IP addresses have been assigned to the string can use it.

Status

Displays whether the string is enabled or disabled. The possible settings are:

Enabled - The string can be used to access the switch.

Disabled - The string cannot be used to access the switch.

4. Click Add.

The Add New SNMP Community page is shown in Figure 200.

Section VIII: Web Browser Management

Figure 200 Add New SNMPv1/v2c Community Page

602

Section VIII: Web Browser Management

AT-S62 User’s Guide

5. In the Community Name field, enter the new community string. The name can be from one to fifteen alphanumeric characters. Spaces are allowed.

6. Use the Status option to either enable or disable the community string. A disabled community string cannot be used to access the switch. The default is enabled.

7. Use the Access Mode option to specify the access mode for the new

SNMP community string. If you specify Read Only, the community string will only allow you to view the MIB objects on the switch. If you specify Read/Write, the community string will allow you to both view and change the SNMP MIB objects on the switch.

8. Use the Allow Any Station option to set the community string as opened or closed. If there is no check in the box next to the option, the community string is closed; only those workstations whose IP addresses are assigned to the community string can use it. If there is a check in the box, the string is open, meaning any SNMP management workstation can use it to access the switch.

9. If you specified the community string as closed, enter the IP addresses of up to eight management workstations in the Manager IP Address fields. These are the management workstations that can use the string.

10. If you want the switch to send traps, enter the IP addresses of up to eight trap receivers in the Trap Receiver IP Address fields.

11. Click Apply.

The new community string is now available on the switch.

12. Repeat this procedure starting with step 3 to add more community strings.

13. To permanently save your changes, use the Save Changes button in

the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

603

Chapter 34: SNMPv1 and SNMPv2 Community Strings

Modifying a Community String

To modify a community string, perform the following procedure:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Select the SNMP tab.

The SNMP tab is shown in Figure 198 on page 599.

3. Click Configure in the SNMPv1/v2c section of the tab

The SNMP tab for SNMPv1 and SNMPv2c is shown in Figure 199 on page 601.

4. Click the button next to the community string you want to modify.

5. Click Modify.

The Modify SNMP Community page is shown in Figure 201.

Section VIII: Web Browser Management

Figure 201 Modify SNMPv1/v2c Community Page

604

Section VIII: Web Browser Management

AT-S62 User’s Guide

Note

You cannot change the name of a community string.

6. Use the Status option to either enable or disable the community string. A disabled community string cannot be used to access the switch.

7. Use the Access Mode option to change the access mode of the community string. If you specify Read Only, the community string will only allow you to view the MIB objects on the switch. If you specify

Read/Write, the community string will allow you to both view and change the SNMP MIB objects on the switch.

8. Use the Allow Any Status option to change the open and close status of the community string. If there is no check in the box next to the option, the community string is closed; only those workstations whose IP addresses are assigned to the community string can use it.

If there is a check in the box, then the status is open, meaning that any

SNMP management workstation can use it to access the switch.

9. If the community string as closed, enter, delete, or modify the IP addresses of up to eight management workstations in the Manager IP

Address fields. These are the management workstations that can use the string.

10. If you want the switch to send traps, enter, delete, or modify the IP addresses of up to eight trap receivers in the Trap Receiver IP Address fields.

11. Click Apply.

The modified community string is now available on the switch.

12. To permanently save the changes, use the Save Changes button in

the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

605

Chapter 34: SNMPv1 and SNMPv2 Community Strings

Deleting a Community String

To delete a community string, do the following:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Select the SNMP tab.

The SNMP tab is shown in Figure 198 on page 599.

3. Click Configure in the SNMPv1/v2c section of the tab.

The SNMP tab for SNMPv1 and SNMPv2c is shown in Figure 199 on page 601.

4. Click the button next to the community string you want to delete. You can select only one community string.

5. Click Remove.

A confirmation prompt is displayed.

6. Click OK. The community string is deleted from the switch.

7. To permanently save your change, use the Save Changes button in

the General tab of the System menu. For directions, refer to Saving

Your Parameter Changes on page 577.

Section VIII: Web Browser Management 606

AT-S62 User’s Guide

Displaying the SNMP Status and Community Strings

To display the SNMPv1 and SNMPv2c community strings on the switch, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP tab.

The information in the tab includes:

SNMP Access

Whether SNMP access is enabled or disabled.

Authentication Failure Trap

Whether the authentication failure trap is enabled or disabled.

3. Click View in the SNMPv1/v2c section of the tab.

The SNMP tab is shown in Figure 202.

Section VIII: Web Browser Management

Figure 202 SNMP Tab (Monitoring)

The information in the tab is described below:

Community Name

The community string.

Access

Whether access is read/write or read only.

Manager Stations

The IP addresses of the management stations that can use a community string to access the switch. This only applies if the string has a closed access status.

607

Chapter 34: SNMPv1 and SNMPv2 Community Strings

Trap Receivers

IP addresses of management stations to receive SNMP traps from the switch.

Open Access

Displays the opened or closed access status of the string:

Yes - The string’s status is open, meaning that any workstation can use it.

No - The string’s status is closed, meaning that only those workstations whose IP addresses have been assigned to the string can use it.

Status

Displays the status of the string. The possible values are:

Enabled - The string can be used to access the switch.

Disabled - The string cannot be used to access the switch.

Section VIII: Web Browser Management 608

Chapter 35

Port Parameters

This chapter explains how to view and change the parameter settings for the individual ports on a switch. Examples of the parameters that you can adjust include port speed and duplex mode.

This chapter contains the following procedures:

❑ Configuring Port Parameters on page 610

❑ Displaying Port Status and Statistics on page 616

609

Chapter 35: Port Parameters

Configuring Port Parameters

To configure the parameter settings of a port on the switch, perform the following procedure:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select the Layer 1 option.

3. Select the Port Settings tab.

The Port Settings tab is shown in Figure 203.

Section VIII: Web Browser Management

Figure 203 Port Settings Tab (Configuration)

4. Click the port in the graphical switch image you want to configure.

The selected port turns white. You can select more than one port at a time to configure. (To deselect a port, click it again.)

5. Click Modify. To configure all of the base ports (not including any expansion ports), click Modify All.

610

The Port Configuration page is shown Figure 204.

AT-S62 User’s Guide

Section VIII: Web Browser Management

Figure 204 Port Configuration Page

Note

The Port Configuration page in the figure above is for a 10/100 Mbps twisted pair port. The page for a fiber optic port on an optional expansion module will contain a subset of the parameters.

If you are configuring multiple ports and the ports have different settings, the Port Configuration menu displays the settings of the lowest numbered port. Once you have configured the settings of the port, all of its settings are copied to the other selected ports.

The Defaults button returns the port settings to the default

values, which are listed in Appendix A, AT-S62 Default Settings on page 820.

6. Adjust the port parameters as needed.

The parameters are described below.

Port Name

You use this selection to assign a name to a port. The name can be from one to fifteen alphanumeric characters. Spaces are allowed, but you should not use special characters, such as asterisks or exclamation points. (You cannot assign a name when you are configuring more than one port.)

Speed and Duplex

You use this selection to configure a port for Auto-Negotiation or to manually set a port’s speed and duplex mode.

If you select Auto for Auto-Negotiation, which is the default setting, the switch will set both speed and duplex mode for the port automatically.

611

Chapter 35: Port Parameters

Section VIII: Web Browser Management

You should note the following concerning the operation of Auto-

Negotiation on the switch port:

❑ In order for a switch port to successfully Auto-Negotiate its duplex mode with an end-node, the end-node should also be using Auto-

Negotiation. Otherwise, a duplex mode mismatch can occur. A switch port using Auto-Negotiation will default to half-duplex if it detects that the end-node is not using Auto-Negotiation. This will result in a mismatch if the end-node is operating at a fixed duplex mode of full-duplex.

To avoid this problem, when connecting an end-node with a fixed duplex mode of full-duplex to a switch port, you should disable

Auto-Negotiation on the port and set the port’s speed and duplex mode manually.

❑ If you disable Auto-Negotiation on a port, the auto-MDI/MDI-X feature on a port is also disabled, and the port defaults to the MDI-

X configuration. Consequently, if you disable Auto-Negotiation and set a port’s speed and duplex mode manually, you might also need to set the port’s MDI/MDI-X setting as well.

Auto-Negotiate: The port will Auto-Negotiate both speed and duplex mode. This is the default.

❑ 10Mbps - Half Duplex

❑ 10Mbps - Full Duplex

❑ 100Mbps - Half Duplex

❑ 100Mbps - Full Duplex

HOL Blocking

For a definition of Head of Line Blocking, refer to page 102.

This parameter can prevent Head of Line Blocking from occurring on a port. The parameter sets a threshold on the utilization of a port’s egress queue. When the threshold for a port is exceeded, the switch signals other ports to discard packets to the oversubscribed port. The number for this value represents cells. A cell is 64 bytes. The range is 1 to 61,440 cells. The default is 7,168.

Status

You use this selection to enable or disable a port. When disabled, a port will not accept or forward frames.

You might want to disable a port and prevent packets from being forwarded if a problem occurs with the node or cable connected to the port. Once the problem has been fixed, you can enable the port again to resume normal operation.

612

Section VIII: Web Browser Management

AT-S62 User’s Guide

You might also want to disable a port that is not being used to secure it from unauthorized connections.

Possible settings for this parameter are:

Enabled The port will receive and forward packets. This is the default setting.

Disabled The port will not receive or forward packets.

Broadcast Filter

Most frames on an Ethernet network are usually unicast frames. A unicast frame is a frame that is sent to a single destination. A node sending a unicast frame intends the frame for a particular node on the network. For example, when a node sends a file to a network server for storage, the node sends the file in unicast Ethernet frames containing the destination address of the server where the file is to be stored.

Broadcast frames are different. Broadcast frames are directed to all nodes on the network or all nodes within a particular virtual

LAN. Broadcast packets can perform a variety of functions. For example, some network operating systems use broadcast frames to announce the presence of devices on a network.

The problem with broadcast frames is that too many of them traversing a network can impact network performance. The more bandwidth consumed by broadcast frames, the less available for unicast frames.

Should the performance of your network be impacted by heavy broadcast traffic, you can use this parameter to limit the number of broadcast frames forwarded by the switch and so limit the number of broadcast frames on your network.

When you activate this feature on a port, the port will discard all egress broadcast packets. That is, if the port has a broadcast packet that is intended to be sent to the end node connected to the port, the port will instead discard the packet.

It should be noted that the filtering takes place only on egress broadcast packets—packets that a port is transmitting. This filter does not apply to ingress broadcast packets.

Possible settings for this parameter are:

Enabled The port will not transmit any broadcast frames.

Disabled The port will transmit broadcast frames. This is the default setting.

613

Chapter 35: Port Parameters

Back Pressure

Sets backpressure on a port. This option only applies to ports operating in half-duplex mode. A switch port uses backpressure to control the flow of ingress packets.

When a twisted pair port on the switch operating in half-duplex mode needs to stop an end node from transmitting data, it forces a collision. A collision on an Ethernet network occurs when two end nodes attempt to transmit data using the same data link at the same time. A collision causes the end nodes to stop sending data.

When a switch port needs to stop a half-duplex end node from transmitting data, it forces a collision on the data link, which stops the end node. Once the switch is ready to receive data again, the switch stops forcing collisions. This is called backpressure.

The default setting for backpressure on a switch port is disabled.

The Limit field specifies the maximum number of ingress packets that a port will accept within a 1 second period before initiating backpressure. The range is 1 to 57,344. The default is 8192.

Flow Control

Sets flow control on the port. This option applies only to ports operating in full-duplex mode.

A switch port uses flow control to control the flow of ingress packets from its end node.

A port using flow control issues a special frame, referred to as a

PAUSE frame, as specified in the IEEE 802.3x standard, to stop the transmission of data from an end node. When a port needs to stop an end node from transmitting data, it issues this frame. The frame instructs the end node to cease transmission. The port continues to issue PAUSE frames until it is ready again to receive data from the end node.

The default setting for flow control on a switch port is disabled.

Possible values are:

Auto - The port will use flow control if it detects that the end node is using it.

Disabled - No flow control on the port.

Enabled - Flow control is activated.

Limit - Specifies the maximum number of ingress packets that a port will receive within a 1 second period before initiating flow control. The range is 1 to 57,344 packets. The default is 8192.

Section VIII: Web Browser Management 614

Section VIII: Web Browser Management

AT-S62 User’s Guide

MDI/MDIX Crossover

Use this selection to set the wiring configuration of the port. The configuration can be Auto, MDI, or MDI-X. The default setting is

Auto.

The default Auto setting activates the auto-MDI/MDI-X feature on a port, which enables a port to configure itself automatically as

MDI or MDI-X when connected to an end node. This allows you to use a straight-through twisted pair cable when connecting any type of network device to a port on the switch.

The Auto setting is only available when a port is set to Auto-

Negotiate its speed and duplex mode. It is also the only setting available when a port’s speed and duplex are set through Auto-

Negotiation.

The auto-MDI/MDI-X feature is not available if you disable Auto-

Negotiation on a port and set a port’s speed and duplex mode manually. A port where Auto-Negotiation has been disabled defaults to MDI-X. Disabling Auto-Negotiation may require that you manually configure a port’s MDI/MDI-X setting using this option or use a crossover cable.

Once you have made the desired changes, click Apply.

The switch activates the parameter changes on the port.

7. To permanently save the changes, use the Save Changes button in

the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

615

Chapter 35: Port Parameters

Displaying Port Status and Statistics

The procedure in this section displays the operating status of the ports on a switch and port statistics. You can view a port’s operating speed, duplex mode, MDI/MDI-X configuration, and more. You can also view the operating status of any GBIC modules installed in an AT-8550GB.

To display the status or statistics of a switch port, perform the following procedure:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. From the Monitoring menu, select the Layer 1 option.

The Layer 1 page is displayed with the Port Settings tab selected

by default, as shown in Figure 205.

Section VIII: Web Browser Management

Figure 205 Port Settings Tab (Monitoring)

The Port Setting tab displays a graphical image of the front of the switch. Ports with valid links to end nodes have a green light.

3. Click a port. You can select more than one port at a time when you want to display port status. However, you can select only one port when displaying statistics. A selected port turns white. (To deselect a port, click it again.)

4. Click Status to display the port’s operating status or Statistics to display port statistics.

616

AT-S62 User’s Guide

If you select port status, the Port Status page in Figure 206 is

displayed.

Section VIII: Web Browser Management

Figure 206 Port Status Page

The information in this page is for viewing purposes only. To

adjust port parameters, refer to Configuring Port Parameters on page 610.

The columns in the page are described below:

Port

The port number.

Name

The name of the port.

Link

The status of the link between the port and the end node connected to the port. Possible values are:

Up - indicates that a valid link exists between the port and the end node.

Down - indicates that the port and the end node have not established a valid link.

Neg

The status of Auto-Negotiation on the port. Possible values are:

Auto - Indicates that the port is using Auto-Negotiation to set operating speed and duplex mode.

Manual - Indicates that the operating speed and duplex mode were set manually.

MDI/X

The operating configuration of the port. Possible values are MDI and MDI-X.

617

Chapter 35: Port Parameters

Speed

The operating speed of the port. Possible values are:

0010 - 10 Mbps

0100 - 100 Mbps

1000 - 1000 Mbps (Optional expansion ports only.)

Duplex

The duplex mode of the port. Possible values are half-duplex and full-duplex.

PVID

The port VLAN identifier assigned to the port.

Flow Control

The port’s flow control setting. Possible values are:

Enabled - Flow control is enabled on the port.

Disabled - Flow control is disabled on the port.

STP State

The operating status of the port. Possible values are Forwarding,

Blocking, Listening, and Learning.

HOL Limit

The utilization threshold of a port’s egress queue which initiates the Head of Line Blocking prevention mechanism. The number for this value represents cells. A cell is 64 bytes. The range is 1 to

61,440 cells. The default is 7,168.

If you select Statistics, the Statistics page in Figure 207 is

displayed.

Section VIII: Web Browser Management

Figure 207 Port Statistics Page

618

Section VIII: Web Browser Management

AT-S62 User’s Guide

The information in this page is for viewing purposes only. The statistics are defined below:

Bytes Received

Number of bytes received on the port.

Bytes Sent

Number of bytes transmitted from the port.

Frames Received

Number of frames received on the port.

Frames Sent

Number of frames transmitted from the port.

Broadcast Frames Received

Number of broadcast frames received on the port.

Broadcast Frames Sent

Number of broadcast frames transmitted from the port.

Multicast Frames Received

Number of multicast frames received on the port.

Multicast Frames Sent

Number of multicast frames transmitted from the port.

Frames 64 Bytes

Frames 65 - 127 Bytes

Frames 128 - 255 Bytes

Frames 256 - 511 Bytes

Frames 512 - 1023 Bytes

Frames 1024 - 1518 Bytes

Frames 1519 - 1522 Bytes

Number of frames transmitted from the port, grouped by size.

Dropped Frames

The number of frames successfully received and buffered by the port, but subsequently discarded.

CRC Error

Number of frames with a cyclic redundancy check (CRC) error but with the proper length (64-1518 bytes) received on the port.

Jabber

Number of occurrences of corrupted data or useless signals appearing on the port.

No. of Rx Errors

Total number of frames received on the port containing errors.

Undersize Frames

Number of frames that were less than the minimum length specified by IEEE 802.3 (64 bytes including the CRC) received on the port.

619

Chapter 35: Port Parameters

Oversize Frames

Number of frames exceeding the maximum specified by IEEE

802.3 (1518 bytes including the CRC) received on the port.

Fragments

Number of undersized frames, frames with alignment errors, and frames with frame check sequence (FCS) errors (CRC errors) received on the port.

The Clear button at the bottom of the statistics page clears all the counters for the selected port. The Clear All button clears the counters for all of the ports on the switch.

Tx Collisions

Total number of collisions detected on the port. Occurs only on ports operating in half duplex mode.

Section VIII: Web Browser Management 620

Chapter 36

MAC Address Table

This chapter contains instructions on how to view the dynamic and static addresses in the MAC address table of the switch. This chapter contains the following procedure:

❑ Displaying the MAC Address Table on page 622

❑ Adding Static Unicast and Multicast MAC Addresses on page 624

❑ Deleting Unicast and Multicast MAC Addresses on page 626

❑ Changing the Aging Time on page 627

Note

For background information, refer to MAC Address Overview on page 110.

621

Chapter 36:MAC Address Table

Displaying the MAC Address Table

To view the MAC address table, perform the following procedure:

1. From the Home page, select either Configuration or Monitoring.

2. Select Layer 2.

The Layer 2 page is displayed with the MAC Address tab shown by default.

Figure 208 shows how this tab appears when you display it

through the Configuration page. If displayed through the

Monitoring page, the Add button is not included. This button is used to add static and multicast address to the switch. For instructions on how to add static and multicast MAC addresses, refer to the next procedure.

Section VIII: Web Browser Management

Figure 208 MAC Address Tab (Configuration)

The tab contains two parts. The top section displays unicast addresses while the bottom part display multicast addresses. The options function the same in both sections, and are described below. You can select only one option at a time.

622

Section VIII: Web Browser Management

AT-S62 User’s Guide

View All

This selection displays all dynamic addresses learned on the ports of the switch and all static addresses that have been assigned to the ports.

View Static

This selection displays just the static addresses assigned to the ports on the switch.

View Dynamic

This selection displays just the dynamic addresses learned on the ports on the switch.

View MAC Addresses on Port

Displays the dynamic and static MAC addresses of a particular port. You can specify more than one port at a time.

View MAC Addresses for VLAN

Displays the static and dynamic addresses learned on the tagged and untagged ports of a specific VLAN. You specify the VLAN by entering the VLAN ID number. You can specify only one VLAN at a time.

View MAC Address

Displays the port number on which a MAC address was assigned or learned.

In some situations, you might want to know which port a particular MAC address was learned. You could display the MAC address table and scroll through the list looking for the MAC address. But if the switch is part of a large network, finding the address could prove difficult.

The procedure in this section offers an easier way. You can specify the MAC address and let the management software automatically locate the port on the switch where the device is connected.

3. After you select an option, click View.

The columns in the MAC address page are defined below.

MAC Address - The static or dynamic unicast MAC address.

Port(s) - The port on which the address was learned or assigned.

The MAC address with port “CPU” is the address of the switch.

Vlan ID - The ID number of the VLAN where the port is a member.

Type - The type of the address: static or dynamic.

623

Chapter 36:MAC Address Table

Adding Static Unicast and Multicast MAC Addresses

This section contains the procedure for assigning a static unicast or multicast address to a port on the switch. You can assign up to 255 static

MAC addresses per port.

To add a static address to the MAC address table, perform the following procedure:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 2.

The Layer 2 page opens with the MAC Address tab selected by

default, as shown in Figure 208 on page 622.

3. To add a static unicast address, in the View/Add Unicast MAC

Addresses section, click Add. To add a static multicast address, in the

View/Add Multicast MAC Addresses section, click Add.

The Add MAC Address page is shown in Figure 209.

Section VIII: Web Browser Management

Figure 209 Add MAC Address Page

4. In the MAC Address field, enter the new static unicast or multicast

MAC address.

5. In the Port Number field, enter the number of the port on the switch where you want to assign the static address. If you are adding a static unicast address, you can enter only one port.

If you are entering a static multicast address, you must specify the port when the multicast application is located as well as the ports where the host nodes are connected. Assigning the address only to the port where the multicast application is located will result in

624

AT-S62 User’s Guide the failure of the multicast packets to be properly forwarded to the host nodes. You can specify the ports individually (e.g., 1,4,5), as a range (e.g., 11-14) or both (e.g., 15-17,22,24).

6. In the VLAN ID field, enter the VLAN ID where the port is a member.

7. Click Apply.

8. Repeat this procedure to add other static addresses to the switch.

9. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 625

Chapter 36:MAC Address Table

Deleting Unicast and Multicast MAC Addresses

To delete a static or dynamic unicast or multicast MAC address from the switch, perform the following procedure:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 2.

The Layer 2 page opens with the MAC Address tab selected by

default, as shown in Figure 208 on page 622.

3. Display the MAC addresses on the switch by selecting one of the

options. For instructions, refer to Displaying the MAC Address Table on page 622.

4. Click on the button next to the MAC address that you want to delete from the switch.

5. Click Remove.

Note

You cannot delete the switch’s MAC (CPU) address, an STP BPDU

MAC address, or a broadcast address.

6. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 626

AT-S62 User’s Guide

Changing the Aging Time

The switch uses the aging time to delete inactive dynamic MAC addresses from the MAC address table. When the switch detects that no packets have been sent to or received from a particular MAC address in the table after the period specified by the aging time, the switch deletes the address. This prevents the table from becoming full of addresses of nodes that are no longer active.

The default setting for the aging time is 300 seconds (5 minutes).

To adjust the aging time, perform the following procedure:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. In the Configuration section, enter a new value in seconds for the

MAC Address Aging Time item. The range is 8 to 512 seconds. The default is 300 seconds (5 minutes).

3. Click Apply.

4. To permanently save the change, click Save Changes.

Section VIII: Web Browser Management 627

Chapter 37

Port Trunking

This chapter contains the procedure for creating, modifying, or deleting a port trunk from a web browser management session.

Sections in this chapter include:

❑ Creating a Port Trunk on page 629

❑ Modifying a Port Trunk on page 632

❑ Deleting a Port Trunk on page 634

❑ Displaying the Port Trunks on page 635

Note

For background information, refer to Port Trunking Overview on page 122.

628

AT-S62 User’s Guide

Creating a Port Trunk

This section contains the procedure for creating a port trunk on the

switch. Be sure to review the guidelines in Port Trunking Overview on page 122 before performing the procedure.

Caution

Do not connect the cables to the trunk ports on the switches until after you have configured the trunk with the management software.

Connecting the cables before configuring the software will create a loop in your network topology. Data loops can result in broadcast storms and poor network performance.

Note

Before you create a port trunk, examine the speed, duplex mode, and flow control settings of the lowest numbered port that will be a part of the trunk. Check to be sure that the settings are correct for the end node to which the trunk will be connected. When you create the trunk, the AT-S62 management software copies the settings of the lowest numbered port in the trunk to the other ports so that all the settings are the same.

You should also check to be sure that the ports are untagged members of the same VLAN. You cannot create a trunk of ports that are untagged members of different VLANs.

To create a port trunk, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 1.

The Layer 1 page opens with the Port Settings tab displayed by

default, as shown in Figure 203 on page 610.

3. Select the Port Trunking tab.

Section VIII: Web Browser Management 629

Chapter 37: Port Trunking

The Port Trunking tab is shown in Figure 210.

Section VIII: Web Browser Management

Figure 210 Port Trunking Tab

This tab lists the existing trunks. Columns in the tab are defined below:

ID

The ID number of the trunk.

Name

The name of the trunk.

Type

The load distribution method:

❑ SA - Source MAC address (Layer 2)

❑ DA - Destination MAC address (Layer 2)

❑ SA/DA - Source MAC address /destination MAC address (Layer 2)

❑ SI - Source IP address (Layer 3)

❑ DI - Destination IP address (Layer 3)

❑ SI/DI - Source IP address /destination IP address (Layer 3)

Ports

The ports of the trunk.

4. Click Add.

630

The Add New Trunk page is shown in Figure 211.

AT-S62 User’s Guide

Section VIII: Web Browser Management

Figure 211 Add New Trunk Page

5. In the Trunk Name field, enter a name for the port trunk. The name can be up to fifteen alphanumeric characters. No spaces or special characters, such as asterisks and exclamation points, are allowed.

Each trunk must be given a unique name.

6. From the Trunk Method list, select a distribution method. Options are:

❑ SA - Source MAC address (Layer 2)

❑ DA - Destination MAC address (Layer 2)

❑ SA/DA - Source MAC address /destination MAC address (Layer 2)

❑ SI - Source IP address (Layer 3)

❑ DI - Destination IP address (Layer 3)

❑ SI/DI - Source IP address /destination IP address (Layer 3)

7. Click the ports that will make up the port trunk. A selected port changes to white. An unselected port is black. A port trunk can contain up to eight ports.

8. Click Apply. The new port trunk is now active on the switch.

9. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

10. Configure the ports on the remote switch for port trunking.

11. Connect the cables to the ports of the trunk on the switch.

The port trunk is ready for network operations.

631

Chapter 37: Port Trunking

Modifying a Port Trunk

This section contains the procedure for modifying a port trunk on the switch. You can change the name of a trunk and the ports that constitute the trunk. You cannot change the load distribute method. Be sure to

review the guidelines in Port Trunking Overview on page 122 before

performing the procedure.

