S63 v120 Menus Guide
S63 v120 Menus Guide
Software
AT-S63
Menus Interface
User’s Guide
AT-9400 Series Layer 2+ Gigabit Ethernet Switches
Version 1.2.0
613-50570-00 Rev. C
Copyright © 2005 Allied Telesyn, Inc.
All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesyn, Inc.
Microsoft and Internet Explorer are registered trademarks of Microsoft Corporation. Netscape Navigator is a registered trademark of
Netscape Communications Corporation. All other product names, company names, logos or other designations mentioned herein are
trademarks or registered trademarks of their respective owners.
Allied Telesyn, Inc. reserves the right to make changes in specifications and other information contained in this document without prior
written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesyn, Inc. be liable for any
incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this
manual or the information contained herein, even if Allied Telesyn, Inc. has been advised of, known, or should have known, the possibility
of such damages.
Contents
Preface ............................................................................................................................................................ 25
How This Guide is Organized........................................................................................................................... 26
Document Conventions .................................................................................................................................... 27
Where to Find Web-based Guides ................................................................................................................... 28
Contacting Allied Telesyn ................................................................................................................................. 29
Online Support ........................................................................................................................................... 29
Email and Telephone Support.................................................................................................................... 29
Returning Products .................................................................................................................................... 29
Sales or Corporate Information .................................................................................................................. 29
Management Software Updates................................................................................................................. 29
New Features in AT-S63 Version 1.2.0 ............................................................................................................ 30
Chapter 1: Overview ...................................................................................................................................... 33
Management Overview..................................................................................................................................... 34
Local Connection.............................................................................................................................................. 36
Remote Connection.......................................................................................................................................... 37
Using an SNMP Network Management Application................................................................................... 37
Management Access Levels............................................................................................................................. 39
3
Contents
4
AT-S63 Management Software Menus Interface User’s Guide
5
Contents
6
AT-S63 Management Software Menus Interface User’s Guide
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping .................... 389
Chapter 19: IGMP Snooping ....................................................................................................................... 391
IGMP Snooping Overview .............................................................................................................................. 392
Configuring IGMP Snooping........................................................................................................................... 394
Enabling or Disabling IGMP Snooping ........................................................................................................... 397
Displaying a List of Host Nodes...................................................................................................................... 398
Displaying a List of Multicast Routers............................................................................................................. 400
7
Contents
8
AT-S63 Management Software Menus Interface User’s Guide
9
Contents
10
AT-S63 Management Software Menus Interface User’s Guide
11
Contents
12
AT-S63 Management Software Menus Interface User’s Guide
13
Contents
14
Figures
15
Figures
16
AT-S63 Management Software Menus Interface User’s Guide
17
Figures
Chapter 23: Spanning Tree and Rapid Spanning Tree Protocols ........................................................... 525
Figure 174: Point-to-Point Ports..........................................................................................................................................531
Figure 175: Edge Port.........................................................................................................................................................532
Figure 176: Point-to-Point and Edge Port ...........................................................................................................................532
Figure 177: VLAN Fragmentation .......................................................................................................................................533
Figure 178: Spanning Tree Configuration Menu.................................................................................................................535
Figure 179: STP Menu........................................................................................................................................................537
Figure 180: STP Port Parameters Menu.............................................................................................................................539
Figure 181: Configure STP Port Settings Menu..................................................................................................................540
Figure 182: Display STP Port Configuration Menu .............................................................................................................541
Figure 183: RSTP Menu .....................................................................................................................................................543
Figure 184: RSTP Port Parameters Menu ..........................................................................................................................545
Figure 185: Configure RSTP Port Settings Menu ...............................................................................................................546
Figure 186: Display RSTP Port Configuration Menu ..........................................................................................................548
Figure 187: Display RSTP Port State Menu .......................................................................................................................549
18
AT-S63 Management Software Menus Interface User’s Guide
19
Figures
20
AT-S63 Management Software Menus Interface User’s Guide
21
Figures
22
Tables
23
Tables
24
Preface
For instructions on how to manage the switch from the command line
interface or web browser interface, refer to the AT-S63 Management
Software Command Line Interface User’s Guide or the AT-S63
Management Software Web Browser Interface User’s Guide. The guides
are available from the Allied Telesyn web site.
Caution
The software described in this documentation contains certain
cryptographic functionality and its export is restricted by U.S. law. As
of this writing, it has been submitted for review as a “retail encryption
item” in accordance with the Export Administration Regulations, 15
C.F.R. Part 730-772, promulgated by the U.S. Department of
Commerce, and conditionally may be exported in accordance with
the pertinent terms of License Exception ENC (described in 15
C.F.R. Part 740.17). In no case may it be exported to Cuba, Iran,
Iraq, Libya, North Korea, Sudan, or Syria. If you wish to transfer this
software outside the United States or Canada, please contact your
local Allied Telesyn sales representative for current information on
this product’s export status.
25
Preface
This section includes information about the file system, uploading and
downloading files, using the event log, and working with classifiers,
Quality of Service, and Denial of Service prevention.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
This section contains chapters about the web server, encryption, PKI,
Secure Shell, TACACS+ and RADIUS, and the management access
control list.
26
AT-S63 Management Software Menus Interface User’s Guide
Document Conventions
Note
Notes provide additional information.
Caution
Cautions inform you that performing or omitting a specific action may
result in equipment damage or loss of data.
Warning
Warnings inform you that performing or omitting a specific action
may result in bodily injury.
27
Preface
The installation and user guides for all Allied Telesyn products are
available in portable document format (PDF) on our web site at
www.alliedtelesyn.com. You can view the documents online or
download them onto a local workstation or server.
28
AT-S63 Management Software Menus Interface User’s Guide
Online Support You can request technical support online by accessing the Allied Telesyn
Knowledge Base: http://kb.alliedtelesyn.com. You can use the
Knowledge Base to submit questions to our technical support staff and
review answers to previously asked questions.
Email and For Technical Support via email or telephone, refer to the Support &
Telephone Services section of the Allied Telesyn web site: www.alliedtelesyn.com.
Support
Returning Products for return or repair must first be assigned a return materials
Products authorization (RMA) number. A product sent to Allied Telesyn without an
RMA number will be returned to the sender at the sender’s expense.
Sales or You can contact Allied Telesyn for sales or corporate information through
Corporate our web site: www.alliedtelesyn.com. To find the contact information for
your country, select Contact Us -> Worldwide Contacts.
Information
Management New releases of management software for our managed products are
Software Updates available from either of the following Internet sites:
If you prefer to download new software from the Allied Telesyn FTP server
from your workstation’s command prompt, you will need FTP client
software and you must log in to the server. Enter “anonymous” for the user
name and your email address for the password.
29
Preface
Table 1 lists the new features in version 1.2.0 of the AT-S63 management
software.
30
AT-S63 Management Software Menus Interface User’s Guide
31
Preface
32
Chapter 1
Overview
This chapter describes the AT-S63 software functions, the methods you
can use to access the software, and the management access levels. This
chapter contains the following sections:
Management Overview
The AT-S63 management software allows you to monitor and adjust the
operating parameters of an AT-9400 Series switch and includes the
following features:
Note
The default settings for the management software are listed in
Appendix A, “AT-S63 Management Software Default Settings” on
page 853.
Locally
Remotely
Local Connection
You establish a local connection with an AT-9400 Series switch when you
use the RJ-45 to RS-232 management cable included with the switch to
connect a terminal or a PC with a terminal emulator program to the
terminal port on the switch. The terminal port is located on the front panel
of the AT-9400 Series switch.
With a local connection you can manage the switch using the command
line or menus interface. The web browser and SNMP interfaces are not
available through a local connection.
Note
For instructions on how to start a local management session, refer to
“Starting a Local Management Session” on page 44.
A switch does not need an Internet Protocol (IP) address for you to
manage it locally. You can start a local management session on a switch
at any time. It does not interfere with the device forwarding packets.
Note
For further information on enhanced stacking, refer to “Enhanced
Stacking Overview” on page 84.
Remote Connection
You can use any management station on your network that has the Telnet
application to manage an AT-9400 Series switch. This is referred to as a
remote connection.
Note
For further information on enhanced stacking, refer to “Enhanced
Stacking Overview” on page 84.
Note
For instructions on how to start a remote management session, refer
to “Starting a Remote Management Session” on page 47.
Using an SNMP You can use the Simple Network Management Protocol (SNMP) to run a
Network network management application such as AT-View to manage the switch
through t. A familiarity with how to use management information base
Management (MIB) objects is necessary for this type of management.
Application
The AT-S63 software supports the following MIBs:
Note
Third-party network management applications such as HP
OpenView cannot use the enhanced stacking feature of AT-S63.
Therefore, you must assign an IP address to each switch that you
want to manage with one of these applications.
Basic Operations
The chapters in this section provide information and procedures for basic
switch setup using the AT-S63 management software. The chapters
include:
To establish a local connection, you use the terminal port on the front
panel of the AT-9400 Series switch, as explained in “Local Connection” on
page 36. When you make the connection and start the AT-S63 menus
interface, you start a local management session.
When you make a local connection to a switch that has been configured
as a master switch of an enhanced stack, you can manage all the
switches that support enhanced stacking in the subnet from the same
local management session. Therefore, you do not need to start a separate
local management session for each switch.
When you start a local management session on a switch that is not part of
an enhanced stack or that is a slave switch, you can only manage that
switch.
Note
For information on enhanced stacking, refer to “Enhanced Stacking
Overview” on page 84.
Starting a Local To start a local management session, perform the following procedure:
Management
1. Connect one end of the RJ-45 to RS-232 management cable to the
Session serial terminal port on the front panel of the switch, as shown in
Figure 1.
Giga
bit E
thern
et Sw
itch
GBIC
000 L
INK /
ACT STAT
L/A
US
24 FAULT
MAST
ER
POWE
R
Note
The port settings are for a DEC VT100 or ANSI terminal, or an
equivalent terminal emulator program.
4. Press Enter.
6. The local management session starts and the command line interface
(CLI) prompt is displayed, as shown in Figure 2.
If the switch has been configured with a name, the name is displayed
after the software version information and before the command
prompt.
For information about the command line interface, refer to the AT-S63
Management Software Command Line Interface User’s Guide.
Q - Quit
When you press the Esc key or type the letter R in a submenu, the
previous menu is redisplayed.
Note
You cannot operate both a local management session and a remote
management session on the same switch simultaneously.
Quitting a Local To quit a local management session, return to the Main Menu and type Q
Management for Quit.
Session
Note
Failure to properly exit from a local or Telnet management session
may block future management sessions.
You should always exit from a management session when you are
finished managing a switch. This prevents unauthorized individuals from
making changes to a switch’s configuration if you leave your management
station unattended. For information about how to use the console timer to
automatically disconnect a management session, refer to “Configuring the
Console Timer” on page 72.
You can use the Telnet application from any workstation on your network
to connect to an AT-9400 Series switch, as described in “Remote
Connection” on page 37. When you make the connection and start the
AT-S63 menus interface, you start a remote management session.
When you make a remote connection to a switch that has been configured
as a master switch of an enhanced stack, you can manage all the switches
that support enhanced stacking in the subnet from the same local
management session. Therefore, you do not need to start a separate
remote management session for each switch.
When you start a remote management session on a switch that is not part
of an enhanced stack or that is a slave switch, you can only manage that
switch.
Note
For information on enhanced stacking, refer to “Enhanced Stacking
Overview” on page 84.
3. The local management session starts and the command line interface
(CLI) prompt is displayed, as shown in Figure 2 on page 45.
If the switch has been configured with a name, the name is displayed
after the software version information and before the command
prompt.
For information about the command line interface, refer to the AT-S63
Management Software Command Line Interface User’s Guide.
When you press the Esc key or type the letter R in a submenu, the
previous menu is redisplayed.
Note
You cannot operate both a local management session and a remote
management session on the same switch simultaneously.
Quitting a To end a remote management session, return to the Main Menu and type
Remote Q for Quit.
Management
Note
Session Failure to properly exit from a local or Telnet management session
may block future management sessions until the console timer times
out.
You should always exit from a management session when you are
finished managing a switch. This prevents unauthorized individuals from
making changes to a switch’s configuration if you leave your management
station unattended. For information about how to use the console timer to
automatically disconnect a management session, refer to “Configuring the
Console Timer” on page 72.
When you make a change to a switch parameter, the change is, in most
cases, immediately activated on the switch as soon as you enter it.
However, most parameter changes are initially saved only to temporary
memory in the switch and will be lost the next time you reset or power
cycle the unit. To permanently save your changes, you must select the S -
Save Configuration Changes option from the Main Menu. The switch
saves your changes to its active configuration file. You should select that
Main Menu option whenever you have made a change to a switch
parameter that you want the switch to retain even when it is reset or power
cycled. If you do not see the option in the Main Menu, there are no
parameter changes to be saved.
Note
For further information on a switch’s configuration file, refer to
“Working with Boot Configuration Files” on page 207.
This section applies to the twisted pair ports 23R and 24R and the SFP
and GBIC slots on the AT-9424T/GB, AT-9424T/SP, and AT-9424Ti/SP
Series switches. Note the following when configuring these ports:
Twisted pair ports 23R and 24R change to the redundant status mode
when an SFP or GBIC module is installed and establishes a link with
its end node. An SFP or GBIC port is only active while it has a valid
link. At all other times the corresponding twisted pair port 23R or 24R
is the active port.
A twisted pair port and its corresponding SFP or GBIC module share
the same configuration settings, including port settings, VLAN
assignments, access control lists, and spanning tree. When an SFP or
GBIC module becomes active, it operates with the same settings as its
corresponding twisted pair port.
An exception is port speed: If you disable Auto-Negotiation on the
twisted pair port and set the speed and duplex mode manually, the
speed reverts to Auto-Negotiation when you install an SFP or GBIC
module and the module establishes a link with an end node.
To specify twisted pair port 23R or 24R in a menu’s prompt, enter “23”
or “24”.
This feature has two primary benefits. First, it helps reduce the number of
IP addresses you must assign to your network devices. Second, it allows
you to configure multiple switches through the same local or remote
management session.
When you assign a switch an IP address, you must also assign it a subnet
mask. The switch uses the subnet mask to determine which portion of an
IP address represents the network address and which the node address.
You must also assign the switch a gateway address if there is a router
between the switch and the remote management station. This gateway
address is the IP address of the router through which the switch and
management station communicates.
Note
For further information on enhanced stacking, refer to “Enhanced
Stacking Overview” on page 84.
How Do You There are two ways that a switch can obtain an IP address.
Assign an IP
The first way is for you to assign the IP configuration information manually.
Address? The procedure for this is explained in “Configuring the IP Address, Switch
Name, and Other Basic Parameters” on page 54. You can initially assign
an IP address to a switch only through a local management session.
The second method is for you to activate the BOOTP and DHCP client
software on the switch and have the switch automatically download its IP
configuration information from a BOOTP or DHCP server on your network.
This procedure is explained in “Activating the BOOTP or DHCP Client
Software” on page 57.
This procedure also explains how to assign a name to the switch, along
with the name of the administrator responsible for maintaining the unit and
the location of the switch.
Note
A change to any parameter in this menu, including the IP address,
subnet mask, and gateway address, is activated immediately on the
switch.
1 - BOOTP/DHCP
This selection activates and deactivates the BOOTP and DHCP client
software on the switch. For information on this selection, refer to
“Activating the BOOTP or DHCP Client Software” on page 57.
2 - IP Address
This parameter specifies the IP address of the switch. You must
specify an IP address if you want the switch to function as the Master
switch of an enhanced stack. The IP address must be entered in the
format: xxx.xxx.xxx.xxx. The default value is 0.0.0.0.
3 - Subnet Mask
This parameter specifies the subnet mask for the switch. You must
specify a subnet mask if you assigned an IP address to the switch. The
subnet mask must be entered in the format: xxx.xxx.xxx.xxx. The
default value is 0.0.0.0.
4 - Default Gateway
This parameter specifies the default router’s IP address. This address
is required if you intend to remotely manage the switch from a
management station that is separated from the switch by a router. The
5 - System Name
This parameter specifies a name for the switch (for example, Sales
Ethernet switch). The name is displayed at the top of the AT-S63
management menus and pages. The name can be from 1 to 39
characters. The name can include spaces and special characters,
such as exclamation points and asterisks. The default is no name. This
parameter is optional.
Note
Allied Telesyn recommends that you assign each switch a name.
Names can help you identify the various switches in your network
and help you avoid performing a configuration procedure on the
wrong switch.
6 - Location
This parameter specifies the location of the switch, (for example, 4th
Floor - rm 402B). The location can be from 1 to 20 characters. The
location can include spaces and special characters, such as dashes
and asterisks. The default is no location. This parameter is optional.
7 - Administrator
This parameter specifies the name of the network administrator
responsible for managing the switch. The name can be from 1 to 20
characters. It can include spaces and special characters, such as
dashes and asterisks. The default is no name. This parameter is
optional.
Note
Item 8, Configure System Time, is described in “Setting the System
Time” on page 67. Item A, ARP Cache Timeout, is described in
“Setting the ARP Cache Timeout” on page 192.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The AT-9400 Series switch contains the client software for these protocols
and can obtain its IP configuration information from a BOOTP or DHCP
server on your network. If you activate this feature, the switch seeks its IP
address and other IP configuration information from a BOOTP or DHCP
server on your network whenever you reset or power ON the device.
In order for this strategy to work, there must be a BOOTP or DHCP server
that resides on your network and you must configure the service by
entering the switch’s MAC address.
BOOTP and DHCP services typically allow you to specify how the IP
address is to be assigned to the switch. The choices are static and
dynamic. If you choose static, the server always assigns the same IP
address to the switch when the switch is reset or powered ON. This is the
preferred configuration. Because the BOOTP and DHCP services always
assigns the same IP address to a switch, you always know which IP
address to use when you need to remotely manage a particular switch.
If you choose dynamic, the server assigns any unused IP address that it
has not already assigned to another device. This means that a switch
might have a different IP address each time you reset or power cycle the
device, which makes it difficult for you to remotely manage the unit.
Note
The BOOTP and DHCP client software is disabled by default on the
switch.
Note
If you activated BOOTP or DHCP, the switch immediately begins to
query the network for a BOOTP or DHCP server. The switch
continues to query the network for its IP configuration until it
receives a response.
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Bootloader ...... ATS63_LOADER v1.0.0 Build Date ...... Feb 4 2005 19:32:40
Application ..... ATS63 v1.0.0 Build Date ...... Feb 14 2005 19:32:40
MAC Address
The MAC address of the switch. You cannot change this parameter.
IP Address
IP address of the switch. To change a switch’s IP address, see
“Configuring the IP Address, Switch Name, and Other Basic
Parameters” on page 54.