Caution

If you will be adding or removing ports from the trunk, you should disconnect all data cables from the ports of the trunk on the switch before performing the procedure. Adding or removing ports from a port trunk without first disconnecting the cables may result in loops in your network topology, which can produce broadcast storms and poor network performance.

Note the following before performing this procedure:

❑ If you are adding a port and the port will be the lowest numbered port in the trunk, its parameter settings will overwrite the settings of the existing ports in the trunk. Consequently, you should check to see if its settings are appropriate prior to adding it.

❑ If you are adding a port and the port will not be the lowest numbered port in the trunk, its settings will be changed to match the settings of the existing ports in the trunk.

❑ If you are adding a port to a trunk, you should check to be sure that the new port is an untagged member of the same VLAN as the other trunk ports. A trunk cannot contain ports that are untagged members of different VLANs.

To modify a port trunk, do the following:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 1.

The Layer 1 page opens with the Port Settings tab displayed by

default, as shown in Figure 203 on page 610.

3. Select the Port Trunking tab.

The Port Trunking tab is shown in Figure 210 on page 630.

4. Click the button next to the port trunk you want to modify and click

Modify.

Section VIII: Web Browser Management 632

AT-S62 User’s Guide

An example of the Modify Trunk page is shown in Figure 212.

Section VIII: Web Browser Management

Figure 212 Modify Trunk Page

Note

You cannot change the Trunk ID number or the load distribution method of a port trunk.

5. To change the name of the trunk, click the Trunk Name field and modify the name as needed. The name can be up to fifteen alphanumeric characters. No spaces or special characters, such as asterisks and exclamation points, are allowed. Each trunk must have a unique name.

6. To add or remove ports from a trunk, click the ports in the graphical image of the switch. A selected port changes to white. An unselected port is black. A port trunk can contain up to eight ports.

7. Click Apply.

Changes to a port trunk are activated on the switch.

8. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

9. Reconnect the cables to the ports of the trunk.

633

Chapter 37: Port Trunking

Deleting a Port Trunk

Caution

Disconnect the cables from the port trunk on the switch before performing the following procedure. Deleting a port trunk without first disconnecting the cables can create loops in your network topology. Data loops can result in broadcast storms and poor network performance.

To delete a port trunk from the switch, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 1.

The Layer 1 page opens with the Port Settings tab displayed by

default, as shown in Figure 203 on page 610.

3. Select the Port Trunking tab.

The Port Trunking tab is shown in Figure 210 on page 630.

4. Click the button next to the port trunk you want to delete and click

Remove.

The port trunk is deleted from the switch.

5. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 634

AT-S62 User’s Guide

Displaying the Port Trunks

To display the port trunks, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590

2. From the Monitoring menu, select the Layer 1 option.

The Layer 1 page is displayed with the Port Settings tab selected

by default, as shown in Figure 205 on page 616.

3. Select the Port Trunking tab.

The Port Trunking tab is shown in Figure 213.

Section VIII: Web Browser Management

Figure 213 Port Trunking Tab (Monitoring)

The tab displays the following information:

ID

The ID number of the trunk.

Name

The name of the trunk.

Type

The load distribution method:

❑ SA - Source MAC address (Layer 2)

❑ DA - Destination MAC address (Layer 2)

❑ SA/DA - Source/destination MAC address (Layer 2)

❑ SI - Source IP address (Layer 3)

635

Chapter 37: Port Trunking

❑ DI - Destination IP address (Layer 3)

❑ SI/DI - Source/destination IP address (Layer 3)

Ports

The ports of the trunk.

Section VIII: Web Browser Management 636

Chapter 38

Port Mirroring

This chapter contains the procedure for creating or deleting a port mirror. Sections in the chapter include:

❑ Creating a Port Mirror on page 638

❑ Modifying or Disabling a Port Mirror on page 641

❑ Deleting a Port Mirror on page 642

❑ Displaying the Port Mirror on page 643

Note

For background information on port mirroring, refer to Port

Mirroring Overview on page 137.

637

Chapter 38: Port Mirroring

Creating a Port Mirror

To create or delete a port mirror, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 1.

The Layer 1 page opens with the Port Settings tab displayed by

default, as shown in Figure 203 on page 610.

3. Select the Port Mirroring tab.

The Port Mirroring tab is shown in Figure 214.

Section VIII: Web Browser Management

Figure 214 Port Mirroring Tab (Configuration)

This tab displays any port mirror already existing on the switch.

The columns are defined below:

Mirror to Port

This is the destination port where the traffic will be copied to and where the network analyzer will be located. There can be only one destination port. A 0 (zero) in this column indicates there is no port mirror on the switch.

Ingress Port(s)

This column lists the source ports whose ingress traffic is mirrored to the destination port.

638

AT-S62 User’s Guide

Egress Port(s)

This column lists the source ports whose egress traffic is mirrored to the destination port.

Status

This column contains the status of the mirroring feature. If enabled, traffic is being copied to the destination port. If disabled, no traffic is being mirrored.

4. Click Modify.

The Modify Mirror page is shown in Figure 215.

Section VIII: Web Browser Management

Figure 215 Modify Mirror Page

5. Click the ports of the port mirror. Clicking a port toggles it through the possible settings, which are shown here:

The destination (mirror) port. There can be only one destination port.

A source port. The port’s ingress traffic will be mirrored to the destination port.

A source port. The port’s egress traffic will be mirrored to the destination port.

A source port. The port’s ingress and egress traffic will be mirrored to the destination port.

You can mirror one port, a few ports, or all of the ports on the switch, with the exception, of course, of the destination port.

639

Chapter 38: Port Mirroring

Figure 216 shows an example of the Modify Mirror page

configured for a port mirror. The egress traffic on Ports 11 and 12 is being mirrored to the destination Port 5.

Figure 216 Example of a Modify Mirror Page

6. After selecting the destination and source ports, click the Enable

Mirror check box.

7. Click Apply.

The port mirror is now active on the switch. You can connect a data analyzer to the destination port to monitor the traffic on the source ports.

8. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 640

AT-S62 User’s Guide

Modifying or Disabling a Port Mirror

To modify a port mirror, you perform the same procedure that you did to

create it, as explained in Creating a Port Mirror on page 638. But before

modifying it, you should first disable it using the Enable Mirror option in the Modify Mirror page. Once you have made the necessary modifications, enable the mirror again and click Apply.

To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 641

Chapter 38: Port Mirroring

Deleting a Port Mirror

To delete a port mirror so that you can use the destination port for

normal network operations, perform the procedure Creating a Port

Mirror on page 638. Disable the port mirror using the Enable Mirror

option and then click the destination port to change it from white to black. Once black, the port is available for normal network operations.

Then click Apply.

To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 642

AT-S62 User’s Guide

Displaying the Port Mirror

To display the port mirror, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590

2. From the Monitoring menu, select the Layer 1 option.

The Layer 1 page is displayed with the Port Settings tab selected

by default, as shown in Figure 205 on page 616.

3. Select the Port Mirroring tab.

The Port Mirroring tab is shown in Figure 217.

Section VIII: Web Browser Management

Figure 217 Port Mirroring Tab (Monitoring)

The information in the tab is described below:

Mirror to Port

The destination port where the traffic is copied to and where the network analyzer is located.

Ingress Port(s)

The source ports whose ingress traffic is mirrored to the destination port.

Egress Port(s)

The source ports whose egress traffic is mirrored to the destination port.

Status

The status of the mirroring feature. If enabled, traffic is being copied to the destination port. If disabled, no traffic is being mirrored.

643

Chapter 39

File Downloads and Uploads

This chapter contains the procedure for downloading a new AT-S62 image file onto the switch from a web browser management session.

This chapter also contains procedures for uploading and downloading system files, such as a boot configuration file, from the file system in the switch. This chapter contains the following section:

❑ Downloading a File on page 645

❑ Uploading a File on page 648

644

AT-S62 User’s Guide

Downloading a File

This procedure explains how to download a file from a TFTP server on your network to the switch using the web browser interface. You can download any of the following files:

❑ AT-S62 image file

❑ Boot configuration file

❑ Public key

❑ CA certificate

Note

The public key and CA certificate are only supported on the version of AT-S62 management software that features SSL, PKI, and SSH security.

Caution

Installing a new AT-S62 image file will invoke a switch reset. Some network traffic may be lost.

Note the following before you begin this procedure:

❑ You must use TFTP to download a file from a web browser management session.

❑ There must be a node on your network that contains the TFTP server software.

❑ The file that you are downloading must be stored on the TFTP server node.

❑ You should start the TFTP server before you begin the download procedure.

❑ The AT-S62 image file contains the bootloader for the switch. You cannot load the image file and bootloader separately.

❑ Installing a new AT-S62 software image does not change the current configuration of a switch (for instance, IP address, subnet mask, and virtual LANs). If you want to return a switch to its default

configuration values, refer to Returning the AT-S62 Software to the Factory Default Values on page 76.

❑ The switch on which you are downloading the file must have an IP address and subnet mask, such as a master switch of an enhanced stack. You cannot use TFTP on a slave switch, since that type of

Section VIII: Web Browser Management 645

Chapter 39: File Downloads and Uploads switch typically does not have an IP address. Rather, you would need to perform the download from a local management session of the switch using Xmodem or, alternatively, switch to switch. For

instructions, refer to Chapter 12, File Downloads and Uploads on page 160.

To download a file, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by default.

2. Select the System Utilities tab.

The System Utilities tab is shown in Figure 218.

Section VIII: Web Browser Management

Figure 218 System Utilities Tab

Note

The top portion of the tab is used to return the switch to its factory

default settings. For instructions, refer to Returning the AT-S62

Software to the Factory Default Values on page 596.

3. In the TFTP Server IP Address field, enter the IP address of the network node that contains the TFTP server software.

4. In the TFTP Operation field, click Download.

646

Section VIII: Web Browser Management

AT-S62 User’s Guide

5. In the TFTP Remote Filename field, enter the filename of the file on the TFTP server to be downloaded to the switch.

6. In the TFTP Local Filename field, enter a name for the file. This is the name that the switch will store the file as in its file system. If you are downloading the AT-S62 image file, enter “ats62.img” as the filename.

7. In the TFTP File Type, select one of the following:

❑ Image - Select this option if you are downloading the AT-S62 image file.

❑ Default Config - Select this option if you are downloading a configuration file and you want the file to be designated as the active boot configuration file.

❑ General - Select this option if you are downloading a CA certificate or a configuration file that you do not want designated as the active boot configuration file.

8. Click Apply.

The management software will notify you once the download is complete.

Caution

Once an AT-S62 switch image file has been downloaded, the switch must decompress it and write it to flash. This can require one to two minutes to complete. Do not reset or power off the unit while it is decompressing the file. Once the file has been decompressed, the switch automatically resets. Your web browser management session will be ended. To continue managing the switch, you must reestablish the management session.

647

Chapter 39: File Downloads and Uploads

Uploading a File

This procedure explains how to upload a file from the switch’s file system to a TFTP server on your network using the web browser interface. You can upload any of the following files:

❑ Boot configuration file

❑ Public encryption key

❑ CA certificate

❑ CA enrollment request

Note

The public key, CA certificate, and CA enrollment request are only supported on the version of AT-S62 management software that features SSL, PKI, and SSH security.

Note the following before you begin this procedure:

❑ You must use TFTP to upload a file using a web browser management session.

❑ There must be a node on your network that contains the TFTP server software.

❑ You should start the TFTP server before you begin the upload procedure.

❑ The switch from which you are uploading a file must have an IP address and subnet mask, such as a master switch of an enhanced stack. You cannot use TFTP on a slave switch, since that type of switch typically does not have an IP address. Rather, you would need to perform the upload from a local management session of

the switch using Xmodem. For instructions, refer to Chapter 12,

File Downloads and Uploads on page 160.

To upload a file, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by default.

2. Select the System Utilities tab.

The System Utilities tab is shown in Figure 218 on page 646.

Section VIII: Web Browser Management 648

AT-S62 User’s Guide

Note

The top portion of the tab is used to return the switch to its factory

default settings. For instructions, refer to Returning the AT-S62

Software to the Factory Default Values on page 596.

3. In the TFTP Server IP Address field, enter the IP address of the network node that contains the TFTP server software.

4. In the TFTP Operation field, click Upload.

5. In the TFTP Remote Filename field, enter a name for the file. This is the name that the file will be stored as on the TFTP server.

6. In the TFTP Local Filename field, enter the name of the file in the switch’s file system that you want to upload to the TFTP server.

Note

The TFTP File Type options are not used when uploading a file.

7. Click Apply.

The management software notifies you once the upload is complete.

Section VIII: Web Browser Management 649

Chapter 40

Event Log

This chapter describes the event log. Sections in the chapter include:

❑ Enabling or Disabling the Event Log on page 651

❑ Displaying Events on page 653

❑ Saving the Event Log on page 655

❑ Clearing the Event Log on page 656

Note

For background information on this feature, refer to Event Log

Overview on page 183.

650

AT-S62 User’s Guide

Enabling or Disabling the Event Log

Allied Telesyn recommends setting the switch’s date and time if you intend to use the event log. Otherwise, the switch will not log the entries

with the correct date and time. For instructions, refer to Setting the

System Time on page 67.

To enable or disable the event log, do the following:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the System page, select the Event Log tab.

The Event Log tab is shown in Figure 219.

Section VIII: Web Browser Management

Figure 219 Event Log Tab

651

Chapter 40: Event Log

3. For Status in Log Settings, click either Disable or Enable. If you enable the log, the system immediately begins to add events to the log. The default is enabled.

4. For Log Full Action, click either Wrap or Halt. The Wrap option causes the log to delete old entries as it adds new entries once it reaches its maximum capacity of 4,000 events. The Halt option causes the log to stop adding new entries once it reaches maximum capacity. The default is Wrap.

5. Click Apply.

6. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

To display the events in the log, go to the next procedure.

Section VIII: Web Browser Management

652

AT-S62 User’s Guide

Displaying Events

To view the event log, do the following:

1. From the Home Page, click either Configuration or Monitoring.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the System page, select the Event Log tab.

The Event Log tab is shown in Figure 219 on page 651.

3. Configure the following options:

Severity Selections

Displays events of a selected severity. Choices are I-Informational,

E-Error, W-Warning, D-Debug, and ALL for All. The default is informational, error, and warning. You can display more than one severity at a time by holding down the Shift key when making a selection.

Display Order

Controls the order of the events in the log. Choices are

Chronological, which displays the events in the order oldest to newest, and Reverse Chronological, which displays the events newest to oldest. The default is Chronological.

Mode

Controls the format of the event log. Choices are Normal, which displays the time, module, severity, and description for each event, and Full, which displays the same information as Normal, plus filename, line number, and event ID. The default is Normal.

Module Selections

Displays events of a selected AT-S62 module. For a list of the

modules, refer to Modules on page 187. The default is ALL, which

displays the events for all modules. You can display more than one module at a time by holding down the Shift key when making a selection.

4. Once you have set the log filters, click View.

Section VIII: Web Browser Management

653

Chapter 40: Event Log

Figure 220 shows an example of the event log in the Full display

mode. The Normal display mode does not include the Filename,

Line Number, and Event ID items.

Section VIII: Web Browser Management

Figure 220 Event Log Example

The columns in the log are described below:

❑ S (Severity) - The event’s severity. Table 6 on page 186 defines the

different severity levels.

❑ Date/Time - The date and time the event occurred.

❑ Event ID - A unique number that identifies the event. (Displayed only in the Full display mode.)

❑ Filename:Line - The subpart of the AT-S62 module and the line number that generated the event. (Displayed only in the Full display mode.)

❑ Event - The module within the AT-S62 software that generated the event followed by a brief description of the event. For a list of

the AT-S62 modules, see Modules on page 187.

654

AT-S62 User’s Guide

Saving the Event Log

You can save the event log as a file in the file system, from where you can view it or download it to your management workstation. To save the event log, do the following:

1. Perform steps 1 to 3 in Displaying Events on page 653. (To save an

event log, you must access the Event Log tab through Configuration and not Monitoring.)

2. In the Save Filename field, enter a name for the file. The name can be up to 16 alphanumeric characters, followed by a 3 letter extension.

The extension should be “.log”.

3. Click Save.

The event log is immediately saved to the file system. For

instructions on the AT-S62 file system, refer to Chapter 11, File

System.

Section VIII: Web Browser Management

655

Chapter 40: Event Log

Clearing the Event Log

To clear all events from the log, perform the following procedure:

1. From the Home Page, click Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the System page, select the Event Log tab.

The Event Log tab is shown in Figure 219 on page 651.

3. In Log Settings, click Clear Log.

4. Click Apply.

The log, if enabled, will immediately begin to learn new events.

Section VIII: Web Browser Management

656

Chapter 41

Quality of Service

This chapter contains instructions on how to configure Quality of Service

(QoS). This chapter contains the following procedure:

❑ Configuring CoS on page 658

❑ Mapping CoS Priorities to Egress Queues on page 661

❑ Configuring Egress Scheduling on page 663

❑ Displaying the CoS Settings on page 664

❑ Displaying QoS Scheduling on page 666

Note

For background information on QoS, refer to Quality of Service

Overview on page 192.

657

Chapter 41: Quality of Service

Configuring CoS

This procedure explains how to change the egress queue used to handle untagged ingress packets on a port. This procedure also overrides the priority levels in tagged ingress packets.

To configure CoS, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select the QoS option.

The QoS page is displayed with the CoS tab selected by default, as

shown in Figure 221.

Figure 221 CoS Tab

3. Click the port where you want to configure CoS. You can select more than one port at a time. A selected port turns white. (To deselect a port, click it again.)

4. Click Modify.

Section VIII: Web Browser Management 658

The CoS Setting for Port page is shown in Figure 222.

AT-S62 User’s Guide

Section VIII: Web Browser Management

Figure 222 CoS Setting for Port Page

5. Use the Priority list to select a value from Level 1 to Level 7 that corresponds to the egress queue where you want all untagged ingress frames received on the port to be stored. For example, if you select Level 4, all untagged packets received on the port will be stored in egress queue Q2 of the egress port. The default is Level 0, which corresponds to Q0. (If you perform Step 6 and override the priority level in tagged packets, the selected egress queue is also used to

store all tagged packets.) The default values are listed in Table 25.

Table 25 Default Mappings of Priority Levels to Priority Queues

Priority Level Egress Queue

Level 0 or 1

Level 2 or 3

Level 4 or 5

Level 6 or 7

Q0

Q1

Q2

Q3

6. If you are configuring a tagged port and you want the port to ignore the priority tag in egress tagged frames, click the Override Priority option. A check in the box indicates this feature is activated. All tagged frames will be directed to the egress queue specified in Step 6.

659

Chapter 41: Quality of Service

Note

The tagged information in a frame is not changed as the frame traverses the switch. A tagged frame exits the switch with the same priority level that it had when it entered.

The default for this parameter is No, meaning that the priority level of tagged frames is determined by the priority level specified in the frame itself.

7. Click Apply.

Configuration changes are immediately activated on the switch.

8. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 660

AT-S62 User’s Guide

Mapping CoS Priorities to Egress Queues

This procedure explains how to change the default mappings of CoS

priorities to egress priority queues, shown in Table 8, Default Mappings of IEEE 802.1p Priority Levels to Priority Queues on page 193. This is set

at the switch level.

To change the mappings, perform the following procedure.

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select the QoS option.

The QoS page is displayed with the CoS tab selected by default, as

shown in Figure 221 on page 658.

3. Select the Scheduling tab.

The Scheduling tab is shown in Figure 223.

Section VIII: Web Browser Management

Figure 223 QoS Scheduling Tab (Configuration)

661

Chapter 41: Quality of Service

Note

The Configure Egress Weights section in the tab is explained in the

next procedure, Configuring Egress Scheduling on page 663.

4. In the Configure CoS Queues to Egress Queues section of the tab, click the list for a CoS priority whose queue assignment you want to change and select the new queue.

For example, to direct all tagged packets with a CoS priority level of 5 to egress queue Q3, you would use the list in CoS 5 to PQ and select Q3 - QoS PriorityQ 3.

5. If desired, repeat Step 4 to change the egress queue assignments of other CoS priorities.

6. Click Apply.

7. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 662

AT-S62 User’s Guide

Configuring Egress Scheduling

This procedure explains how to select and configure a scheduling method for QoS. Scheduling determines the order in which the ports handle packets in their egress queues. For an explanation of the two

scheduling methods, refer to Scheduling on page 194. Scheduling is set

at the switch level. You cannot set this at the port level.

To change scheduling, perform the following procedure.

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select the QoS option.

The QoS page is displayed with the CoS tab selected by default, as

shown in Figure 221 on page 658.

3. Select the Scheduling tab.

The Scheduling tab is shown in Figure 223 on page 661.

Note

The Configure CoS Queues to Egress Queues section in the tab is

explained in the previous procedure Mapping CoS Priorities to

Egress Queues on page 661.

4. To select a scheduling method, click either Strict Priority or

Weighted Priority in the Configure Egress Weights section of the tab. The default is Strict Priority.

Skip the next step if you select Strict Priority. Queue weights do not apply to Strict Priority scheduling.

5. If you selected Weighted Priority, use the Queue # Weight fields to specify for each queue the number of packets you want a port to transmit before it goes to the next queue. For an example, refer to

Table 10 on page 195.

Leaving the default value of 1 for each queue results in all egress queues being given the same priority.

6. Click Apply.

7. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 663

Chapter 41: Quality of Service

Displaying the CoS Settings

To display the CoS settings, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590

2. From the Monitoring menu, select the QoS option.

The QoS page is displayed with the CoS tab selected by default, as

shown in Figure 224.

Figure 224 CoS Tab (Monitoring)

3. Click the port where you want to view the settings. You can select more than one port at a time. A selected port turns white. (To deselect a port, click it again.)

4. Click View. The CoS Setting for Port page is shown in Figure 225.

Section VIII: Web Browser Management

Figure 225 CoS Setting for Port Page

664

AT-S62 User’s Guide

The page displays the following information:

Port

The port number.

VLAN Id

The VLAN of which the port is a member.

Default Priority

The default priority level for this port.

Override Priority

Whether or not the default priority should be overridden.

Section VIII: Web Browser Management 665

Chapter 41: Quality of Service

Displaying QoS Scheduling

To display QoS scheduling, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590

2. From the Monitoring menu, select the QoS option.

The QoS page is displayed with the CoS tab selected by default, as

shown in Figure 224 on page 664.

3. Select the Scheduling tab.

The Scheduling tab is shown in Figure 226.

Section VIII: Web Browser Management

Figure 226 QoS Scheduling Tab (Monitoring)

The upper section displays the CoS priority to egress queue assignments. The lower half displays the egress weight settings.

For an explanation of the information in this window, refer to

Mapping CoS Priorities to Egress Queues on page 661 and

Configuring Egress Scheduling on page 663.

666

Chapter 42

IGMP Snooping

This chapter describes how to configure the IGMP snooping feature on the switch.

Sections in the chapter include:

❑ Configuring IGMP Snooping on page 668

❑ Displaying a List of Host Nodes and Multicast Routers on page 671

Note

For background information, refer to IGMP Snooping Overview on page 204.

667

Chapter 42: IGMP Snooping

Configuring IGMP Snooping

To configure IGMP snooping from a web browser management session, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586

2. Select the IGMP tab.

The IGMP tab is shown in Figure 227.

Section VIII: Web Browser Management

Figure 227 IGMP Tab (Configuration)

3. Adjust the IGMP parameters as necessary.

The parameters are explained below:

Enable IGMP Snooping Status

Enables and disables IGMP snooping on the switch. A check in the box indicates that IGMP is enabled.

Multicast Host Topology

Defines whether there is only one host node per switch port or multiple host nodes per port. Possible settings are Edge (Single-

Host/Port) and Intermediate (Multi-Host/Port).

The Edge (Single-Host/Port) setting is appropriate when there is only one host node connected to each port on the switch. This setting causes the switch to immediately stop sending multicast packets out a switch port when a host node signals its desire to leave a multicast group by sending a leave request or when the

668

Section VIII: Web Browser Management

AT-S62 User’s Guide host node stops sending reports and times-out. The switch forwards the leave request to the router and simultaneously ceases transmission of any further multicast packets out the port where the host node is connected.

The Intermediate (Multi-Host) setting is appropriate if there is more than one host node connected to a switch port, such as when a port is connected to an Ethernet hub to which multiple host nodes are connected. With this setting selected the switch continues sending multicast packets out a port even after it receives a leave request from a host node on the port. This ensures that the remaining active host nodes on the port will continue to receive the multicast packets. Only after all of the host nodes connected to a switch port have transmitted leave requests

(or have timed out) will the switch stop sending multicast packets out the port.

If a switch has a mixture of host nodes, that is, some connected directly to the switch and others through an Ethernet hub, you should select the Intermediate Multi-Host Port selection.

Multicast Router Ports Mode

Specifies whether the router ports will be determined automatically or if you will enter them manually. If you want the switch to determine the ports automatically, select Auto-Detect, which is the default. To enter them yourself, click Manual Select and enter the ports in the field.

Host/Router Timeout Interval

Specifies the time period in seconds after which the switch determines that a host node has become inactive. An inactive host node is a node that has not sent an IGMP report during the specified time interval. The range is from 1 second to 86,400 seconds (24 hours). The default is 260 seconds.

This parameter also specifies the time interval used by the switch in determining whether a multicast router is still active. The switch makes the determination by watching for queries from the router.

If the switch does not detect any queries from a multicast router during the specified time interval, it assumes that the router is no longer active on the port.

Maximum Multicast Groups

Specifies the maximum number of multicast groups the switch will learn. The range is 1 to 2048 groups. The default is 256 multicast groups.

669

Chapter 42: IGMP Snooping

This parameter is useful with networks that contain a large number of multicast groups. You can use the parameter to prevent the switch’s MAC address table from filling up with multicast addresses, leaving no room for dynamic or static MAC addresses. The range is 1 address to 2048 addresses. The default is

256 multicast addresses.

4. After setting the IGMP snooping parameters, click Apply.

5. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 670

AT-S62 User’s Guide

Displaying a List of Host Nodes and Multicast Routers

You can use the AT-S62 software to display a list of the multicast groups on a switch, as well as the host nodes. You can also view the multicast routers. A multicast router is a router that is receiving multicast packets from a multicast application and transmitting the packets to host nodes.

To view host nodes and multicast routers, perform the following procedure:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. Select the IGMP tab.

The IGMP tab is shown in Figure 228.

Section VIII: Web Browser Management

Figure 228 IGMP Tab (Monitoring)

For an explanation of the information in this tab, refer to the previous procedure.

3. To view the multicast addresses and the host nodes, click View

Multicast Host List and then click View. To view the multicast routers, click View Multicast Router List and then click View.