Model Name
Model name of the AT-9400 Series switch. You cannot change this
setting.
Subnet Mask
Subnet mask assigned to the switch. To change the subnet mask, see
“Configuring the IP Address, Switch Name, and Other Basic
Parameters” on page 54.
Serial Number
Serial number of the switch. You cannot change this setting.
Gateway
Gateway assigned to the switch. To change the gateway, see
“Configuring the IP Address, Switch Name, and Other Basic
Parameters” on page 54.
System Up Time
The number of days, hours, minutes, and seconds the switch has been
operational. You cannot change this setting.
System Name
The name assigned to the switch. To change the name, see
“Configuring the IP Address, Switch Name, and Other Basic
Parameters” on page 54.
Administrator
The administrator of the switch. To change the administrator’s name,
see “Configuring the IP Address, Switch Name, and Other Basic
Parameters” on page 54.
Location
The location of the switch. To change the location information, see
“Configuring the IP Address, Switch Name, and Other Basic
Parameters” on page 54.
Rebooting a Switch
Note
Any configuration changes not saved are lost after the switch
reboots. To save your configuration changes, return to the Main
Menu and type S to select Save Configuration Changes.
1 - File Operations
2 - Downloads and Uploads
3 - Ping a Remote System
4 - Reset to Factory Defaults
5 - Reboot the Switch
6 - Networking Stack
Note
Item 1 - File Operations, is described in Chapter 11, ”File System” on
page 203. Item 2 - Downloads and Uploads is described in Chapter
12, ”File Downloads and Uploads” on page 229. Ping a Remote
System, item 3, is described in “Pinging a Remote System” on
page 75. Reset to Factory Defaults, item 4, is described in
“Returning the AT-S63 Management Software to the Factory Default
Values” on page 76. Item 6, Networking Stack, is described in
Chapter 10, ”Networking Stack” on page 187.
3. From the System Utilities menu, type 5 to select Reboot the switch.
Caution
The switch does not forward traffic while it reloads its operating
software, a process that takes approximately 20 seconds to
complete. Some packet traffic may be lost. After the switch finishes
rebooting, you must reestablish your management session if you
want to continue managing the unit.
Changing the To change the manager or operator password, perform the following
Manager or procedure:
Operator 1. From the Main Menu, type 5 to select System Administration.
Password
The System Administration menu is shown in Figure 4 on page 54.
5. Type the current manager password (the default is “friend”) and press
Return.
8. Type the current operator password (the default is “friend”) and press
Return.
Note
A password can be from 0 to 16 alphanumeric characters.
Passwords are case sensitive. You should not use spaces or special
characters, such as asterisks (*) or exclamation points (!), in a
password if you are managing the switch from a web browser. Many
web browsers cannot handle special characters in passwords.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Resetting the If you change the manager password from the default and lose or forget it,
Manager you can reset the password. Note the following about this feature:
Password You must perform this procedure from a local management session.
You cannot perform it through enhanced stacking or from a Telnet or
web browser management session.
When the local management session ends, such as the management
session timing out, a login and password are required to log in again
unless you perform this procedure again.
If the AT-S63 management software detects another active
management session when you perform this procedure, a message is
displayed for the other user stating that the user will be logged off.
Thus, this type of session takes precedence over any other user’s
management session.
Caution
This procedure gives any person with physical access to the switch
the ability to access its management software without having to
provide a username and password. For this reason, all AT-9400
Series switches should be maintained in a locked wiring closet or
other secure location to prevent unauthorized management access.
Note
This procedure is only available through a local management
session.
You are not prompted for a login or password but you are logged in
with manager privileges and the Main Menu is displayed, as shown in
Figure 3 on page 46.
management session. You must use the new password the next time
you log on to the switch at the start of a management session.
This procedure explains how to set the switch’s date and time. Setting the
system time is important if you configured the switch to send traps to your
management stations. Traps from a switch where the time has not been
set do not contain the correct date and time. Therefore, it becomes difficult
for you to determine when the events represented by the traps occurred.
It is also important to set the system time if you intend to use the Secure
Sockets Layer (SSL) certificate feature described in, Chapter 34, ”PKI
Certificates and SSL” on page 781. Certificates must contain the date and
time when they are created.
There are two ways to set the switch’s time. One method is to set it
manually. The AT-9400 Series switch has an onboard battery that
maintains the date and time even when the unit is powered off or reset.
For instructions, refer to “Setting the System Time Manually,” next.
The second method uses the Simple Network Time Protocol (SNTP). The
AT-S63 management software is shipped with the client version of this
protocol. You can configure the AT-S63 management software to obtain
the current date and time from an SNTP or Network Time Protocol (NTP)
server located on your network or the Internet.
SNTP is a reduced version of the NTP. However, the SNTP client software
in the AT-S63 management software is interoperable with NTP servers.
Note
The default system time on the switch is midnight, January 1, 1970.
Setting the To set the system time manually, perform the following procedure:
System Time 1. From the Main Menu, type 5 to select System Administration.
Manually
The System Administration menu is shown in Figure 4 on page 54.
4. From the Configure System Time menu, type 1 to select System Time.
5. Enter a new time for the system in the following format: hours,
minutes, and seconds all separated by colons.
6. Enter a new date for the system. Use two numbers to specify the day
and month. Use four numbers to specify the year. Separate the values
with hyphens. For example, December 5, 2004 is specified 05-12-
2004.
The new time and date are immediately activated on the switch.
Setting the To configure the switch to obtain its date and time from an SNTP or NTP
System Time server on your network or the Internet, perform the following procedure:
from an SNTP or 1. From the Main Menu, type 5 to select System Administration.
NTP Server
The System Administration menu is shown in Figure 4 on page 54.
Note
If the switch is obtaining its IP address and subnet mask from a
DHCP server, you can configure the DHCP server to provide the
switch with an IP address of an NTP or SNTP server. If you
configured the DHCP server to provide this address, then you do not
need to enter it here, and you can skip ahead to step 5.
6. Type 4 to select UTC Offset to specify the difference between the UTC
and local time.
Note
If the switch is using DHCP, it automatically attempts to determine
this value. In this case, you do not need to configure a value for the
UTC Offset parameter.
9. Type E to enable daylight savings time and allow the switch to adjust
system time to daylight savings time. This is the default value. Type D
to disable daylight savings time and not allow the switch to adjust
system time to daylight savings time.
Note
The switch does not set DST automatically. If the switch is in a
locale that uses DST, you must remember to enable this in April
when DST begins and disable it in October when DST ends. If the
switch is in a locale that does not use DST, this option should be set
to disabled all the time.
10. Type 6 to select Poll Interval to specify the time interval between
queries to the SNTP server.
Note
Selection 7, Last Delta, reports the last adjustment that had to be
applied to the system time; the drift in the system clock between two
successive queries to the SNTP server. You cannot change this
value.
11. Enter the number of seconds the switch waits between polling the
SNTP or NTP server. The default is 600 seconds. The range is from
60 to 1200 seconds.
12. Type 2 to select SNTP Status to enable or disable the SNTP client.
After SNTP is enabled, the switch immediately polls the SNTP or NTP
server for the current date and time. (The switch also automatically
polls the server whenever a change is made to any of the parameters
in this menu, so long as SNTP is enabled.)
The Last Delta option in the menu displays the last adjustment that
was applied to system time due to a drift in the system clock between
two successive queries to the SNTP server. This is a read only field.
Option U, Update System Time, allows you to prompt the switch to poll
the SNTP or NTP server for the current time and date. You can use
this selection to update the time and date immediately rather than wait
for the switch’s next polling period. This selection has no effect if you
set the date and time manually.
14. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
You can configure the AT-S63 management software to display either the
Main Menu or the command line interface prompt whenever you start a
local or Telnet management session. The default is the command line
interface.
3. Type 1 to toggle Console Startup Mode between Menu and CLI. When
the mode is set to Menu, a management session starts by displaying
the Main Menu. When the mode is set to CLI, a management session
starts with the command line interface prompt. The system default is
CLI.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
A change to the console startup mode takes effect the next time you
start a local management session.
The AT-S63 management software uses the console timer, also referred
to as the console disconnect interval, to automatically end inactive local
and remote management sessions. A management session is
automatically ended if the management software does not detect any
activity from a local or remote management station after the console timer
has expired. For example, if you specify two minutes as the console timer,
the AT-S63 management software automatically ends a management
session if it does not detect any activity from the local or remote
management station after two minutes.
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This procedure describes how to enable and disable the Telnet server on
the switch. You might disable the server to prevent individuals from
managing the switch with a Telnet application or if you intend to use the
Secure Shell (SSH) protocol.
This procedure also explains how to toggle the Telnet server on the switch
so that is adds a NULL character after each CR. Some Telnet clients
require the character in order to correctly display the information from the
Telnet server.
To enable or disable the Telnet server or to set the Telnet NULL character
parameter, perform the following procedure:
Note
Disable Telnet access if you are using the SSH (Secure Shell)
feature. (The SSH feature is not available in all versions of the
AT-S63 management software.)
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The default baud rate of the RJ-45 type serial terminal port on the switch is
9600 bps.
Note
If you are running a local management session, be sure to change
your terminal’s baud rate.
5. Press Return.
You can instruct the switch to ping a remote device on your network. This
procedure is useful in determining whether a valid link exists between the
switch and another device.
Note
To perform this procedure, the switch must have an IP address.
3. For the System Utilities menu, type 3 to select Ping a Remote System.
4. Enter the IP address of the end node you want the switch to ping.
Note
The AT-S63 management software default values are listed in
Appendix A, “AT-S63 Management Software Default Settings” on
page 853.
Do you want to reset static IP, Subnet and Gateway? [Yes/No] ->
5. If you type Y for yes, all switch parameters including the IP address,
subnet mask, and gateway address are changed to the default values.
If you type N for no, all switch parameters excluding the IP address,
subnet mask, and gateway address are changed to the default values.
Caution
The switch does not forward traffic while it reloads its operating
software, a process that takes approximately 20 seconds to
complete. Some packet traffic may be lost. You must reestablish
your management session if you want to continue managing the
switch.
This step returns the active boot configuration file back to the default
settings.
You can view information about the system hardware, including details
about the fans and temperature settings.
Note
Menu selection U, Uplink Information, is described in “Displaying
Uplink Port Information” on page 80.
U - Update Display
R - Return to Previous Menu
Note
The information displayed in this menu varies, depending upon the
switch model.
Note
The Uplink Information menu only indicates that a GBIC or an SFP
is inserted in the slot. It does not indicate whether or not a fiber optic
cable is connected to the GBIC or SFP.
N - Next Page
U - Update Display
R - Return to Previous Menu
P - Previous Page
U - Update Display
R - Return to Previous Menu
Note
The information displayed in the menus depends upon whether a
GBIC or an SFP transceiver is installed and the transceiver vendor.
Enhanced Stacking
This chapter explains the enhanced stacking feature. The sections in this
chapter include:
The enhanced stacking feature can make it easier for you to manage the
AT-9400 Series switches in your network. It offers the following benefits:
Enhanced There are a few guidelines to keep in mind when implementing enhanced
Stacking stacking for your network:
Guidelines An enhanced stack cannot span subnets.
All of the switches in an enhanced stack must use the same
Management VLAN. For information about Management VLANs, refer
to “Specifying a Management VLAN” on page 633.
A subnet can contain more than one enhanced stack. You can create
different enhanced stacks within a subnet by assigning the switches to
different Management VLANs.
An enhanced stack must have at least one master switch.
The master switch can be any switch that supports enhanced stacking,
such as an AT-8000 Series, AT-8400 Series, AT-8500 Series or
AT-9400 Series switch.
You should assign the master switch an IP address and subnet mask.
Note
No IP address is required if you intend to manage the enhanced
stack solely through the RJ-45 serial terminal port on a master
switch. However, remote management of a stack using Telnet, a
web browser, or an SNMP application does require assigning an IP
address and subnet mask to a master switch.
There are three basic tasks to implementing this feature on your network:
The master switch can be any switch that supports enhanced stacking,
such as an AT-8000 Series, AT-8400 Series, AT-8500 Series, or
AT-9400 Series switch. For networks that consist of more than one
subnet, there must be at least one master switch in each subnet.
Note
You can set the IP address manually or activate the BOOTP or
DHCP service on the master switch and have the switch obtain its IP
information from a BOOTP or DHCP server on your network. Initially
assigning an IP address or activating the BOOTP or DHCP service
can only be performed through a local management session.
Note
No IP address is required if you intend to manage the enhanced
stack solely through the RJ-45 serial terminal port on a master
switch. However, remote management of a stack using Telnet, a
web browser, or an SNMP application does require assigning an IP
address and subnet mask to a master switch.
Master 1
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch 1 3 5 7 9 11 13 15 17 19 21 23R AT-9424T/SP Gigabit Ethernet Switch
PORT ACTIVITY
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
HDX / COL LASER PRODUCT
D/C FDX
TERMINAL STATUS D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT 1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT L/A FAULT
SFP SFP SFP
D/C 1000 LINK / ACT MASTER SFP SFP 1000 LINK / ACT
L/A
D/C MASTER
L/A RPS L/A
L/A
RPS
23 24
23 24
D/C POWER D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R 2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24 23 24
2 4 6 8 10 12 14 16 18 20 22 24R
IP Address
149.32.11.22 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23R
24R
SFP
23
CLASS 1
LASER PRODUCT
SFP
24
D/C
L/A
D/C
L/A
D/C
L/A
2
1000 LINK /
FDX
1 3
4
5
6
ACT
PORT ACTIVITY
8
9
10
10/100 LINK /
HDX /
11
12
13
14
COL
15
16
ACT
17
18
19
20
21 23R
22 24R
23 24
SFP
1000 LINK /
L/A
ACT
AT-9424T/SP
TERMINAL
PORT
Gigabit Ethernet Switch
STATUS
FAULT
MASTER
RPS
POWER
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23R
24R
SFP
23
CLASS 1
LASER PRODUCT
SFP
24
L/A
D/C
L/A
D/C
L/A
D/C
1
2
1000 LINK /
FDX
4
5
6
ACT
8
PORT ACTIVITY
10
10/100 LINK /
HDX /
11
12
13
14
COL
15
16
ACT
17
18
19
20
21 23R
22 24R
23 24
SFP
1000 LINK /
L/A
ACT
AT-9424T/SP
TERMINAL
PORT
Gigabit Ethernet Switch
STATUS
FAULT
MASTER
RPS
POWER
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
FDX HDX / COL
D/C
TERMINAL STATUS 1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
1 3 5 7 9 11 13 15 17 19 21 23R PORT
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
L/A
SFP FAULT LASER PRODUCT
SFP SFP 1000 LINK / ACT D/C FDX HDX / COL
D/C MASTER TERMINAL STATUS
L/A 1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A RPS
23 24 L/A
SFP FAULT
D/C POWER SFP SFP 1000 LINK / ACT
D/C MASTER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24 L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Master 2 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23R
24R
SFP
23
CLASS 1
LASER PRODUCT
SFP
24
L/A
D/C
L/A
D/C
L/A
D/C
1000 LINK /
FDX
2
3
4
5
6
ACT
8
PORT ACTIVITY
10
10/100 LINK /
HDX /
11
12
13
14
COL
15
16
ACT
17
18
19
20
21 23R
22 24R
23 24
SFP
1000 LINK /
L/A
ACT
AT-9424T/SP
TERMINAL
PORT
Gigabit Ethernet Switch
STATUS
FAULT
MASTER
RPS
POWER
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23R
24R
SFP
23
CLASS 1
LASER PRODUCT
SFP
24
L/A
D/C
L/A
D/C
L/A
D/C
1000 LINK /
FDX
2
3
4
5
6
PORT ACTIVITY
ACT
8
9
10
10/100 LINK /
HDX /
11
12
13
14
COL
15
16
ACT
17
18
19
20
21 23R
22 24R
23 24
SFP
1000 LINK /
L/A
ACT
AT-9424T/SP
TERMINAL
PORT
Gigabit Ethernet Switch
STATUS
FAULT
MASTER
RPS
POWER
IP Address
Subnet A
149.32.11.16
Router TLUAF
RETSAM
RWP
TROP LANIMRET 232-SR
Subnet B
Master 1
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch 1 3 5 7 9 11 13 15 17 19 21 23R AT-9424T/SP Gigabit Ethernet Switch
PORT ACTIVITY
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT LASER PRODUCT
D/C FDX HDX / COL FDX HDX / COL
TERMINAL STATUS D/C
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT 1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT L/A
SFP FAULT
SFP SFP 1000 LINK / ACT SFP SFP
D/C MASTER D/C 1000 LINK / ACT MASTER
L/A L/A
L/A RPS L/A RPS
23 24 23 24
D/C POWER D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R 2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24 2 4 6 8 10 12 14 16 18 20 22 24R 23 24
IP Address
149.32.09.18 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23R
24R
SFP
23
CLASS 1
LASER PRODUCT
SFP
24
L/A
D/C
L/A
D/C
L/A
D/C
1000 LINK /
FDX
2
3
4
5
6
ACT
8
PORT ACTIVITY
10
9
10/100 LINK /
HDX /
11
12
COL
13
14
15
16
ACT
17
18
19
20
21 23R
22 24R
23 24
SFP
1000 LINK /
L/A
ACT
AT-9424T/SP
TERMINAL
PORT
Gigabit Ethernet Switch
STATUS
FAULT
MASTER
RPS
POWER
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23R
24R
SFP
23
CLASS 1
LASER PRODUCT
SFP
24
L/A
D/C
L/A
D/C
L/A
D/C
1000 LINK /
FDX
2
3
4
5
6
ACT
8
PORT ACTIVITY
10
10/100 LINK /
HDX /
11
12
COL
13
14
15
16
ACT
17
18
19
20
21 23R
22 24R
23
SFP
1000 LINK /
24
L/A
ACT
AT-9424T/SP
TERMINAL
PORT
Gigabit Ethernet Switch
STATUS
FAULT
MASTER
RPS
POWER
Master 2
1 3 5 7 9 11 13 15 17 19 21 23R AT-9424T/SP Gigabit Ethernet Switch 1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
PORT ACTIVITY
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT LASER PRODUCT
LASER PRODUCT HDX / COL
D/C FDX
D/C FDX HDX / COL
TERMINAL STATUS TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT 1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A FAULT
L/A
SFP FAULT
SFP SFP SFP
SFP SFP 1000 LINK / ACT D/C 1000 LINK / ACT MASTER
D/C MASTER
L/A
L/A
L/A
RPS
L/A RPS
23 24 23 24
D/C POWER
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R 2 4 6 8 10 12 14 16 18 20 22 24R
23 24 2 4 6 8 10 12 14 16 18 20 22 24R 23 24
2 4 6 8 10 12 14 16 18 20 22 24R
IP Address
149.32.09.24
The enhanced stacking status of the switch can be master switch, slave
switch, or unavailable. Each status is described below:
Note
The default setting for a switch is slave.