Viewing a list of host nodes opens a page containing the following information. The information in the page is for viewing purposes only.

Multicast Group

The multicast address of the group.

671

Chapter 42: IGMP Snooping

VLAN ID

The VID of the VLAN in which the port is an untagged member.

Member Port

The port(s) on the switch to which one or more host nodes of the multicast group are connected.

Host IP

The IP address(es) of the host node(s) connected to the port.

Status

The status of the host node. Status can be:

❑ Active - The host node is an active member of the group.

❑ Left Group - The host node recently left the group.

Viewing a list of multicast routers displays a page containing the following information. The information in the page is for viewing purposes only.

Port

The port on the switch where the multicast router is connected.

VLAN ID

The VID of the VLAN in which the port is an untagged member.

Router IP

The IP address of the port on the router.

Section VIII: Web Browser Management 672

Chapter 43

Denial of Service Defense

This chapter contains instructions on how to configure the Denial of

Service defense feature on the switch. The sections include:

❑ Configuring Denial of Service Attack Defense on page 674

❑ Displaying the DoS Settings on page 677

Note

For background information, refer to Denial of Service Defense

Overview on page 213. Be sure to read the overview before

implementing a DoS defense on a switch. Some defense mechanisms are CPU intensive and can impact switch behavior.

673

Chapter 43: Denial of Service Defense

Configuring Denial of Service Attack Defense

To configure the ports on the switch for a Denial of Service defense, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Security.

The Security page is displayed with the 802.1x Port Access tab

selected by default, as shown in Figure 283 on page 786.

3. Select the DoS tab.

The DoS tab is shown in Figure 229.

Section VIII: Web Browser Management

Figure 229 DoS Tab

4. If you are implementing the SMURF or Land defense, you must provide an IP address and mask for your LAN. To accomplish this, do the following steps. Otherwise, skip ahead to Step 5.

a. In the DoS LAN Subnet IP field, enter the IP address of one of the devices connected to the switch, preferably the lowest IP address.

674

AT-S62 User’s Guide b. In the DoS Subnet Mask field, enter the LAN’s mask. A binary “1” indicates the switch should filter on the corresponding bit of the

IP address, while a “0” indicates that it should not. As an example, assume that the devices connected to a switch are using the IP address range 149.11.11.1 to 149.11.11.50. The mask would be

0.0.0.63.

c. If you are activating the Land defense, in the DoS Uplink Port field enter the number of the port connected to the device (e.g., DSL router) that leads outside your network. You can specify only one uplink port.

5. Click the ports in the switch image where you want to enable or disable a defense mechanism. A selected port turns white. To deselect a port, click it again. You can select more than one port at a time.

6. Using the DoS Type list, select the Denial of Service defense you want to either enable or disable on the ports. Your choices are:

❑ Syn Flood attack

❑ Smurf attack

❑ Land attack

❑ Tear drop attack

❑ Ping of death attack

❑ IP Options

7. Click Modify. To configure all the ports, click Modify All.

The DoS Configuration page opens, as shown in Figure 230.

Section VIII: Web Browser Management

Figure 230 DoS Configuration Page

675

Chapter 43: Denial of Service Defense

8. Adjust the settings as needed. The parameters are described below.

Status

Enables or disables the DoS on the selected ports.

Mirror Port

This option applies to Land, Tear Drop, Ping of Death, and IP

Options. You can use this option to copy invalid traffic to another port on the switch. You can specify only one mirror port.

Specifying a mirror port is not required.

9. Click Apply.

The defense is immediately activated or deactivated on the ports.

10. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 676

AT-S62 User’s Guide

Displaying the DoS Settings

To display the DoS settings, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590

2. From the Monitoring menu, select the Security option.

The Security page opens with the 802.1x Port Access tab selected

by default, as shown in Figure 287 on page 795.

3. Select the DoS tab.

The DoS tab is shown in Figure 231.

Section VIII: Web Browser Management

Figure 231 DoS Tab (Monitoring)

4. Click the port whose DoS settings you want to view. You can select more than one port at a time.

5. Using the DoS Type list, select the type of Denial of Service defense whose settings you want to view.

6. Click View.

677

Chapter 44

SNMPv3 Protocol

This chapter provides the following procedures for configuring basic switch parameters using a web browser management session:

❑ Configuring the SNMPv3 Protocol on page 679

❑ Enabling the SNMP Protocol on page 680

❑ Configuring the SNMPv3 User Table on page 683

❑ Configuring the SNMPv3 View Table on page 690

❑ Configuring the SNMPv3 Access Table on page 696

❑ Configuring the SNMPv3 SecurityToGroup Table on page 703

❑ Configuring the SNMPv3 Notify Table on page 708

❑ Configuring the SNMPv3 Target Address Table on page 713

❑ Configuring the SNMPv3 Target Parameters Table on page 720

❑ Configuring the SNMPv3 Community Table on page 727

❑ Displaying SNMPv3 Tables on page 733

678

AT-S62 User’s Guide

Configuring the SNMPv3 Protocol

To configure the SNMPv3 protocol, you need to configure the SNMPv3 tables. To enable a manager to access the SNMPv3 protocol on the switch, you need to enable the SNMP protocol. See the following procedures:

❑ Enabling the SNMP Protocol on page 680

❑ Configuring the SNMPv3 User Table on page 683

❑ Configuring the SNMPv3 View Table on page 690

❑ Configuring the SNMPv3 Access Table on page 696

❑ Configuring the SNMPv3 SecurityToGroup Table on page 703

❑ Configuring the SNMPv3 Notify Table on page 708

❑ Configuring the SNMPv3 Target Address Table on page 713

❑ Configuring the SNMPv3 Target Parameters Table on page 720

❑ Configuring the SNMPv3 Community Table on page 727

Note

Use the SNMPv3 Community Table only if you are configuring the

SNMPv3 protocol with the SNMPv1 or an SNMPv2c protocol. Allied

Telesyn does not recommend this configuration.

For reference information about the SNMPv3 protocol, see Chapter 17:

SNMPv3 Configuration on page 222.

Section VIII: Web Browser Management 679

Chapter 44: SNMPv3 Protocol

Enabling the SNMP Protocol

In order to allow an NMS (an SNMP manager) to access the switch, you need to enable SNMP access. In addition, to allow the switch to send a trap when it receives a request message, you need to enable authentication failure traps. This section provides a procedure to accomplish both of these tasks.

To enable SNMP access and authentication failure traps, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

Section VIII: Web Browser Management 680

The SNMP Tab is shown in Figure 232.

AT-S62 User’s Guide

Section VIII: Web Browser Management

Figure 232 Configuration System Page, SNMP Tab

3. To enable SNMP Access, click the box next to Enable SNMP Access.

Use this parameter to enable the switch to be remotely managed with an SNMP application program.

Note

If the check box in the Enable SNMP Access box is empty, the switch cannot be managed through SNMP. This is the default.

4. To enable authentication failure traps to be sent on behalf of the switch, click the box next to Enable Authentication Failure Trap.

681

Chapter 44: SNMPv3 Protocol

5. Click Apply to update the User Table.

6. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 682

AT-S62 User’s Guide

Configuring the SNMPv3 User Table

You can create, delete, and modify an SNMPv3 User Table entry. See the following procedures:

❑ Creating a User Table Entry on page 683

❑ Deleting a User Table Entry on page 686

❑ Modifying a User Table Entry on page 686

For reference information about the SNMPv3 User Table, see

Configuring the SNMPv3 User Table on page 234.

Creating a User

Table Entry

To create an entry in the SNMPv3 User Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

User Table. Then click Configure at the bottom of the page.

The SNMPv3 User Table Page is shown in Figure 233.

Section VIII: Web Browser Management

Figure 233 SNMPv3 User Table Page

683

Chapter 44: SNMPv3 Protocol

4. Click the Add button to add a new SNMPv3 User Table entry.

The Add New SNMPv3 User Page is shown in Figure 234

Section VIII: Web Browser Management

Figure 234 Add New SNMPv3 User Page

5. In the User Name field, enter a name, or logon id, that consists of up to 32 alphanumeric characters

6. In the Authentication Protocol field, enter an authentication protocol.

This is an optional parameter.

Select one of the following:

MD5

This value represents the MD5 authentication protocol. With this selection, users are authenticated with the MD5 authentication protocol after a message is received. With this selection, you can configure a Privacy Protocol.

SHA

This value represents the SHA authentication protocol. With this selection, users are authenticated with the SHA authentication protocol after a message is received. With this selection, you can configure a Privacy Protocol.

None

This value represents no authentication protocol. When messages are received, users are not authenticated. With the None selection, you cannot configure a Privacy Protocol.

7. In the Authentication Password field, enter an authentication password of up to 32 alphanumeric characters.

684

Section VIII: Web Browser Management

AT-S62 User’s Guide

8. In the Confirm Authentication Password field, re-enter the authentication password.

Note

If you have the AT-S60 software version 2.1.0 that does not contain the encryption features, then the Privacy Protocol field is read-only field and it is set to None.

Note

You can only configure the Privacy Protocol if you have configured the Authentication Protocol with the MD5 or SHA values.

9. In the Privacy Protocol field, enter one of the following options:

DES

Select this value to make the DES privacy (or encryption) protocol the privacy protocol for this User Table entry. With this selection, messages transmitted between the host and the switch are encrypted with the DES protocol.

None

Select this value if you do not want a privacy protocol for this User

Table entry. With this selection, messages transmitted between the host and the switch are not encrypted.

10. In the Privacy Password field, enter a privacy password of up to 32 alphanumeric characters.

11. In the Confirm Privacy Password field, re-enter the privacy password.

12. In the Storage Type field, enter one of the following storage options for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the User Table to the configuration file. After making changes to an User Table entry with a Volatile storage type, Save

Changes does not appear on the General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the User Table to the configuration file. After making changes to an User Table entry with a NonVolatile storage type, Save

Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 User Table entry takes effect immediately.

685

Chapter 44: SNMPv3 Protocol

Deleting a User

Table Entry

To delete an entry in the SNMPv3 User Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

User Table. Then click Configure.

The SNMPv3 User Table Page is shown in Figure 233 on page 683.

4. Click the circle next to the User Table entry that you want to delete.

Then click Remove.

A warning message is displayed. Click OK to remove the User

Table entry.

5. To save your changes, return to the General Tab and click Save

Changes.

Modifying a

User Table

Entry

13. Click Apply to update the SNMPv3 User Table.

14. To save your changes, return to the General Tab and click Save

Changes.

To modify an entry SNMPv3 User Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

User Table. Then click Configure.

The SNMPv3 User Table Page is shown in Figure 233 on page 683.

4. To modify an SNMPv3 User Table entry, click the circle next to the

SNMPv3 user that you want to change. Then click Modify.

Section VIII: Web Browser Management 686

The Modify SNMPv3 User Page is shown in Figure 235.

AT-S62 User’s Guide

Section VIII: Web Browser Management

Figure 235 Modify SNMPv3 User Page

5. In the Authentication Protocol field, enter an authentication protocol.

This is an optional parameter.

Select one of the following:

MD5

This value represents the MD5 authentication protocol. With this selection, users are authenticated with the MD5 authentication protocol after a message is received. With this selection, you can configure a Privacy Protocol.

SHA

This value represents the SHA authentication protocol. With this selection, users are authenticated with the SHA authentication protocol after a message is received. With this selection, you can configure a Privacy Protocol.

None

This value represents no authentication protocol. When messages are received, users are not authenticated. With the None selection, you cannot configure a Privacy Protocol.

Note

When you change the Authentication Protocol field, you must reenter the authentication password. In addition, if the Privacy

Protocol is set to DES and you change Authentication Protocol, then you must reenter the Privacy Password.

687

Chapter 44: SNMPv3 Protocol

6. In the Authentication Password field, enter an authentication password of up to 32 alphanumeric characters.

7. In the Confirm Authentication Password field, re-enter the authentication password.

Note

If you have the AT-S60 software version 2.1.0 that does not contain the encryption features, then the Privacy Protocol field is read-only field and it is set to None.

Note

You can only configure the Privacy Protocol if you have configured the Authentication Protocol with the MD5 or SHA values.

8. In the Privacy Protocol field, enter one of the following options:

DES

Select this value to make the DES privacy (or encryption) protocol the privacy protocol for this User Table entry. With this selection, messages transmitted between the host and the switch are encrypted with the DES protocol.

None

Select this value if you do not want a privacy protocol for this User

Table entry. With this selection, messages transmitted between the host and the switch are not encrypted.

9. In the Privacy Password field, enter a privacy password of up to 32 alphanumeric characters.

10. In the Confirm Privacy Password field, re-enter the privacy password.

11. In the Storage Type field, enter one of the following storage options for this User Table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 User Table to the configuration file. After making changes to an SNMPv3 User Table entry with a Volatile storage type, Save Changes does not appear on the General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 User Table to the configuration file. After making changes to an SNMPv3 User Table entry with a NonVolatile storage type, Save Changes appears on the General Tab.

Section VIII: Web Browser Management 688

AT-S62 User’s Guide

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 User Table entry takes effect immediately.

12. Click Apply to update the SNMPv3 User Table.

13. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 689

Chapter 44: SNMPv3 Protocol

Configuring the SNMPv3 View Table

You can create, delete, and modify an SNMPv3 View Table entry. See the following procedures:

❑ Creating a View Table Entry on page 690

❑ Deleting a View Table Entry on page 693

❑ Modifying a View Table Entry on page 694

For reference information about the SNMPv3 View Table, see

Configuring the SNMPv3 View Table on page 690.

Creating a View

Table Entry

To create an entry in the SNMPv3 View Table entry, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

View Table. Then click Configure at the bottom of the page.

The SNMPv3 View Table Page is shown in Figure 236.

Section VIII: Web Browser Management

Figure 236 SNMPv3 View Table Page

690

AT-S62 User’s Guide

4. To create a new SNMPv3 View Table entry click Add.

The Add New SNMPv3 View Page is shown in Figure 237.

Section VIII: Web Browser Management

Figure 237 Add New SNMPv3 View Page

5. In the View Name field, enter a descriptive name of this view.

Assign a name that reflects the subtree OID, for example,

“internet.” Enter a unique name of up to 32 alphanumeric characters.

Note

The “defaultViewAll” value is the default entry for the SNMPv1 and

SNMPv2c configuration. You cannot use the default value for an

SNMPv3 View Table entry.

6. In the Subtree OID field, enter a subtree that this view will or will not be permitted to display.

You can enter either a numeric value in hex format or the equivalent text name. For example, the OID hex format for TCP/IP is:

1.3.6.1.2.1.6

The text format is for TCP/IP is: tcp

7. In the Subtree Mask field, enter a subtree mask in hexidecimal format.

This is an optional parameter that is used to further refine the value in the View Subtree parameter. This parameter is in binary format.

691

Chapter 44: SNMPv3 Protocol

The View Subtree parameter defines a MIB View and the Subtree

Mask further restricts a user’s view, for example, to a specific row of the MIB tree. The value of the Subnet Mask parameter is dependent on the subtree you select. See RFC 2575 for detailed information about defining a subnet mask.

8. In the View Type field, enter one of the following view types:

Included

Enter this value to permit the user to see the subtree specified above.

Excluded

Enter this value to not permit the user to see the subtree specified above.

9. In the Storage Type field, enter a storage type for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the View Table to the configuration file. After making changes to a View Table entry with a Volatile storage type, Save

Changes does not appear on the General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the View Table to the configuration file. After making changes to a View Table entry with a NonVolatile storage type, Save Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 View Table entry takes effect immediately.

10. Click Apply to update the SNMPv3 View Table.

11. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 692

AT-S62 User’s Guide

Deleting a View

Table Entry

To delete an entry in the SNMPv3 View Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

View Table. Then click Configure.

4. The SNMPv3 View Table Page is shown in Figure 236 on page 690.

5. Click the circle next to the View Table entry that you want to delete.

Then click Remove.

A warning message is displayed. Click OK to remove the View

Table entry.

6. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 693

Chapter 44: SNMPv3 Protocol

Modifying a

View Table

Entry

To modify an entry in the SNMPv3 View Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

View Table. Then click Configure at the bottom of the page.

The SNMPv3 View Table Page is shown in Figure 236 on page 690.

4. To modify an SNMPv3 View Table entry, click the circle next to the

SNMPv3 View Table entry that you want to change. Then click

Modify.

The Modify SNMPv3 View Page is shown in Figure 238.

Section VIII: Web Browser Management

Figure 238 Modify SNMPv3 View Page

5. In the Subtree Mask field, enter a subtree mask in hexidecimal format.

This is an optional parameter that is used to further refine the value in the View Subtree parameter. This parameter is in binary format.

The View Subtree parameter defines a MIB View and the Subtree

Mask further restricts a user’s view, for example, to a specific row of the MIB tree. The value of the Subnet Mask parameter is dependent on the subtree you select. See RFC 2575 for detailed information about defining a subnet mask.

694

Section VIII: Web Browser Management

AT-S62 User’s Guide

6. In the View Type field, enter one of the following view types:

Included

Enter this value to permit the View Name to see the subtree specified above.

Excluded

Enter this value to not permit the View Name to see the subtree specified above.

7. In the Storage Type field, enter a storage type for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Target Parameters Table to the configuration file.

After making changes to an Target Parameters Table entry with a

Volatile storage type, Save Changes does not appear on the

General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the View Table to the configuration file. After making changes to a View Table entry with a NonVolatile storage type, Save Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the web interface.

The Active value indicates the SNMPv3 View Table entry takes effect immediately.

8. Click Apply to update the SNMPv3 View Table.

9. To save your changes, return to the General Tab and click Save

Changes.

695

Chapter 44: SNMPv3 Protocol

Configuring the SNMPv3 Access Table

You can create, delete, and modify an SNMPv3 Access Table entry. See the following procedures:

❑ Creating an Access Table on page 696

❑ Deleting an Access Table Entry on page 700

❑ Modifying an Access Table Entry on page 701

For reference information about the SNMPv3 Access Table, see

Configuring the SNMPv3 Access Table on page 696.

Creating an

Access Table

To create an entry in the SNMPv3 Access Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Access Table. Then click Configure at the bottom of the page.

Section VIII: Web Browser Management 696

The SNMPv3 Access Table Page is shown in Figure 239.

AT-S62 User’s Guide

Figure 239 SNMPv3 Access Table Page

4. To create an SNMPv3 Access Table entry, click Add.

The Add New SNMPv3 Access Page is shown in Figure 240.

Section VIII: Web Browser Management

Figure 240 Add New SNMPv3 Access Page

697

Chapter 44: SNMPv3 Protocol

Section VIII: Web Browser Management

5. In the Group Name field, enter a descriptive name of the group.

The Group Name can consist of up to 32 alphanumeric characters.

You are not required to enter a unique value here because the

SNMPv3 Access Table entry is indexed with the Group Name,

Security Model, and Security Level parameter values. However, a unique group name makes it easier for you to tell the groups apart.

There are four default values for this field that are reserved for

SNMPv1 and SNMPv2c implementations:

❑ defaultV1GroupReadOnly

❑ defaultV1GroupReadWrite

❑ defaultV2cGroupReadOnly

❑ defaultV2cGroupReadWrite

Note

The Context Prefix field is a read only field. The Context Prefix field is always set to null.

6. In the Read View Name field, enter a value that you configured with the View Name parameter in the SNMPv3 View Table.

This parameter allows the users assigned to this Group Name to view the information specified by the View Table entry. This value does not need to be unique.

7. In the Write View Name field, enter a value that you configured with the View Name parameter in the SNMPv3 View Table.

This parameter allows the users assigned to this Security Group to write, or modify, the information in the specified View Table. This value does not need to be unique.

8. In the Notify View Name field, enter a value that you configured with the View Name parameter in the SNMPv3 View Table.

This parameter allows the users assigned to this Group Name to send traps permitted in the specified View. This value does not need to be unique.

9. In the Security Model field, enter an SNMP protocol.

Select one of the following SNMP protocols as the Security Model for this Group Name.

v1

Select this value to associate the Group Name with the SNMPv1 protocol.

698

Section VIII: Web Browser Management

AT-S62 User’s Guide

v2c

Select this value to associate the Group Name with the SNMPv2c protocol.

v3

Select this value to associate the Group Name with the SNMPv3 protocol.

10. In the Security Level field, enter a security level.

Select one of the following security levels:

No Authentication/Privacy

This option represents neither an authentication nor privacy protocol. Select this security level if you do not want to authenticate users and you do not want to encrypt messages using a privacy protocol. This option provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c,

NoAuthenticationNoPrivacy is the only security level you can select.

Authentication

This option permits an authentication protocol, but not a privacy protocol. Select this security level if you want to authenticate

SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the

Security Model parameter with the SNMPv3 protocol.

Privacy

This option represents authentication and the privacy protocol.

Select this security level to allow authentication and encryption.

This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

Note

The Context Match field is a read only field. The Context Match field is always set to Exact.

11. In the Storage Type field, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Access Table to the configuration file. After making changes to an Access Table entry with a Volatile storage type,

Save Changes does not appear on the General Tab.

699

Chapter 44: SNMPv3 Protocol

NonVolatile

Select this storage type if you want the ability to save an entry in the Access Table to the configuration file. After making changes to an Access Table entry with a NonVolatile storage type, Save

Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 Access Table entry will take effect immediately.

12. Click Apply to update the SNMPv3 Access Table.

13. To save your changes, return to the General Tab and click Save

Changes.

Deleting an

Access Table

Entry

To delete an entry in the SNMPv3 Access Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Access Table. Then click Configure at the bottom of the page.

The SNMPv3 Access Table Page is shown in Figure 239 on page

697.

4. Display the Access Table entry that you want to delete.

Click Next or Previous to display an entry.

5. Click Remove.

A warning message is displayed. Click OK to remove the Access

Table entry.

6. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 700

AT-S62 User’s Guide

Modifying an

Access Table

Entry

To modify an entry in the SNMPv3 Access Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Access Table. Then click Configure at the bottom of the page.

The SNMPv3 Access Table Page is shown in Figure 239 on page

697.

4. Display the Access Table entry that you want to change.

Click Next or Previous to display an entry.

5. Click Modify.

The Modify SNMPv3 Access Page is shown in Figure 241.

Section VIII: Web Browser Management

Figure 241 Modify SNMPv3 Access Page

Note

The Context Prefix field is a read-only field. The Context Prefix field is always set to null.

6. In the Read View Name field, enter a value that you configured with the View Name parameter in the View Table.

701

Chapter 44: SNMPv3 Protocol

This parameter allows the users assigned to this Group Name to view the information specified by the View Table entry. This value does not need to be unique.

7. In the Write View Name field, enter a value that you configured with the View Name parameter in the View Table.

This parameter allows the users assigned to this Security Group to write, or modify, the information in the specified View Table. This value does not need to be unique.

8. In the Notify View Name field, enter a value that you configured with the View Name parameter in the View Table.

This parameter allows the users assigned to this Group Name to send traps permitted in the specified View. This value does not need to be unique.

Note

The Context Match field is a read only field. The Context Match field is always set to Exact.

9. In the Storage Type field, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Access Table to the configuration file. After making changes to an Access Table entry with a Volatile storage type,

Save Changes does not appear on the General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the Access Table to the configuration file. After making changes to an Access Table entry with a NonVolatile storage type, Save

Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the Access Table entry takes effect immediately.

10. Click Apply to update the SNMPv3 Access Table.

11. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 702

AT-S62 User’s Guide

Configuring the SNMPv3 SecurityToGroup Table

Creating a

SecurityToGroup

Table Entry

You can create, delete, and modify an SNMPv3 SecurityToGroup Table entry. See the following procedures:

❑ Creating a SecurityToGroup Table Entry on page 703

❑ Deleting a SecurityToGroup Table Entry on page 705

❑ Modifying a SecurityToGroup Table Entry on page 706

For reference information about the SNMPv3Configuring the SNMPv3

SecurityToGroup Table on page 703.

To create an entry in the SNMPv3 SecurityToGroup Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

SecurityToGroup Table. Then click Configure at the bottom of the page.

The SNMPv3 SecurityToGroup Table Page is shown in Figure 242.

Section VIII: Web Browser Management

Figure 242 SNMPv3 SecurityToGroup Table Page

703

Chapter 44: SNMPv3 Protocol

4. To create an SNMPv3 SecurityToGroup Table entry, click Add.

The Add New SNMPv3 SecurityToGroup Page is shown in Figure

243.

Section VIII: Web Browser Management

Figure 243 Add New SNMPv3 SecurityToGroup Page

5. In the Security Model field, select the SNMP protocol that was configured for this User Name.

Choose from the following:

v1

Select this value to associate the User Name with the SNMPv1 protocol.

v2c

Select this value to associate the User Name with the SNMPv2c protocol.

v3

Select this value to associate the User Name with the SNMPv3 protocol.

6. In the Security Name field, enter the User Name that you want to associate with a group.

Enter a User Name that you configured in Creating a User Table

Entry on page 683.

7. In the Group Name field, enter a Group Name that you configured in the Access Table.

See Creating an Access Table on page 696.

704

AT-S62 User’s Guide

There are four default values for this field that are reserved for

SNMPv1 and SNMPv2c implementations:

❑ defaultV1GroupReadOnly

❑ defaultV1GroupReadWrite

❑ defaultV2cGroupReadOnly

❑ defaultV2cGroupReadWrite

8. In the Storage Type field, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the SecurityToGroup Table to the configuration file. After making changes to a SecurityToGroup Table entry with a Volatile storage type, Save Changes does not appear on the General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the SecurityToGroup Table to the configuration file. After making changes to a SecurityToGroup Table entry with a NonVolatile storage type, Save Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 SecurityToGroup Table entry takes effect immediately.

Deleting a

SecurityToGroup

Table Entry

9. Click Apply to update the SNMPv3 SecurityToGroup Table.

10. To save your changes, return to the General Tab and click Save

Changes.

To delete an entry SNMPv3 SecurityToGroup Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

SecurityToGroup Table. Then click Configure at the bottom of the page.

Section VIII: Web Browser Management 705

Chapter 44: SNMPv3 Protocol

Modifying a

SecurityToGroup

Table Entry

The SNMPv3 SecurityToGroup Table Page is shown in Figure 242 on page 703.

4. Click the circle next to the SecurityToGroup Table entry that you want to delete. Then click Remove.

A warning message is displayed. Click OK to remove the SNMPv3

SecurityToGroup Table entry.

5. To save your changes, return to the General Tab and click Save

Changes.

To modify an entry SNMPv3 SecurityToGroup Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

SecurityToGroup Table. Then click Configure at the bottom of the page.

The SNMPv3 SecurityToGroup Table Page is shown in Figure 242 on page 703.

4. Click the circle next to the SecurityToGroup Table entry that you want to change. Then click Modify.

The Modify SNMPv3 SecurityToGroup Page is shown in Figure

244.

Section VIII: Web Browser Management

Figure 244 Modify SNMPv3 SecurityToGroup Page

706

Section VIII: Web Browser Management

AT-S62 User’s Guide

5. In the Group Name field, enter a Group Name that you configured in the SNMPv3 Access Table.

See Creating an Access Table on page 696.

There are four default values for this field that are reserved for

SNMPv1 and SNMPv2c implementations:

❑ defaultV1GroupReadOnly

❑ defaultV1GroupReadWrite

❑ defaultV2cGroupReadOnly

❑ defaultV2cGroupReadWrite

6. In the Storage Type field, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the SecurityToGroup Table to the configuration file. After making changes to a SecurityToGroup Table entry with a Volatile storage type, Save Changes does not appear on the General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the SecurityToGroup Table to the configuration file. After making changes to a SecurityToGroup Table entry with a NonVolatile storage type, Save Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 SecurityToGroup Table entry takes effect immediately.

7. Click Apply to update the SNMPv3 SecurityToGroup Table.

8. To save your changes, return to the General Tab and click Save

Changes.

707

Chapter 44: SNMPv3 Protocol

Configuring the SNMPv3 Notify Table

You can create, delete, and modify an SNMPv3 Notify Table entry. See the following procedures:

❑ Creating a Notify Table Entry on page 708

❑ Deleting a Notify Table Entry on page 710

❑ Modifying a Notify Table Entry on page 711

For reference information about the SNMPv3 Notify Table, see

Configuring the SNMPv3 Notify Table on page 708.

Creating a

Notify Table

Entry

To create an entry in the SNMPv3 Notify Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Notify Table. Then click Configure at the bottom of the page.

The SNMPv3 Notify Table Page is shown in Figure 245.

Section VIII: Web Browser Management

Figure 245 SNMPv3 Notify Table Page

708

AT-S62 User’s Guide

4. To create an SNMPv3 Notify Table entry, click Add.

The Add New SNMPv3 Notify Page is shown in Figure 246.

Section VIII: Web Browser Management

Figure 246 Add New SNMPv3 Notify Page

5. In the Notify Name field, enter the name associated with this trap message.

Enter a descriptive name of up to 32 alphanumeric characters. For example, you might want to define a trap message for hardware engineering and enter a value of “hardwareengineeringtrap” for the Notify Name.

6. In the Notify Tag field, enter a description name of the Notify Tag.

Enter a name of up to 32 alphanumeric characters.

7. In the Notify Type field, enter one of the following message types:

Trap

Indicates this notify table is used to send traps. With this message type, the switch does not expects a response from the host.

Inform

Indicates this notify table is used to send inform messages. With this message type, the switch expects a response from the host.

8. In the Storage Type field, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Notify Table to the configuration file. After making changes to a Notify Table entry with a Volatile storage type, Save

Changes does not appear on the General Tab.

709

Chapter 44: SNMPv3 Protocol

NonVolatile

Select this storage type if you want the ability to save an entry in the Notify Table to the configuration file. After making changes to a Notify Table entry with a NonVolatile storage type, Save

Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 Notify Table entry takes effect immediately.

9. Click Apply to update the SNMPv3 Notify Table.

10. To save your changes, return to the General Tab and click Save

Changes.

Deleting a

Notify Table

Entry

To delete an entry in the SNMPv3 Notify Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Notify Table. Then click Configure at the bottom of the page.

The SNMPv3 Notify Table Page is shown in Figure 245 on page

708.

4. Click the circle next to the Notify Table entry that you want to delete.

Then click Remove.

A warning message is displayed. Click OK to remove the SNMPv3

Notify Table entry.

5. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 710

AT-S62 User’s Guide

Modifying a

Notify Table

Entry

To modify an entry in the SNMPv3 Notify Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Notify Table. Then click Configure at the bottom of the page.

The SNMPv3 Notify Table Page is shown in Figure 245 on page

708.

4. Click the circle next to the table entry that you want to change. Then click Modify.

The Modify SNMPv3 Notify Page is shown in Figure 247

Section VIII: Web Browser Management

Figure 247 Modify SNMPv3 Notify Page

5. In the Notify Tag field, enter a description name of the Notify Tag.

Enter a name of up to 32 alphanumeric characters.

6. In the Notify Type field, enter one of the following message types:

Trap

Indicates this notify table is used to send traps. With this message type, the switch does not expects a response from the host.

Inform

Indicates this notify table is used to send inform messages. With this message type, the switch expects a response from the host.

711

Chapter 44: SNMPv3 Protocol

7. In the Storage Type field, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Notify Table to the configuration file. After making changes to an Notify Table entry with a Volatile storage type, Save

Changes does not appear on the Configuration Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the Notify Table to the configuration file. After making changes to an Notify Table entry with a NonVolatile storage type, Save

Changes appears on the Configuration Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 Notify Table entry takes effect immediately.

8. Click Apply to update the SNMPv3 Notify Table.

9. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 712

AT-S62 User’s Guide

Configuring the SNMPv3 Target Address Table

You can create, delete, and modify an SNMPv3 Target Address Table entry. See the following procedures:

❑ Creating a Target Address Table Entry on page 713

❑ Deleting a Target Address Table Entry on page 716

❑ Modifying Target Address Table Entry on page 717

For reference information about the SNMPv3 Target Address Table, see

Configuring the SNMPv3 Target Address Table on page 713.

Creating a

Target Address

Table Entry

To create an entry in the SNMPv3 Target Address Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Target Address Table. Then click Configure at the bottom of the page.

Section VIII: Web Browser Management 713

Chapter 44: SNMPv3 Protocol

The SNMPv3 Target Address Table Page is shown in Figure 248.

Figure 248 SNMPv3 Target Address Table Page

4. To create an SNMPv3 Target Address Table entry, click Add.

The Add New SNMPv3 Target Address Table Page is shown in

Figure 249.

Section VIII: Web Browser Management

Figure 249 Add New SNMPv3 Target Address Table Page

714

Section VIII: Web Browser Management

AT-S62 User’s Guide

5. In the Target Address Name field, enter the name of the SNMP manager, or host, that manages the SNMP activity on your switch.

You can enter a name of up to 32 alphanumeric characters.

6. In the IP Address field, enter the IP address of the host.

Use the following format for an IP address:

XXX.XXX.XXX.XXX

7. In the UDP Port Number field, enter a UDP port number.

You can enter a UDP port in the range of 0 to 65,535. The default

UDP port is 162.

8. In the Timeout field, enter a timeout value in milliseconds.

When an Inform message is generated, it requires a response from the switch. The timeout value determines how long the switch considers the Inform message an active message. This parameter applies to Inform messages only. The range is from 0 to

2,147,483,647 milliseconds. The default value is 1500 milliseconds.

9. In the Retries field, enter the number of times the switch retries, or resends, an Inform message.

When an Inform message is generated, it requires a response from the switch. This parameter determines how many times the switch resends an Inform message. The Retries parameter applies to Inform messages only. The range is 0 to 255 retries. The default is 3 retries.

10. In the Tag List field, enter a list of tags that you configured in a

SNMPv3 Notify Table with the Notify Tag parameter.

See Creating a Notify Table Entry on page 708. Enter a Tag List of

up to 256 alphanumeric characters. Use a space to separate entries, for example: hwengtag swengtag testengtag

11. In the Target Parameters field, enter a Target Parameters name.

This name can consist of up to 32 alphanumeric characters. The value configured here must match the value configured with the

Target Parameters Name parameter in the SNMPv3 Target

Parameters Table.

12. In the Storage Type field, enter one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Target Address Table to the configuration file. After making changes to a Target Address Table entry with a Volatile storage type, Save Changes does not appear on the General Tab.

715

Chapter 44: SNMPv3 Protocol

NonVolatile

Select this storage type if you want the ability to save an entry in the Target Address Table to the configuration file. After making changes to a Target Address Table entry with a NonVolatile storage type, Save Changes appears on the General Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 Target Address Table entry takes effect immediately.

13. Click Apply to update the SNMPv3 Target Address Table.

14. To save your changes, return to the General Tab and click Save

Changes.

Deleting a

Target Address

Table Entry

To delete an entry in the SNMPv3 Target Address Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Target Address Table. Then click Configure at the bottom of the page.

The SNMPv3 Target Address Table Page is shown in Figure 248 on page 714.

4. Display the SNMPv3 Target Address Table entry that you want to delete.

Click Next or Previous to display an entry.

5. Click Remove.

A warning message is displayed. Click OK to remove the Target

Address Table entry.

6. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 716

AT-S62 User’s Guide

Modifying

Target Address

Table Entry

To modify an entry in the SNMPv3 Target Address Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Target Address Table. Then click Configure at the bottom of the page.

The SNMPv3 Target Address Table Page is shown in Figure 248 on page 714.

4. Display the Target Address Table entry that you want to change.

Click Next or Previous to display an entry.

5. Click Modify.

The Modify SNMPv3 Target Address Table Page is shown Figure

250.

Section VIII: Web Browser Management

Figure 250 Modify SNMPv3 Target Address Table Page

6. In the IP Address field, enter the IP address of the host.

Use the following format for an IP address:

XXX.XXX.XXX.XXX

717

Chapter 44: SNMPv3 Protocol

Section VIII: Web Browser Management

7. In the UDP Port Number field, enter a UDP port number.

You can enter a UDP port in the range of 0 to 65,535. The default

UDP port is 162.

8. In the Timeout field, enter a timeout value in milliseconds.

When an Inform message is generated, it requires a response from the switch. The timeout value determines how long the switch considers the Inform message an active message. This parameter applies to Inform messages only. The range is from 0 to

2,147,483,647 milliseconds. The default value is 1500 milliseconds.

9. In the Retries field, enter the number of times the switch retries, or resends, an Inform message.

When an Inform message is generated, it requires a response from the switch. This parameter determines how many times the switch resends an Inform message. The Retries parameter applies to Inform messages only. The range is 0 to 255 retries. The default is 3 retries.

10. In the Tag List field, enter a list of tags that you configured with the

Notify Tag parameter in a Notify Table entry.

See Creating a Notify Table Entry on page 708. Enter a Tag List of

up to 256-alphanumeric characters. Use a space to separate entries, for example: hwengtag swengtag testengtag

11. In the Target Parameters field, enter a Target Parameters name.

This name can consist of up to 32 alphanumeric characters. The value configured here must match the value configured with the

Target Parameters Name parameter in the Target Parameters

Table.

12. In the Storage Type field, enter one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Target Address Table to the configuration file. After making changes to a Target Address Table entry with a Volatile storage type, Save Changes does not appear on the General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the Target Address Table to the configuration file. After making changes to an Target Address Table entry with a NonVolatile storage type, Save Changes appears on the General Tab.

13. Click Apply to update the SNMPv3 Target Address Table.

718

AT-S62 User’s Guide

14. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 719

Chapter 44: SNMPv3 Protocol

Configuring the SNMPv3 Target Parameters Table

You can create, delete, and modify an SNMPv3 Target Parameters Table entry. See the following procedures:

❑ Creating a Target Address Table Entry on page 713

❑ Deleting a Target Address Table Entry on page 716

❑ Modifying Target Address Table Entry on page 717

For reference information about the SNMPv3 Target Parameters Table,

see Configuring the SNMPv3 Target Parameters Table on page 720.

Creating a

Target

Parameters

Table Entry

To create an entry in the SNMPv3 Target Parameters Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Target Parameters Table. Then click Configure at the bottom of the page.

The SNMPv3 Target Parameters Table Page is shown in Figure 251.

Section VIII: Web Browser Management

Figure 251 SNMPv3 Target Parameters Table Page

720

AT-S62 User’s Guide

4. To create an SNMPv3 Target Parameters Table entry, click Add.

The Add New SNMPv3 Target Parameter Table Page is shown in

Figure 252.

Section VIII: Web Browser Management

Figure 252 Add New SNMPv3 Target Parameters Table Page

5. In the Target Parameters Name field, enter a name of the SNMP manager or host.

Enter a value of up to 32 alphanumeric characters.

Note

Enter a value for the Message Processing Model parameter only if you select SNMPv1 or SNMPv2c as the Security Model. If you select the SNMPv3 protocol as the Security Model, then the Message

Processing Model is automatically assigned to SNMPv3.

6. In the Message Processing Model field, enter an SNMP Protocol that is used to process messages.

Select one of the following SNMP protocols:

v1

Select this value to process messages with the SNMPv1 protocol.

v2c

Select this value to process messages with the SNMPv2c protocol.

v3

Select this value to process messages with the SNMPv3 protocol.

721

Chapter 44: SNMPv3 Protocol

7. In the Security Model field, select one of the following SNMP protocols as the Security Model for this Security Name, or User Name.

v1

Select this value to associate the Security Name, or User Name, with the SNMPv1 protocol.

v2c

Select this value to associate the Security Name, or User Name, with the SNMPv2c protocol.

v3

Select this value to associate the Security Name, or User Name, with the SNMPv3 protocol.

8. In the Security Name field, enter a User Name that you previously configured with the SNMPv3 User Table.

See Creating a User Table Entry on page 683.

9. In the Security Level field, select one of the following Security Levels:

Note

The value you configure for the Security Level must match the value

configured for the User Name in the User Table Menu. See Creating a User Table Entry on page 683.

No Authentication/Privacy

This option represents neither an authentication nor privacy protocol. Select this security level if you do not want to authenticate users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

Note

If you have selected SNMPv1 or SNMPv2c as the Security Model, you must select No Authentication/Privacy as the Security Level.

Authentication

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

Privacy

This option represents authentication and the privacy protocol.

Select this security level to allow authentication and encryption.

Section VIII: Web Browser Management 722

AT-S62 User’s Guide

This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

10. In the Storage Type parameter, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Target Parameters Table to the configuration file.

After making changes to a Target Parameters Table entry with a

Volatile storage type, then Save Changes does not appear on the

Configuration Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the Target Parameters Table to the configuration file. After making changes to a Target Parameters Table entry with a

NonVolatile storage type, then Save Changes appears on the

Configuration Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 Target Parameters Table entry takes effect immediately.

11. Click Apply to update the SNMPv3 Target Parameters Table.

12. To save your changes, return to the General Tab and click Save

Changes.

Deleting a

Target

Parameters

Table Entry

To delete an SNMPv3 Target Parameters Table entry, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Target Parameters Table. Then click Configure at the bottom of the page.

The SNMPv3 Target Parameters Table Page is shown in Figure 251 on page 720.

4. Click the circle next to the Target Parameters Table entry that you want to delete. Then click Remove.

Section VIII: Web Browser Management 723

Chapter 44: SNMPv3 Protocol

A warning message is displayed. Click OK to remove the Target

Parameters Table entry.

5. To save your changes, return to the General Tab and click Save

Changes.

Modifying a

Target

Parameters

Table Entry

To modify an SNMPv3 Target Parameters Table entry, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Target Parameters Table. Then click Configure at the bottom of the page.

The SNMPv3 Target Parameters Table Page is shown in Figure 251 on page 720.

4. Click the circle next to the Target Parameters Table entry that you want to change. Then click Modify.

The Modify SNMPv3 Target Parameter Table Page is shown in

Figure 253 on page 724.

Section VIII: Web Browser Management

Figure 253 Modify SNMPv3 Target Parameters Table Page

724

Section VIII: Web Browser Management

AT-S62 User’s Guide

Note

Enter a value for the Message Processing Model field only if you select SNMPv1 or SNMPv2c as the Security Model. If you select the

SNMPv3 protocol as the Security Model, then the switch automatically assigns the Message Processing Model to SNMPv3.

5. In the Message Processing Model field, enter a Security Model that is used to process messages.

Select one of the following SNMP protocols:

v1

Select this value to process messages with the SNMPv1 protocol.

v2c

Select this value to process messages with the SNMPv2c protocol.

v3

Select this value to process messages with the SNMPv3 protocol.

6. In the Security Model field, select one of the following SNMP protocols as the Security Model for this Security Name, or User Name.

v1

Select this value to associate the Security Name, or User Name, with the SNMPv1 protocol.

v2c

Select this value to associate the Security Name, or User Name, with the SNMPv2c protocol.

v3

Select this value to associate the Security Name, or User Name, with the SNMPv3 protocol.

7. In the Security Name field, enter a User Name that you previously configured with the SNMPv3 User Table.

See Creating a User Table Entry on page 683.

8. In the Security Level field, select one of the following Security Levels:

Note

The value you configure for the Security Level must match the value configured for the User Name in the SNMPv3 User Table Menu. See

Creating a User Table Entry on page 683.

No Authentication/Privacy

This option represents neither an authentication nor privacy protocol. Select this security level if you do not want to authenticate users and you do not want to encrypt messages using a privacy protocol. This security level provides the least security.

725

Chapter 44: SNMPv3 Protocol

Note

If you have selected SNMPv1 or SNMPv2c as the Security Model, you must select No Authentication/Privacy as the Security Level.

Authentication

This option represents authentication, but no privacy protocol.

Select this security level if you want to authenticate SNMP users, but you do not want to encrypt messages using a privacy protocol.You can select this value if you configured the Security

Model parameter with the SNMPv3 protocol.

Privacy

This option represents authentication and the privacy protocol.

Select this security level to allow authentication and encryption.

This level provides the greatest level of security. You can select this value if you configured the Security Model parameter with the SNMPv3 protocol.

9. In the Storage Type parameter, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the Target Parameters Table to the configuration file.

After making changes to an Target Parameters Table entry with a

Volatile storage type, Save Changes does not appear on the

General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the Target Parameters Table to the configuration file. After making changes to an Target Parameters Table entry with a

NonVolatile storage type, Save Changes appears on the General

Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 Target Parameters Table entry will take effect immediately.

10. Click Apply to update the SNMPv3 Target Parameters Table.

11. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 726

AT-S62 User’s Guide

Configuring the SNMPv3 Community Table

You can create, delete, and modify an SNMPv3 Community Table entry.

See the following procedures:

❑ Creating an SNMPv3 Community Table Entry on page 727

❑ Deleting an SNMPv3 Community Table Entry on page 730

❑ Modifying an SNMPv3 Community Table Entry on page 731

For reference information about the SNMPv3 Community Table, see

Configuring the SNMPv3 Community Table on page 727.

Note

Use the SNMPv3 Community Table only if you are configuring the

SNMPv3 protocol with an SNMPv1 or an SNMPv2c implementation.

Allied Telesyn does not recommend this configuration.

Creating an

SNMPv3

Community

Table Entry

To create an SNMPv3 Community Table entry, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Community Table. Then click Configure at the bottom of the page.

The SNMPv3 Community Table Page is shown in Figure 254.

Section VIII: Web Browser Management 727

Chapter 44: SNMPv3 Protocol

Figure 254 SNMPv3 Community Table Page

4. To create an SNMPv3 Community Table entry, click Add.

The Add New SNMPv3 Community Table Page is shown in Figure

255.

Section VIII: Web Browser Management

Figure 255 Add New SNMPv3 Community Table Page

728

Section VIII: Web Browser Management

AT-S62 User’s Guide

5. In the Community Index field, enter a numerical value for this

Community.

This parameter is used to index the other parameters in an

SNMPv3 Community Table entry. Enter a value of up to 32- alphanumeric characters.

6. In the Community Name field, enter a Community Name of up to

64-alphanumeric characters.

The value of the Community Name parameter acts as a password for the SNMPv3 Community Table entry. This parameter is case sensitive.

Note

Allied Telesyn recommends that you select SNMP Community

Names carefully to ensure these names are known only to authorized personnel.

7. In the Security Name field, enter a name of an SNMPv1 and SNMPv2c user.

This name must be unique. Enter a value of up to 32 alphanumeric characters.

Note

Do not use a value configured with the User Name parameter in the

SNMPv3 User Table.

8. In the Transport Tag field, enter a name of up to 32 alphanumeric characters.

The Transport Tag parameter links an SNMPv3 Community Table entry with an SNMPv3 Target Address Table entry. Add the value you configure for the Transport Tag parameter to the Tag List

parameter in the Target Address Table as desired. See Creating a

Target Address Table Entry on page 713.

9. In the Storage Type field, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Community Table to the configuration file.

After making changes to an SNMPv3 Community Table entry with a Volatile storage type, Save Changes does not appear on the

General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Community Table to the configuration file. After

729

Chapter 44: SNMPv3 Protocol making changes to an SNMPv3 Community Table entry with a

NonVolatile storage type, Save Changes appears on the General

Tab.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 Community Table entry takes effect immediately.

10. Click Apply to update the SNMPv3 Community Table.

11. To save your changes, return to the General Tab and click Save

Changes.

Deleting an

SNMPv3

Community

Table Entry

To delete an entry in the SNMPv3 Community Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Community Table. Then click Configure at the bottom of the page.

The SNMPv3 Community Table Page is shown in Figure 254 on page 728.

4. Click the circle next to the SNMPv3 Community Table entry that you want to delete. Then click Remove.

A warning message is displayed. Click OK to remove the SNMPv3

Community Table entry.

5. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 730

AT-S62 User’s Guide

Modifying an

SNMPv3

Community

Table Entry

To modify an entry in the SNMPv3 Community Table, perform the following procedure.

1. From the Home Page, select Configuration.

The Configuration System Page is displayed with the General Tab

selected by default, as shown in Figure 194 on page 586.

2. Select the SNMP Tab.

The SNMP Tab is shown in Figure 198 on page 599.

3. In the SNMPv3 section of the page, click the circle next to Configure

Community Table. Then click Configure at the bottom of the page.

The SNMPv3 Community Table Page is shown in Figure 254 on page 728.

4. Click the circle next to the SNMPv3 Community Table entry that you want to change. Then click Modify.

The Modify SNMPv3 Community Table Page is shown in Figure

256.

Section VIII: Web Browser Management

Figure 256 Modify SNMPv3 Community Table Page

5. In the Community Name field, enter a Community Name of up to 64- alphanumeric characters.

The value of the Community Name parameter acts as a password for the SNMPv3 Community Table entry. This parameter is case sensitive.

Note

Allied Telesyn recommends that you select SNMP Community

Names carefully to ensure these names are known only to authorized personnel.

731

Chapter 44: SNMPv3 Protocol

6. In the Security Name field, enter a name of an SNMPv1 and SNMPv2c user.

This name must be unique. Enter a value of up to 32 alphanumeric characters.

Note

Do not use a value configured with the User Name parameter in the

SNMPv3 User Table.

7. In the Transport Tag field, enter a name of up to 32 alphanumeric characters.

The Transport Tag parameter links an SNMPv3 Community Table entry with an SNMPv3 Target Address Table entry. Add the value you configure for the Transport Tag parameter to the Tag List

parameter in the Target Address Table as desired. See Creating a

Target Address Table Entry on page 713.

8. In the Storage Type field, select one of the following storage types for this table entry:

Volatile

Select this storage type if you do not want the ability to save an entry in the SNMPv3 Community Table to the configuration file.

After making changes to an SNMPv3 Community Table entry with a Volatile storage type, Save Changes does not appear on the

General Tab.

NonVolatile

Select this storage type if you want the ability to save an entry in the SNMPv3 Community Table to the configuration file. After making changes to an SNMPv3 Community Table entry with a

NonVolatile storage type, Save Changes appears on the General

Tab, allowing you to save your changes.

Note

The Row Status parameter is a read-only field in the Web interface.

The Active value indicates the SNMPv3 Community Table entry takes effect immediately.

9. Click Apply to update the SNMPv3 Community Table.

10. To save your changes, return to the General Tab and click Save

Changes.

Section VIII: Web Browser Management 732

AT-S62 User’s Guide

Displaying SNMPv3 Tables

This section contains procedures to display the SNMPv3 Tables. The following procedures are provided:

❑ Displaying User Table Entries on page 734

❑ Displaying View Table Entries on page 735

❑ Displaying Access Table Entries on page 736

❑ Displaying SecurityToGroup Table Entries on page 737

❑ Displaying Notify Table Entries on page 738

❑ Displaying Target Address Table Entries on page 739

❑ Displaying Target Parameters Table Entries on page 740

❑ Displaying SNMPv3 Community Table Entries on page 741

Section VIII: Web Browser Management 733

Chapter 44: SNMPv3 Protocol

Displaying User

Table Entries

To display entries in the SNMPv3 User Table, perform the following procedure.

1. From the Home Page, select Monitoring.

The Monitoring System Page is displayed with the General Tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP Tab.

3. From the SNMP Monitoring Tab, click the circle next to View User

Table.

4. Click View at the bottom of the page.

The Monitoring, SNMPv3 User Table Page is shown in Figure 257.

Section VIII: Web Browser Management

Figure 257 Monitoring, SNMPv3 User Table Page

734

AT-S62 User’s Guide

Displaying View

Table Entries

To display entries in the SNMPv3 View Table, perform the following procedure.

1. From the Home Page, select Monitoring.

The Monitoring System Page is displayed with the General Tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP Tab.

3. From the SNMP Monitoring Tab, click the circle next to View View

Table.

4. Click View at the bottom of the page.

The Monitoring, SNMPv3 View Table Page is shown in Figure 258.

Section VIII: Web Browser Management

Figure 258 Monitoring, SNMPv3 View Table Page

735

Chapter 44: SNMPv3 Protocol

Displaying

Access Table

Entries

To display entries in the SNMPv3 Access Table, perform the following procedure.

1. From the Home Page, select Monitoring.

The Monitoring System Page is displayed with the General Tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP Tab.

3. From the SNMP Monitoring Tab, click the circle next to View Access

Table.

4. Click View at the bottom of the page.

The Monitoring, SNMPv3 Access Table Page is shown in Figure

259.

Section VIII: Web Browser Management

Figure 259 Monitoring, SNMPv3 Access Table Page

736

AT-S62 User’s Guide

Displaying

SecurityToGroup

Table Entries

To display entries in the SNMPv3 SecurityToGroup Table, perform the following procedure.

1. From the Home Page, select Monitoring.

The Monitoring System Page is displayed with the General Tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP Tab.

3. From the SNMP Monitoring Tab, click the circle next to the View

SecurityToGroup Table.

4. Click View at the bottom of the page.

The Monitoring, SNMPv3 SecurityToGroup Table Page is shown in

Figure 260.

Section VIII: Web Browser Management

Figure 260 Monitoring, SNMPv3 SecurityToGroup Table Page

737

Chapter 44: SNMPv3 Protocol

Displaying

Notify Table

Entries

To display entries in the SNMPv3 Notify Table, perform the following procedure.

1. From the Home Page, select Monitoring.

The Monitoring System Page is displayed with the General Tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP Tab.

3. From the SNMP Monitoring Tab, click the circle next to View Notify

Table.