Note
You cannot change the stacking status of a switch accessed through
enhanced stacking. To change the stacking status of a switch that
does not have an IP address or subnet mask, such as a slave
switch, you must use a local management session. If the switch has
an IP address and subnet mask, such as a master switch, you can
use either a local or remote management session.
The menu displays the current status of the switch at the end of
selection “1 - Switch State.” For example, the switch’s current status in
the figure above is master.
Note
Item 2, Stacking Services, is only displayed on master switches.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To manage a slave switch or another master switch in the stack, you need
to select it from the AT-S63 management software.
Note
Item 2, Stacking Services, is only displayed on master switches.
The master switch polls the subnet for all slave and master switches
that are a part of the enhanced stack and displays a list of the switches
in the Stacking Services menu, as shown in the example in Figure 19.
By default, the switches are sorted in the menu by MAC address. You
can sort the switches by name as well. To do this, select option 2, Sort
Switches in New Order.
Note
Item 4, Load Image/Bootloader, uploads the AT-S63 image from the
master switch to another AT-9400 Series switch in the enhanced
stack, as explained in “Uploading the AT-S63 Image File Switch to
Switch” on page 238. Item 5, Load Configuration File, allows you to
upload a configuration file from a master switch to another AT-9400
Series switch, as explained in “Uploading an AT-S63 Configuration
File Switch to Switch” on page 241.
5. Type the number of the switch in the list you want to manage.
The Main Menu of the selected switch is displayed. You now can
manage the switch. Any management tasks you perform effect only
the selected switch.
When you have finished managing a slave switch, return to the Main Menu
of the slave switch and type Q for Quit. This returns you to the Stacking
Services menu. After you see that menu, you are again addressing the
master switch from which you started the management session.
You can either select another switch in the list to manage or, if you want to
manage the master switch, type R twice to return to the master switch’s
Main Menu.
The menu shows the enhanced stacking status of the switch you
selected.
The procedures in this chapter show you how to create and manage
SNMPv1 and SNMPv2c community strings through which your SNMP
application program at your management workstation can access the
switch’s MIB objects.
You can also configure SNMPv1 and SNMPv2c with the SNMPv3 Table
menus described in Chapter 22, ”SNMPv3” on page 419. However,
because the SNMPv3 Table menus require a much more extensive
configuration, Allied Telesyn recommends configuring SNMPv1 and
SNMPv2c with the procedures in this chapter.
To manage a switch using SNMP, you need to know the IP address of the
switch or of a master switch and at least one of the switch’s community
strings. A community string is a string of alphanumeric characters that
gives you access to the switch.
A community string has several attributes that you can use to control who
can use the string and what the string will allow a network management to
do on the switch. The community string attributes are defined below:
Access Mode
This defines what the community string will allow a network manager to
do. There are two access modes: Read and Read/Write. A community
string with an access mode of Read can only be used to view but not
change the MIB objects on a switch. A community string with a Read/Write
access can be used to both view the MIB objects and change them.
Operating Status
A community string can be enabled or disabled. When disabled, no one
can use it to access the switch. You might disable a community string if
you suspect someone is using it for unauthorized access to the device.
When a community string is enabled, then it is available for use.
Trap Receivers
A trap is a signal sent to one or more management workstations by the
switch to indicate the occurrence of a particular operating event on the
device. There are numerous operating events that can trigger a trap. For
instance, resetting the switch or the failure of a cooling fan are two
examples of occurrences that cause a switch to send a trap to the
management workstations. You can use traps to monitor activities on the
switch.
It does not matter which community strings you assign your trap receivers.
When the switch sends a trap, it looks at all the community strings and
sends the trap to all trap receivers on all community strings. This is true
even for community strings that have a access mode of only Read.
If you are not interested in receiving traps, then you do not need to enter
any IP addresses of trap receivers.
Default SNMP The AT-S63 management software provides two default community
Community strings: public and private. The public string has an access mode of just
Read and the private string has an access mode of Read/Write. If you
Strings activate SNMP management on the switch, you should delete or disable
the private community string, which is a standard community string in the
industry, or change its status from open to closed to prevent unauthorized
changes to the switch.
3. From the SNMP Configuration menu, type 1 to toggle the SNMP Status
option between its two settings of Enabled and Disabled. When set to
Disabled, the default, you cannot manage the switch using SNMP.
When set to Enabled, you can manage the switch using SNMP.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Given the importance of this trap to the protection of your switch, the
management software allows you to disable and enable it separately from
the other traps. If you enable it, the switch will send this trap if either of the
above events occur. If you disable it, the switch will not send this trap. The
default is disabled.
If you enable this trap, be sure to add one or more IP addresses of trap
receivers to the community strings so that the switch will know where to
send the trap if it needs to.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
U - Update Display
R - Return to Previous Menu
This menu lists the current community strings on the switch and their
attributes. For attribute definitions, refer to “SNMPv1 and SNMPv2c
Overview” on page 96.
5. Enter the new SNMP community string. The name can be from one to
fifteen alphanumeric characters. Spaces are allowed.
6. Specify the access mode for the new SNMP community string. If you
specify Read, the community string will only allow you to view the MIB
objects on the switch. If you specify Read/Write, the community string
will allow you to both view and change the SNMP MIB objects on the
switch.
7. Specify the open access status. If you enter Yes, any network manager
who knows the community string can use it. If you respond with No,
making it closed access, only those management workstations whose
IP addresses you assign to the community string can use it.
10. If desired, repeat this procedure starting with Step 4 to create additional
community strings.
11. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
U - Update Display
R - Return to Previous Menu
This menu lists the current community strings on the switch and their
attributes. For attribute definitions, refer to “SNMPv1 and SNMPv2c
Overview” on page 96.
d. If you want the switch to send traps to a trap receiver, enter the IP
address of the receiver at this prompt. Otherwise, just press
Return.
f. After making changes, type R until you return to the Main Menu.
Then type S to select Save Configuration Changes.
e. After making changes, type R until you return to the Main Menu.
Then type S to select Save Configuration Changes.
e. After making changes, type R until you return to the Main Menu.
Then type S to select Save Configuration Changes.
e. After making changes, type R until you return to the Main Menu.
Then type S to select Save Configuration Changes.
e. After making changes, type R until you return to the Main Menu.
Then type S to select Save Configuration Changes.
6. Type Y for yes to delete the string or N for no to cancel the procedure.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To display the attributes of all the SNMP community strings on the switch,
use the following procedure:
Community Name Access Mode Status OpenAcc Manager IP Addr Trap Receiver IP
=================================================================================
Private125 Read|Write Enabled No 147.41.11.30 147.45.16.70
147.45.16.80 147.45.16.80
PublicATI78 Read Only Enabled No 147.41.11.12 147.42.22.22
147.44.16.86 147.45.16.86
147.45.16.88 147.45.16.88
147.45.16.90 147.45.16.90
HighSchool2 Read|Write Enabled No 147.45.10.80 147.45.10.80
U - Update Display
R - Return to Previous Menu
Port Parameters
This chapter contains the procedures for viewing and changing the
parameter settings for the individual ports on a switch, and contains the
following procedures:
To configure the most basic parameter settings for a port, perform the
following procedure:
3. Enter the number of the port you want to configure. You can specify
more than one port at a time. You can specify ports individually (for
example, 5,7,22), as a range (for example, 18-23), or both (for
example 1,5,14-22). You cannot specify nonconsecutive ports (for
example, 5,7,9).
Note
To configure the SFP or GBIC port 23 or 24 on an AT-9424T/SP,
AT-9424T/GB, or AT-9424Ti/SP4T/SP switch, the port must have a
valid link to an end node. If no SFP or GBIC is installed or if it does
not have a valid link, specifying port 23 or 24 configures the twisted
pair port 23R or 24R, respectively. You cannot configure twisted pair
port 23R or 24R if its corresponding SFP or GBIC port has a valid
link to an end node.
Note
If you are configuring multiple ports and the ports have different
settings, the Port Configuration menu displays the settings of the
lowest numbered port.
Note
A change to a parameter is immediately activated on the port.
0 - Description
You use this option to assign a description to a port, from 1 to 15
alphanumeric characters. Spaces are allowed, but you should not use
special characters, such as asterisks or exclamation points. (You
cannot set a port description if you are configuring more than one port.)
1 - Status
You use this option to enable or disable a port. When disabled, a port
does not forward frames to or from the node connected to the port.
You might want to disable a port and prevent packets from being
forwarded if a problem occurs with the node or cable connected to the
port. After the problem has been fixed, you can enable the port again
to resume normal operation.
You might also want to disable a port that is not being used to secure it
from unauthorized connections.
Enabled - The port receives and forwards packets. This is the default
setting.
Note
Option 2, HOL Blocking Prevention, is described in “Configuring
Head of Line Blocking” on page 117.
6 - Negotiation
You use this option to configure a port for Auto-Negotiation or to
manually set a port’s speed and duplex mode. The default is Auto.
Note
When you set negotiation to Manual, items 7 (Speed), 8 (Duplex),
and 9 (MDI Crossover) are displayed.
If you select Auto for Auto-Negotiation, which is the default setting, the
switch sets speed, duplex mode, and MDI crossover for the port
automatically. The switch determines the highest possible common
speed between the port and its end node and sets the port to that
speed. This helps to ensure that the port and the end node are
operating at the highest possible common speed.
Note the following items concerning the operation of Auto-Negotiation
on the switch port:
7 - Speed
This item is only available when Negotiation is set to Manual. Type 7 to
toggle between the following selections:
10 Mbps
100 Mbps
Note
A 10/100/1000Base-T twisted pair port can operate at 1000 Mbps
only when set to Auto-Negotiation. You cannot manually configure a
10/100/1000Base-T twisted pair port to 1000 Mbps.
8 - Duplex
This item is only available when Negotiation is set to Manual. The
possible settings are full-duplex and half-duplex.
9 - MDI Crossover
This item is only available when Negotiation is set to Manual.
This selection sets the wiring configuration of a twisted pair port. The
configuration can be MDI or MDI-X.
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Port A Port C
50%
C C C C D D D D
Ingress Queue Egress Queue
50%
Port B Port D
100%
D D D D D D D D D D D D D D D D
Ingress Queue Engress Queue
The HOL Limit parameter can help prevent this problem from occurring.
This parameter sets a threshold on the utilization of a port’s egress queue.
When the threshold for a port is exceeded, the switch signals other ports to
discard packets to the oversubscribed port.
For example, referring to the figure above, when the utilization of the
storage capacity of port D exceeds the threshold, the switch signals the
other ports to discard packets destined for port D. Port A drops the D
packets, enabling it to once again forward packets to port C.
The number that you enter for this value represents cells. A cell is 128
bytes. The range is 0 to 8191 cells. The default is 682.
5. Enter the threshold in cells. A cell equals 128 bytes. The range is 1 to
8191 cells and the default is 682.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
A switch port uses flow control to control the flow of ingress packets from
its end node when operating in full-duplex mode.
Back pressure performs much the same function as flow control. Both are
used by a port to control the flow of ingress packets. Flow control applies
to ports operating in full-duplex; back pressure applies to ports operating in
half-duplex mode.
When a switch port needs to stop a half-duplex end node from transmitting
data, it forces a collision on the data link, which stops the end node. After
the switch is ready to receive data again, the switch stops forcing
collisions. This is called back pressure.
Disabled -No flow control on the port. This is the default setting.
Auto - The port uses flow control only if it detects that the end node is
using it.
Disabled - The port does not use back pressure. This is the default
setting.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
If the performance of your network is affected by heavy traffic, you can use
these parameters to restrict ingress and egress broadcast packets as well
as unknown unicast and multicast packets forwarded by a port. Activating
this feature on a port causes the port to discard all packets of the type you
specified. For example, you might configure a port to discard all ingress
and egress broadcast packet or perhaps just unknown unicast egress
packets. The default setting for each filter is disabled.
11. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The rate limiting feature allows you to set the maximum number of ingress
packets the port accepts each second. Packets exceeding the threshold
are discarded. You can enable rate limiting and set a rate independently
for unknown unicast, multicast, and broadcast packets.
5. From the Rate Limiting menu, type 1 to toggle Unknown Unicast Rate
Limiting Status between Enabled and Disabled.
11. Type 3 to toggle Multicast Rate Limiting Status between Enabled and
Disabled.
14. Type 5 to toggle Broadcast Rate Limit Status between Enabled and
Disabled.
16. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Resetting a Port
3. Enter the number of the port you want to reset. To reset a range of
ports, enter the first and last ports of the range, separated by a dash
(for example, 4-8). You cannot specify nonconsecutive ports (for
example, 5,7,9)
3. Enter the number of the port you want to reset. To reset a range of
ports, enter the first and last ports of the range, separated by a dash
(for example, 4-8). You cannot specify nonconsecutive ports (for
example, 5,7,9)
You can return the parameters settings of a port to the default values.
3. Enter the number of the port you want to reset. To reset a range of
ports, enter the first and last ports of the range, separated by a dash
(for example, 4-8). You cannot specify nonconsecutive ports (for
example, 5,7,9)
3. From the Port Statistics menu, type 1 to select Display Port Statistics.
Enter port-list:
4. Enter the port whose statistics you want to view. You can specify more
than one port at a time.
Port 6
U - Update Display
R - Return to Previous Menu
Bytes Rx
Number of bytes received by the port.
Bytes Tx
Number of bytes transmitted from the port.
Frames Rx
Number of frames received by the port.
Frames Tx
Number of frames transmitted from the port.
Bcast Frames Rx
Number of broadcast frames received by the port.
Bcast Frames Tx
Number of broadcast frames transmitted from the port.
Mcast Frames Rx
Number of multicast frames received by the port.
Mcast Frames Tx
Number of multicast frames transmitted from the port.
Frames 64
Frames 65-127
Frames 128-255
Frames 256-511
Frames 512-1023
Frames 1024-1518
Frames 1519-1522
Number of frames transmitted from the port, grouped by size.
CRC Error
Number of frames with a cyclic redundancy check (CRC) error but with
the proper length (64-1518 bytes) received on the port.
Jabber
Number of occurrences of corrupted data or useless signals appearing
on the port.
No. of Rx Errors
Number of receive errors.
No. of Tx Errors
Number of transmit errors.
Undersize Frames
Number of frames that were less than the minimum length specified by
IEEE 802.3 (64 bytes including the CRC) received on the port.
Oversize Frames
Number of frames exceeding the maximum specified by IEEE 802.3
(1518 bytes including the CRC) received on the port.
Fragments
Number of undersized frames, frames with alignment errors, and
frames with frame check sequence (FCS) errors (CRC errors)
received on the port.
Collision
Number of collisions that have occurred on the port.
Dropped Frames
Number of frames successfully received and buffered by the port, but
discarded and not forwarded.
To clear the Ethernet port statistics and reset them to “0”, perform the
following procedure:
The statistics are reset to “0” and the statistics gathering starts again.
To display the current status of the ports on the switch, perform the
following procedure:
P - Previous Page
U - Update Display
R - Return to Previous Menu
Note
The speed, duplex mode, and flow control settings are blank for a
port that has not established a link with its end node.
The Port Status menu displays a table that contains the following
columns of information:
Port
The port number.
Link
The status of the link between the port and the end node connected to
the port. The possible settings are:
Up - Indicates that a valid link exists between the port and the end
node.
Down - Indicates that the port and the end node have not established a
valid link.
Neg
The status of Auto-Negotiation on the port. Possible values are:
Manual - Indicates that the operating speed and duplex mode have
been set manually.
MDIO
The operating configuration of the port. Possible values are Auto, MDI,
MDI-X. The status Auto indicates that the port automatically
determines the appropriate MDI or MDI-X setting.
Speed
The operating speed of the port. Possible values are:
10 - 10 Mbps
PVID
The VLAN identifier (VID) of the VLAN where the port is an untagged
member. This column does not include the VIDs of the VLANs where
the port is a tagged member.
Port Type
The port type.
This chapter contains the procedures for viewing the static and dynamic
MAC address table. It also explains how to add static MAC addresses to
the table.
The AT-9400 Series switch contains a MAC address table with a storage
capacity of 16,000 entries. The switch uses the table to store the MAC
addresses of the network nodes connected to its ports, along with the port
number on which each address was learned.
The switch learns the MAC addresses of the end nodes by examining the
source address of each packet received on a port. It adds the address and
port on which the packet was received to the MAC table if the address has
not already been entered in the table. The result is a table that contains all
the MAC addresses of the devices that are connected to the switch’s
ports, and the port number where each address was learned.
If the switch receives a packet with a destination address that is not in the
MAC address table, it floods the packet to all the ports on the switch,
excluding the port where the packet was received. If the ports have been
grouped into virtual LANs, the switch floods the packet only to those ports
that belong to the same VLAN from where the packet originated. This
prevents packets from being forwarded onto inappropriate LAN segments
and increases network security. When the destination node responds, the
switch adds its MAC address and port number to the table.
Dynamic MAC addresses are not stored indefinitely in the MAC address
table. The switch deletes a dynamic MAC address from the table if it does
not receive any frames from the node after a specified period of time. The
switch assumes that the node with that MAC address is no longer active
and that its MAC address can be purged from the table. This prevents the
MAC address table from becoming filled with addresses of nodes that are
no longer active.
The period of time that the switch waits before purging an inactive dynamic
MAC address is called the aging time. This value is adjustable on the
AT-9400 Series switch. The default value is 300 seconds (5 minutes). For
instructions on changing the aging timer, refer to “Changing the Aging
Time” on page 146.
The MAC address table can also store static MAC addresses. A static
MAC address is a MAC address of an end node that you assign to a switch
port manually. A static MAC address remains in the table indefinitely and
is never deleted, even when the end node is inactive.
You might need to enter static MAC addresses of end nodes the switch
does not learn in its normal dynamic learning process, or if you want a
MAC address to remain permanently in the table, even when the end node
is inactive.
1. From the Main Menu, type 4 to select MAC Address Tables. The MAC
Address Tables menu is shown in Figure 34.
2. From the MAC Address Tables menu, type 3 to select Display Unicast
MAC Addresses or 4 to select Display Multicast MAC Addresses. The
Display Unicast MAC Addresses menu is shown in Figure 35. The
Display Multicast MAC Addresses menu contains the same selections.
1 - Display All
2 - Display Static
3 - Display Dynamic
4 - Display by Port
5 - Display Specified MAC
6 - Display by VLAN ID
7 - Display on Base Ports
1 - Display All
This selection displays all dynamic addresses learned on the ports of
the switch and all static addresses that have been assigned to the
ports. An example of a unicast MAC address table is shown in Figure
36.