4. Click View at the bottom of the page.

The Monitoring, SNMPv3 Notify Table Page is shown in Figure

261.

Section VIII: Web Browser Management

Figure 261 Monitoring, SNMPv3 Notify Table Page

738

AT-S62 User’s Guide

Displaying

Target Address

Table Entries

To display entries in the SNMPv3 Target Address Table, perform the following procedure.

1. From the Home Page, select Monitoring.

The Monitoring System Page is displayed with the General Tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP Tab.

3. From the SNMP Monitoring Tab, click the circle next to View Target

Address Table.

4. Click View at the bottom of the page.

The Monitoring, SNMPv3 Target Address Table Page is shown in

Figure 262.

Section VIII: Web Browser Management

Figure 262 Monitoring, SNMPv3 Target Address Table Page

739

Chapter 44: SNMPv3 Protocol

Displaying

Target

Parameters

Table Entries

To display entries in the SNMPv3 Target Parameters Table, perform the following procedure.

1. From the Home Page, select Monitoring.

The Monitoring System Page is displayed with the General Tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP Tab.

3. From the SNMP Monitoring Tab, click the circle next to the View

Target Parameters Table.

4. Click View at the bottom of the page.

The Monitoring, SNMPv3 Target Parameters Table Page is shown

in Figure 262.

Section VIII: Web Browser Management

Figure 263 Monitoring, SNMPv3 Target Parameters Table Page

740

AT-S62 User’s Guide

Displaying

SNMPv3

Community

Table Entries

To display entries in the SNMPv3 Community Table, perform the following procedure.

1. From the Home Page, select Monitoring.

The Monitoring System Page is displayed with the General Tab

selected by default, as shown in Figure 195 on page 590.

2. Select the SNMP Tab.

3. From the SNMP Monitoring Tab, click the circle next to the View

Community Table.

4. Click View at the bottom of the page.

The Monitoring, SNMPv3 Community Table Page is shown in

Figure 264.

Section VIII: Web Browser Management

Figure 264 Monitoring, SNMPv3 Community Table Page

741

Chapter 45

STP, RSTP, and MSTP

This chapter explains how to configure the STP, RSTP and MSTP parameters on an AT-8524M switch from a web browser management session.

Sections in the chapter include:

❑ Enabling or Disabling Spanning Tree on page 743

❑ Configuring STP on page 745

❑ Configuring RSTP on page 748

❑ Configuring MSTP on page 752

❑ Displaying Spanning Tree Settings on page 760

Note

For background information on STP and RSTP, refer to STP and RSTP

Overview on page 330. For background information on MSTP, refer

to MSTP Overview on page 353.

742

AT-S62 User’s Guide

Enabling or Disabling Spanning Tree

To enable or disable spanning tree on the switch, do the following:

1. From the Home page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 2.

The Layer 2 page is displayed with the MAC Address tab shown by

default, as shown in Figure 208 on page 622.

3. Select the Spanning Tree tab.

The Spanning Tree tab is shown in Figure 265.

Section VIII: Web Browser Management

Figure 265 Spanning Tree Tab (Configuration)

4. To select an active spanning tree for the switch, click either STP,

RSTP, or MSTP for the Active Protocol Version parameter. Only one protocol can be active on the switch at a time. The default is RSTP.

5. Click Apply.

6. To enable or disable spanning tree, click the Enable Spanning Tree check box. A check indicates that the feature is enabled while no check indicates that the feature is disabled. The default is disabled.

Note

Do not enable spanning tree on the switch until after you have selected an activate spanning tree protocol and configured the settings.

743

Chapter 45: STP, RSTP, and MSTP

7. Click Apply.

8. If you activated STP, go to Configuring STP on page 745. If you

activated RSTP go to Configuring RSTP on page 748. If you selected

MSTP, go to Configuring MSTP on page 752.

Section VIII: Web Browser Management 744

AT-S62 User’s Guide

Configuring STP

Caution

The bridge provides default STP parameters that are adequate for most networks. Changing them without prior experience and an understanding of how STP works might have a negative effect on your network. You should consult the IEEE 802.1d standard before changing any of the STP parameters.

This procedure assumes that you have already designated STP as the

active spanning tree on the switch. For instructions, refer to Enabling or

Disabling Spanning Tree on page 743.

To configure STP, perform the following procedure:

1. In the Spanning Tree tab, the Configure Spanning Tree Parameters section, click Configure.

The STP Spanning Tree tab is shown in Figure 266.

Section VIII: Web Browser Management

Figure 266 STP Spanning Tree Tab

Note

The Defaults button returns all STP settings to the default settings.

745

Chapter 45: STP, RSTP, and MSTP

2. Adjust the STP bridge settings as needed. The parameters are described below.

Bridge Priority

The priority number for the bridge. This number is used in determining the root bridge for RSTP. The bridge with the lowest priority number is selected as the root bridge. If two or more bridges have the same priority value, the bridge with the numerically lowest MAC address becomes the root bridge. When a root bridge goes off-line, the bridge with the next priority number automatically takes over as the root bridge. This parameter can be from 0 (zero) to 61,440 in increments of 4096, with 0 being the highest priority. For a list of the increments, refer

to Table 12, Bridge Priority Value Increments on page 331.

Bridge Hello Time

The time interval between generating and sending configuration messages by the bridge. This parameter can be from 1 to 10 seconds. The default is 2 seconds.

Bridge Forwarding Delay

The waiting period in seconds before a bridge changes to a new state, for example, becomes the new root bridge after the topology changes. If the bridge transitions too soon, not all links may have yet adapted to the change, resulting in network loops.

The range is 4 to 30 seconds. The default is 15 seconds.

Bridge Max Age

The length of time after which stored bridge protocol data units

(BPDUs) are deleted by the bridge. All bridges in a bridged LAN use this aging time to test the age of stored configuration messages called bridge protocol data units (BPDUs). For example, if you use the default value 20, all bridges delete current configuration messages after 20 seconds. This parameter can be from 6 to 40 seconds.

In selecting a value for maximum age, the following rules must be observed:

MaxAge must be greater than (2 x (HelloTime + 1))

MaxAge must be less than (2 x (ForwardingDelay - 1))

Note

The aging time for BPDUs is different from the aging time used by the MAC address table.

Section VIII: Web Browser Management 746

AT-S62 User’s Guide

Bridge Identifier

The MAC address of the bridge. The bridge identifier is used as a tie breaker in the selection of the root bridge when two or more bridges have the same bridge priority value. This value cannot be changed.

3. After you have made the desired changes, click Apply.

4. To adjust a port’s STP settings, click on the port in the switch image and click Modify. You can select more than one port at a time.

The STP Port Settings window is shown in Figure 267.

Section VIII: Web Browser Management

Figure 267 STP Port Settings Window

5. Adjust the settings as desired. The parameters are described below.

1 - Port Priority

This parameter is used as a tie breaker when two or more ports are determined to have equal costs to the root bridge. The range is 0 to 240 in increments of 16. The default value is 8 (priority value

128). For a list of the increments, refer to Table 17, Port Priority

Value Increments on page 334.

2 - Port Cost

The spanning tree algorithm uses the cost parameter to decide which port provides the lowest cost path to the root bridge for that LAN. The range is 0 to 65,535. The default setting is Autodetect, which sets port cost depending on the speed of the port.

For the default values used by Automatic Update, refer Table 13 on page 332 and Table 14 on page 333.

6. Once you have configured the parameters, click Apply.

7. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

747

Chapter 45: STP, RSTP, and MSTP

Configuring RSTP

Caution

The bridge provides default RSTP parameters that are adequate for most networks. Changing them without prior experience and an understanding of how RSTP works might have a negative effect on your network. You should consult the IEEE 802.1w standard before changing any of the RSTP parameters.

This procedure assumes that you have already designated RSTP as the

active spanning tree on the switch. For instructions, refer to Enabling or

Disabling Spanning Tree on page 743.

To configure RSTP, perform the following procedure:

1. In the Spanning Tree tab, Configure Spanning Tree Parameters section, click Configure.

The RSTP Spanning Tree tab is shown in Figure 268.

Section VIII: Web Browser Management

Figure 268 RSTP Spanning Tree Tab

Note

The Defaults button returns all RSTP settings to the default settings.

748

Section VIII: Web Browser Management

AT-S62 User’s Guide

2. Adjust the parameters are desired. The parameters are defined below.

1 - Force Version

This selection determines whether the bridge will operate with

RSTP or in an STP-compatible mode. If you select RSTP, the bridge operates all ports in RSTP, except for those ports that receive STP

BPDU packets. If you select Force STP Compatible, the bridge operates in RSTP, using the RSTP parameter settings, but it sends only STP BPDU packets out the ports.

2 - Bridge Priority

The priority number for the bridge. This number is used in determining the root bridge for RSTP. The bridge with the lowest priority number is selected as the root bridge. If two or more bridges have the same priority value, the bridge with the numerically lowest MAC address becomes the root bridge. When a root bridge goes off-line, the bridge with the next priority number automatically takes over as the root bridge. This parameter can be from 0 (zero) to 61,440 in increments of 4096, with 0 being the highest priority. For a list of the increments, refer

to Table 12, Bridge Priority Value Increments on page 331.

3 - Bridge Hello Time

The time interval between generating and sending configuration messages by the bridge. This parameter can be from 1 to 10 seconds. The default is 2 seconds.

4 - Bridge Forwarding

The waiting period before a bridge changes to a new state, for example, becomes the new root bridge after the topology changes. If the bridge transitions too soon, not all links may have yet adapted to the change, possibly resulting in a network loop.

The range is 4 to 30 seconds. The default is 15 seconds. This setting applies only to ports running in the STP-compatible mode.

5 - Bridge Max Age

The length of time after which stored bridge protocol data units

(BPDUs) are deleted by the bridge. All bridges in a bridged LAN use this aging time to test the age of stored configuration messages called bridge protocol data units (BPDUs). For example, if you use the default 20, all bridges delete current configuration messages after 20 seconds. This parameter can be from 6 to 40 seconds. The default is 20 seconds.

In selecting a value for maximum age, the following must be observed:

MaxAge must be greater than (2 x (HelloTime + 1)).

MaxAge must be less than (2 x (ForwardingDelay - 1))

749

Chapter 45: STP, RSTP, and MSTP

6 - Bridge Identifier

The MAC address of the bridge. The bridge identifier is used as a tie breaker in the selection of the root bridge when two or more bridges have the same bridge priority value. This value cannot be changed.

3. After you have made your changes, click Apply.

4. To adjust RSTP port settings, click on the port in the switch image and click Modify. You can select more than one port at a time.

The RSTP Port Settings window is shown in Figure 269.

Section VIII: Web Browser Management

Figure 269 RSTP Port Settings Window

5. Adjust the settings as desired. The parameters are described below.

1 - Port Priority

This parameter is used as a tie breaker when two or more ports are determined to have equal costs to the root bridge. The range is 0 to 240 in increments of 16. The default value is 8 (priority value

128). For a list of the increments, refer to Table 17, Port Priority

Value Increments on page 334.

2 - Port Cost

The spanning tree algorithm uses the cost parameter to decide which port provides the lowest cost path to the root bridge for that LAN. The range is 0 to 20,000,000. The default setting is

Automatic detect, which sets port cost depending on the speed of

the port. The default Auto-detect settings are listed in Table 18 on page 381 and Table 19 on page 381.

3 - Point-to-Point

This parameter defines whether the port is functioning as a point-

to-point port. For an explanation of this parameter, refer to Pointto-Point Ports and Edge Ports on page 336.

750

AT-S62 User’s Guide

4 - Edge Port

This parameter defines whether the port is functioning as an edge

port. For an explanation of this parameter, refer to Point-to-Point

Ports and Edge Ports on page 336.

6. Once you have configured the parameters, click Apply.

7. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 751

Chapter 45: STP, RSTP, and MSTP

Configuring MSTP

Configuring

MSTP and CIST

Parameters

This section is divided into the following procedures:

❑ Configuring MSTP and CIST Parameters on page 752

❑ Associating VLANs to MSTIs on page 755

❑ Configuring MSTP Port Parameters on page 758

This procedure assumes that you have already designated MSTP as the

active spanning tree on the switch. For instructions, refer to Enabling or

Disabling Spanning Tree on page 743.

To configure MSTP parameters, perform the following procedure:

1. From the Home page, select Configuration.

2. From the Configuration page, select Layer 2.

3. From the Layer 2 page, select the Spanning Tree tab.

The Spanning Tree Web Page appears as shown in Figure 265 on page 743.

4. Click Configure.

Section VIII: Web Browser Management 752

The MSTP Spanning Tree tab is shown in Figure 270.

AT-S62 User’s Guide

Section VIII: Web Browser Management

Figure 270 MSTP Spanning Tree Tab

Note

This procedure explains the Configure MSTP Parameters and

Configure CIST Parameters sections of the web page. The CIST/MSTI

Table is explained in Associating VLANs to MSTIs on page 755. The

graphic image of the switch is described in Configuring MSTP Port

Parameters on page 758.

753

Chapter 45: STP, RSTP, and MSTP

5. Adjust the bridge MSTP settings as needed. The parameters are described below.

Force Version

This selection determines whether the bridge will operate with

MSTP or in an STP-compatible mode. If you select MSTP, the bridge operates all ports in MSTP, except those ports that receive

STP or RSTP BPDU packets. If you select Force STP Compatible, the bridge uses its MSTP parameter settings, but sends only STP BPDU packets from the ports. The default is MSTP.

Bridge Hello Time

The time interval between generating and sending configuration messages by the bridge. This parameter can be from 1 to 10 seconds. The default is 2 seconds. This value is active only if the bridge is selected as the root bridge of the network.

Bridge Forwarding

The waiting period before a bridge changes to a new state, for example, becomes the new root bridge after the topology changes. If the bridge transitions too soon, not all of the links may have adapted to the change, possibly resulting in a network loop.

The range is 4 to 30 seconds. The default is 15 seconds. This setting applies only to ports running in the STP-compatible mode.

Configuration Name

The name of the MSTP region. The range is 0 (zero) to 32 alphanumeric characters in length. The name, which is casesensitive, must be the same on all bridges in a region. Examples of a configuration name include Sales Region and Production

Region.

Bridge Max Age

The length of time after which stored bridge protocol data units

(BPDUs) are deleted by the bridge. This parameter applies only if the bridged network contains an STP or RSTP single-instance spanning tree. Otherwise, the bridges use the Max Hop counter to delete BPDUs.

All bridges in a single-instance bridged LAN use this aging time to test the age of stored configuration messages called bridge protocol data units (BPDUs). For example, if you use the default of

20, all bridges delete current configuration messages after 20 seconds. The range of this parameter is 6 to 40 seconds. The default is 20 seconds.

In selecting a value for maximum age, the following must be observed:

❑ MaxAge must be greater than (2 x (HelloTime + 1))

Section VIII: Web Browser Management 754

AT-S62 User’s Guide

❑ MaxAge must be less than (2 x (ForwardingDelay - 1))

Bridge Max Hops

MSTP regions use this parameter to discard BPDUs. The Max Hop counter in a BPDU is decremented every time the BPDU crosses an

MSTP region boundary. Once the counter reaches zero, the BPDU is deleted.

Revision Level

The revision level of an MSTP region. This is an arbitrary number that you assign to a region. The revision level must be the same on all bridges in a region. Different regions can have the same revision level without conflict. The range is 0 (zero) to 255.

CIST Priority

The priority number for the bridge. This number is used in determining the root bridge of the bridged network. This number is analogous to the RSTP bridge priority value. The bridge in the network with the lowest priority number is selected as the root bridge. If two or more bridges have the same bridge or CIST priority values, the bridge with the numerically lowest MAC address becomes the root bridge.

6. Once you have adjusted the parameters, click the Apply button.

Associating

VLANs to MSTIs

This section explains how to create and delete MSTI IDs and how to associate VLANs to MSTI IDs.

To manage the MSTI ID and VLAN associations, perform the following procedure:

1. Display the Spanning Tree Expanded Web Page for MSTP by

performing Steps 1 through 4 in the procedure Configuring MSTP and

CIST Parameters on page 752.

Section VIII: Web Browser Management 755

Chapter 45: STP, RSTP, and MSTP

2. To create or delete an MSTI ID and to associate VLANs to MSTIs, do the following: a. In the CIST/MSTI Table section of the menu, click Add.

The Add New MSTI window is shown in Figure 271.

Section VIII: Web Browser Management

Figure 271 Add New MSTI Window b. In the MSTI ID field, enter a new MSTI ID. The range is 1 to 15.

c. In the Priority field, enter a MSTI Priority value. This parameter is used in selecting a regional root for the MSTI. The range is 0 (zero) to 61,440 in increments of 4,096, with 0 being the highest priority.

This parameter is used in selecting a regional root for the MSTI.

For a list of the increments, refer to Table 12 on page 331. The

default is 0.

d. In the VLAN List field, enter the VIDs of the VLANs to be associated with this MSTI. You can specify more than one VID at a time (e.g.,

2,4,7).

e. Click Apply.

f.

Repeat this procedure to create more MSTI IDs.

3. To add or remove VLANs or to change the MSTI Priority value of an existing MSTI ID, do the following: a. In the CIST/MSTI Table section of the menu, click the circle next to the MSTI ID you want to modify. You can select only one MSTI ID at a time. You cannot modify CIST.

b. Click Modify.

756

The Modify MSTI window is shown in Figure 272.

AT-S62 User’s Guide

Section VIII: Web Browser Management

Figure 272 Modify MSTI Window c. In the Priority field, enter a new MSTI Priority value. This parameter is used in selecting a regional root for the MSTI. The range is 0

(zero) to 61,440 in increments of 4,096, with 0 being the highest

priority. For a list of the increments, refer to Table 12 on page 331.

The default is 0.

d. In the VLAN List field, modify the list of VIDs of the VLANs to be associated with this MSTI. You can add more VLANs or remove

VLANs. You can specify more than one VID at a time (e.g., 2,4,7). If you remove a VLAN, the VLAN will be associated with CIST.

e. Click Apply.

f.

Repeat this procedure to modify more MSTI IDs.

4. To delete an MSTI ID, do the following: a. In the CIST/MSTI Table section of the menu, click the circle next to the MSTI ID you want to delete. You can select only one MSTI ID at a time.

b. Click Remove.

A confirmation prompt is displayed.

c. Click OK to delete the MSTI or Cancel to cancel the procedure.

If you select OK, the MSTI is deleted and VLANs associated with it are returned to CIST, which has an ID of 0.

757

Chapter 45: STP, RSTP, and MSTP

Configuring

MSTP Port

Parameters

To configure MSTP port parameters, perform the following procedure:

1. Perform Steps 1 through 4 in the procedure Configuring MSTP and

CIST Parameters on page 752 to display the Spanning Tree Expanded

Web Page for MSTP.

2. In the diagram of the switch at the bottom of the MSTP Spanning Tree

Expanded Web Page, click the port you want to configure. You can select more than one port at a time. A selected port turns white.

3. Click Configure.

The Configure MSTP Port Settings window is shown in Figure 273.

Section VIII: Web Browser Management

Figure 273 MSTP Port Settings Window

4. Adjust the parameters as needed. The parameters are described below.

Port Priority

This parameter is used as a tie breaker when two or more ports are determined to have equal costs to the regional root bridge. The range is 0 to 240 in increments of 16. The default value is 8 (priority

value is 128). For a list of the increments, refer to Table 17 on page

334.

Port Internal Path Cost

The port cost of the port if the port is connected to a bridge which is part of the same MSTP region. The range is 0 to 200,000,000. The default setting is Auto-detect, which sets port cost depending on the speed of the port. The default Auto-detect settings are listed

in Table 18 on page 381 and Table 19 on page 381.

Edge Port

This parameter defines whether the port is functioning as an edge

port. For an explanation of this parameter, refer to Point-to-Point

Ports and Edge Ports on page 336.

758

AT-S62 User’s Guide

Point-to-Point

This parameter defines whether the port is functioning as a point-

to-point port. For an explanation of this parameter, refer to Pointto-Point Ports and Edge Ports on page 336.

Port External Path Cost

The port cost of the port if the port is connected to a bridge which is a member of another MSTP region or is running STP or RSTP. The range is 0 to 200,000,000. The default setting is 200,000.

5. After adjusting the parameters, click Apply.

6. Repeat this procedure to configure MSTP parameters for other switch ports.

Section VIII: Web Browser Management 759

Chapter 45: STP, RSTP, and MSTP

Displaying Spanning Tree Settings

To display the parameter settings for the active spanning tree, perform the following procedure:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. From the Monitoring menu, select Layer 2.

3. Select the Spanning Tree tab.

The Spanning Tree tab is shown in Figure 274.

Section VIII: Web Browser Management

Figure 274 Spanning Tree Tab (Monitoring)

This tab displays information on whether spanning tree is enable or disabled and which protocol version is active.

4. Click View.

5. To view port settings, click a port in the graphical image of the switch and click Status or Settings.

For explanations of the spanning tree parameters, refer to earlier sections in this chapter.

760

Chapter 46

Virtual LANs

This chapter explains how to create, modify, and delete port-based and tagged VLANs from a web browser management session. This chapter also explains how to select a multiple VLAN mode.

This chapter contains the following sections:

❑ Creating a New Port-Based or Tagged VLAN on page 762

❑ Modifying a Port-Based or Tagged VLAN on page 766

❑ Deleting a Port-Based or Tagged VLAN on page 768

❑ Displaying VLANs on page 769

❑ Selecting a VLAN Mode on page 771

❑ Specifying a Management VLAN on page 773

Note

For background information on port-based and tagged VLANs, refer

to Chapter 20, Tagged and Port-based Virtual LANs on page 385. For

information on the multiple VLAN modes, refer to Chapter 22,

Multiple VLAN Modes on page 446.

761

Chapter 46: Virtual LANs

Creating a New Port-Based or Tagged VLAN

To create a new port-based or tagged VLAN, perform the procedure below:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 2.

The Layer 2 page is displayed with the MAC Address tab selected

by default, as shown in Figure 208 on page 622.

3. Select the VLAN tab.

The VLAN tab is shown in Figure 275.

Section VIII: Web Browser Management

Figure 275 VLAN Tab (Configuration)

Note

The Modify and Remove buttons are not included in the tab if the only VLAN on the switch is the Default_VLAN.

762

AT-S62 User’s Guide

The VLAN Mode and Uplink Port options are explained in

Selecting a VLAN Mode on page 771. The Mgmt. VLAN ID option

is explained in Specifying a Management VLAN on page 773.

The tab displays the VLANs on the switch. The columns in the tab are defined below:

VLAN ID

The VID number assigned to the VLAN.

(Client) Name

The name of the VLAN.

Uplink Port

This column is applicable only when the switch is operating in one of the two multiple VLAN modes. The column lists the port that is functioning as the uplink port for the other ports on the switch.

Type - Either Port Based, for both port-based and tagged VLANs, or

GVRP Dynamic, for VLANs created by GVRP.

Protocol - Not used.

Tagged(T)/Untagged(U) Port

Lists the ports of the VLAN. Tagged ports are designated with a “T” and untagged ports with a “U.”

4. To add a new VLAN, click Add.

The Add New VLAN page is shown in Figure 276.

Section VIII: Web Browser Management

Figure 276 Add New VLAN Page

5. Select the VID field and enter a VID value for the new VLAN. The range of the VID value is 2 to 4096. The default is the next available VID number on the switch.

763

Chapter 46: Virtual LANs

Section VIII: Web Browser Management

If this VLAN will be unique in your network, then its VID should also be unique. If this VLAN will be part of a larger VLAN that spans multiple switches, than the VID value for the VLAN should be the same on each switch. For example, if you are creating a VLAN called Sales that will span three switches, you should assign the Sales VLAN on each switch the same VID value.

Note

A VLAN must have a VID.

The switch is only aware of the VIDs of the VLANs that exist on the device, and not those that might already be in use in the network. For example, if you add a new AT-8524M switch to a network that already contains VLANs that use VIDs 2 through 24, the AT-S62 software will still use VID 2 as the default value when you create the first VLAN on the new switch, even though that VID number is already being used by another VLAN on the network. To prevent inadvertently using the same VID for two different VLANs, you should keep a list of all your network VLANs and their VID values.

6. Select the Name field and enter a name for the new VLAN.

The name can be from one to fifteen alphanumeric characters in length. The name should reflect the function of the nodes that will be a part of the VLAN (for example, Sales or Accounting). The name cannot contain spaces or special characters, such as asterisks (*) or exclamation points (!).

If the VLAN will be unique in your network, then the name should be unique as well. If the VLAN will be part of a larger VLAN that spans multiple switches, then the name for the VLAN should be the same on each switch where nodes of the VLAN are connected.

Note

A VLAN must be assigned a name.

7. To select the ports for the VLAN, click the ports in the switch image.

Clicking repeatedly on a port toggles it through the following possible settings:

Untagged port

Tagged port

Port not a member of the VLAN

764

AT-S62 User’s Guide

8. Click Apply.

Note

Any untagged ports that you assign to the new VLAN are automatically removed from their current untagged VLAN assignment.

The new user-configured VLAN is now ready for network operations.

9. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 765

Chapter 46: Virtual LANs

Modifying a Port-Based or Tagged VLAN

This procedure explains how to add or remove ports from a VLAN. When modifying a VLAN, note the following:

❑ You cannot change the VID of a VLAN.

❑ You cannot change the name of a VLAN from a web browser management session; you can from a local or Telnet session.

❑ You cannot modify VLANs when the switch is operating in one of the multiple VLAN modes.

To modify a VLAN, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 2.

The Layer 2 page is displayed with the MAC Address tab selected

by default, as shown in Figure 208 on page 622.

3. Select the VLAN tab.

The VLAN tab is shown in Figure 275 on page 762.

4. Click the button next to the name of the VLAN you want to modify.

5. Click Modify.

The Modify VLAN window for the VLAN is displayed.

6. To add or remove ports from the VLAN, click on the appropriate ports in the switch image.

Clicking repeatedly on a port toggles it through the following possible settings:

Untagged port

Tagged port

Port not a member of the VLAN

Section VIII: Web Browser Management 766

AT-S62 User’s Guide

7. After making the necessary changes, click Apply.

Note

Untagged ports that are added to a VLAN are automatically removed from their current untagged VLAN assignment. Untagged ports that are removed from a VLAN are returned to the

Default_VLAN.

Removing an untagged port from the Default_VLAN without assigning it to another VLAN will leave the port as an untagged member of no VLAN.

The modified VLAN is now ready for network operations.

8. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 767

Chapter 46: Virtual LANs

Deleting a Port-Based or Tagged VLAN

To delete a port-based or tagged VLAN from the switch, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 2.

The Layer 2 page is displayed with the MAC Address tab selected

by default, as shown in Figure 208 on page 622.

3. Select the VLAN tab.

The VLAN tab is shown in Figure 275 on page 762.

4. Click the button next to the name of the VLAN you want to delete.

(You cannot delete the Default_VLAN.)

5. Click Remove.

A confirmation prompt is displayed.

6. Click OK to delete the VLAN or Cancel to cancel the procedure.

If you click OK, the VLAN is deleted from the switch. The untagged ports in the VLAN are returned to the Default_VLAN as untagged ports.

7. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 768

AT-S62 User’s Guide

Displaying VLANs

To display the current VLANs on a switch, perform the following procedure:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. From the Monitoring menu, select Layer 2.

The Layer 2 page is displayed with the MAC Address tab selected by default.

3. Select the VLAN tab.

The VLAN tab is shown in Figure 277. The information in this tab is

for viewing purposes only.

Section VIII: Web Browser Management

Figure 277 VLAN Tab (Monitoring)

The columns in the window are defined below.

VLAN ID

The VID number assigned to the VLAN.

(Client) Name

The name of the VLAN. If the switch is operating in one of the multiple VLAN modes, the names of the VLANs start with “Client,” with the exception of the VLAN containing the uplink port, which starts with “Uplink.”

769

Chapter 46: Virtual LANs

Uplink Port

This column is applicable only when the switch is operating in one of the two multiple VLAN modes. The column lists the port that is functioning as the uplink port for all the other ports on the switch.

Type - If this column contains Port Based, the VLAN is a port-based or tagged VLAN. If it contains GARP, the VLAN was created automatically by GVRP.

Protocol - If this column is blank, the VLAN is a port-based or tagged

VLAN. If it contains GARP, the VLAN or the port is a dynamic GVRP

VLAN or a dynamic GVRP port of a static VLAN.

Tagged(T)/Untagged(U) Port

The ports of the VLAN. Tagged ports are designated with a “T” and untagged ports with a “U.”

Section VIII: Web Browser Management 770

AT-S62 User’s Guide

Selecting a VLAN Mode

The AT-S62 management software features three VLAN modes:

❑ Port-based and tagged VLAN Mode (default mode)

❑ IEEE 802.1Q-compliant Multiple VLAN Mode

❑ Non-IEEE 802.1Q compliant Multiple VLAN Mode

For background information on port-based and tagged VLANs, refer to

Chapter 20, Tagged and Port-based Virtual LANs on page 385. For

information on the multiple VLAN modes, refer to Chapter 22, Multiple

VLAN Modes on page 446.

Note

Any port-based or tagged VLANs that you may have created are not retained when you change the VLAN mode from the user configured mode to a multiple VLAN mode and, at some point, reset the switch. The user configured VLAN information will be lost and will need to be recreated if you later return the switch to the user configured VLAN mode.

To select a VLAN mode for the switch, perform the procedure below:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 2.

The Layer 2 page is displayed with the MAC Address tab selected

by default, as shown in Figure 208 on page 622.

3. Select the VLAN tab.

The VLAN tab is shown in Figure 275 on page 762.

4. In the VLAN Mode section, select a VLAN mode. Only one mode can be active on the switch at a time. The modes are:

❑ User Configured - Port-based and tagged VLAN Mode

❑ Multiple - Non-IEEE 802.1Q-compliant Multiple VLAN Mode

❑ Multiple 802.1Q - IEEE 802.1Q-compliant Multiple VLAN Mode

5. If you select one of the multiple VLAN modes, specify an uplink port in the Uplink Port field. This port will function as the uplink port for the

VLANs. The default is port 1.

Section VIII: Web Browser Management 771

Chapter 46: Virtual LANs

6. Click Apply.

The new mode is automatically activated on the switch.

7. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 772

AT-S62 User’s Guide

Specifying a Management VLAN

The management VLAN is the VLAN through which an AT-8524M switch expects to receive management packets. This VLAN is important if you will be managing a switch remotely or using the enhanced stacking feature of the switch.

Management packets are packets generated by a management workstation when you remotely manage a switch using the Telnet application protocol or a web browser. The switch will act upon the management packets only if they are received on a port that is a member of the management VLAN.

The default management VLAN on an AT-8524M switch is the

Default_VLAN. If you do not create any additional VLANs and link the switches together using untagged ports, then there will be no need to specify a new management VLAN in order to remotely manage the devices.

However, if you create additional VLANs on your switches, it may be necessary for you to create a management communications path and then specify that path as the new management VLAN.

Below are several rules to observe when using this feature:

❑ The management VLAN must exist on each AT-8524M switch that you want to manage.

❑ Using the following procedure, you must specify the management VLAN in the AT-S62 software on each slave and master switch of an enhanced stack.

❑ The uplink and downlink ports on each switch that are functioning as the tagged or untagged data links between the switches must be either tagged or untagged members of the management VLAN.

❑ The port on the switch to which the management station is connected must be a member of the management VLAN. (This rule does not apply when managing the switch locally through the RS232 Terminal Port.)

Here is an example. Let’s assume that you have an enhanced stack of seven AT-8524M switches with one master switch. If the uplink and downlink ports between the various switches are members of the

Default_VLAN and if the management station is connected to a port of the Default_VLAN, you will be able to manage all the switches since the

Default_VLAN is the default management VLAN.

Section VIII: Web Browser Management 773

Chapter 46: Virtual LANs

Now let’s assume that you decide to create a VLAN called NMS with a VID of 24 for the sole purpose of remote network management of your switches. For this, you would need to create the NMS VLAN on each

AT-8524M switch that you want to manage remotely, being sure to assign each NMS VLAN the VID of 24. Then you would need to be sure that the uplink and downlink ports connecting the switches together are either tagged or untagged members of the NMS VLAN. You would also need to specify the NMS VLAN as the management VLAN on each switch using the management software. Finally, you must be sure to connect your management station to a port on a switch that is a tagged or untagged member of the management VLAN.

Note

You cannot specify a management VLAN when the switch is operating in a multiple VLAN mode.

To set the management VLAN, do the following:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. From the Configuration menu, select Layer 2.

The Layer 2 page is displayed with the MAC Address tab selected

by default, as shown in Figure 208 on page 622.

3. Select the VLAN tab.

The VLAN tab is shown in Figure 275 on page 762.

4. For the Mgmt. VLAN ID parameter, enter the VID of the VLAN on the switch that is to function as the management VLAN. The VLAN must already exist on the switch. The default is 1, which is the VID of the

Default_VLAN.

5. Click Apply.

6. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 774

Chapter 47

GARP VLAN Registration Protocol

This chapter about web server security contains the following procedures:

❑ Configuring GVRP on page 776

❑ Enabling or Disabling GVRP on a Port on page 778

❑ Displaying the GVRP Settings on page 780

Note

For background information on GVRP, refer to Basic Overview of

GARP VLAN Registration Protocol (GVRP) on page 421 or Technical

Overview of Generic Attribute Registration Protocol (GARP) on page

426.

775

Chapter 47: GARP VLAN Registration Protocol

Configuring GVRP

To configure the GVRP parameters, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586

2. From the Configuration menu, select the Layer 2 option.

3. Select the GVRP tab.

The GVRP tab is shown in Figure 278.

Section VIII: Web Browser Management

Figure 278 GVRP Tab (Configuring)

The GVRP tab is not shown if MSTP is enabled on the switch.

The Default button returns all GVRP parameter settings to their default values.

4. Configure the following parameters:

Enable GVRP

Click in this box to enable GVRP.

Leave Time

Sets the duration of the Leave Period timer. The range is from 30 to180 centiseconds and the default is 60.

776

Section VIII: Web Browser Management

AT-S62 User’s Guide

Join Time

Sets the duration of the Join Period timer. The range is from 10 to

60 centiseconds and the default is 20.

If you change this timer, it must in relation to the GVRP Leave

Timer according to the following equation:

Join Timer <= 2 x (GVRP Leave Timer)

Enable GIP

Enables the operation of GIP. If enabled, attribute registrations and de-registrations processed on a port are propagated to other ports in the GIP-connected ring. GIP must be enabled in order to use GVRP.

Note

Do not disable GIP if you intend to use GVRP. GIP is required to propagate VLAN information among the ports of the switch.

Leave All Time

Sets the duration of the LeaveAll Period timer. The range is from

500 to 3000 centiseconds and the default is 1000.

Caution

The settings for the three GVRP timers must be the same on all

GVRP-active devices in your network.

5. Click Apply.

6. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

777

Chapter 47: GARP VLAN Registration Protocol

Enabling or Disabling GVRP on a Port

This procedure enables and disables GVRP on a switch port. The default setting for GVRP on a port is enabled. Only those ports where GVRP is enabled transmit PDUs.

Note

Allied Telesyn recommends disabling GVRP on unused ports and those ports that are connected to GVRP-inactive devices. This will protect against unauthorized access to restricted areas of your

network. For further information, refer to GVRP and Network

Security on page 424.

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586

2. From the Configuration menu, select the Layer 2 option.

3. Select the GVRP tab.

The GVRP tab is shown in Figure 278 on page 776.

4. Click a port in the graphical image of the switch.

5. Click Modify.

The GVRP Port Configuration page is shown in Figure 279.

Section VIII: Web Browser Management

Figure 279 GVRP Port Configuration Page

6. Change the port mode if desired.

A setting of Normal means the port processes and propagates

GVRP information. This is the default setting. A setting of None prevents the port from processing GVRP information and from transmitting PDUs.

7. Click Apply.

A change to GVRP port mode is immediately activated on a port.

778

AT-S62 User’s Guide

8. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

Section VIII: Web Browser Management 779

Chapter 47: GARP VLAN Registration Protocol

Displaying the GVRP Settings

Use this procedure to view the GVRP settings:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. From the Monitoring menu, select the Layer 2 option.

3. Select the GVRP tab.

The GVRP tab is shown in Figure 280.

Section VIII: Web Browser Management

Figure 280 GVRP Tab (Monitoring)

For definitions of the GVRP parameters, refer to Technical

Overview of Generic Attribute Registration Protocol (GARP) on page 426.

4. To view GVRP switch and port configuration information, select one of the following and click View:

View Port Configuration

Displays the status of GVRP on each port. Normal indicates that

GVRP is active on a port while None means it is inactive.

View GVRP Database

Refer to Table 21 on page 441 for descriptions of the status

information displayed by the selection.

780

AT-S62 User’s Guide

View GVRP State Machine for VLAN

Refer to Table 23 on page 443 for descriptions of the status

information displayed by the selection. You must enter a VID number.

View GVRP Counters

Refer to Table 20 on page 438 for descriptions of the status

information displayed by the selection.

View GIP Connected Ports Ring

Refer to Table 22 on page 442 for descriptions of the status

information displayed by the selection.

Section VIII: Web Browser Management 781

Chapter 48

MAC Address Security

This chapter explains how to display the MAC address security levels on the ports on the switch. It contains the following section:

❑ Displaying MAC Address Security Levels on page 783

Note

For background information, refer to MAC Address Security

Overview on page 455.

Note

You cannot configure the MAC address security feature from a web browser management session. This feature can only be configured from a local or Telnet management session.

782

AT-S62 User’s Guide

Displaying MAC Address Security Levels

To display the MAC address security level of a port, perform the following procedure:

1. From the Home page, select Monitoring.

2. Select Layer 2.

The Layer 2 page is displayed with the MAC Address tab selected

by default, as shown in Figure 208 on page 622.

3. Select the Port Security tab.

The Port Security tab is shown in Figure 281.

Figure 281 Port Security Tab (Monitoring)

4. Click the port whose port security level you want to view. A selected port turns white. You can select more than one port at a time.

5. Click View.

The security information for the selected ports is displayed in the

Security for Port(s) page. An example is shown in Figure 282.

Section VIII: Web Browser Management

Figure 282 Security for Port(s) Tab

783

Chapter 48: MAC Address Security

This page is for viewing purposes only. The columns in the page are defined below:

Port

The number of the port.

Security Mode

The active security mode on the port.

Intruder Action

The column specifies the action taken by a port when it receives an invalid frame.

❑ Discard: The port discards invalid frames. This is the default.

❑ Send Trap: The port discards invalid frames and sends a trap.

❑ Disable Port: The port discards invalid frames, sends a trap, and disables the port.

Participating

This column applies only when the intrusion action on a port is set to trap or disable. It does not apply when intrusion action is set to discard. If this column contains No when intrusion action is set to trap or disable, the port discards invalid packets, but it does not send the SNMP trap or disable the port. When this column contains Yes, the port sends a trap and/or is disabled after receiving an invalid frame.

MAC Limit

This column specifies the maximum number of dynamic MAC addresses the port will learn. It only applies when a port is operating in the Limited security mode.

Section VIII: Web Browser Management 784

Chapter 49

802.1x Port-based Access Control

This chapter contains instructions on how to configure the 802.1x portbased access control feature on the switch.

❑ Enabling and Disabling Port-based Access Control on page 786

❑ Setting Port Roles on page 788

❑ Configuring Authenticator Port Parameters on page 790

❑ Configuring Supplicant Port Parameters on page 793

❑ Displaying the Port-based Access Control Settings on page 795

Note

For background information, refer to 802.1x Port-based Access

Control Overview on page 464.

785

Chapter 49: 802.1x Port-based Access Control

Enabling and Disabling Port-based Access Control

This procedure explains how to enable and disable port-based access control on the switch. If you have not assigned port roles and configured the parameter settings, you should skip this procedure and go first to

Setting Port Roles on page 788.

To enable or disable port-based access control, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Select Security.

The Security page is displayed with the 802.1x Port Access tab

selected by default, as shown in Figure 283.

Section VIII: Web Browser Management

Figure 283 802.1x Port Access Tab (Configuration)

Note

The Authentication Method field cannot be changed.

786

Section VIII: Web Browser Management

AT-S62 User’s Guide

3. To enable or disable the feature, do the following: a. Click the Enable Port Access check box. A check in the box means that the feature is activated on the switch. No check means that the feature is disabled.

b. Click Apply.

4. If you want to use the RADIUS accounting feature, configure the parameters in the RADIUS Accounting section of the tab. For

background information, refer to RADIUS Accounting on page 468.

The parameter are described below:

Enable Accounting

Activates and deactivate RADIUS accounting on the switch. A check in the box indicates the feature is activated. The default is Disabled.

Trigger Type

Specifies the action that causes the switch to send accounting information to the RADIUS server. The choices are:

❑ Start Stop - The switch sends accounting information whenever a client logs on or logs off the network. This is the default.

❑ Stop - The switch sends accounting information only when a client logs off.

Port Number

Specifies the UDP port for RADIUS accounting. The default is port

1813.

Type

Specifies the type of RADIUS accounting. The default is Network. This value cannot be changed.

Enable Update

Controls whether the switch is to send interim accounting updates to the RADIUS server. The default is disabled. If you enable this feature, use the next option to specify the intervals at which the switch is to send the accounting updates.

Update Interval

Specifies the intervals at which the switch is to send interim accounting updates to the RADIUS server. The range is 30 to 300 seconds. The default is 60 seconds.

5. Click Apply.

6. To permanently save the changes, use the Save Changes button in

the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

787

Chapter 49: 802.1x Port-based Access Control

Setting Port Roles

To set port roles for port-based access control, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Select Security.

The Security page is displayed with the 802.1x Port Access tab

selected by default, as shown in Figure 283 on page 786.

The graphical image of the switch shows which ports have been assigned port roles. An “A” indicates that a port is functioning as an authenticator while an “S” indicates the port is functioning as a supplicant. A black port has not been assigned a port role and is not participating in port-based access control. This is the default setting for a port.

3. To set a port’s role, click on the port. The selected port turns white.

You can select more than one port at a time.

4. Click Port Role.

The Port Role Configuration page is shown in Figure 284.

Section VIII: Web Browser Management

Figure 284 Port Role Configuration Page

5. Select the desired role for the port. Click None if the port is not to participate in port access control. This is the default setting. Clicking

Authenticator configures the port to function as an authenticator.

This is the appropriate setting if the port is connected to a supplicant.

Clicking Supplicant sets the port to function as an supplicant. This is the appropriate setting if the port is connected to an authenticator. A port can have only one port role at a time.

6. Click Apply.

788

AT-S62 User’s Guide

7. To configure authenticator port settings, go to Configuring

Authenticator Port Parameters on page 790. To configure supplicant

port settings, go to Configuring Supplicant Port Parameters on page

793.

Section VIII: Web Browser Management 789

Chapter 49: 802.1x Port-based Access Control

Configuring Authenticator Port Parameters

To configure authenticator port parameters, perform the following procedure:

1. From the 802.1x Port Access tab shown in Figure 283 on page 786,

click the authenticator port that you want to configure. You can select more that one authenticator port at a time. The selected port turns white.

Note

A port must already be configured as an authenticator before you can configure its settings. For instructions on how to set the role of

a port, refer to Setting Port Roles on page 788.

2. Click Settings.

The Authenticator Parameters page is shown in Figure 285.

Section VIII: Web Browser Management

Figure 285 Authenticator Parameters Page

3. Adjust the parameters as needed. The parameters are described below:

Port Control

This parameter can take the following values:

Force-authorized: Disables IEEE 802.1X port-based authentication and causes the port to transition to the authorized state without any authentication exchange required. The port transmits and receives normal traffic without 802.1x-based

790

Section VIII: Web Browser Management

AT-S62 User’s Guide authentication of the client. This is the default setting

Force-unauthorized: Causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface

Auto: Enables 802.1x port-based authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port changes or the port receives an EAPOL-Start packet from a supplicant. The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server. Each client that attempts to access the network is uniquely identified by the switch using the client's

MAC address.

Quiet Period

Sets the number of seconds that the port remains in the quiet state following a failed authentication exchange with the clien t.

The default value is 60 seconds. The range is 0 to 65,535 seconds.

TX Period

Sets the number of seconds that the switch waits for a response to an EAP-request/identity frame from the client before retransmitting the request. The default value is 30 seconds. The range is 1 to 65,535 seconds.

Reauth Period

Enables periodic reauthentication of the client, which is disabled by default. The default value is 3600 seconds. The range is 1 to

65,535 seconds.

Supplicant Timeout

Sets the switch-to-client retransmission time for the EAP-request frame. The default value for this parameter is 30 seconds. The range is 1 to 600 seconds.

Server Timeout

Sets the timer used by the switch to determine authentication server timeout conditions. The default value for this parameter is

30 seconds. The range is 1 to 65,535 seconds.

Max Requests

Specifies the maximum number of times that the switch retransmits an EAP Request packet to the client before it times out the authentication session. The default value for this parameter is

2 retransmissions. The range is 1 to 10 retransmissions.

791

Chapter 49: 802.1x Port-based Access Control

4. Click Apply.

5. To permanently save the changes, use the Save Changes button in

the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

Section VIII: Web Browser Management 792

AT-S62 User’s Guide

Configuring Supplicant Port Parameters

To configure supplicant port parameters, perform the following procedure:

1. From the 802.1x Port Access tab shown in Figure 283 on page 786,

click the supplicant port that you want to configure. You can select more that one supplicant port at a time. The selected port turns white.

Note

A port must already be designated as a supplicant before you can configure its settings. For instructions on how to set the role of a

port, refer to Setting Port Roles on page 788.

2. Click Settings.

The Supplicant Parameters page is shown in Figure 285.

Section VIII: Web Browser Management

Figure 286 Supplicant Parameters Page

3. Adjust the parameters as needed. The parameters are described below:

Auth Period

Specifies the period of time in seconds that the supplicant will wait for a reply from the authenticator after sending an EAP-

Response frame. The range is 1 to 60 seconds. The default is 30 seconds.

793

Chapter 49: 802.1x Port-based Access Control

Held Period

Specifies the amount of time in seconds the supplicant is to refrain from retrying to re-contact the authenticator in the event the end user provides an invalid username and/or password.

Once the time period has expired, the supplicant can attempt to log on again. The range is 0 to 65,535 seconds. The default value is 60 seconds.

Max Start

Specifies the maximum number of times the supplicant will send

EAPOL-Start frames before assuming that there is no authenticator present. The range is 1 to 10. The default is 3.

Start Period

Specifies the time period in seconds between successive attempts by the supplicant to establish contact with an authenticator when there is no reply. The range is 1 to 60. The default is 30.

User Name

Specifies the username for the switch port. The port sends the name to the authentication server for verification when the port logs on to the network. The username can be from 1 to 64 alphanumeric characters (A to Z, a to z, 1 to 9). Do not use spaces or special characters, such as asterisks or exclamation points. The username is case-sensitive.

User Password

Specifies the password for the switch port. The port sends the password to the authentication server for verification when the port logs on to the network. The password can contain alphanumeric characters (A to Z, a to z, 1 to 9). Do not use spaces or special characters, such as asterisks or exclamation points. The password is case-sensitive.

4. Click Apply.

5. To permanently save the changes, use the Save Changes button in

the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

Section VIII: Web Browser Management 794

AT-S62 User’s Guide

Displaying the Port-based Access Control Settings

To display the port-based access control settings, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. From the Monitoring menu, select the Security option.

The 802.1x Port Access tab opens with the 802.1x Port Access tab

selected by default, as shown in Figure 287.

Section VIII: Web Browser Management

Figure 287 802.1x Port Access Tab (Monitoring)

3. To see the status of a port, click the port and click Status. You can select more than one port at a time.

795

Chapter 49: 802.1x Port-based Access Control

A port status page is displayed, as shown in Figure 288.

Section VIII: Web Browser Management

Figure 288 Port Status Page

4. To review the port access settings, click the port and click Settings.

You can

Note

To view the settings of multiple ports, you have to select ports that have the same port role (authenticator or supplicant).

For authenticator port(s), the Authenticator Port Parameters page

is displayed, as shown in Figure 289.

Figure 289 Authenticator Port Parameters Page

For supplicant port(s), the Supplicant Port Parameters Page is

displayed, as shown in Figure 290.

Figure 290 Supplicant Port Parameters Page

796

Chapter 50

Secure Shell Protocol

This chapter contains the procedure for configuring the SSH protocol settings. Sections in this chapter include:

❑ Configuring the SSH Server on page 798

❑ Displaying SSH Information on page 800

Note

For background information, refer to SSH Overview on page 544.

797

Chapter 50: Secure Shell Protocol

Configuring the SSH Server

This section describes how to configure the SSH server software on the switch. For an overview of all the steps to configuring the SSH server, see

General Steps to Configuring SSH on page 547.

This procedure assumes that you have already created the two key pairs.

If you have not created the keys, go to Creating an Encryption Key on page 500. You cannot create encryption keys from a web browser

management session.

Prior to configuring the SSH feature, you must disable the SSH server.

When you have completed your configuration changes, enable the SSH server to permit SSH client connections.

Note

Allied Telesyn recommends disabling the Telnet server before activating SSH. Otherwise, the security functions provided by SSH

are lost. See Enabling or Disabling the Telnet Server on page 73.

To configure the SSH server software on the switch, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Click Security.

3. Select the Secure Shell tab. The Secure Shell tab is shown in Figure

291.

Section VIII: Web Browser Management

Figure 291 Secure Shell Tab (Configuration)

798

Section VIII: Web Browser Management

AT-S62 User’s Guide

4. Configure the parameters as needed. The parameters are described below:

Status

Enables and disables the feature. Choose from one of the following:

Disabled - Disables the SSH server. While you are configuring SSH, you must set this field to Disabled. This is the default.

Enabled - Enables the SSH server. Select this value after you have finished configuring SSH and want to log on to the server.

Note

You cannot disable the SSH server when there is an active SSH connection. Otherwise, you receive a warning message.

Key ID

Specifies the key ID of the encryption key pair to act as the SSH host key.

Server Key ID

Specifies the ID of the encryption key pair to act as the SSH server key.

Server Key Expiry Time

Specifies the time, in hours, for the server key to expire. This timer determines how often the switch generates a new server key. A server key is regenerated for security purposes. A server key is only valid for the time period configured in the Server Key Expiry

(Expiration) Time timer. Allied Telesyn recommends you set this field to 1. With this setting, a new key is generated every hour.

The default is 0 hours which means the server key never expires.

The range is 0 to 5 hours.

Login Timeout

Specifies the amount of time a switch waits before releasing the

SSH server from an incomplete SSH client connection. Enter a time in seconds. The default is 180 seconds (3 minutes). The range is 60 to 600 seconds.

5. When you have finished setting the parameters, click Apply.

6. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

799

Chapter 50: Secure Shell Protocol

Displaying SSH Information

To display SSH information, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. Click Security.

3. Select the Secure Shell tab.

The Secure Shell tab is shown in Figure 292.

Section VIII: Web Browser Management

Figure 292 Secure Shell (Monitoring)

The following information is displayed:

❑ Versions Supported: Indicates the versions of SSH which are supported by the AT-S62 software.

❑ Server Status: Indicates whether or not the SSH server is enabled or disabled.

❑ Server Port: Indicates the well-known port for SSH. The default is port 22.

❑ Host Key ID: Indicates the host key ID defined for SSH.

❑ Host Key Bits: Indicates the number of bits in the host key.

800

AT-S62 User’s Guide

❑ Server Key ID: Indicates the server key ID defined for SSH.

❑ Server Key Bits: Indicates the number of bits in the server key.

❑ Server Key Expiry: Indicates the length of time, in hours, until the server key is regenerated. The default is 0 hours which means the server key is not regenerated.

❑ Login Timeout: Indicates the time, in seconds, until a SSH server is released from an incomplete connection with a SSH client.

❑ Authentication Available: Indicates the authentication method available. Currently, password authentication is the only supported method.

❑ Ciphers Available: Indicates the SSH ciphers that are available on the switch.

❑ MACs Available: Indicates the Message Authorization Code (MAC) that is used to validate incoming SSH messages to the server. Two algorithms are supported.

❑ Data Compression: Indicates whether or not data compression is available on the switch. Data compression is useful for networks that have a slow throughput speed.

Section VIII: Web Browser Management 801

Chapter 51

Encryption Keys, PKI, and SSL

This chapter explains how to view the encryption keys, PKI certificates, and SSL settings and includes the following sections:

❑ Displaying Encryption Keys on page 803

❑ Displaying PKI Settings and Certificates on page 804

❑ Displaying the SSL Settings on page 807

Note

For background information on encryption keys, refer to Basic

Overview on page 493 or Technical Overview on page 495. For

background information on certificates, refer to Basic Overview on

page 511 or Technical Overview on page 516.

You cannot create encryption keys, self-signed certificates, or enrollment requests from a web browser management session. Nor can you adjust SSL or PKI parameter settings. These functions must be performed from a local or Telnet management session.

802

AT-S62 User’s Guide

Displaying Encryption Keys

To display the SSL and SSH encryption key pairs, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. Click Security.