N - Next Page
U - Update Display
R - Return to Previous Menu
Note
The first address in the unicast MAC address table is the address of
the switch.
MAC
The static or dynamic unicast MAC address.
Port
The port where the address was learned or assigned. The MAC
address with port 0 is the address of the switch.
VLAN ID
The ID number of the VLAN where the port is an untagged member.
Type
The type of the address: static or dynamic.
U - Update Display
R - Return to Previous Menu
MAC Address
The static or dynamic multicast MAC address.
VLAN ID
The ID number of the VLAN where the port is an untagged member.
Type
The type of the address: static or dynamic.
Port Maps
The tagged and untagged ports on the switch that are members of a
multicast group. This column is useful in determining which ports
belong to different groups.
2 - Display Static
This selection displays only the static addresses assigned to the ports
on the switch.
3 - Display Dynamic
This selection displays only the dynamic addresses learned on the
ports on the switch.
4 - Display by Port
This selection displays the dynamic and static MAC addresses of a
particular port. When you select this option, you are prompted for a
port number. You can specify more than one port at a time.
When you use the Display Specified MAC selection, you specify the
MAC address and the AT-S63 management software automatically
locates the port on the switch where the device is connected.
6 - Display by VLAN ID
Displays all the static and dynamic addresses learned on the tagged
and untagged ports of a specific VLAN. When you select this option,
you are prompted for the VLAN ID number of the VLAN. You can
specify only one VLAN at a time
This section contains the procedure for adding static unicast and multicast
MAC addresses to the switch. You can assign up to 255 static addresses
per port on an AT-9400 Series switch.
2. From the MAC Address Tables menu, type 2 to select MAC Addresses
Configuration.
XXXXXX XXXXXX
After you have specified the MAC address, the following prompt is
displayed:
5. Enter the number of the port on the switch where you want to assign
the static address. If you are adding a static unicast address, you can
specify only one port.
If you are entering a static multicast address, you must specify the port
when the multicast application is located as well as the ports where the
host nodes are connected. Assigning the address only to the port
where the multicast application is located will prevent the forwarding of
the multicast packets to the host nodes. You can specify the ports
individually (e.g., 1,4,5), as a range (e.g., 11-14) or both (e.g., 15-
17,22,24).
2. From the MAC Address Tables menu, type 2 to select MAC Addresses
Configuration.
XXXXXX XXXXXX
After you have entered the MAC address, the following prompt is
displayed:
5. Enter the VLAN ID of the port where the address was assigned or
learned.
The MAC address is deleted from the switch’s MAC address table.
Note
You cannot delete a switch’s MAC address, an STP BPDU MAC
address, or a broadcast address.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To delete all dynamic unicast and multicast MAC address from the MAC
address table, perform the following procedure:
2. From the MAC Address Tables menu, type 2 to select MAC Addresses
Configuration.
If you respond with yes, all dynamic unicast and multicast addresses
are deleted from the table, and the switch begins to learn new
addresses.
The switch uses the aging time to delete inactive dynamic MAC addresses
from the MAC address table. When the switch detects that no packets
have been sent to or received from a particular MAC address in the table
after the period specified by the aging time, the switch deletes the
address. This prevents the table from becoming full of addresses of nodes
that are no longer active.
The default setting for the aging time is 300 seconds (5 minutes).
2. From the MAC Address Tables menu, type 1 to select MAC Address
Aging Time.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This chapter contains the procedures for creating, modifying, and deleting
static and LACP port trunks. Sections in the chapter include:
Static trunks
Link Aggregate Control Protocol (LACP) IEEE 802.3ad trunks
Static Port Trunk A static port trunk consists of two to eight ports on the switch that function
Overview as a single virtual link between the switch and another device. A static port
trunk improves performance by distributing the traffic across multiple ports
between the devices and enhances reliability by reducing the reliance on a
single physical link.
A static trunk is easy to configure. You simply designate the ports on the
switch that are to be in the trunk and the management software on the
switch automatically groups them together. The management software
also gives you control over how the traffic is to be distributed over the
trunk ports, as described in “Load Distribution Methods” on page 156.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
manufacturer. For this reason static trunks are typically employed only
between devices from the same vendor. That is not to say that an Allied
Telesyn layer 2 managed switch cannot form a static trunk with a device
from another manufacturer. But there is the possibility that the
implementations of static trunking on the two devices might not be
compatible.
Also note that a static trunk does not provide for redundancy or link
backup. If a port in a static trunk loses its link, the trunk’s total bandwidth is
diminished. Though the traffic carried by the lost link is shifted to one of the
remaining ports in the trunk, the bandwidth remains reduced until the lost
link is reestablished or you reconfigure the trunk by adding another port to
it.
LACP Trunk An LACP (Link Aggregation Control Protocol) trunk is another type of port
Overview trunk. It performs the same function as a static trunk. It increases the
bandwidth between two network devices by distributing the traffic load
over multiple physical links.
The advantage of an LACP trunk over a static port trunk is its flexibility.
While implementations of static trunking tend to be vendor specific, the
AT-9400 Series implementation of LACP is compliant with the IEEE
802.3ad standard. This makes it interoperable with equipment from other
vendors that also comply with the standard. Therefore, you can create a
trunk between an Allied Telesyn device and networking devices from other
manufacturers.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
Aggregate Trunks
in Different Aggregators
802.3ad-compliant MODE
AT-8524M Fast Ethernet Switch
STATUS
Ethernet Switch
LINK FAULT
MODE MASTER
LINK RPS
MODE PWR
Caution
The example cited here illustrates a loop in a network. Avoid
network loops to prevent broadcast storms.
Aggregate Trunks
in Same Aggregator
802.3ad-compliant LINK
MODE
AT-8524M Fast Ethernet Switch
STATUS
FAULT
802.3ad-compliant
Ethernet Switch Server
MODE MASTER
LINK RPS
MODE PWR
12-14
You could, if you wanted, create separate aggregators for the different
aggregate trunks in the example above. But letting the switch make the
determination for you whenever possible saves time later if you physically
reassign ports to a different trunk connected to another device.
If a conflict does occur, the two devices need a mechanism for resolving
the problem, a means by which they can decide whose LACP settings are
to take precedence. That is the function of the system LACP priority value.
A hexadecimal value of from 1 to FFFF, this parameter is used whenever
the devices encounter a conflict creating a trunk. The lower the number,
the higher the priority. The settings on the device with the higher priority
take precedence over the settings on the other device. If both devices
have the same system LACP priority value, the settings on the switch with
the lowest MAC address take precedence.
Adminkey Parameter
The switch uses this parameter to determine which ports are to be active
and which are to be in the standby mode in situations where the number of
ports in the aggregate trunk exceeds the highest allowed number of active
ports. This parameter can be adjusted on each port and is a hexadecimal
value in a range of 1 to FFFF. The lower the number, the higher the
priority. Ports with the highest priorities are designated as the active ports
in an aggregate trunk.
The default value of a port’s priority number is equal to its port number in
hexadecimal. For example, the default values for ports 2 and 11 are 0002
and 000B, respectively.
In the unusual event that you set this parameter to the same value for
some or all of the ports of an aggregate trunk, the selection of active ports
is based on port numbering. The lower the port number, the higher the
priority.
The load distribution method determines the manner in which the switch
distributes the traffic across the active ports of an aggregate trunk. The
method is assigned to an aggregator and applies to all aggregate trunks
within it. If you want to assign different load distribution methods to
different aggregate trunks, you must create a separate aggregator for
each trunk. For further information, refer to “Load Distribution Methods” on
page 156.
LACP must be activated on both the switch and the other device.
The other device must be 802.3ad-compliant.
An aggregator can consist of any number of ports.
The AT-9400 Series switch supports up to eight active ports in an
aggregate trunk at a time.
The switch supports a maximum of three aggregate trunks.
The ports of an aggregate trunk must be of the same medium type: all
twisted pair ports or all fiber optic ports.
The ports of a trunk can be consecutive (for example ports 5-9) or
nonconsecutive (for example, ports 4, 8, 11, 20).
A port can belong to only one aggregator at a time.
A port cannot be a member of an aggregator and a static trunk at the
same time.
The ports of an aggregate trunk must be untagged members of the
same VLAN. (The switch’s management software does not return an
error message if you create an aggregator with ports that are members
of different untagged VLANs. However, it does not add the ports to the
aggregate trunk when establishing the trunk.)
10/100/1000Base-TX twisted pair ports must be set to Auto-
Negotiation or 100 Mbps, full-duplex mode. LACP trunking is not
supported in half-duplex mode.
100Base-FX fiber optic ports must be set to full-duplex mode.
You can create an aggregate trunk including transceivers with
1000Base-X fiber optic ports.
Only those ports that are members of an aggregator transmit LACPDU
packets.
The load distribution method is applied at the aggregator level. If you
want aggregate trunks to have different load distribution methods, you
must create a separate aggregator for each trunk. For further
information, refer to “Load Distribution Methods” on page 156.
A port that is a member of an aggregator functions as part of an
aggregate trunk only if it receives LACPDU packets from the remote
device. If it does not receive LACPDU packets, it functions as a regular
Ethernet port, forwarding network traffic while also continuing to
transmit LACPDU packets.
The port with the highest priority in an aggregate trunk carries
broadcast packets and packets with an unknown destination.
When creating a new aggregator, you can specify either a name for
the aggregator or an adminkey, but not both. If you specify a name, the
adminkey is based on the operator key of the lowest numbered port in
the aggregator. If you specify an adminkey, the default name is
DEFAULT_AGG followed by the port number of the lowest numbered
port in the aggregator. For example, an aggregator of ports 12 to 16 is
given the default name DEFAULT_AGG12.
Prior to creating an aggregate trunk between an AT-9400 Series
switch and another vendor’s device, refer to the vendor’s
documentation to determine the maximum number of active ports the
device can support in a trunk. If the number is less than eight, the
maximum number for the AT-9400 Series switch, you should probably
assign it a higher system LACP priority than the AT-9400 Series
switch. If it is more than eight, assign the AT-9400 Series switch the
higher priority. This can avoid a possible conflict between the devices if
some ports are placed in the standby mode when the devices create
the trunk. For background information, refer to “LACP System Priority”
on page 153.
LACPDU packets are transmitted as untagged packets.
Load Distribution This section discusses the load distribution methods and applies to both
Methods static and LACP port trunks.
One of the steps to creating a static or LACP port trunk is the selection of
a load distribution method. This step determines how the switch distributes
the traffic load across the ports in the trunk. The AT-S63 management
software offers the following load distribution methods:
The load distribution methods examine the last three bits of a packet’s
MAC or IP address and compare the bits against mappings assigned to
the ports in the trunk. The port mapped to the matching bits is selected as
the transmission port for the packet.
In cases where you select a load distribution that employs either a source
or destination address but not both, only the last three bits of the
designated address are used in selecting a transmission port in a trunk. If
you select one of the two load distribution methods that employs both
source and destination addresses, port selection is achieved through an
XOR operation of the last three bits of both addresses.
Last 3 Bits 000 001 010 011 100 101 110 111
(0) (1) (2) (3) (4) (5) (6) (7)
Trunk Ports 7 8 9 10 11 12 13 14
Assume you selected source MAC address as the load distribution method
and that the switch needed to transmit over the trunk a packet with a
source MAC address that ended in 9. The binary equivalent of 9 is 1001,
making the last three bits of the address 001. An examination of the table
above indicates that the switch would use Port 8 to transmit the frame
because that port is mapped to the matching bits.
A similar method is used for the two load distribution methods that employ
both the source and destination addresses. Only here the last three bits of
both addresses are combined by an XOR process to derive a single value
which is then compared against the mappings of the bits to ports. The
XOR rules are as follows:
0 XOR 0 = 0
0 XOR 1 = 1
1 XOR 0 = 1
1 XOR 1 = 0
9 = 1001
3 = 0011
Applying the XOR rules above on the last three bits would result in 010, or
2. A examination of the table above shows that the packet would be
transmitted from port 9.
You can assign different load distribution methods to different static trunks
on the same switch. The same is true for LACP aggregators. However, it
should be noted that all aggregate trunks within an LACP aggregator must
use the same load distribution method.
The load distribution methods assume that the final three bits of the
source and/or destination addresses of the packets from the network
nodes are varied enough to support adequate distribution of the packets
over the trunk ports. A lack of variation can result in one or more ports in a
trunk being used more than others, with the potential loss of a trunk’s
efficiency and performance.
The following procedures explain how to create, modify, and delete static
port trunks:
Creating a Static This section contains the procedure for creating a static port trunk on a
Port Trunk switch. Be sure to review the guidelines in “Port Trunk Overview” on
page 148 before performing the procedure.
Caution
Do not connect the cables to the trunk ports on the switches until
after you have configured the trunk with the management software.
Connecting the cables before configuring the software will create a
loop in your network topology. Data loops can result in broadcast
storms and poor network performance.
Note
Before creating a port trunk, examine the speed, duplex mode, and
flow control settings of the lowest numbered port that will be a part of
the trunk. Check to be sure that the settings are correct for the end
node to which the trunk will be connected. When you create the
trunk, the AT-S63 management software copies the settings of the
lowest numbered port in the trunk to the other ports so that all the
settings are the same.
You should also check to be sure that the ports are untagged
members of the same VLAN. You cannot create a trunk of ports that
are untagged members of different VLANs.
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
3. From the Port Trunking and LACP menu, type 1 to select Static Port
Trunking.
C - Create Trunk
D - Delete Trunk
M - Modify Trunk
This menu lists the trunks that already exist on the switch.
Create Trunk
1 - Trunk ID ......... 1
2 - Trunk Name .......
3 - Trunk Method ..... SRC/DST MAC
4 - Trunk Ports ......
C - Create Trunk
R - Return to Previous Menu
1 - Trunk ID
Specifies the trunk ID. Enter an ID number for the trunk, from 1 to 6. A
trunk must be assigned a unique ID number. The default value is the
next unused ID number.
2 - Trunk Name
Specifies the trunk name. Enter a name for the trunk. The name can be
up to 16 alphanumeric characters. No spaces or special characters,
such as asterisks and exclamation points, are allowed. Each trunk
must have a unique name.
3 - Trunk Method
Specifies the load distribution method. The possible settings are:
SRC MAC - Source MAC address
DST MAC - Destination MAC address
SRC/DST MAC - Source address /destination MAC address
SRC IP - Source IP address trunking
DST IP - Destination IP address trunking
SRC/DST IP - Source address /destination IP address
4 - Port Range
Specifies the ports of the trunk. A trunk can contain up to eight ports.
You can identify the ports individually (for example, 3,7,10), as a range
(for example, 5-11), or both (for example, 2,4,11-14).
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Modifying a This section contains the procedure for modifying a static port trunk on the
Static Port Trunk switch. Be sure to review the guidelines in “Static Port Trunk Guidelines”
on page 149 before performing the procedure.
Caution
If you will be adding or removing ports from the trunk, you should
disconnect all data cables from the ports of the trunk on the switch
before performing the procedure. Adding or removing ports from a
static port trunk without first disconnecting the cables may result in
loops in your network topology, which can result in broadcast storms
and poor network performance.
If you are adding a port and the port will be the lowest numbered port
in the trunk, its parameter settings will overwrite the settings of the
existing ports in the trunk. Therefore, you should check to see if its
settings are appropriate prior to adding it.
If you are adding a port and the port will not be the lowest numbered
port in the trunk, its settings will be changed to match the settings of
the existing ports in the trunk.
If you are adding a port to a static trunk, you should check to be sure
that the new port is an untagged member of the same VLAN as the
other trunk ports. A trunk cannot contain ports that are untagged
members of different VLANs.
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
3. From the Port Trunking and LACP menu, type 1 to select Static Port
Trunking.
The Modify Trunk menu is displayed. The menu displays the operating
specifications of the selected trunk. An example is shown in Figure 45.
M - Modify Trunk
R - Return to Previous Menu
Note
You cannot change a trunk’s ID number.
1 - Trunk ID
Specifies the trunk ID. Enter an ID number for the trunk, from 1 to 6. A
trunk must be assigned a unique ID number. The default value is the
next unused ID number.
2 - Trunk Name
Specifies the trunk name. Enter a name for the trunk. The name can be
up to 16 alphanumeric characters. No spaces or special characters,
such as asterisks and exclamation points, are allowed. Each trunk
must have a unique name.
3 - Trunk Method
Specifies the load distribution method. The possible settings are:
4 - Port Range
Specifies the ports of the trunk. A trunk can contain up to eight ports.
You can identify the ports individually (for example, 3,7,10), as a range
(for example, 5-11), or both (for example, 2,4,11-14).
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting a Static To delete a static port trunk from the switch, perform the following
Port Trunk procedure:
Caution
Disconnect the cables from the port trunk on the switch before
performing the following procedure. Deleting a port trunk without first
disconnecting the cables can create loops in your network topology.
Data loops can result in broadcast storms and poor network
performance.
2. From the Port Menu, type 4 to select Port Trunking and LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
3. From the Port Trunking and LACP menu, type 1 to select Static Port
Trunking.
6. Type Y for yes to delete the port trunk or N for no to cancel this
procedure.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The following procedures explain how to create and manage LACP trunks:
Enabling or This procedure explains how to enable or disable LACP on the switch.
Disabling LACP When you enable LACP, the switch begins to transmit LACPDU packets
from ports assigned to aggregators. If ports in an aggregator receive
LACPDU packets from a remote device, the switch creates aggregate
trunks. If no aggregators are defined, no LACPDU packets are
transmitted. When you disable LACP, any ports in existing aggregators
stop sending LACPDU packets and function as regular Fast Ethernet
ports.
Caution
Do not disable LACP if there are defined aggregators without first
disconnecting all cables connected to the aggregate trunk ports.
Otherwise, a network loop might occur, resulting in a broadcast
storm and poor network performance.
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Setting the LACP This procedure explains how to set the LACP system priority value on a
System Priority switch. The switch uses this parameter if a conflict occurs when
establishing an aggregate trunk with the other device. The LACP settings
on the device with the higher priority take precedence over the settings on
the other device. The lower the value, the higher the priority. A switch can
have only one LACP system priority. For more information, refer to “LACP
System Priority” on page 153.
To set the LACP system priority for the switch, perform the following
procedure:
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
Before creating an aggregator, verify that the ports that will be
members of the aggregator are set to Auto-Negotiation or 1000
Mbps, full-duplex. Aggregate trunks do not support half-duplex
mode.
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
1 - Aggregator ..................
2 - Adminkey .................... 0x0000
3 - Distribution Mode ........... SRC/DST MAC
4 - Port Range ..................
C - Create Aggregator
1 - Aggregator
Specifies a name for the aggregator. The name can be up to 20
alphanumeric characters. Spaces are allowed, but special characters,
such as asterisks and exclamation points, are not. Each aggregator
must have a unique name.
2 - Adminkey
Specifies a unique adminkey value for the aggregator. The value is
entered in hexadecimal. The range is 1 to FFFF. For background
information, refer to “Adminkey Parameter” on page 153.
Note
You can specify either a new aggregator’s name or adminkey, but
not both. If you specify a name, the adminkey is based on the
operator key of the lowest numbered port in the aggregator.
3 - Distribution Mode
Sets the load distribution method. Possible settings are:
4 - Port Range
Specifies the aggregator ports. An aggregator can contain any number
of ports on the switch. You can identify the ports individually (for
example, 3,7,10), as a range (for example, 5-11), or both (for example,
2,4,11-14).
9. Connect the cables to the ports of the aggregator on both the switch
and the other network device.
The aggregator and its aggregate trunk(s) are now ready for network
operations.
Caution
Do not connect the cables to the ports of the aggregator on the
switch until after you have enabled LACP. Connecting the cables
before activating the protocol will create a loop in your network
topology. Data loops can result in broadcast storms and poor
network performance.
11. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Modifying an This procedure explains how to modify an aggregator. You can change an
Aggregator aggregator’s name, adminkey, or load distribution method. You can also
use this procedure to add or remove ports. To modify an aggregator, you
need to know its name or adminkey key. It is recommended that you
review the section “LACP Trunk Guidelines” on page 155 before modifying
an aggregator.
Caution
If you will be adding or removing ports from the aggregator, you
should disconnect all network cables from the ports of the
aggregator on the switch before performing the procedure. Adding
or removing ports without first disconnecting the cables can result in
loops in your network topology, which can result in broadcast storms
and poor network performance.
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
1 - Aggregator ..................
2 - Adminkey .................... 0x0000
3 - Distribution Mode ........... SRC/DST MAC
4 - Port Range ..................
M - Modify Aggregator
1 - Aggregator
Specifies a name for the aggregator. The name can be up to twenty
alphanumeric characters. Spaces are allowed, but special characters,
such as asterisks and exclamation points, are not. Each aggregator
must have a unique name.
2 - Adminkey
Specifies a unique adminkey value for the aggregator. The value is
entered in hexadecimal. The range is 1 to FFFF. For background
information, refer to “Adminkey Parameter” on page 153.
3 - Distribution Mode
Sets the load distribution method. Possible settings are:
SRC MAC - Source MAC address
DST MAC - Destination MAC address
SRC/DST MAC - Source address /destination MAC address
4 - Port Range
Specifies the aggregator ports. An aggregator can contain any number
of ports on the switch. You can identify the ports individually (for
example, 3,7,10), as a range (for example, 5-11), or both (for example,
2,4,11-14).
Deleting an This procedure deletes an aggregator from the switch. The ports that are
Aggregator members of the aggregator stop transmitting LACPDU packets after the
aggregator is deleted.
Caution
Disconnect the cables from the ports of the aggregator before
performing the following procedure. Deleting an aggregator without
first disconnecting the cables can create loops in your network
topology. Data loops can result in broadcast storms and poor
network performance.
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
5. Enter the name of the aggregator you want to delete. The name is
case-sensitive. You can delete only one aggregator at a time.
Are you sure you want to delete this aggregator (Y/N) [Yes/No]
->
Configuring This procedure explains how to configure a port’s priority value. This
LACP Port parameter determines whether a port is active or in standby mode as part
of an aggregate trunk. For further information, refer to “LACP Port Priority
Parameters Parameter” on page 153. This procedure also shows how to assign a port
to a different aggregator.
Note
To remove a port from an aggregator without assigning it to a
different one, skip this procedure and instead perform “Modifying an
Aggregator” on page 171. When modifying the aggregator, reenter
its port list, omitting the port you want to remove.
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
5. Type 1 to select Port Number and, when prompted, enter the port you
want to configure. You can configure only one port at a time.
6. To set the port’s priority value, type 3 to Priority and enter the new
value in hexadecimal. The range is 1 to FFFF. The default is the port
number in hexadecimal.
Displaying LACP To display LACP port and aggregator status, perform the following
Port and procedure:
Aggregator 1. From the Main Menu, type 1 to select Port Configuration.
Status
The Port Configuration menu is shown in Figure 25 on page 112.
2. From the Port Configuration menu, type 4 to select Port Trunking and
LACP.
The Port Trunking and LACP menu is shown in Figure 42 on page 160.
4. To view port status, type 7 to select Show LACP Port Status. To view
aggregator status, type 8 to select Show LACP Aggregator Status.
Port ............. 01
Aggregator ....... Sales server
ACTOR PARTNER
====================================++++++++===========================
Actor Port ............. 06 Partner Port ......... 00
Selected ............... SELECTED Partner System ....... 00-30-84-00-00-02
Oper Key ............... 0x0050 Oper Key ............ 0x0004
Oper Port Priority .... 0x0006 Oper Port Priority ... 0x0007
Individual ............. NO Individual ........... NO
Synchronized............ YES Synchronized.......... YES
Collecting ............ YES Collecting ........... YES
Distributing ........... YES Distributing ......... NO
Defaulted .............. NO Defaulted ............ NO
Expired ................ NO Expired .............. NO
Actor Churn .......... YES Partner Churn ........ YES
N - Next Page
U - Update Display
R - Return to Previous Menu
LAG ID:
[(0080,00-30-84-00-00-00,0041,00,0000),(0080,00-30-84-00-00-02,0004,00,0000)]
Port Mirroring
This chapter contains the procedures for creating and deleting a port
mirror. Sections in the chapter include:
The port mirroring feature allows you to unobtrusively monitor the traffic
being received and transmitted on one or more ports on a switch by
having the traffic copied to another switch port. You can connect a network
analyzer to the port where the traffic is being copied and monitor the traffic
on the other ports without impacting network performance or speed.
The port(s) whose traffic you want to mirror is called the source port(s).
The port where the traffic will be copied to is called the destination port.
You can select more than one source port at a time. However, the
more ports you mirror, the less likely the destination port will be able to
handle all the traffic. For example, if you mirror the traffic of six heavily
active ports, the destination port is likely to drop packets, meaning that
it will not provide an accurate mirror of the traffic of the six source
ports.
The source and destination ports must be located on the same switch.
You can mirror either the ingress or egress traffic of the source ports,
or both.
Enter Enable(E)/Disable(D):
New options are added to the Port Mirroring menu, as shown in Figure
53.
6. Enter the number of the port that functions as the destination port. This
is the port where the traffic from the source ports will be copied to and
where the network analyzer will be located. You can specify only one
destination port.
7. If you want to mirror the ingress (received) traffic on one or more ports,
type 3 to select Ingress(Rx) Mirror (Source Ports.
8. Enter the ports. You can identify the ports individually (for example,
3,7,10), as a range (for example, 5-11), or both (for example, 2,4,11-
14). Entering “0” (zero) removes all ingress source ports.
9. If you want to mirror the egress (transmitted) traffic from one or more
ports, type 4 to select Egress Mirror Port.
10. Enter the ports. Entering “0” (zero) removes all egress source ports.
Note
If you want to monitor both the ingress and egress traffic of the
source ports, you must specify the ports in both selection 3 and 4.
11. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Enter Enable(E)/Disable(D):
Port mirroring on the switch is now disabled. You can disconnect the
network analyzer from the destination port and use the port for normal
network operations.
4. Enter the number of the port that will function as the destination port.
This is the port where the traffic from the source ports will be copied to
and where the network analyzer will be located. You can specify only
one destination port.
5. If you want to mirror the ingress (received) traffic on one or more ports,
type 3 to select Ingress(Rx) Mirror (Source) Ports.
6. Enter the ports. You can identify the ports individually (for example,
3,7,10), as a range (for example, 5-11), or both (for example, 2,4,11-
14). Entering “none” removes all ingress source ports.
7. If you want to mirror the egress (transmitted) traffic from one or more
ports, type 4 to select Egress Mirror Port.
8. Enter the ports. Entering “none” removes all egress source ports.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The Port Mirroring menu provides the following information about the
port mirror:
Enable/Disable
The port mirroring status, Enabled or Disabled.
Mirror-To (Destination) Port
The port that functions as the destination port.
Networking Stack
The switch has an Address Resolution Protocol (ARP) table for storing IP
addresses of network devices and their corresponding MAC addresses.
The switch uses the table whenever you issue a management command
that requires the switch’s AT-S63 management software to interact with
another device on the network. An example would be if you instructed the
switch to ping another network device or download a new AT-S63 image
file or configuration file from a TFTP server.
The value of the ARP table is that it eliminates the need of the switch to
issue unnecessary ARP broadcast packets when performing some
management functions. This can improve the switch’s response time as
well as reduce the number of broadcast packets on your network.
The table can hold up to 11 entries. There are two types of entries. One
type is permanent. There is only one permanent entry. It is used by the
switch for internal diagnostics and it can never be removed from the table.
The other type is a temporary entry, of which there can be up to ten. The
switch adds a temporary entry whenever its management software
interacts with another network device during a management function.
When you enter a management command that contains an IP address not
in the table, the switch sends out an ARP broadcast packet. When the
remote device responds with its MAC address, the switch adds the
device’s IP address and MAC address as a new temporary entry to the
table.
A temporary entry remains in the table only while active. An entry remains
active so long as it is periodically used by the switch for management
functions. If an entry is inactive for a specified period of time, referred to as
ARP cache timeout, it is automatically removed from the table. This value
is adjustable, as explained in “Setting the ARP Cache Timeout” on
page 192. The default is 400 seconds. If the table becomes full, the
management software continues to add new entries by deleting the oldest
entries.
The management software allows you to view the contents of the table.
You can also delete individual table entries or delete all the entries. These
functions are explained in the following subsections:
Note
The switch does not use the ARP table to move packets through its
switching matrix. The switch refers to the table only when performing
a management function that involves interaction with another
network node.
Displaying the To display the ARP table, perform the following procedure:
ARP Table 1. From the Main Menu, type 5 to select System Administration.
4. From the Networking Stack menu, type 1 to select Display ARP Table.
U - Update Display
R - Return to Previous Menu
The Display ARP Table menu displays a table that contains the
following columns of information: The information in this table is for
viewing purposes only.
Interface
The network interface of a table entry. The switch has two network
interfaces. The “loopback” designation represents the interface used
by the switch for internal diagnostics. The “eth0” designation
represents the Ethernet network interface.
IP Address and
MAC Address
The IP addresses and their corresponding MAC addresses.
Type
The type of ARP entry. An entry can be permanent, meaning it can
never be deleted from the table, or temporary. Only the “loopback”
entry is permanent. All “eth0” entries are temporary.
Deleting an ARP To remove a dynamic ARP entry from the ARP cache, perform the
Table Entry following procedure:
4. From the Networking Stack menu, type 2 to select Delete ARP Entry.
5. Enter the IP address of the entry you want to delete. You cannot delete
the first entry in the table with the interface designation “loopback.”
You do not need to return to the main menu to save the changes made
with this procedure.
Resetting the To clear all entries from the ARP table, perform the following procedure:
ARP Table
1. From the Main Menu, type 5 to select System Administration.
4. From the Networking Stack menu, type 3 to select Reset ARP Table.
Note
No confirmation prompt is displayed. All entries in the ARP table are
immediately deleted, with the exception of the “loopback” entry,
which cannot be deleted.
The switch begins to add new entries to the table as it performs new
management functions in conjunction with other network devices.
Setting the ARP Inactive temporary entries in the ARP table are timed out according to the
Cache Timeout ARP cache timeout value. This parameter prevents the table from
becoming full with inactive entries. The default setting is 400 seconds. To
set this value, perform the following procedure:
The routing table is used by the switch when a remote node specified in a
management command is not on the same physical network as the switch.
The table contains the IP address of the next hop to reaching the remote
network or device. For example, the switch might refer to the table if you
instructed it to download a new AT-S63 image file from a network server
that was on a different physical network.
U - Update Display
R - Return to Previous Menu
The information in this menu is for viewing purposes only. The Display
Route Table menu contains the following columns of information.
Destination
The IP address of a destination network, subnetwork, or end node.
Mask
A filter used to designate the active part of the destination IP address.
A binary 1 in the mask indicates an active bit in the address while a
binary 0 indicates that the corresponding bit in the address is not.
Next Hop
The IP address of the next intermediary device to reaching the
destination network, subnetwork, or end node.
Interface
The interface on the switch where the next hop is located. The switch
has two interfaces. The interface “loopback” is for internal diagnostics
only. The other interface is “eth0.”
The TCP connections table lists the active Telnet, SSH, and web browser
management sessions on a switch and includes the IP addresses of the
management stations. You can use the table to determine the number of
remote, active management sessions open on a switch, as well as identify
the management stations.
U - Update Display
R - Return to Previous Menu
This menu is for viewing purposes only. The Display TCP Connections
menu contains the following information:
Local Address
The IP address of the switch, followed by the TCP port number used
by the switch for the connection. The two values are divided by a
colon, as illustrated in Figure 59. The port number indicates the type of
TCP connection. A port number of 23 indicates a Telnet connection, 22
an SSH connection, and 80 or 443 a web browser HTTP or HTTPS
connection, respectively.
TCP Port
IP Address Number
169.254.37.1:23
Foreign Address
The IP address of the management workstation that initiated the
connection, followed by the station’s TCP port number.
State
The state of the TCP connection. The TCP states are:
The entries for the listening sockets for the Telnet, SSH, and web
browser servers are identified in the table with a TCP state of LISTEN.
If you disable a server on the switch, its corresponding LISTEN entry is
removed from the table. Disabling all the servers leaves the table
empty. (The SSH server is disabled by default on the switch.)
The example in Figure 59 on page 196 shows that the Telnet and web
browser servers are active on the switch. The table also includes two
active TCP connections. Entry 4 is for a Telnet connection and entry 24
is for a web browser HTTP connection.
A web browser management session can have more than one TCP
connection open at a time. The different connections are used to carry
different packets of the management session.
You cannot change any of the information in this table. The only
operating parameter on the switch that affects management TCP
connections that you can adjust, other than enabling or disabling the
servers, is the TCP port used by the web browser server. The default
values are port 80 for HTTP and 443 for HTTPS. For instructions on
how to change this setting, refer to “Configuring the Web Server” on
page 753. The management software does not allow you to change
the default port number of 23 for Telnet connections or 22 for SSH
connections.
This procedure explains how you can use the TCP connections table to
end a Telnet, SSH, or web browser management session on a switch.
This procedure is useful if a manager forgot to log out after ending a
session or if you suspect that an unauthorized person is accessing the
switch’s management software.
Before performing this procedure, display the TCP table by performing the
procedure “Displaying the TCP Connections” on page 195 and write down
on paper the index number of the connection you want to end. A web
browser management session can consist of more than one TCP
connection.
You cannot delete the entries for the listening sockets for the Telnet, SSH,
and web browser servers. To remove a listening socket entry from the
table, disable the corresponding server.
To display the TCP connections and see the index numbers, refer to
“Displaying the TCP Connections” on page 195.
6. Enter the index number of the connection you want to delete and press
Enter. You can enter only one index number at a time.
The TCP Global Information table displays TCP status and statistics. To
view the table, perform the following procedure:
4. From the Networking Stack menu, type 6 to select Display TCP Global
Information.
U - Update Display
R - Return to Previous Menu
Max connections
The maximum number of TCP connections allowed.
Active Opens
The number of active TCP opens. Active opens initiate connections.
Passive Opens
The number of TCP passive opens. Passive opens are issued to wait
for a connection from another host.
Attempt Fails
The number of failed connection attempts.
Established Resets
The number of connections established but have not been reset.
Current Established
The number of current connections.
In Segs
The number of segments received.
In Segs Error
The number of segments received with an error.
Out Segs
The number of segments transmitted.
Advanced Operations
File System
The chapter describes the AT-S63 file system, and how you can copy,
rename, and delete system files from the file system or from a compact
flash card. This chapter also explains how you can use the file system to
select which boot configuration file you want the switch to use the next
time the device is reset or power cycled.
The AT-S63 management software has a file system for storing system
files. The file system is a part of flash memory in the switch. You can view
a list of files as well as copy, rename, and delete files. For those AT-9400
Series switches that support a compact flash memory card, you can
perform the same functions on the files stored on a flash card, as well as
copy files between the switch’s file system and a flash card.
Configuration files
Public keys
CA and self-signed certificates
Certificate enrollment requests
Event logs
Note
The certificate file, certificate enrollment request file, and key file are
supported only on the version of AT-S63 management software that
features SSL and PKI security.
This chapter does not explain how to transfer a file from the AT-S63 file
system to a management station or to an TFTP server. For those
instructions, refer to Chapter 12, “File Downloads and Uploads” on page
229.
Note
The file system may contain one or more ENC.UKF files. These are
encryption key pairs. These files cannot be deleted, copied, or
exported from the file system. For instructions on deleting a key pair,
refer to “Deleting an Encryption Key” on page 771.
File Naming The flash memory file system is a flat file system—directories are not
Conventions supported. However, directories are supported on compact flash cards. In
both types of storage, files are uniquely identified by a file name in the
following format:
filename.ext
where:
filename is a descriptive name for the file, and may be one to sixteen
characters in length. Valid characters are lowercase letters (a–z),
uppercase letters (A–Z), digits (0–9), and the following characters: ~ ’
@ # $ % ^ & ( ) _ - { }. Invalid characters are: ! * + = “| \ [ ] ; : ? / , < >.
ext is a file name extension of three characters in length, preceded by
a period (.). The extension is used by the switch to determine the file
type.
standardconfig.cfg
The following is an example of an invalid file name for a file stored in flash
memory:
sys/head_o.cfg
The backslash character (/ ) is not a valid character for files stored in flash
memory because subdirectories are not supported in the flash memory
system.
Using Wildcards You can use the asterisk character (*) as a wildcard character in some
to Specify Groups fields to identify groups of files. In addition, a wildcard can be combined
with other characters. The following are examples of valid wildcard
of Files expressions:
*.cfg
*.key
28*.cfg
Specifying the When you work with files on a switch that supports a compact flash card,
File Location the default file location for file system operations is flash memory. You can
use the Copy File, Rename File, Delete File, View File, and List Files
selections on the File Operations menu (see Figure 61 on page 208) to
work with files in flash memory or on a compact flash card by specifying
the file location. To specify the file location as flash memory, precede the
file name with “flash:.,” For example:
flash:boot.cfg
To specify a file located on a compact flash card, precede the name with
“cflash:,” for example:
cflash:switch12.cfg
A boot configuration file contains the series of commands that are needed
to recreate the current or a specific configuration of the switch when the
unit is power cycled or reset. The commands in the file recreate all the
VLANs, port settings, spanning tree settings, port trunks, port mirrors, and
so forth.
A switch can contain multiple boot configuration files, but only one can be
active on a switch at a time. The active boot file is the file that is updated
whenever you select the Save Configuration Changes option from the
Main Menu.
You can create different boot configuration files and store them in the
switch’s file system. For example, you might create a backup of a boot
configuration file to protect against the loss of the file, or you might create
different boot configuration files to see which works best on the switch and
for your network. You can also copy boot configuration files onto different
switches to save yourself the trouble of having to manually configure
AT-9400 Series switches that are to have similar configurations. One way
to do this with switches that support compact flash cards is to copy the
configuration file from flash memory on the master switch onto the
compact flash card. Then take the compact flash card to other switches
and copy the configuration file from the compact flash card into the
switch’s flash memory.
To display a list of the boot configuration files that exist on the switch, see
“Displaying System Files” on page 220.
Creating a Boot This section explains how to create a new boot configuration file on the
Configuration switch. You might want to create a boot configuration file to download it
onto another switch. Or, you might want to create a backup of your current
File configuration.
Note
Item 9, Format Flash Drive, and item F, Display Flash Information,
are described in “Working with Flash Memory” on page 223. Item C,
Display Compact Flash Information and item D, Compact Flash
Directory Configuration are described in “Working with the Compact
Flash Card” on page 225.
5. Enter a file name for the new boot configuration file. When entering a
file name, observe the following:
After you enter the file name, the switch creates the file. The file
contains the switch’s current configuration.
This makes your new boot configuration file the active file on the
switch. Any changes you now make to the switch’s parameter settings
are saved to this file.
The file name is now displayed following selection 1 in the File
Operations menu. The file name should be followed by “Exist”,
meaning that the file exists in the switch’s file system. If “Not Found” is
displayed instead, you probably entered the name incorrectly. If
necessary, repeat steps 6 and 7 and reenter the file name.
After you create the boot configuration file and designate it as the active
boot configuration file on the switch, you can configure the switch’s
parameter settings by making those changes that you want the new boot
configuration file to contain. Then, save your changes to the boot
configuration file by returning to the Main Menu and typing S to select
Save Configuration Changes. Failure to save your changes means that
the boot configuration file will not contain the new parameter settings.
Note
Only the active boot configuration file is changed when you select
the Save Configuration Changes option in the Main Menu. No other
boot configuration files that are stored on the switch are altered.
You have now created the boot configuration file, made the necessary
changes to the switch’s parameter settings, and saved the changes. If you
want the switch to use this new boot configuration file the next time you
reset or power cycle the switch, no further steps are necessary. The new
boot configuration file is already the active boot file on the device.
But if you want the switch to use a different file as the active boot
configuration file, then perform the procedure in “Setting the Active Boot
Configuration File” on page 210.
Setting the Active This procedure selects the active boot configuration file for the switch. The
Boot switch uses the active boot configuration file to set its parameter settings
when you reset or power cycle the unit. It also updates the active
Configuration configuration boot file whenever you select Save Configuration Changes
File from the Main Menu.
To view the name of the currently active configuration file, display the
File Operations menu. The name of the file is displayed in option 1
Boot Configuration File in the menu.
The file that you want to select as the new active configuration file
must already exist in the switch’s file system or on a flash memory
card, for those switches that support a flash card. To view the switch’s
configuration files, see “Displaying System Files” on page 220.
Configuration files have a “.cfg” extension.
To create an entirely new configuration file, refer to “Creating a Boot
Configuration File” on page 207.
Specifying a new active boot configuration file does not change the
current operating configuration of the switch. If you want the switch to
reconfigure itself according to the configuration in the newly assigned
active boot configuration file, reset or power cycle the switch at the end
of the procedure.
Selecting Save Configuration Changes from the Main Menu after
changing the active configuration file overwrites the settings in the file
with the current operating settings of the switch.
You can specify a configuration file on a flash memory card for those
systems that support a flash card. However, the switch does not copy
the configuration file to its file system. Instead, it uses and updates the
file directly on the card. If at some point you remove the card, the
switch will not allow you to save any further configuration changes until
you reinsert the flash card or specify another active boot configuration
file. Additionally, if you reset the switch after removing a flash card that
contains the switch’s active boot configuration file, the management
software uses the switch’s default settings.
To select the active boot configuration file for the switch, perform the
following procedure:
5. Enter the name of the file of the switch’s new active boot configuration
file. When entering the name, note the following:
The name of the file should now appear following selection 1 in the File
Operations menu. The file name should be followed by “Exist”, which
means that the file exists in the switch’s file system.
Viewing a Boot Use the following procedure to view the contents of a boot configuration
Configuration file. (To display the names of the boot configuration files on the switch, see
“Displaying System Files” on page 220.)
File
To view the contents of a boot configuration file, perform the following
procedure:
5. Enter the name of the boot configuration file you want to view.
The contents of the boot configuration file are displayed in the View
File menu. An example is shown in Figure 62.
N - Next Page
U - Update Display
R - Return to Previous Menu
Figure 62. View File Menu with Sample Boot Configuration File
A boot configuration file contains those switch settings that differ from
the AT-S63 default values. The parameter settings are shown in their
command line equivalents. The switch executes the commands in the
boot configuration file to configure its settings when it is reset or power
cycled. For information on command line commands, refer to the
AT-S63 Management Software Command Line Interface User’s Guide.
The information in this menu is for viewing purposes only.
6. Type N for Next Page and P for Previous Page to scroll through the
file.
Editing a Boot You can edit a boot configuration file using a text editor on your
Configuration management station. To edit the file, you must first upload it from the
switch to your management station. You cannot edit a boot configuration
File file directly on the switch. After you edit the file, you can download it to the
switch and make it the active boot configuration file.
The following are several guidelines for editing a boot configuration file:
The text editor must be able to store the file as ASCII text. Do not use
special formatting codes, such as boldface or italics.
The boot configuration file must contain AT-S63 command line
commands. You enter the commands you want the switch to perform
when reset or power cycled. For a description of the commands, refer
to the AT-S63 Management Software Command Line Interface User’s
Guide.
A boot configuration file is divided into sections with each section
devoted to the commands for a particular function. For example, the
VLAN Configuration section should only contain commands for
creating VLANs or for setting the VLAN mode.
Each command must start flush left.
To comment out a command so that the switch does not perform it,
precede the command with the pound symbol (#).
You should test the commands manually by entering them at a
command line prompt before you insert them into a boot configuration
file. This helps ensure that you understand the syntax and parameters
of the commands and that the commands produce the desired results.
To troubleshoot a boot configuration file, start a local management
session with the switch and reset the device. Messages displayed on
the screen during the boot up and boot configuration process indicate
the line in the boot configuration file that contains the error.
You can also use this procedure is to copy files between a switch’s file
system and a flash memory card. For example, you might want to copy a
configuration file from a flash card to a switch’s file system, or perhaps
copy an SSL enrollment request from the switch to a compact flash card.
To copy a file on a compact flash card, you must first change to the
directory where the file is stored or, if you are copying a file to the card
from the switch’s file system, where you want to store the file. This is
explained in “Changing the Current Flash Card Directory” on
page 227. The following procedure does not allow you to specify a
directory path. The default location is the root of the flash card.
Files with the extension UKF are encryption key pairs. These files
cannot be copied, renamed, or deleted from the file system.
Note
Selecting Copy File does not allow you to overwrite files.
5. Enter the name of the file you want to copy. If the file is located on a
compact flash card, precede the filename with “cflash:”
6. Enter the new file name. If you want to place the copy on a compact
flash card, precede the filename with “cflash:”.
Please wait...
Press any key ...
Examples The following examples illustrate how to create copies of files as well as
transfer files between a switch’s flash memory and a compact flash card.
This example copies the configuration file “sw_sales.cfg” from the switch’s
file system to a flash memory card, without changing the name.
This example copies an event log file called “sw14_apr12.log” from the
switch’s file system to a flash memory card, and assigns it the name
“sw14.log” on the card:
To rename a file on a compact flash card, you must first change to the
directory where the file is stored. This procedure does not allow you to
specify a directory path. For instructions, refer to “Changing the
Current Flash Card Directory” on page 227.
Files with the extension UKF are encryption key pairs. These files
cannot be copied, renamed, or deleted from the file system.
Renaming the active boot configuration file and then resetting the
switch returns the unit to its default parameter settings, unless you
save the current configuration or select another active boot
configuration file. For instructions on how to change the active boot
configuration file, see “Setting the Active Boot Configuration File” on
page 210.
5. Enter the name of the file you want to rename. If the file is located on a
compact flash card, precede the filename with “cflash:”.
Note
The source and destinations must be on the same device, either
flash memory or a compact flash card.
Please wait...
Press any key ...
Examples The following examples illustrate how to rename files in a switch’s flash
memory and on a compact flash card.
This example renames the file “sw24.cfg” located on a flash memory card
to “sw24_bk.cfg”:
Deleting the active boot configuration file and then resetting the switch
returns the unit to its default parameter settings, unless you save the
current configuration or select another active boot configuration file.
For instructions on how to change the active boot configuration file,
see “Setting the Active Boot Configuration File” on page 210.
To delete a file on a compact flash card, you must first change to the
directory where the file is stored. This procedure does not allow you to
specify a directory path. For instructions, refer to “Changing the
Current Flash Card Directory” on page 227.
Files with the extension UKF are encryption key pairs. These files
cannot be copied, renamed, or deleted from the file system. To delete
a key pair from the switch, refer to “Deleting an Encryption Key” on
page 771.
5. Enter the name of the file you want to delete. If the file is located on a
compact flash card, precede the filename with “cflash:”.
Please wait...
Press any key ...
Use this procedure to display a list of the system files currently stored
either in the flash memory of the switch or on a compact flash card. For
information about shortcuts for specifying file names, see “File Naming
Conventions” on page 205.
Listing All Files To display a list of the system files stored in flash memory as well as on a
compact flash card (if the switch supports this and a compact flash card is
inserted in the slot), perform the following procedure:
5. Enter a boot configuration file name or pattern using the wildcard “*”.
Below are examples of how to use the wildcard to display different
files.
To display a list of all the files stored both in flash memory and on a
compact flash card in the same switch, enter:
*.*
*.cer
*.cfg
*.key
To display a list of the files that begin with the letter t, enter:
t*.*
U - Update Display
R - Return to Previous Menu
Figure 63. List Files Menu for Flash Memory and a Compact Flash Card
Note
If the switch does not support a compact flash card, only the files in
flash memory are displayed. To display only the files in flash
memory, precede the file name with “flash:”.
The columns in the List Files table are described below. This
information is for viewing purposes only.
File Name
Name of the system file.
Device
The device type, either “flash” for flash memory or “cflash” for compact
flash card.
Size
Size of the file, in bytes.
Last Modified
The time the file was created or last modified, in the following date and
time format: month/day/year hours:minutes:seconds.
Listing Files on To view the files on the compact flash card, perform the following
the Compact procedure:
Flash Card 1. From the Main Menu, type 5 to select System Administration.
cflash:*.*
Note
You can also specify a particular file type, as described “File Naming
Conventions” on page 205.
U - Update Display
R - Return to Previous Menu
An AT-9400 Series switch contains flash memory where the file system,
which contains files such as the configuration file, and event log are
stored.
Displaying To display information about the flash memory, perform the following
Information procedure:
about the Flash 1. From the Main Menu, type 5 to select System Administration.
Memory
The System Administration menu is shown Figure 4 on page 54.
Flash:
------------------------------------------------------
Files 4096 bytes (2 files)
Free 8219648 bytes
Total 8223744 bytes
U - Update Display
R - Return to Previous Menu
Formatting the When the file system in flash memory is full, you can make more room by
Flash Memory formatting the flash memory. For information about displaying how much
room is left in the flash memory, refer to “Displaying Information about the
Flash Memory” on page 223.
Caution
When you format the flash memory, ALL files including the active
configuration file are lost. This includes encryption keys, certificates,
configuration files, and all other special files. To remove selected
files, use the procedure in “Deleting a System File” on page 219.
4. From the File Operations menu, type 9 to select Format Flash Drive.
5. To continue, type Y for Yes; to stop the formatting, type N for No.
If you choose Y, the flash memory is formatted and the switch reboots.
Some AT-9400 Series switches contain a compact flash card slot, into
which you can put a compact flash card. You can then copy files such as
configuration files onto the compact flash card, take the card to other
switches that have compact flash card slots, and copy files from the
compact flash card to that switch through a local connection. The compact
flash card is also a medium onto which you can store system files as
backups.
Displaying To display information about the compact flash card, perform the following
Compact Flash procedure:
Card Information 1. From the Main Menu, type 5 to select System Administration.
Compact Flash:
------------------------------------------------------
Current Directory: \
Number of files ......... 0
Number of directories ... 1
Bytes used .............. 0
Card Information:
Hardware detected ....... Yes
Serial Number ........... F000530211
Size .................... 124666 KB
Used .................... 4 KB (2 files)
Free .................... 124662 KB
U - Update Display
R - Return to Previous Menu
Current Directory
The currently selected directory. To change the directory, see
“Changing the Current Flash Card Directory” on page 227.
Number of files
The number of files in the current directory.
Number of directories
The number of directories on the compact flash card.
Bytes used
The number of bytes used in the current directory.
Hardware detected
Whether or not a compact flash card is inserted in the slot.
Serial Number
The serial number of the compact flash card.
Size
The size in KB of the compact flash card.
Used
The amount of space that is currently used.
Free
The amount of space that is free.
Changing the To change the current directory on a compact flash card, perform the
Current Flash following procedure:
Card Directory 1. From the Main Menu, type 5 to select System Administration.
Note
For instructions on how to obtain the latest version of the AT-S63
management software, refer to “Management Software Updates” on
page 29.
Caution
The switch stops forwarding Ethernet traffic after it has downloaded
the image file and begun to initialize the software. Some network
traffic may be lost.
Guidelines The following guidelines apply to both Xmodem and TFTP downloads:
Xmodem can only download the image file onto the switch where you
started the local management session. You cannot use Xmodem to
download a new image file to a switch accessed through enhanced
stacking.
The new AT-S63 image file must be stored on the computer or terminal
connected to the RS232 terminal port on the switch.
The following procedures assume that you have already obtained the new
software from Allied Telesyn and stored it on the management station from
which you will be performing the procedure, or on the TFTP server.
Downloading the Review “Guidelines” on page 230 before performing the following
AT-S63 Image download procedure.
from a Local To download a new AT-S63 software image into the application block
Management portion of the switch’s flash memory, making it the active image file on the
Session switch, from a local management session using Xmodem or TFTP,
perform the following procedure:
3 - Download a File
4 - Upload a File
a. Type T.
c. Enter the file name of the AT-S63 image file stored on the TFTP
server.
d. If you have not already done so, start the TFTP server software.
After the switch has downloaded the image file, the following
message is displayed:
After receiving the file, the switch compares the version numbers of
the new image file that you just downloaded against the file already
in the application block on the switch. If the new image file has an
earlier or the same version number as the file in the switch’s
application block, it cancels the update process. If the new image
file has a newer version number, the switch writes the file to the
application block portion of flash memory and then resets.
Caution
The switch does not forward any network traffic while writing the
image to flash and during the reset process. This can take several
minutes to complete. Some network traffic may be lost.
Note
The transfer protocol must be Xmodem or 1K Xmodem.
10. From the HyperTerminal main window, select Send File from the
Transfer menu, as shown in Figure 69.
11. Click Browse and specify the location and file to be downloaded onto
the switch.
12. Click in the Protocol field and select as the transfer protocol either
Xmodem or, for a faster download, 1K Xmodem.
After receiving the file, the switch compares the version numbers of the
new image file that you just downloaded against the file already in the
application block on the switch. If the new image file has an earlier or
the same version number as the file in the switch’s application block, it
cancels the update process. If the new image file has a newer version
number, the switch writes the file to the application block portion of
flash memory and then resets.
Caution
The switch does not forward network traffic while writing the image
to flash and during the reset process. This can take several minutes
to complete. Some network traffic may be lost.
Downloading the Review “Guidelines” on page 230 before performing the following
AT-S63 Image download procedure.
from a Remote To download a new AT-S62 image file into the application block portion of
Management the switch’s flash memory, making it the active image file on the switch,
Session from a remote management session (i.e, Telnet or SSH) using TFTP,
perform the following procedure:
Note
As noted in “Guidelines” on page 230, a TFTP download requires
that the switch where you want to download the new AT-S62 image
file have an IP address.
7. Enter the file name of the image file on the TFTP server that you want
to download.
8. If you have not already done so, start the TFTP server software.
After the switch has downloaded the image file, the following message
is displayed:
After receiving the file, the switch compares the version numbers of the
new image file that you just downloaded against the file already in the
application block on the switch. If the new image file has an earlier or
the same version number as the file in the switch’s application block, it
cancels the update process. If the new image file has a newer version
number, the switch writes the file to the application block portion of
flash memory and then resets.
Caution
The switch does not forward any network traffic while writing the
image to flash and during the reset process. This can take several
minutes to complete. Some network traffic may be lost.
Caution
This procedure causes the switch to reset. Some network traffic may
be lost.
Guidelines Please review the following guidelines before performing the procedure:
Note
The “2 - Stacking Services” selection is only available on a master
switch.
5. Enter the number (Num column in the menu) of the AT-9400 Series
switch whose software you want to update. You can specify more than
one switch at a time (for example, 2,4,5).
Note
You cannot download AT-S63 software onto any type of enhanced
stacking switch other than AT-9400 Series switches.
6. You can respond with Yes or No to this prompt. It does not affect the
download.
After receiving the file, a switch compares the version numbers of the
new and existing image files. If the new image file has the same or an
earlier version number as the file in the application block, it cancels the
update process. If the new image file has a newer version number, the
switch writes the file to the application block portion of flash memory
and then resets.
Caution
The switch does not forward network traffic while writing the image
to flash and during the reset process. This can take several minutes
to complete. Some network traffic may be lost.
This completes the procedure for uploading the AT-S63 image file from
a master switch to other switches in an enhanced stack.
Note
You can perform this procedure from a local or remote management
session.
Guidelines Please review the following guidelines before performing the procedure:
This procedure gives you the choice of uploading the master switch’s
active boot configuration file or another configuration file in the switch’s
file system. If you choose the switch’s active boot configuration file, the
following information in the file is not included in the upload: IP
address, subnet mask, gateway address, switch name, contact,
location, and the master mode setting. This is to prevent two switches
from having the same IP configuration. However, the switch receiving
the configuration file does not retain its current settings to these
parameters. Instead, they return to their default values.
If you choose to upload another configuration file from the master
switch’s file system, the entire file without modification is uploaded.
This type of upload should be performed with care. If you upload onto
more than one switch a configuration file that assigns the devices a
specific IP address, the switches will end up using the same IP
address.
After the upload is complete, the switch that received the configuration
file marks it as its active boot configuration file and resets. Some
network traffic may be lost while the switch reloads its operating
software. After the reset is complete, the switch operates with the
parameter settings contained in the uploaded configuration file.
A configuration file should only be uploaded onto the same model of
switch as the original switch (for example, AT-9408LC/SP to
AT-9408LC/SP). Allied Telesyn does not recommend uploading a
configuration file onto a switch of a different model (for example,
AT-9408LC/SP to AT-9424T/SP). Undesirable switch behavior may
result.
The master switch must have an IP address for this procedure. The
address can be assigned manually or through DHCP or BOOTP. Since
a master switch of an enhanced stack typically has an IP address, this
should not be an issue.
Caution
This procedure causes the switch to reset. Some network traffic may
be lost.
Note
The “2 - Stacking Services” selection is available only on master
switches.
5. If you want to upload the master switch’s active boot configuration file
onto the other switch, type Y for yes and go to step 7. If you want to
upload a different configuration file from the master switch, type N for
no.
6. Enter the name of the configuration file stored in the master switch’s
file system you want to upload. The name must include the suffix
“.cfg”. (To view the names of the configuration files, refer to “Displaying
System Files” on page 220.)
7. Enter the number (Num column in the menu) of the AT-9400 Series
switch where you want to upload the configuration file. You can specify
more than one switch at a time (for example, 2,4,5).
Note
You can upload an AT-9400 Series configuration file only onto other
AT-9400 Series switches. Do not attempt to upload the file onto any
other type of enhanced stacking switch.
Caution
The switch does not forward network traffic during the reset. Some
network traffic may be lost.
Both procedures are used to download files into a switch’s file system.
One procedure downloads files from a local management using either
Xmodem or TFTP, and the other explains how to do it from a remote
management session using TFTP.
There are only two files that you are ever likely to download into a switch’s
file system:
Note that you can also use these procedures to store an AT-S63 image
file in the switch’s file system. However, placing an image file in the file
system does not make it the active image file on the switch, and it will take
up a large portion of the file system. To be active, the file must be stored in
the switch’s application block, which is a separate part of flash memory
from the file system. To download an AT-S63 image file directly to a
switch’s application block so that it functions as the active image file on the
unit, see “Downloading the AT-S63 Image File onto a Switch” on page 230
or “Uploading the AT-S63 Image File Switch to Switch” on page 238. If you
do load the image file into a switch’s file system, the only means of
transferring it into the application block is with the LOAD command in the
command line interface. An image file is about 2MB; it will take up
approximately a quarter of the 8MB of storage capacity of the switch’s file
system.
Guidelines This section contains guidelines for downloading a file to the switch’s file
system.
You can use either Xmodem or TFTP to download files from a local
management session.
Xmodem can only download a file onto the switch where you started
the local management session. You cannot use Xmodem to download
a file onto a switch accessed through enhanced stacking.
The file to be downloaded must be stored on the computer or terminal
connected to the RS232 terminal port on the switch.
a. Type T.
c. Enter the name of the file on the TFTP server you want to
download to the switch’s file system. You can specify only one
system file.
d. Enter a name for the system file. This is the name that the switch
will store the file as in its file system. To store the file on a flash
memory card in the switch rather than the file system, precede the
name with “cflash:”.
e. If you have not already done so, start the TFTP server software.
After the switch has downloaded the system file, the following
message is displayed:
7. Enter a name for the system file. This is the name that the switch will
store the file as in its file system. To store the file on a flash memory
card in the switch rather than the file system, precede the name with
“cflash:”.
Note
The transfer protocol must be Xmodem or 1K Xmodem.
9. Begin the file transfer of the system file using the terminal emulator
program.
10. From the HyperTerminal main window, select Send File from the
Transfer menu, as shown in Figure 72.
11. Click Browse and specify the location and system file to be
downloaded onto the switch.
12. Click in the Protocol field and select as the transfer protocol either
Xmodem or, for a faster download, 1K XModem.
14. If you downloaded a configuration file and want to make it the active
boot file on the switch, refer to “Setting the Active Boot Configuration
File” on page 210. If you downloaded a CA certificate, refer to “Adding
a Certificate to the Database” on page 797.
This completes the procedure for downloading a file into the switch’s
file system or flash memory card from a local management session
using Xmodem.
7. Enter the name of the file on the TFTP server you want to download
into the switch’s file system.
8. Enter a name for the system file. This is the name that the switch will
store the file as in its file system. To store the file on a flash memory
card in the switch rather than the file system, precede the name with
“cflash:”.
9. If you have not already done so, start the TFTP server software.
After the switch has downloaded the system file, the following
message is displayed:
10. If you downloaded a configuration file and want to make it the active
boot file on the switch, refer to “Setting the Active Boot Configuration
File” on page 210. If you downloaded a CA certificate, refer to “Adding
a Certificate to the Database” on page 797.
This completes the procedure for downloading a file into the switch’s
file system or flash memory card from a remote management session
using TFTP.
These procedures explain how to upload files from a switch’s file system
to your management workstation or a TFTP server. One procedure
explains how to perform the upload from a local management using either
Xmodem or TFTP. The other explains how to upload a file from a remote
management session, which only supports TFTP.
Here are the system files you are most likely to upload from a switch:
You might, for instance, upload a switch’s configuration file so that you can
modify it with a text editor at your management workstation. Or, you might
have created a CA certificate enrollment request on the switch and need
to upload it prior to submitting it to a CA.
Note
The certificate enrollment request and the public encryption key are
supported only on the version of AT-S63 management software that
features SSL and PKI security.
Guidelines This section contains guidelines for uploading a file from the switch’s file
system.
You can use either Xmodem or TFTP when uploading files from a local
management session.
You must use TFTP when uploading files from a remote management
session.
If the switch supports a flash memory card, you can use these
procedures to upload a file from the card rather than the switch’s file
system. To upload a file from a flash memory card, you must first
change to the directory where the file is stored on the card. For
instructions, refer to “Changing the Current Flash Card Directory” on
page 227.
To upload a public key, you must first export it from the key database
into the switch’s file system. For instructions, refer to “Exporting an
Encryption Key” on page 773. Public keys have the file name
extension “.key.”
You cannot upload an encryption key pair. Key pairs have the file name
extension “.ukf.” (The prohibition against uploading an encryption key
pair is to prevent an unauthorized individual from obtaining the private
key.)
Xmodem can upload a file only from the switch where you started the
local management session. You cannot use Xmodem to upload a file
from a switch accessed through enhanced stacking.
Your network must have a node with the TFTP server software.
You should start the TFTP server software before beginning the
download procedure.
The switch must have an IP address and subnet mask, such as a
master switch of an enhanced stack. For switches that do not have an
IP address, such as slave switches, you can perform the upload from a
local management session of the switch using Xmodem.
a. Type T.
c. Enter a name for the file for when it is stored on the TFTP server.
d. Enter the name of the system file in the switch’s file system that
you want to upload to the TFTP server. You can specify only one
file. You cannot use wildcards in the file name. If the file is stored
on a flash memory card, precede the name with “cflash:”.
After the switch has uploaded the system file, the following
message is displayed:
The file is now stored on the TFTP server. This completes the
procedure for uploading a file using TFTP from a local management
session.
8. Enter the name of the system file on the switch that you want to upload
to your computer. You can specify only one file. You cannot use
wildcards in the file name. If the file is stored on a flash memory card,
precede the name with “cflash:”.
Note
The transfer protocol must be Xmodem or 1K Xmodem.
Steps 11 through 14 illustrate how you would upload a file using the
Hilgraeve HyperTerminal program.
11. From the HyperTerminal main window, select Receive File from the
Transfer menu, as shown in Figure 75.
12. Click Browse and specify the location on your computer where you
want the system file stored.
13. Click in the Protocol field and select as the transfer protocol either
Xmodem or, for a faster download, 1K XModem.
15. When prompted, enter a name for the file. This is the name given the
file when it is stored on your workstation. When naming a file, be sure
to give it the same extension as the original file name (for example,
“.cfg” for a configuration file and “.csr” for an CA certificate enrollment
request.)
The switch uploads the file from the switch to your computer. This
completes the procedure for uploading a file from the switch from a
local management session using Xmodem.
7. Enter a name for the file for when it is stored on the TFTP server.
When naming a file, be sure to give it the same extension as the
original file name (for example, “.cfg” for a configuration file and “.csr”
for an CA certificate enrollment request.)
8. Enter the name of the system file on the switch that you want to upload
to the TFTP server. You can specify only one file. You cannot use
wildcards in the file name. If the file is stored on a flash memory card in
the switch, precede the filename with “cflash:”.
After the switch has uploaded the system file, the following message is
displayed:
The file is now stored on the TFTP server. This completes the
procedure for uploading a file from a remote management session
using TFTP.
This chapter describes the event logs that allow you to view information
about switch activity, and how to configure the switch to send the events to
a syslog server. Sections in the chapter include:
There are two ways that you can view a switch’s event messages. One
method is to view the event logs in the switch. The AT-9400 Series switch
has two event logs. The first is located in temporary memory and has a
storage capacity of up to 4,000 entries. The events in this log are purged
whenever you reset or power cycle the switch. The second log is located
in permanent memory and has a maximum storage capacity of 2,000
entries. Events in this log are retained even when the switch is reset or
power cycled. Both logs store the same events messages. You can view
either log to display the events of the switch since the unit was last reset.
But to view the events that preceded a system reset, you must view the
permanent event log.
The second method for viewing the event messages of a switch is to have
the device send its events to a syslog server. The syslog server functions
as a central repository that stores events from many network devices
simultaneously.
In order for a switch to send its events to a syslog server, you must define
the syslog output. The syslog output includes the IP address of the syslog
server along with other information such as the types of event messages
you want the switch to send to the syslog server. You can create up to 19
output definitions on a switch. For instructions, refer to “Configuring Log
Outputs” on page 274.
Note
The event logs, even when disabled, log all AT-S63 initialization
events that occur when the switch is reset or power cycled. Any
switch events that occur after AT-S63 initialization are entered into
the logs only if you enable the event log feature. The default setting
for the event log feature is enabled.
Enabling or This procedure explains how to enable or disable the event logs on the
Disabling the switch. If you disable the logs, the AT-S63 management software does not
store events in its logs and does not send events to any syslog servers.
Event Logs The default setting for the event logs is enabled.
Note
Allied Telesyn recommends setting the switch’s date and time if you
enable the event logs. Otherwise, event messages will not have the
correct time and date. For instructions, refer to “Setting the System
Time” on page 67.
C - Clear Log
L - Configure Log Outputs
S - Save Log to File
V - View Log
R - Return to Previous Menu
Enabled
The switch immediately begins to add events to the logs and send
events to any defined syslog servers. This is the default.
Disabled
The switch does not store events in the logs and does not send events
to any syslog servers.
Note
You cannot individually disable or enable the temporary and
permanent event logs.
Note
When the event log feature is disabled and the switch is rebooted,
initialization events are still stored in the logs.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Displaying an Each time that you want to view an event log, you must choose how and
Event Log what you want displayed. Event log settings are not saved.
To specify the type of events you want to view in an event log, perform the
following procedure:
3. To specify the event log whose events you want to view, type 2 to
select Display Output and toggle between these two options:
Temporary (Memory)
Displays the events stored in temporary memory. This selection stores
approximately 4,000 events. If the switch has been running for some
time without a reset or power cycle, select Temporary. This is the
default.
Permanent (NVS)
Displays events stored in nonvolatile memory, which stores no more
than 2,000 events. If the switch was recently reset or power cycled and
you want to view the events that occurred prior to the reset, select
Permanent.
4. To select the order of the events in the event log, type 3 to select
Display Order and toggle between these two options:
Chronological
Displays the events in the order from the oldest event to the most
recent event. This is the default.
Reverse Chronological
Displays the events from the most recent event to the oldest event.
5. To select the format of the event log, type 4 to select Display Mode
and toggle between these two options:
Normal
Displays the time, module, severity, and description for each event.
This is the default. An example of Normal mode is shown in Figure 78
on page 267.
Full
Displays the same information as Normal, plus the file name, line
number, and event ID. An example of Full mode is shown in Figure 79
on page 269.
ALL
All messages of the following types are displayed. This is the default.
E - Error
Only error messages are displayed. Error messages indicate that the
switch operation is severely impaired.
W - Warning
Only warning messages are displayed. These messages indicate that
an issue may require manager attention.
I - Information
Only informational messages are displayed. Informational messages
display useful information that you can ignore during normal operation.
D - Debug
Debug messages provide detailed high-volume information that is
intended only for technical support personnel.
9. To display the event messages of the log and settings you have
chosen, type V to select View Log.
The events are displayed in a table. The columns in the table shown in
normal display mode are described below:
S (Severity)
The event’s severity. The severity codes and their corresponding
severity level and description are shown in Table 4.
Severity
Severity Level Description
Code
Date/Time
The date and time the event occurred.
Event
This item contains two parts. The first part is the name of the module
within the AT-S63 management software that generated the event.
The second part is a description of the event.
S Date Time
EventID Source File:Line Number
Event
--------------------------------------------------------------------------
I 02/24/04 12:31:02 323003 atissh.c:518
ssh: SSH server disabled
I 02/24/04 12:31:02 073001 garpmain.c:259
garp: GARP initialized
I 02/24/04 12:31:02 103001 trunkapp.c:220
ptrunk: Trunk initialization succeeded
Event ID
A unique, random number assigned to each event.
P - Previous page
N - Next page
F - First page
L - Last page
Modifying the This procedure explains how to control what the logs are to do when they
Event Log Full reach the maximum capacity of 4,000 events for the temporary log and
2,000 events for the permanent log. There are two options. The first is to
Action have the switch delete the oldest entries in a log as it adds new entries.
The second is to have the switch stop adding entries, so as to preserve
the existing log contents. You can set the action independently for the two
logs.
This procedure applies only to the event logs. If you defined syslog
servers, the switch continues to send events to the servers even when the
event logs are full.
To modify the action taken when an event log becomes full, perform the
following procedure:
3. From the Event Log menu, type L to select Configure Log Outputs.
4. From the Configure Log Outputs menu, type 2 to select Modify Log
Output.
1 - Wrap on Full
When the event log reaches its maximum capacity, old entries are
deleted when new entries are added. This is the default.
2- Halt on Full
When the event log reaches its maximum capacity, the log stops
adding new entries.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Clearing an You can clear the events from an event log so that the log starts fresh. To
Event Log clear an event log, perform the following procedure:
4. To clear the temporary event log, type T. To clear the permanent event
log, type P.
Saving an Event You can save an event log as a file in a file system to review later or to
Log to a File upload to your management workstation. The file is saved as an ASCII file.
To save the event log as a file in the file system, perform the following
procedure:
4. From the Event Log menu, type S to select Save Log to File.
5. To save the log file type Y for Yes, or to cancel the process, type N for
No.
6. Type a name for the file with a .log file name extension.
The log file is saved in the switch’s file system as an ASCII file.
10. From the System Utilities menu, type 1 to select File Operations.
11. From the File Operations menu, type 7 to select View File.
12. Type the file name with the .log file name extension and press
Return.
The other way to view events is to configure the switch to send its event
messages to a syslog server. A syslog server can store the events of
many network devices simultaneously. Therefore, network management is
easier because you can go to one location to see all the events.
Creating a Log To create a log output definition, perform the following procedure:
Output Definition
1. From the Main Menu, type 5 to select System Administration.
3. From the Event Log menu, type L to select Configure Log Outputs.
The Configure Log Outputs menu, with a list of any log outputs that
have already been created, is shown in Figure 81.
Output 0 is the event log in permanent memory and Output 1 is the log
in temporary memory.
4. From the Configure Log Outputs menu, type 1 to select Create Log
Output.
Enabled
Enables the syslog output definition. When enabled, the switch sends
events to the specified syslog server.
Disabled
Disables the syslog output definition. When disabled, which is the
default, the switch does not send events to the syslog server.
Normal
Sends the severity, module, and description for each event.
Extended
Sends the same information as Normal along with the date, time, and
switch’s IP address. This is the default.
This parameter adds a facility level to the entries when they are sent to
the syslog server. The facility level is a way for you to add a numerical
code to each entry to help you group entries on the syslog server
according to the module or switch that produced them. This grouping
helps you determine which events belong to which device when a
syslog server is collecting events from several network devices. You
can specify only one facility level.
There are two approaches to using this parameter. The first is to use
the 0-DEFAULT setting which is based on the functional groupings
defined in the RFC 3164 standard. The numerical codes that are
applicable to the AT-S63 management software and its modules are
shown in Table 5.
Numerical
RFC 3164 Facility AT-S63 Module
Code
Authentication modules:
- SYSTEM
- RADIUS
- TACACS+
Numerical
RFC 3164 Facility AT-S63 Module
Code
For example, the setting of DEFAULT assigns all port mirroring events
a code of 22 and all encryption key events a code of 4.
Your other option is to assign the same numerical code to all events
from a switch using one of the following facility level settings:
1 - LOCAL1
2 - LOCAL2
3 - LOCAL3
4 - LOCAL4
5 - LOCAL5
6 - LOCAL6
7 - LOCAL7
Numerical
Facility Level Setting
Code
17 LOCAL1
18 LOCAL2
19 LOCAL3
Numerical
Facility Level Setting
Code
20 LOCAL4
21 LOCAL5
22 LOCAL6
23 LOCAL7
ALL
All messages of the following types are displayed. This is the default.
E - Error
Only error messages are displayed. Error messages indicate that the
switch operation is severely impaired.
W - Warning
Only warning messages are displayed. These messages indicate that
an issue may require manager attention.
I - Information
Only informational messages are displayed. Informational messages
display useful information that you can ignore during normal operation.
D - Debug
Debug messages provide detailed high-volume information that is
intended only for technical support personnel.
The switch immediately adds the new syslog server definition to the
Configure Log Outputs menu and begins to send events to the sever, if
you enabled the definition when you created it. An example of the
menu with a new syslog server definition is shown in Figure 83.
Figure 83. Configure Log Outputs Menu with a Syslog Output Definition
17. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Modifying a Log To modify a log output definition you have already created, perform the
Output following procedure:
3. From the Event Log menu, type L to select Configure Log Outputs.
4. From the Configure Log Outputs menu, type 2 to select Modify Log
Output.
5. Enter the number of the log output that you want to modify.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting a Log To delete a log output definition you have already created, perform the
Output following procedure:
3. From the Event Log menu, type L to select Configure Log Outputs.
4. From the Configure Log Outputs menu, type 3 to select Modify Log
Output.
5. Enter the number of the log output that you want to delete.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Displaying the To view the settings of a log output definition you have already created,
Log Output perform the following procedure:
Definition Details 1. From the Main Menu, type 5 to select System Administration.
3. From the Event Log menu, type L to select Configure Log Outputs.
4. From the Configure Log Outputs menu, type 4 to select View Log
Output Details.
5. Enter the number of the log output that you want to view.
1 - Output ID ................ 3
2 - Server IP Address ........ 149.35.87.45
3 - Message Generation ....... Enabled
4 - Message Format ........... Extended
5 - Facility Level ........... DEFAULT
6 - Event Severity ........... E,W,I
7 - Event Module ............. All
Classifiers
This chapter explains classifiers and how you can create classifiers to
define traffic flows. The sections in this chapter include:
Classifier Overview
A classifier contains a set of criteria you configure to match the traffic flow
you want the classifier to define. Examples of the variables include source
and destination MAC addresses, source and destination IP addresses, IP
protocols, source and destination TCP and UDP ports numbers, and so
on. You can also specify more than one criteria within a classifier to make
the definition of the traffic flow more specific. Some of the variables you
can mix-and-match, but there are restrictions, as explained later in this
section in the descriptions of the individual variables.
By itself, a classifier does not perform any action or produce any result
because it lacks instructions on what a port should do when it receives a
packet that belongs to the defined traffic flow. Rather, the action is
established outside the classifier. As a result, you will never use a
classifier by itself.
There are two AT-S63 features that use classifiers. They are:
When you create an ACL you must specify the traffic flow you want the
ACL to control. You do that by creating one or more classifiers and adding
the classifiers to the ACL. The action that the port takes when an ingress
packet matches the traffic flow specified by a classifier is contained in the
ACL itself. The action will be to either accept packets of the traffic flow or
discard them.
The other feature that uses classifiers is Quality of Service (QoS) policies.
You can use this feature to regulate the various traffic flows that pass
through the switch. For instance, you might raise or lower their user
priority values or increase or decrease their allotted bandwidths.
As with an ACL, you specify the traffic flow of interest by creating one or
more classifiers and applying them to a QoS policy. The action to be taken
by a port when it receives a packet that corresponds to the prescribed flow
You can identify a traffic flow by specifying the source and/or destination
MAC address. For instance, you might create a classifier for a traffic flow
destined to a particular destination node, or from a specific source node to
a specific destination node, all identified by their MAC addresses.
You can create a classifier that filters packets based on Ethernet frame
type and whether a packet is tagged or untagged within a frame type. (A
tagged Ethernet frame contains within it a field that specifies the ID
number of the VLAN to which the frame belongs. Untagged packets lack
this field.) Options are:
User
Tag Protocol Identifier Priority CFI VLAN Identifier
1
16 bits 3 bits 12 bits
bit
Figure 85. User Priority and VLAN Fields within an Ethernet Frame
You can identify a traffic flow of tagged packets using the user priority
value. A classifier for such a traffic flow would instruct a port to watch for
tagged packets containing the specified user priority level.
The priority level criteria can contain only one value, and the value must
be from 0 (zero) to 7. Multiple classifiers are required if a port is to watch
for several different traffic flows of different priority levels.
VLAN ID (Layer 2)
A classifier can contain only one VLAN ID. To create a port ACL or QoS
policy that applies to several different VLAN IDs, multiple classifiers are
required.
Protocol (Layer 2)
IP
ARP
RARP
Protocol Number
If you choose to specify a protocol by its number, you can enter the
value in decimal or hexadecimal format. If you choose the latter,
precede the number with the prefix “0x”.
0 3 7 15 31
0 1 2 3 4 5 6 7
DSCP value
Precedence
The Differentiated Services Code Point (DSCP) tag indicates the class of
service to which packets belong. The DSCP value is written into the TOS
field of the IP header, as shown in Figure 86 on page 287. Routers within
the network use this DSCP value to classify packets, and assign QoS
appropriately. When a packet leaves the DiffServ domain, the DSCP value
can be replaced with a value appropriate for the next DiffServ domain.The
range of the value is 0 to 63.
IP Protocol (Layer 3)
TCP
UDP
ICMP
IGMP
IP protocol number
If you choose to specify a Layer 3 protocol by its number, you can enter
the value in decimal or hexadecimal format. It you choose the latter,
precede the number with the prefix “0x”.
You do not need to enter a source IP mask if you are filtering on the IP
address of a specific end node. A mask is required, however, when you
filter on a subnet. A binary “1” indicates the switch should filter on the
corresponding bit of the IP address, while a “0” indicates that it should not.
For example, the Class C subnet address 149.11.11.0 would have the
mask “255.255.255.0.”
You can also define a traffic flow based on the destination IP address of a
subnet or a specific end node.
You do not need to enter a destination IP mask if you are filtering on the IP
address of a specific end node. A mask is required, however, when
filtering on a subnet. Identical to the source IP mask, a binary “1” indicates
the switch should filter on the corresponding bit of the IP address, while a
“0” indicates that it should not. For example, the Class C subnet address
149.11.11.0 would have the mask “255.255.255.0.”
TCP Flags
URG - Urgent
ACK - Acknowledgement
RST - Reset
PSH - Push
SYN - Synchronization
FIN - Finish
Creating a Classifier
P - Purge Classifiers
R - Return to Previous Menu
E - Edit Parameters
C - Create Classifier
N - Next Page
U - Update Display
R - Return to Previous Menu
This is the first page of the classifier variables. To view the remaining
variables, type N to select Next Page. The Create Classifier menu
(page 2) is shown in Figure 90.
E - Edit Parameters
C - Create Classifier
P - Previous Page
U - Update Display
R - Return to Previous Menu
5. Enter the number of the variable you want to configure. You can
configure only one parameter at a time.
Note
Item 1 allows you to assign the classifier an ID number. Each
classifier must have a unique number. The range is 1 to 9999. The
default is the lowest available number.
10. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Modifying a Classifier
In order to modify a classifier, you need to know its ID number. If you are
unsure of the ID number of the classifier you want to modify, refer to
“Displaying Classifiers” on page 299.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting a Classifier
Note
You cannot delete a classifier if it belongs to an ACL or QoS
policy.You must first remove the classifier from its ACL or policy
assignments before you can delete it.
The details of the specified classifier are displayed. Use this window to
verify that you are deleting the correct classifier.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This procedure deletes all classifiers from the switch. To delete individual
classifiers, refer to “Deleting a Classifier” on page 297.
Note
You cannot delete all classifiers if any of them belong to an ACL or
QoS policy.You must first remove all classifiers from their ACL and
policy assignments before performing this procedure.
To delete all classifiers from the switch, perform the following procedure:
Caution
No confirmation prompt is displayed. All classifiers are immediately
deleted from the switch.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Displaying Classifiers
ID
The classifier’s ID number.
Description
The description of the classifier.
Number of References
The number of active and inactive ACL and QoS policy assignments
for the classifier. An active ACL or QoS policy has been assigned to a
switch port while an inactive ACL or policy has not been assigned to a
port. If this number is 0 (zero), the classifier has not been assigned to
any ACLs or policies.
You can use this number together with the Number of References to
determine the number of inactive ACLs and policies for a classifier. For
example, if Number of References for a classifier is 5 and the Number
of Active Associations is 3, two of the ACL or QoS policy assignments
for the classifier have not been assigned to a switch port.
The first page of the Display Classifier Details menu is shown in Figure
92.
N - Next Page
U - Update Display
R - Return to Previous Menu
P - Previous Page
U - Update Display
R - Return to Previous Menu
This chapter explains access control lists (ACL) and how you can use this
feature to improve network security and performance. This chapter
contains the following sections:
An ACL is a tool for managing network traffic. You can use this feature to
control which ingress packets a port will accept and which it will reject.
One of the benefits of this feature is that it can add to network security. An
ACL can protect parts of a network from unauthorized access by allowing
only permitted traffic to enter the port. An ACL can explicitly state which
traffic is permitted to enter a switch port and which is to be discarded.
Note
This feature is not related to the management ACL feature,
described in Chapter 37, “Management Access Control List” on
page 841. They perform different functions and are configured in
different ways.
When you create an ACL, you are asked to specify the classifier that
defines the traffic flow you want to permit or deny on a port.
There are two kinds of ACLs based on the two actions that an ACL can
perform. One is called a permit ACL. Packets that meet the criteria in a
permit ACL are accepted by a port.
The second type of ACL is a deny ACL. This type of ACL will deny entry to
packets that meet the criteria of its classifiers, unless the packet also
meets the criteria of a permit ACL on the same port, in which case the
packet is accepted. This is because a permit ACL overrides a deny ACL.
2. If the packet matches the criteria of a permit ACL, the port immediately
accepts it, even if the packet also matches a deny ACL assigned to the
same port, because a permit ACL always overrides a deny ACL.
3. If a packet meets the criteria of a deny ACL but not any permit ACLs
on the port, then the packet is discarded.
4. Finally, if a packet does not meet the criteria of any ACLs on a port, it is
accepted by the port.
Parts of an ACL To create an ACL, you need to provide the following information:
Name - An ACL needs a name. The name should reflect the type of
traffic flow the ACL will be filtering and, perhaps, also the action. An
example might be “HTTPS flow - permit.” The more specific the name,
the easier it will be for you to identify the different ACLs.
Action - An ACL can have one of two actions: permit or deny. An action
of permit means that the ingress packets matching the criteria in the
classifiers are to be accepted by the switch port. An action of deny
means any ingress packets meeting the criteria are to be discarded,
provided that the packets do not match any permit ACLs on the port.
Classifiers - An ACL needs one or more classifiers to define the traffic
flow whose packets you want the port to accept or reject. Each
classifier defines a different traffic flow. An ACL can have more than
one classifier to filter multiple traffic flows.
Port Lists - Finally, you need to specify the ports to which an ACL is to
be assigned.
In this example, port 4 has been assigned one ACL, a deny ACL for the
subnet 149.11.11.0. This ACL prevents the port from accepting any traffic
originating from that subnet. Since this is the only ACL applied to the port,
all other traffic is accepted. As explained earlier, a port automatically
accepts all packets that do not meet the criteria of the classifiers assigned
to its ACLs.
To deny traffic from several subnets on the same port, you can create
multiple classifiers and apply them to the same ACL. This example denies
traffic on port 4 from three subnets using three classifiers, one for each
subnet, assigned to the same ACL.
Create Classifier
Create Classifier
Create Access Control Lists (ACL)
Create Classifier
You can achieve the same result by assigning each classifier to a different
ACL and assigning the ACLs to the same port, as in this example, again
for port 4.
Create Classifier
Create Access Control Lists (ACL)
Create Classifier
Create Access Control Lists (ACL)
This example limits the traffic on port 22 to HTTPS web traffic intended for
the end node with the IP address 149.55.55.55, while rejecting all other IP
traffic. (The Dst IP Mask field in classifier 6 is left empty because you do
not need to specify a mask for the source or destination IP address of an
end node. If you want to include a mask, it would be 255.255.255.255.)
Create Classifier
Create Access Control Lists (ACL)
01 - Classifier ID: ...... 6
1 - ACL ID ................. 4
02 - Description: ....... 55.55 HTTPS
2 - Description .......... Web - permit
.
3 - Action .................. Permit
.
4 - Classifier List ...... 6
14 - Dst IP Addr: ....... 149.55.55.55
5 - Port List .............. 22
15 - Dst IP Mask: ......
.
17 - TCP Dst Port: ..... 443
The next example limits the ingress traffic on port 17 to IP packets from
the subnet 149.22.11.0 and a Type of Service setting of 6, destined to the
end node with the IP address 149.22.22.22. All other IP traffic and ARP
packets are prohibited.
Create Classifier
Create Access Control Lists (ACL)
01 - Classifier ID: ...... 6
1 - ACL ID ................. 4 02 - Description: ....... ToS 6 subnet flow
2 - Description .......... ToS 6 traffic - permit .
3 - Action .................. Permit .
4 - Classifier List ...... 6 09 - IP ToS: ............... 6
5 - Port List .............. 17 .
12 - Src IP Addr: ....... 149.22.11.0
13 - Src IP Mask: ...... 255.255.255.0
14 - Dst IP Addr: ....... 149.22.22.22
15 - Dst IP Mask: ......
Create Classifier
Creating an ACL
2. From the Security and Services menu, type 4 to select Access Control
Lists.
1 - Create ACL
2 - Modify ACL
3 - Destroy ACL
4 - Show ACL
P - Purge ACL
R - Return to Previous Menu
3. From the Access Control Lists (ACL) menu, type 1 to select Create
ACL.
1 - ACL ID ........... 0
2 - Description .......
3 - Action ............ Deny
4 - Classifier List ...
5 - Port List .........
C - Create ACL
R - Return to Previous Menu
7. Type 0 if you want the ACL to discard ingress packets that meet the
criteria in the classifiers to be assigned to the ACL or 1 if the packets
are to be accepted. The default setting is Deny.
8. Type 4 to select Classifier List from the Create ACL menu and, when
prompted, enter the classifiers to be assigned to the ACL. The prompt
includes the ID numbers of the classifiers on the switch. You can
assign more than one classifier to an ACL. Separate multiple
classifiers with a comma (for example, 4,7,2). The order in which you
specify the classifiers is not important.
When entering classifiers, keep in mind the action that you specified
for this ACL in step 7. The action and the traffic flows defined by the
classifiers should correspond. For instance, an ACL with an action of
permit should be assigned those classifiers that define the traffic flow
you want the ports to accept.
9. Type 5 to select Port List and, when prompted, enter the ports where
you want to assign the ACL. You can assign an ACL to just one port or
to more than one port. When entering multiple ports, you can list the
ports individually (e.g., 2,5,7), as a range (e.g., 8-12) or both (e.g., 1-
4,6,8).
11. To create additional ACLs, repeat this procedure starting with step 3.
12. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Modifying an ACL
2. From the Security and Services menu, type 4 to select Access Control
Lists.
The Access Control Lists (ACL) menu is shown in Figure 100 on page
311.
3. From the Access Control Lists (ACL) menu, type 2 to selection Modify
ACL.
4. Enter the ID number of the ACL you want to modify. You can modify
only one ACL at a time.
1 - ACL ID ............ 12
2 - Description ....... HTTP - permit
3 - Action ............ Permit
4 - Classifier List ... 18,22
5 - Port List ......... 7,10-14
M - Modify ACL
R - Return to Previous Menu
7. Type 0 if you want the ACL to discard ingress packets that meet the
criteria in the classifiers to be assigned to the ACL or 1 if the packets
are to be accepted. The default setting is Deny.
When entering classifiers, keep in mind the action you specified for this
ACL in step 7. The action and the traffic flows defined by the classifiers
should correspond. For instance, an ACL with an action of permit
should be assigned those classifiers that define the traffic flow you
want ports to accept.
9. To change the ports to which the ACL is assigned, type 5 to select Port
List and, when prompted, enter the ports where you want to assign the
ACL. You can assign an ACL to more than one port. Ports can be
listed individually (e.g., 2,5,7), as a range (e.g., 8-12) or both (e.g., 1-
4,6,8).
11. To modify additional ACLs, repeat this procedure starting with step 3.
12. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an ACL
2. From the Security and Services menu, type 4 to select Access Control
Lists.
The Access Control Lists (ACL) menu is shown in Figure 100 on page
311.
3. From the Access Control Lists (ACL) menu, type 3 to selection Destroy
ACL.
4. Enter the ID number of the ACL you want to modify. You can modify
only one ACL at a time.
1 - ACL ID ............ 25
2 - Description ....... UDP-deny
3 - Action ............ Deny
4 - Classifier List ... 32
5 - Port List ......... 15,22
D - Destroy ACL
R - Return to Previous Menu
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
2. From the Security and Services menu, type 4 to select Access Control
Lists.
The Access Control Lists (ACL) menu is shown in Figure 100 on page
311.
3. From the Access Control Lists (ACL) menu, type P to selection Purge
ACLs.
Caution
No confirmation prompt is displayed. All ACLs are immediately
deleted from the switch.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Displaying ACLs
2. From the Security and Services menu, type 4 to select Access Control
Lists.
The Access Control Lists (ACL) menu is shown in Figure 100 on page
311.
1. From the Access Control Lists (ACL) menu, type 4 to selection Show
ACLs.
Number of ACLs: 12
ID Description Active
-------------------------------------------------------
1 IP - deny Yes
2 HTTP - permit Yes
3 TCP - deny No
4 Src22.49 - deny Yes
5 P-149.22.22.22 Yes
6 Dst22.50 Yes
7 ARP packets - deny No
3. Enter the ID number of the ACL you want to display. The details of the
selected ACL are displayed.
1 - ACL ID .............. 1
2 - Description ......... IP - Deny
3 - Action .............. Deny
4 - Classifier List ..... 1
5 - Port List ........... 2-4
U - Update Display
R - Return to Previous Menu
Class of Service
This is where CoS is of value. It allows you to manage the flow of traffic
through a switch by having the switch ports give higher priority to some
packets, such as delay sensitive traffic, over other packets. This is
referred to as prioritizing traffic.
A tagged packet can also contain a priority level. This priority level is used
by network switches and other networking devices to know how important
(delay sensitive) that packet is compared to other packets. Packets of a
high priority are typically handled before packets of a low priority.
CoS, as defined in the IEEE 802.1p standard, has eight levels of priority.
The priorities are 0 to 7, with 0 the lowest priority and 7 the highest.
Each switch port has eight egress queues, labeled Q0, Q1, Q2, Q3, Q4,
Q5, Q6, Q7. Q0 is the lowest priority queue and Q7 is the highest. A
packet in a high priority egress queue is typically transmitted out a port
sooner than a packet in a low priority queue.
Table 7 lists the default mappings between the eight CoS priority levels
and the eight egress queues of a switch port.
0 Q1
1 Q0 (lowest)
2 Q2
3 Q3
4 Q4
5 Q5
6 Q6
7 Q7 (highest)
For example, when a tagged packet with a priority level of 3 enters a port
on the switch, the packet is stored in Q3 queue on the egress port.
You can change these mappings. For example, you might decide that
packets with a priority of 5 need to be handled by egress queue Q3 and
packets with a priority of 2 should be handled in Q1. The result is shown in
Table 8.
0 Q1
1 Q0 (lowest)
2 Q1
3 Q3
4 Q4
5 Q3
6 Q6
7 Q7 (highest)
You can configure a port to completely ignore the priority levels in its
tagged packets and instead use a temporary priority level assigned to the
port. For instance, perhaps you decide that all tagged packets received on
port 4 should be assigned a priority level of 5, regardless of the priority
level in the packets themselves. The procedure for overriding priority
levels is explained in “Configuring CoS” on page 327.
One last thing to note is that