3. Select the Keys tab.

The Keys tab is shown in Figure 293.

Section VIII: Web Browser Management

Figure 293 Keys Tab (Monitoring)

This tab lists the key pairs existing on the switch. The fields in the menu are described below:

ID

The identification number of the key.

Algorithm

The algorithm used in creating the encryption. This is always RSA

- Private.

Length

The length of the key in bits.

Digest

The CRC32 value of the MD5 digest of the public key.

Description

The key’s description.

803

Chapter 51: Encryption Keys, SSL, and PKI

Displaying PKI Settings and Certificates

To display the self-signed and CA certificates stored in the certificate database and the PKI settings, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. Click the Security option.

3. Select the PKI tab.

The PKI tab is shown in Figure 293.

Section VIII: Web Browser Management

Figure 294. PKI Tab (Monitoring)

The upper section states the maximum number of certificates that can be configured on the switch.

The lower section displays a table that lists the currently configured certificates and contains the following columns of information:

Name

The certificate name.

State

The state of the certificate, one of the following:

❑ Trusted - The certificate is from a trusted CA.

❑ Untrusted - The certificate is from an untrusted CA.

804

Section VIII: Web Browser Management

AT-S62 User’s Guide

MTrust (Manually Trusted)

The certificate has been manually verified that it is from a trusted or untrusted authority.

Type

The certificate type, one of the following:

❑ EE - The certificate was issued by a CA.

❑ CA - The certificate belongs to a CA.

❑ Self - A self-signed certificate.

Source

The certificate was created on the switch.

4. To view the details about a certificate, click the certificate and click

View.

The X509 Certificate Details page provides the following information about the certificate:

Name

The name of the certificate.

State

Whether the certificate is Trusted or Untrusted.

Manually Trusted

You verified the certificate is from a trusted or untrusted authority.

Type

The type of the certificate. The options are EE, SELF, and CA.

Source

The certificate was created on the switch.

Version

The version number of the AT-S63 management software.

Serial Number

The certificate’s serial number.

Signature Algorithm

The signature algorithm of the certificate.

Public Key Algorithm

The public key algorithm.

Not Valid Before

The date the certificate became active.

Not Valid After

The date the certificate expires. Self-signed certificates are valid for two years.

805

Chapter 51: Encryption Keys, SSL, and PKI

Subject

The Subject distinguished name.

Issuer

The certificate issuer’s distinguished name.

MD5 Fingerprint

The MD5 algorithm. This value provides a unique sequence for each certificate consisting of 16 bytes.

SHA1 Fingerprint

The Secure Hash Algorithm. This value provides a unique sequence for each certificate consisting of 20 bytes.

5. Click Close to close the page.

Section VIII: Web Browser Management 806

AT-S62 User’s Guide

Displaying the SSL Settings

To display the SSL settings, perform the following procedure:

1. From the Home page, select Monitoring.

The System page is displayed with the General tab selected by

default, as shown in Figure 195 on page 590.

2. From the Monitoring menu, select the Security option.

3. Select the SSL tab.

The SSL tab is shown in Figure 295.

Figure 295 SSL Tab (Monitoring)

The SSL tab provides the following information:

Maximum Number of Sessions

The maximum number of SSL sessions allowed at one time.

Session Cache Timeout

The length of time before the session cache times out, in seconds.

Section VIII: Web Browser Management 807

Chapter 52

RADIUS and TACACS+

Authentication Protocols

This chapter contains instructions on how to configure the authentication protocols. This chapter contains the following procedures:

❑ Configuring RADIUS and TACACS+ on page 809

❑ Displaying the RADIUS or TACSACS+ Settings on page 813

Note

For background information on the authentication protocols, refer

to 802.1x Port-based Access Control Overview on page 464 and

TACACS+ and RADIUS Overview on page 553.

808

AT-S62 User’s Guide

Configuring RADIUS and TACACS+

To configure the authentication protocols, perform the following procedure:

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586

2. Select the Server-based Authentication tab.

The Server-based Authentication tab is shown in Figure 296.

Section VIII: Web Browser Management

Figure 296 Server-based Authentication Tab (Configuration)

Note

The Enable Server-based Authentication check box applies only to

new manager accounts, described in TACACS+ and RADIUS

Overview on page 553. It does not apply to 802.1x port-based access

control, described in 802.1x Port-based Access Control Overview on page 464.

3. To select an authentication protocol, click either RADIUS or TACACS+ in the Authentication Method section of the tab. The default is

TACACS+.

Note

The switch can support only one authentication protocol at a time.

Additionally, you cannot select a different authenticator protocol when this feature is enabled.

809

Chapter 52: RADIUS and TACACS+ Authentication Protocols

4. Click Apply.

Note

To configure TACACS+, go to Step 6. To configure RADIUS, go to

Step 7.

5. To configure TACACS+, do the following: a. In lower section of the Server-based Authentication tab, click

TACACS+ Configuration and click Configure.

The TACACS+ Client Configuration page is shown in Figure

297.

Section VIII: Web Browser Management

Figure 297 TACACS+ Configuration Page b. Configure the parameters as needed. They are described below.

Global Secret

If all of the TACACS+ servers have the same encryption secret, you can enter the key here. If the servers have different keys, you must specify each key when you specify a server’s IP address.

Global Server Timeout

This parameter specifies the maximum amount of time the switch will wait for a response from a TACACS+ server before assuming the server cannot respond. If the timeout expires and the server has not responded, the switch queries the next

TACACS+ server in the list. If there aren’t any more servers, than the switch will default to the standard Manager and

Operator accounts. The default is 30 seconds. The range is 1 to

30 seconds.

810

AT-S62 User’s Guide

IP Address and Encryption Key

Use these fields to specify the IP addresses and encryption secrets of up to three network servers containing TACACS+ server software. You can leave an encryption field blank if you entered the server’s secret in the Global Secret field.

c. After you have finished configuring the parameters, click Apply.

d. To enable the authentication feature on the switch, click the

Enable Server-based Authentication check box. A check in the box indicates that this feature is enabled. No check indicate the feature is disabled. The default is disabled.

e. To permanently save the changes, use the Save Changes button

in the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

6. To configure RADIUS, do the following: a. In lower section of the Server-based Authentication tab, click

RADIUS Configuration and click Configure.

The RADIUS Client Configuration page is shown in Figure 297.

Section VIII: Web Browser Management

Figure 298 RADIUS Configuration Page b. Configure the parameters as needed. They are described below.

Global Encryption Key

If all of the TACACS+ servers have the same encryption secret, you can enter the key here. If the servers have different keys, you must specify each key when you specify a server’s IP address.

811

Chapter 52: RADIUS and TACACS+ Authentication Protocols

Global Server Timeout

This parameter specifies the maximum amount of time the switch will wait for a response from a TACACS+ server before assuming the server cannot respond. If the timeout expires and the server has not responded, the switch queries the next

TACACS+ server in the list. If there aren’t any more servers, than the switch will default to the standard Manager and

Operator accounts. The default is 30 seconds. The range is 1 to

30 seconds.

IP Address, Port #, and Encryption Key

Use these fields to specify the IP address, UDP port number, and encryption key of each RADIUS server. You can specify up to a maximum of three servers. You can leave the encryption field blank if you entered the server’s key in the Global Secret field.

c. After you have finished configuring the parameters, click Apply.

d. To enable the authentication feature on the switch, click the

Enable Server-based Authentication check box. A check in the box indicates that this feature is enabled. No check indicate the feature is disabled. The default is disabled.

Note

The Enable Server-based Authentication check box applies only when you are using the RADIUS client software to support new manager accounts. If you will be using RADIUS for 802.1x port-based access control but not for new manager accounts, you should leave the check box empty.

e. To permanently save the changes, use the Save Changes button

in the General tab. For directions, refer to Saving Your Parameter

Changes on page 577.

Section VIII: Web Browser Management 812

AT-S62 User’s Guide

Displaying the RADIUS or TACSACS+ Settings

To display the RADIUS or TACACS+ settings on the switch, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. Select the Server-based Authentication tab.

The Server-based Authentication tab is shown in Figure 299.

Figure 299 Server-Based Authentication Tab (Monitoring)

The upper part of the page displays whether server-based authentication is enabled or disabled and the authentication method. The lower part of the page allows you to view either the settings for the current authentication method.

3. To view the TACACS+ or RADIUS settings, click TACACS+ or RADIUS.

4. Click View.

Section VIII: Web Browser Management 813

Chapter 52: RADIUS and TACACS+ Authentication Protocols

The TACACS+ (Figure 300) or RADIUS (Figure 301) client

configuration page is displayed.

Figure 300 TACACS+ Client Configuration Page (Monitoring)

Figure 301 RADIUS Client Configuration Page (Monitoring)

Section VIII: Web Browser Management 814

Chapter 53

Management Access Control List

This chapter explains how to create a Management Access Control List

(ACL). You can use the ACL to restrict Telnet and web browser management access to the switch. Sections in this chapter include:

❑ Creating a Management ACL on page 816

❑ Adding or Deleting an ACE on page 818

❑ Displaying the Management ACL on page 819

Note

For background information, refer to Management Access Control

List Overview on page 564.

815

Chapter 53: Management Access Control List

Creating a Management ACL

To create a Management ACL, perform the following procedure:

Note

Activating this feature without specifying any ACEs will prohibit you from managing the device remotely.

1. From the Home Page, select Configuration.

The System page is displayed with the General tab selected by

default, as shown in Figure 194 on page 586.

2. Click Security.

3. Select the Mgmt ACL tab.

The Mgmt ACL tab is shown in Figure 302.

Section VIII: Web Browser Management

Figure 302 Mgmt ACL Tab (Configuration)

ACEs already existing in the Management ACL are listed in the middle section of the tab.

4. To add a new ACE, in the Mgmt. ACL IP Address field enter the IP address of a specific management workstation (for example,

149.11.11.11) or a subnet. You must enter an IP address. If you enter an IP address of a specific management node, then that node will

816

Section VIII: Web Browser Management

AT-S62 User’s Guide been permitted remote management access to the switch. If you enter a subnet. then any management node in the subnet will be permitted remote management access to the switch.

5. In the Mgmt. ACL IP Mask field enter a mask that indicates the parts of the IP address the switch should filter on. A binary “1” indicates the switch should filter on the corresponding bit of the address, while a

“0” indicates that it should not. If you are filtering on a specific IP address, use the mask 255.255.255.255. If you are filtering on a subnet, the mask will depend on the address. For example, to allow all management workstations in the subnet 149.11.11.0 to manage the switch, you would enter the mask 255.255.255.0.

6. From the Protocol list, select either TCP or ALL. (Do not select UDP.)

7. From the Interface list, select the interface that you want the management workstation to be able to use when managing the switch. Your choices are:

❑ Telnet - Permits Telnet management.

❑ Web - Permits web browser management.

❑ All - Permits both Telnet and web browser.

8. Click Add.

9. If desired, repeat this procedure starting with Step 4 to add more

ACEs to the Management ACL.

10. Once you have added all of the ACEs, click the check box Enable

MGMT. ACL and then click Apply.

The Management ACL is now active on the switch.

11. To permanently save the change, use the Save Changes button in the

General tab. For directions, refer to Saving Your Parameter Changes on page 577.

817

Chapter 53: Management Access Control List

Adding or Deleting an ACE

You can add or delete ACEs from the management ACL at any time. To add a new ACE, simply repeat the procedure in the previous section.

New ACEs are immediately activated on the switch once added to the

ACL.

To remove an ACE, from the Mgmt ACL menu click the button next to the ACE you want to delete and click Delete.

Section VIII: Web Browser Management 818

AT-S62 User’s Guide

Displaying the Management ACL

To display the ACEs in the Management ACL, do the following:

1. From the Home page, select Monitoring.

The Monitoring System page is displayed with the General tab

selected by default, as shown in Figure 195 on page 590.

2. Click Security.

3. Select the Mgmt ACL tab.

The Mgmt ACL tab is shown in Figure 303.

Section VIII: Web Browser Management

Figure 303 Mgmt ACL Tab (Monitoring)

The information in the tab is described below:

IP Address

The IP address of a management workstation or subnet.

IP Mask

The mask used by the switch to filter the IP address.

Protocol

The protocol of the Telnet or web browser management packets.

This will be either TCP or ALL.

Interface

The management interface allowed by the ACE. This will be

TELNET, WEB, or ALL.

819

Appendix A

AT-S62 Default Settings

This appendix lists the AT-S62 factory default settings. It contains the following sections:

❑ Basic Switch Default Settings on page 821

❑ Enhanced Stacking Default Setting on page 824

❑ SNMP Default Settings on page 825

❑ Port Configuration Default Settings on page 826

❑ Event Log Default Settings on page 827

❑ Quality of Service on page 828

❑ IGMP Snooping Default Settings on page 829

❑ Denial of Service Prevention Default Settings on page 830

❑ STP, RSTP, and MSTP Default Settings on page 831

❑ VLAN Default Settings on page 833

❑ GVRP Default Settings on page 834

❑ MAC Address Security Default Settings on page 835

❑ 802.1x Port-Based Network Access Control Default Settings on page 836

❑ Web Server Default Settings on page 837

❑ SSL Default Settings on page 838

❑ PKI Default Settings on page 839

❑ SSH Default Settings on page 840

❑ Server-Based Authentication Default Settings on page 841

❑ Management Access Control List Default Setting on page 842

820

AT-S62 User’s Guide

Basic Switch Default Settings

Boot

Configuration

File Default

Setting

This section lists the default settings for basic switch parameters. The following topics are covered:

❑ Boot Configuration File Default Setting on page 821

❑ Management Access Default Settings on page 821

❑ Management Interface Default Settings on page 821

❑ RS-232 Port Default Settings on page 822

❑ SNTP Default Settings on page 822

❑ Switch Administration Default Settings on page 823

❑ System Software Default Settings on page 823

The following table lists the File Menu default setting.

File Menu Setting

Default Configuration File

Default

boot.cfg

Management

Access Default

Settings

The following table lists the management access default settings.

Remote Management Access Setting

Telnet

SNMP

TFTP

Web Server

Default

Enabled

Disabled

Enabled

Enabled

Management

Interface

Default Settings

The following table lists the management interface default settings.

Management Interface Setting

Manager Login Name

Manager Password

Operator Login Name

Operator Password

Default

manager friend operator operator

821

Appendix A: AT-S62 Default Settings

Management Interface Setting

Console Disconnect Timer Interval

Default

10 minutes

Note

Login names and passwords are case-sensitive.

RS-232 Port

Default Settings

The following table lists the RS-232 Terminal Port default settings.

RS-232 Port Setting

Data Bits

Stop Bits

Parity

Flow Control

Baud Rate

Default

8

1

None

None

9600 bps

SNTP Default

Settings

The following table lists the SNTP default settings.

SNTP Setting

System Time

SNTP Status

SNTP Server

UTC Offset

Daylight Savings Time (DST)

Poll Interval

Default

00:00:00 on January 1,

1970

Disabled

0.0.0.0

+0

Enabled

600 seconds

822

AT-S62 User’s Guide

Switch

Administration

Default Settings

The following table describes the switch administration default settings

.

Administration Setting

IP Address

Subnet Mask

Gateway Address

System Name

Administrator

Comments

BOOTP/DHCP

MAC Address Aging Time

Default

0.0.0.0

0.0.0.0

0.0.0.0

None

None

None

Disabled

300 seconds

System

Software

Default Settings

The following table lists the system software default settings.

System Software Setting

Console Startup Mode

Default

Command line

823

Appendix A: AT-S62 Default Settings

Enhanced Stacking Default Setting

The following table lists the enhanced stacking default setting.

Enhanced Stacking Setting

Switch State

Default

Slave

824

AT-S62 User’s Guide

SNMP Default Settings

The following table describes the SNMPv1 and SNMPv2c default settings.

SNMP Communities Setting

SNMP Status

Authentication Failure Trap Status

Community Name

Community Name

Status (public)

Status (private)

Open Status (public

Open Status (private)

Default

Disabled

Disabled public (Read only) private (Read|Write)

Enabled

Enabled

Yes

Yes

825

Appendix A: AT-S62 Default Settings

Port Configuration Default Settings

The following table lists the port configuration default settings.

Port Configuration Setting

Status

Broadcast Filter

Override Priority

HOL Blocking

Back Pressure

Flow Control

Speed

Duplex Mode

MDI/MDI-X

Default

Enabled

Disabled

No override

Disabled

Disabled

Auto

Auto-Negotiation

Auto-Negotiation

Auto-MDI/MDIX

826

Event Log Default Settings

The following table lists the event log default settings.

Event Log Setting

Status

Full Log Action

Default

Enabled

Wrap

AT-S62 User’s Guide

827

Appendix A: AT-S62 Default Settings

Quality of Service

The following table lists the default mappings of IEEE 802.1p priority levels to egress port priority queues.

IEEE 802.1p Priority Level

0 and 1

2 and 3

4 and 5

6 and 7

Port Priority Queue

Q0 (lowest)

Q1

Q2

Q3 (highest)

828

AT-S62 User’s Guide

IGMP Snooping Default Settings

The following table lists the IGMP Snooping default settings.

IGMP Snooping Setting

IGMP Snooping Status

Multicast Host Topology

Host/Router Timeout Interval

Maximum Multicast Groups

Multicast Router Ports Mode

Default

Disabled

Single Host/ Port (Edge)

260 seconds

64

Auto Detect

829

Appendix A: AT-S62 Default Settings

Denial of Service Prevention Default Settings

The following table lists the default settings for the Denial of Service prevention feature.

Denial of Service Prevention Setting

IP Address

Subnet Mask

Uplink Port

SYN Flood Defense

Smurf Defense

Land Defense

Teardrop Defense

Ping of Death Defense

IP Options Defense

Default

0.0.0.0

0.0.0.0

26

Disabled

Disabled

Disabled

Disabled

Disabled

Disabled

830

AT-S62 User’s Guide

STP, RSTP, and MSTP Default Settings

This section provides the spanning tree, STP RSTP, and MSTP, default settings.

Spanning Tree

Switch Settings

The following table describes the Spanning Tree Protocol default settings for the switch.

STP Switch Setting

Spanning Tree Status

Active Protocol Version

Default

Disabled

RSTP

STP Default

Settings

The following table describes the STP default settings.

STP Setting

Bridge Priority

Bridge Hello Time

Bridge Forwarding

Bridge Max Age

Port Cost

Port Priority

Default

32768

2

15

20

Automatic -Update

128

RSTP Default

Settings

The following table describes the RSTP default settings.

RSTP Setting

Force Version

Bridge Priority

Bridge Hello Time

Bridge Forwarding

Bridge Max Age

Edge Port

Point-to-Point

Port Cost

Default

RSTP

32768

2

15

20

Yes

Auto Detect

Automatic Update

831

Appendix A: AT-S62 Default Settings

RSTP Setting

Port Priority

Default

128

MSTP Default

Settings

The following table lists the MSTP default settings.

MSTP Setting

Status

Force Version

Bridge Hello Time

Bridge Forwarding Delay

Bridge Max Age

Maximum Hops

Configuration Name

Revision Level

CIST Priority

Port Priority

Port Internal Path Cost

Port External Path Cost

Point-to-Point

Edge Port

15

20

20 null

Default

Disabled

MSTP

2

0

Increment 8 (32768)

Increment 8 (128)

Auto Update

200,000

Auto Detect

Yes

832

AT-S62 User’s Guide

VLAN Default Settings

This section provides VLAN default settings.

VLAN Setting

Default VLAN Name

Management VLAN ID

VLAN Mode

Uplink Port

Default

Default_VLAN (all ports)

1 (Default_VLAN)

User Configured

None

833

Appendix A: AT-S62 Default Settings

GVRP Default Settings

This section provides the default settings for GVRP.

GVRP Setting

Status

GIP Status

Join Timer

Leave Timer

Leave All Timer

Port Mode

Default

Disabled

Enabled

20 centiseconds

60 centiseconds

1000 centiseconds

Normal

834

AT-S62 User’s Guide

MAC Address Security Default Settings

The following table lists the MAC address security default settings.

MAC Address Security Setting

Security Mode

Intrusion Action

Participating

MAC Limit

Default

Automatic (no security)

Discard

No

No Limit

835

Appendix A: AT-S62 Default Settings

802.1x Port-Based Network Access Control Default Settings

The following table describes the 802.1x Port Access Control default settings.

802.1x Port Access Control Setting

Port Access Control

Authentication Method

Port Role

Default

Disabled

RADIUS EAP

None

The following table lists the default settings for RADIUS accounting.

RADIUS Accounting Setting

Status

Port

Type

Trigger Type

Update Status

Update Interval

Default

Disabled

1813

Network

Start_Stop

Disabled

60

836

Web Server Default Settings

The following table lists the web server default settings.

Web Server Configuration Setting

Status

Mode

Port Number

SSL Key ID

Default

Enabled

HTTP

80

None

AT-S62 User’s Guide

837

Appendix A: AT-S62 Default Settings

SSL Default Settings

The following table lists the SSL default settings.

SSL Setting

Maximum Number of Sessions

Session Cache Timeout

Default

50

300 seconds

838

AT-S62 User’s Guide

PKI Default Settings

The following table lists the PKI default settings, including the generate enrollment request settings.

PKI Setting

Switch Distinguished Name

Maximum Number of Certificates

Request Name

Key Pair ID

Format

Type

Default

None

256

None

0

PEM

PKCS10

839

Appendix A: AT-S62 Default Settings

SSH Default Settings

The following table lists the SSH default settings.

SSH Setting

Status

Host Key ID

Server Key ID

Server Key Expiry Time

Login Timeout

Default

Disabled

Not Defined

Not Defined

0 hours

180 seconds

840

AT-S62 User’s Guide

Server-Based Authentication Default Settings

This section describes the server-based authentication, RADIUS, and

TACACS+ client default settings.

Server-Based

Authentication

Default Settings

The following table describes the server-based authentication default settings.

Server-based Authentication Setting

Server-based Authentication

Active Authentication Method

Default

Disabled

TACACS+

RADIUS Default

Settings

The following table lists the RADIUS configuration default settings.

RADIUS Configuration Setting

Global Encryption Key

Global Server Timeout Period

RADIUS Server 1 Configuration

RADIUS Server 2 Configuration

RADIUS Server 3 Configuration

Auth Port

Encryption Key

Default

ATI

30 seconds

0.0.0.0

0.0.0.0

0.0.0.0

1812

Not Defined

TACACS+ Client

Default Settings

The following table lists the TACACS+ client configuration default settings.

TACACS+ Client Configuration Setting Default

TAC Server 1

TAC Server 2

TAC Server 3

TAC Server Order

TAC Global Secret

TAC Timeout

0.0.0.0

0.0.0.0

0.0.0.0

1 2 3

None

30 seconds

841

Appendix A: AT-S62 Default Settings

Management Access Control List Default Setting

The following table lists the default setting for the Management Access

Control List.

Management ACL Setting

Status

Default

Disabled

842

Appendix B

SNMPv3 Configuration Examples

This appendix provides two examples of SNMPv3 configuration using the SNMPv3 Table menus and a worksheet to use as an aid when configuring the SNMPv3 protocol. It includes the following sections:

❑ SNMPv3 Manager Configuration on page 844

❑ SNMPv3 Operator Configuration on page 845

❑ SNMPv3 Worksheet on page 846

843

Appendix B: SNMPv3 Configuration Examples

SNMPv3 Configuration Examples

This appendix provides SNMPv3 configuration examples for the following types of users:

❑ a Manager

❑ an Operator

In addition an SNMPv3 Configuration Table is provided to record your

SNMPv3 configuration.

For more information about the SNMPv3 protocol, see Chapter 17,

SNMPv3 Configuration on page 222.

SNMPv3

Manager

Configuration

This section provides a sample configuration for a Manager with a User

Name of systemadmin24. Each table is listed with its parameters.

Configure SNMPv3 User Table Menu

User Name: systemadmin24

Authentication Protocol: MD5

Privacy Protocol: DES

Storage Type: NonVolatile

Configure SNMPv3 View Table Menu

View Name: internet

View Subtree OID: internet (or 1.3.6.1)

Subtree Mask:

View Type: Included

Storage Type: NonVolatile

Configure SNMPv3 Access Table

Group Name: Managers

Security Model: SNMPv3

Security Level: P-Authentication and Privacy

Read View Name: internet

Write View Name: internet

Notify View Name: internet

Storage Type: NonVolatile

844

AT-S62 User’s Guide

SNMPv3

Operator

Configuration

Configure SNMPv3 SecurityToGroup Table

User Name:systemadmin24

Security Model:v3

Group Name: Managers

Storage Type: NonVolatile

Configure SNMPv3 Notify Table

Notify Name: sysadminTrap

Notify Tag: sysadminTag

Notify Type: Trap

Storage Type: NonVolatile

Configure SNMPv3 Target Address Table

Target Address Name: host451

Target IP Address: 198.35.11.1

UDP Port#: 162

Timeout: 1500

Retries: 3

Tag List: sysadminTag

Target Parms Name: SNMPmanagerPC

Storage Type: NonVolatile

Configure SNMPv3 Target Parameters Table

Target Parameters Name:SNMPmanagerPC

User Name:systemadmin24

Security Model: v3

Security Level: P-Authentication and Privacy

Storage Type: NonVolatile

This section provides a sample configuration for an Operator with a User

Name of nikoeng73. Since this user will only send messages to a group and not an SNMP host, you do not need to configure message notification for this user.

Configure SNMPv3 User Table Menu

User Name: nikoeng73

Authentication Protocol: MD5

Privacy Protocol: None

Storage Type: NonVolatile

845

Appendix B: SNMPv3 Configuration Examples

SNMPv3

Worksheet

Configure SNMPv3 View Table Menu

View Name: internet

View Subtree OID: 1.3.6.1 (or internet)

Subtree Mask:

View Type: Included

Storage Type: NonVolatile

Configure SNMPv3 Access Table

Group Name: Operators

Security Model: SNMPv3

Security Level: Authentication

Read View Name: internet

Write View Name:

Notify View Name:

This section supplies a table that you can use a worksheet when configuring SNMPv3. Each SNMPv3 Table is listed with its associated parameters.

SNMPv3 Parameters

SNMPv3 User Table

User Name

Authentication Protocol

Authentication Password

Privacy Protocol

Privacy Password

Storage Type

SNMPv3 View Table Menu

View Name

View Subtree OID

Subtree Mask

View Type

Storage Type

846

SNMPv3 Parameters (Continued)

SNMPv3 Access Table Menu

Group Name

Security Model

Security Level

Read View Name

Write View Name

Notify View Name

Storage Type

SNMPv3 SecurityToGroup Table

User Name

Security Model

Group Name

Storage Type

SNMPv3 Notify Table

Notify Name

Notify Tag

Notify Type

Storage Type

SNMPv3 Target Address Table

Target Address Name

Target IP Address

UDP Port

Timeout

Retries

Tag List

Target Parms Name

AT-S62 User’s Guide

847

Appendix B: SNMPv3 Configuration Examples

SNMPv3 Parameters (Continued)

Storage Type

SNMPv3 Target Parameters Table

Target Parameters Name

User (Security) Name

Security Model

Security Level

Storage Type

848

Index

Numerics

802.1x port-based network access control

access role, configuring 474, 788

authentication process 465

authenticator port

configuring 476, 790

described 464

configuring 474, 788

default settings 836

disabling 473, 786 enabling 473, 786

guidelines 470

overview 464

port role, configuring 474, 788

port roles 466

supplicant port

configuring 480, 793

described 464

A

access control entry (ACE)

adding 570, 818 deleting 570, 818

described 564

displaying 570

parts of 564

access control list (ACL)

creating 816

described 564

guidelines 565

ACE. See access control entry (ACE)

ACL. See access control list (ACL)

administrator name

configuring 61, 587

default setting 823

aging time

changing 120, 627

default setting 823

defined 111

app (applicant state machine) parameter 444 app parameter 444

associated VLANs parameter 375

associations

defined 358

VLANs to MSTI IDs 377

asymmetrical encryption algorithms 497

AT-S62 software

default settings 820

resetting to factory defaults 76, 596

AT-S62 software updates

downloading 30

downloading from a local session 161, 177

obtaining 30

auth period 481, 793

authentication failure trap

default setting 825

disabling 86 enabling 86

authentication protocols 553, 809

authentication server 465

authenticator port role 466

authenticator port, described 464

automatic port security mode, described 455

849

Index auto-negotiation

configuring 100, 611, 612

forced 105

status 96

B

back pressure

configuring 104, 614

default setting 826

boot configuration file

configuring parameters 151

creating 149

displaying 153

editing 154

overview 149

selecting 152 selecting active 152

Boot Protocol (BootP)

activating 62, 589 deactivating 62

default setting 823

defined 62

BPDU, see bridge protocol data unit

BPDU. See bridge protocol data unit

bridge forwarding delay

default setting 831

Rapid Spanning Tree Protocol (RSTP) 348,

749

Spanning Tree Protocol (STP) 343, 746

bridge forwarding delay parameter

Multiple Spanning Tree Protocol (MSTP)

370

bridge forwarding delay parameter, 754

bridge hello time

default setting 831

Rapid Spanning Tree Protocol (RSTP) 348,

749

Spanning Tree Protocol (STP) 343, 746

bridge hello time parameter

Multiple Spanning Tree Protocol (MSTP)

370

bridge hello time parameter, 754

bridge identifier

described 331

Rapid Spanning Tree Protocol (RSTP) 349,

750

Spanning Tree Protocol (STP) 343, 747

bridge identifier parameter

Multiple Spanning Tree Protocol (MSTP)

371

bridge max age

default setting 831

Rapid Spanning Tree Protocol (RSTP) 348,

749

Spanning Tree Protocol (STP) 343, 746

bridge max age parameter

Multiple Spanning Tree Protocol (MSTP)

370

bridge max age parameter, 754

bridge priority

default setting 831

described 331

Rapid Spanning Tree Protocol (RSTP) 348,

749

Spanning Tree Protocol (STP) 343, 746

bridge priority, 755

bridge protocol data unit (BPDU) 335, 343, 348,

749

bridge protocol data unit (BPDU), 754

broadcast filter

default setting 826

disabling 99, 613 enabling 99, 613

broadcast frame control

configuring, 212

broadcast packets 108

browser tools 576

C

CA certificate

described 511

CA certificate, steps for 488

CA. See certification authority (CA)

CBC. See Cipher Block Chaining (CBC)

certificate database 522

certificate format 538

certificate revocation list (CRL), described 522

certificate type, configuring 529

certificates, guidelines 515

certificates, PKI

adding to database 528

chains 521

creating 524

database 522

850

database storage 522

deleting 531, 533

described 519

displaying 534

modifying 531, 533

validating 521

certificates, SSL

authentication 518 described 518

certificates, X.509 519

certification authority (CA)

described 520

root 521

CFB. See Cipher Feedback (CFB)

Cipher Block Chaining (CBC), described 496

Cipher Feedback (CFB), described 496

ciphers available parameter 551, 801

CIST priority parameter 373

CIST. See Common and Internal Spanning Tree

Class of Service (CoS)

configuring 196, 658

described 192

mapping to egress queues 200, 661

priority level and egress queue mappings

193

scheduling, configuring 201, 663

Common and Internal Spanning Tree (CIST)

configuring 372

defined 362 priority 362

community name parameter, SNMPv3 protocol

311, 729, 731

configuration file

default name 821

downloading switch to switch 169

configuration name 358

configuration name parameter 371

configuration name, 754

console disconnect interval

configuring 72

default setting 822

console startup mode, default setting 823

console timer 72

CoS. See Class of Service (CoS)

CRL. See certificate revocation list (CRL)

AT-S62 User’s Guide

D

data authentication, described 497

data compression parameter 551, 801

Data Encryption Standard (DES), described 495 data encryption, described 495

daylight savings time (DST)

default setting 822

setting 69

default values, AT-S62 software 820

default VLAN name 388

Denial of Service (DoS) defense

configuring 218, 674

default settings 830

enabling or disabling 676

mirror port 220, 676

overview 213

DER certificate format 538

DES privacy protocol 225

DES. See Data Encryption Standard (DES)

destination address load distribution method

126

destination IP address 124

destination MAC address 123

destination port 137

Diffie-Hellman algorithm 499

digital certificates. See certificates digital signatures 519

distinguished name

default setting 839

described 512

distinguished name, configuring 527

document conventions 27

documentation 28

DoS. See Denial of Service (DoS) defense

duplex mode 611

configuring 96, 612

default setting 826

dynamic GVRP port 421 dynamic GVRP VLAN 421

Dynamic Host Control Protocol (DHCP)

activating 62, 589 deactivating 62

default setting 823

dynamic MAC address, defined 111

851

Index

E

ECB. See Electronic Code Book (ECB)

edge port

default setting 831

described 336

Multiple Spanning Tree Protocol (MSTP)

382

Rapid Spanning Tree Protocol (RSTP) 350

edge port parameter 382

egress rules 416

Electronic Code Book (ECB), described 496

encryption (SSL) 516

encryption key

creating 500

deleting 504

described 493

exporting 506

importing 508

modifying 505

Secure Shell (SSH) 544

End Entity 520

Engine ID, defined 224

enhanced stacking

changing switches 582

configuring 52, 580

default switch setting 824

defined 44, 49, 57

diagram 51

guidelines 49

setting switch status 52, 580

enrollment request

creating 537

described 512

name, configuring 538

steps for 488

Ethernet port statistics, displaying 142

event log

default settings 827

F

factory defaults

list 820

resetting 76

file naming conventions 148

files

downloading 172, 175

upoading 177

flow control

configuring 103, 614

default setting 826

status 97

force renegotiation, configuring 105

force version

default setting 831

Rapid Spanning Tree Protocol (RSTP) 348,

749

force version parameter

Multiple Spanning Tree Protocol (MSTP)

370

force version, 754

forwarding delay 334

G

GARP Information Declaration (GID), diagram

428

GARP Information Propagation (GIP), defined

426

GARP VLAN Registration Protocol (GVRP)

configuring 430

database 441

diagram 422

disabling on a port 432, 778

displaying

GVRP state machine 443

parameters 436, 780 statistics 436

enabling on a port 432, 778

GIP connected ports ring 442

guidelines 423

GVRP counters 437

GVRP state machine, displaying 443

intermediate switches 425

overview 421

parameters, displaying 436, 780

security issues 424

statistics, displaying 436

GARP. See Generic Attribute Registration

Protocol (GARP) gateway address

configuring 61, 588

default setting 823

displaying 591

852

Generic Attribute Registration Protocol (GARP)

Applicant state machine 428

defined 426

diagram 427

overview 426

Registrar state machine 429

GID index parameter 441

GID. See GARP Information Declaration (GID)

GIP connected ports ring 442

GIP. See GARP Information Propagation (GIP)

global encryption key

configuring 560, 811

default setting 841

global secret

configuring 559, 810

default setting 841

global server timeout

configuring 560, 810

default setting 841

GVRP

default settings 834

GVRP counters 437

GVRP database 441

GVRP GIP status parameter 430, 777

GVRP join timer parameter 431, 777

GVRP leave all timer parameter 431, 777

GVRP leave timer parameter 431, 776

GVRP status parameter 430, 776

GVRP. See GARP VLAN Registration Protocol

(GVRP)

H

hardware information 78

hash algorithm 498

held period 481, 794

hello time

default setting 831

described 335

Rapid Spanning Tree Protocol (RSTP) 348,

749

Spanning Tree Protocol (STP) 343, 746

hello time parameter

Multiple Spanning Tree Protocol (MSTP)

370

HMAC authentication algorithm 498

HMAC-MD5-96 (MD5) authentication protocol

224

AT-S62 User’s Guide

HMAC-SHA-96 (SHA) authentication protocol

224

HOL blocking

configuring 102

default setting 826

host key ID parameter 549, 799

host nodes, displaying 671

host/router timeout interval

configuring 207, 669

default setting 829

HTTP 487

HTTPS 487

I

IEEE 802.1D standard 329

IEEE 802.1p standard 192

IEEE 802.1w standard 347

IGMP snooping. See Internet Group

Management Protocol (IGMP) snooping

image file, downloading 165

ingress filtering, enabling or disabling 417

ingress packet threshold 107

ingress rules 416

inner CBC encryption mode 496

Internet Group Management Protocol (IGMP) snooping

activating 206 configuring 206, 668 deactivating 206

default settings 829

disabling 207, 668

displaying

host nodes 209

multicast routers 211

enabling 207, 668

host nodes, displaying 209

multicast routers, displaying 211

overview 204

snoop topology 207, 668

Internet Protocol (IP) address

assigning 58

configuring 60, 588

default 823

switches 57

intrusion action (port)

configuring 460, 784

default setting 835

853

Index

IP Options attack 217

K

key exchange algorithms 498

key pair ID, configuring 538

L

Land attack 214

limited port security mode, described 455

link status 96

local management session

defined 34

quitting 44

starting 41, 42

locked port security mode, described 456

login timeout parameter 549, 799

M

MAC address aging time

changing 120, 627

default setting 823

MAC address table

defined 110

displaying 112, 622

MAC addresses

adding 116, 624

defined 110

deleting 118, 626

displaying 112, 622

MAC limit, default setting 835

MAC. See Message Authentication Code (MAC)

MACs available parameter 551, 801

Main Menu 43

Management Access Control List

default setting 842

management access defaults 821

management access levels 38, 65, 592

management ACL. See access control list (ACL)

Management Information Base. See MIBs

management interface defaults 821

management VLAN ID

configuring 419, 774

default setting 833

management VLAN, described 418

Manager access 38, 65, 592

manager accounts 553

Manager password

configuring 65, 592

default setting 821

master switch

assigning 52, 580 defined 52, 580

returning to 55, 583

max age

default setting 831

Rapid Spanning Tree Protocol (RSTP) 348,

749

Spanning Tree Protocol (STP) 343, 746

max age parameter

Multiple Spanning Tree Protocol (MSTP)

370

max hops parameter

Multiple Spanning Tree Protocol (MSTP)

371

max hops, 755

max requests 478, 791

max start 481, 794

maximum multicast groups

configuring 208, 669

default setting 829

maximum number of sessions

configuring 542

default setting 838

MCHECK parameter 382

MD5 authentication algorithm 498

MD5 authentication protocol 224

MDI 96

MDI/MDIX mode 100, 615

MDI-X 96

message authentication code (MAC)

defined 517

described 497

message encryption 518

MIB Subtree view 226

MIB tree

diagram 226

RFC 225

MIB view 225

MIBs

viewing 224

MIBs, supported 37

854

MSTI association to a VLAN

creating 378

removing 379

MSTI priority, defined 361

MSTI. See Multiple Spanning Tree Instance

(MSTI)

multicast groups, maximum 208, 669

multicast host topology

configuring 207, 668

default setting 829

multicast MAC address

adding 116, 624

deleting 118, 119, 626

displaying 112, 622

multicast packets 108

multicast router ports

configuring 208, 669

default setting 829

multicast router, displaying 671

Multiple Spanning Tree Instance (MSTI)

defined 354

diagram 357

guidelines 358

MSTI IDs

associating to VLANs 379

creating 375 deleting 375

list 374

modifying 376

removing a VLAN association 379

port priority 374

Multiple Spanning Tree Protocol (MSTP)

associating VLANs to MSTI IDs 377

associations 358

bridge forwarding delay 370 bridge hello time 370

bridge identifier 371

bridge max age 370

bridge settings, configuring 369

configuration name 358, 371

connecting VLANs 366

default settings 832

diagram 356

edge port 382

force version 370

max hops 371

AT-S62 User’s Guide

MSTI ID

creating 374 deleting 374

modifying 376

MSTI priority, defined 361

overview 353

point-to-point port 381 port external path cost 381 port internal path cost 381

port parameters, configuring 380

port priority 381

port settings, displaying 383 port status, displaying 383

regional root 361

regions 358

revision level 359, 371

with STP and RSTP 363

multiple VLAN

802.1Q-compliant 447 defined 447

mode

activating 451 deactivating 451

overview 447

N

negotiation status 96

non-802.1Q compliant multiple VLAN mode, described 449

none port role 466

NonVolatile storage, described 226

O

OFB. See Output Feedback (OFB)

Operator access 38, 65, 592

Operator password

configuring 65, 592

default setting 821

outer CBC encryption mode 496

Output Feedback (OFB), described 496

override priority, default setting 826

P

password

changing 592

default 43, 45, 575

path cost parameter 375

855

Index

PEM certificate format 538

Ping of Death attack 216

pinging 75, 595

PKI certificates

adding to database 528

certificate database 522

chains 521

creating 524

database storage 522

deleting 531, 533

described 519

displaying 534

maximum number of certificates, default setting 839

modifying 531, 533

validating 521

PKI. See Public Key Infrastructure (PKI)

point-to-point (port) parameter 381

point-to-point port

default setting 831

described 336

Multiple Spanning Tree Protocol (MSTP)

381

Rapid Spanning Tree Protocol (RSTP) 350,

750

poll interval

default setting 822

setting 70

port

configuring parameters, basic 610

default configuration 105

disabling 99, 612 enabling 99, 612

link status 617

resetting 105, 106

speed, 101

statistics, displaying 618

status

default setting 826

displaying 95, 616

port configuration, displaying, Rapid Spanning

Tree Protocol (RSTP) 351

port control 477, 790

802.1x port-based access control 791

force-authorized 790

force-unauthorized 791

port cost

default setting 831

Rapid Spanning Tree Protocol (RSTP) 350,

750

Spanning Tree Protocol (STP) 345, 747

port external path cost parameter, Multiple

Spanning Tree Protocol (MSTP) 381 port internal path cost parameter, Multiple

Spanning Tree Protocol (MSTP) 381

port mirror

creating 138, 638

deleting 140, 642

destination port 137

disabling 641 modifying 641

source port 137 port mirroring, described 137

port mode parameter 433

port parameters, configuring

basic 610

general 98

Multiple Spanning Tree Protocol (MSTP)

380

Rapid Spanning Tree Protocol (RSTP) 349,

748

Spanning Tree Protocol (STP) 344, 745

port priorities, displaying 202, 415

port priority

default setting 831

described 334

Rapid Spanning Tree Protocol (RSTP) 350,

750

Spanning Tree Protocol (STP) 345, 747

port priority parameter

Multiple Spanning Tree Instance (MSTI) 374

Multiple Spanning Tree Protocol (MSTP)

381

port role, default setting 836

port security

configuring 458

default settings 835

defined 455

displaying 461, 783

guidelines 457

intrusion action 460, 784

levels 455

port security violations 456

856

port speed

configuring 96, 611

default setting 826

port state, displaying, Rapid Spanning Tree

Protocol (RSTP) 351

port statistics, displaying 142

port trunk

creating 129, 629

deleting 135, 634

modifying 132, 632

port trunking

described 122 example 122 guidelines 122

port VLAN identifier (PVID)

described 389

displaying 202, 415

port-based access control. See 802.1x port-

based network access control port-based VLAN

creating 400, 404, 762 creating, example 404

defined 388

deleting 411, 768

diagram 391

displaying 410, 452, 769

drawbacks 390

modifying 406, 766

rules 390

ports, untagged 389

priority level and egress queue mappings 193

privacy 225

private keys 518 public key encryption 518

Public Key Infrastructure (PKI)

certificate database 522

certificates

adding 522

adding to database 528

chains 521

creating 524

deleting 531, 533

displaying 534

fingerprint 523

modifying 531, 533

retrieving 522

validating 521

AT-S62 User’s Guide

certification authority 520

certification authority (CA), root 521

default settings 839

End Entity 520

overview 518

standards 522

structure 520

X.509 certificates 519

PVID. See Port VLAN identifier (PVID)

Q

QoS. See Quality of Service (QoS)

Quality of Service

default settings 828

Quality of Service (QoS)

described 192

scheduling

configuring 200

described 194

quiet period, configuring 478, 791

R

RADIUS

configuring 809

default settings 841

disabling 557 enabling 557

guidelines 554

overview 553

settings, displaying 562 status, displaying 562

RADIUS server

encryption key 561, 811, 812

IP address, configuring 561, 812

Rapid Spanning Tree Protocol (RSTP)

bridge forwarding delay 348, 749 bridge hello time 348, 749

bridge identifier 750

bridge max age 348, 749

bridge parameters, configuring 347

bridge priority 348, 749

bridge settings, configuring 748

default settings 831

disabling 340, 743

edge port, configuring 350, 751

enabling 340

force version 348, 749

857

Index

MCHECK 382

parameters, displaying 760

point-to-point port, configuring 350, 750

port configuration, displaying 351

port cost 350, 750

port parameters, configuring 349, 749

port priority 350, 750

port settings, configuring 750

port settings, displaying 760

port state, displaying 351

rate limit, setting 107

reauth period, configuring 478, 791

reg (registrar state machine) parameter 445

regional root ID parameter 375 regional root path cost parameter 375

regional root, described 361

remote management access defaults 821

revision level 359

revision level parameter 371

revision level, 755

root bridge 331

RS-232 port, default settings 822

S

scheduling

configuring 200, 201

described 194

strict priority

configuring 201

described 194

weighted round robin

configuring 201

described 195

Secure Shell (SSH)

AT-8400 switch implementation 544 ciphers 544

clients, described 545

configuration overview 547

default settings 840

encryption algorithms 544 encryption keys 544 overview 544

server

configuring 548, 798

described 545

displaying information 550

users

adding 545 deleting 545 modifying 545

Secure Sockets Layer (SSL) certificates

authenticating 518 described 518

configuring 542

data transfer 517

default settings 838

encryption 516

message types 517

overview 514, 516

session 517 user verification 517

secured port security mode, described 456

self-signed certificate

creating 488

described 511

server authentication UDP port

configuring 561, 812

default setting 841

server key expiry time parameter 549, 799 server key ID parameter 549, 799

server port (SSH) parameter 550, 800

server timeout, configuring 478, 791

server-based authentication method

default setting 836, 841

setting 557

session cache timeout

configuring 542, 807

default setting 838

SHA authentication algorithm 498

SHA authentication protocol 224

Simple Network Management Protocol. See

SNMP

Simple Network Time Protocol (SNTP)

configuring 67

default setting 822

servers 67

slave switch

assigning 52, 580 defined 52, 580

SMURF attack 214

858

SNMP

default setting for remote management

821

default settings 825

SNMP community

configuring 680 enabling 680

SNMP community string

access mode 83 closed access status 83

creating 87, 601

default 84

default name 825

deleting 606

disabling 85

displaying 93

enabling 85

modifying 89, 604

name 83 open access status 83 operating status 83

SNMP management

default setting 825

disabling 85, 599 enabling 85, 599

SNMP management session 37

SNMPv3 Access Table entry

creating 253

deleting 257

displaying 322

modifying

notify view 264

read view 259

storage type 266

write view name 262

SNMPv3 Access Table web entry

displaying 736

SNMPv3 Access Table, described 230

SNMPv3 community 309

SNMPv3 Community Table entry

creating 310

deleting 313

displaying 327

modifying

community name 314

security name 316

storage type 317

AT-S62 User’s Guide

transport tag 316

SNMPv3 Community Table web entry

displaying 741

SNMPv3 Community Table, described 232

SNMPv3 Engine ID, defined 224

SNMPv3 Nofity Table web entry

displaying 738

SNMPv3 Notify Table entry

creating 276

deleting 278

displaying 324

modifying

notify tag 279

storage type 282

SNMPv3 Notify Table, described 231

SNMPv3 protocol

authentication protocols 224

community name parameter 311, 729, 731

Configure SNMPv3 Community Table 232

Engine ID 224

message notification 226

MIB views 225

overview 223

privacy protocols 225

SNMPv3 Access Table 230

SNMPv3 Notify Table 231

SNMPv3 SecurityToGroup Table 231

SNMPv3 Target Address Table 231

SNMPv3 Target Parameters Table 231

storage types 226

tables 227

User Table 230

View Table 230

SNMPv3 SecurityToGroup Table entry

creating 268

deleting 271

displaying 323

modifying

group name 272

storage type 274

SNMPv3 SecurityToGroup Table web entry

displaying 737

SNMPv3 SecurityToGroup Table, described 231

SNMPv3 Target Address Table entry

creating 284

deleting 286

displaying 325

859

Index modifying

storage type 294

target address retries 291

target address tag list 292

target address timeout 290

target address UDP port 289

target IP address 288

target parameters 293

SNMPv3 Target Address Table web entry

displaying 739

SNMPv3 Target Address Table, described 231

SNMPv3 Target Parameters Table entry

creating 297

deleting 300

displaying 326

modifying

message process model 306

security level 305

security model 304

storage type 307

user name 302

SNMPv3 Target Parameters Table web entry

displaying 740

SNMPv3 Target Parameters Table, described

231

SNMPv3 trap 226

SNMPv3 User Table entry

creating 234

deleting 238

displaying 319

modifying

authentication protocol 239 authentication protocol password 239

privacy protocol 241 privacy protocol password 241

SNMPv3 User Table web entry

displaying 734

SNMPv3 User Table, described 230

SNMPv3 View Table entry 248, 250

creating 244

deleting 247

displaying 321

storage type, modifying 251

SNMPv3 View Table web entry

displaying 735

SNMPv3 View Table, described 230

SNTP server, default setting 822

SNTP. See Simple Network Time Protocol

(SNTP) software updates

downloading from a local session 161, 177

downloading switch to switch 167

source address (SA) trunking load distribution method 123

source address load distribution methods 124

source address/destination address load distribution method 127

source IP address 124

source port 137

Spanning Tree Protocol (STP)

and VLANs 338

bridge forwarding delay 343, 746 bridge hello time 343, 746 bridge identifier 343, 747 bridge max age 343, 746

bridge parameters, configuring 342, 745

bridge priority 343, 746

default settings 831

defined 330

disabling 340, 743

disablingRapid Spanning Tree Protocol

(RSTP)

enabling 743

enabling 340, 743

forwarding delay 343

parameters, displaying 760

port cost 345, 747

port priority 747

port settings, configuring 344, 747

port settings, displaying 346, 760

spanning tree, default setting 831

SSH server status parameter 549

SSH. See Secure Shell (SSH)

SSL key ID, configuring 491

SSL messages 517

SSL. See Secure Sockets Layer (SSL)

static MAC address

adding 624

deleting 119, 626

displaying 112

static unicast MAC address

adding 116

defined 111

deleting 118

860

displaying 112, 622

STP ID parameter 442

strict priority scheduling 194

subnet mask 61, 588 configuring 61, 588

default setting 823

Subtree Mask 226

subtree mask, modifying 248

supplicant port

described 464

start period 481, 794

supplicant role 467

supplicant timeout 478, 791

switch

hardware information 78, 590

rebooting 64 resetting 64

software information 78, 590

switch name, configuring 59, 586

switch state, default setting 824

symmetrical encryption 495

SYN Flood attack 213

system date

default setting 822

setting 67

system files

copying 156 deleting 156

displaying 158

downloading 171, 172, 175

renaming 156

uploading 177

system name

configuring 61, 587

default setting 823 system software default settings 823

system time

default setting 822

setting 67

T

TACACS+

configuring 809, 810, 811

default settings 841

disabling 557 enabling 557

guidelines 554

AT-S62 User’s Guide

overview 553

server IP address 558

server order 559 server timeout 559, 812, 841

tagged VLAN

creating 400, 762

defined 395

deleting 411, 768

diagram 398

displaying 410, 452, 769

example 405

modifying 406, 766

overview 395

rules 397

target IP address 276

Teardrop attack 215

Telnet management session

defined 35

quitting 46

starting 45

Telnet, default setting for remote management

821

TFTP

default setting for remote management

821

downloading and uploading files 161, 177

trap receivers 83

Triple DES (3DES) encryption algorithms, described 496

tx period, configuring 478, 791

U

unavailable status, defined 52, 580

unicast packets 108

uplink port

configuring 451, 771

default setting 833

described 448, 450

used parameter 441

user name

configuring 481, 794

default 45, 575

user password, configuring 482, 794

User-based Security Model (USM) authentication 223

UTC offset

default setting 822

861

Index

setting 69

V

versions supported (SSH) parameter 550, 800

VID. See VLAN ID

view type, modifying 250

virtual LAN (VLAN)

creating 400, 404, 762

default settings 833

defined 386

deleting 411, 414, 768

displaying 410, 452, 769

mode, selecting 771

modifying 406, 766

multiple

802.1Q-compliant 447 defined 447 overview 447

overview 386

port-based, defined 388

tagged, defined 395

VLAN and MSTI associations 358

VLAN ID parameter 441

VLAN identifier (VID)

configuring 96, 407, 763, 769

described 388

VLAN name

configuring 401, 763, 769

default setting 833

described 388

VLAN, port-based. See port-based VLAN

VLAN, tagged. See tagged VLAN

VLAN. See virtual LAN (VLAN)

Volatile storage 226

W

web browser management session

defined 36 limitations 36

quitting 578

starting 574

web server

configuring 490

default settings 837

described 487

disabling 491 enabling 491

overview 487

port number 491 web server mode, configuring 491

weighted round robin priority scheduling 195

X

X.509

certificate 519 specification 519

862

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents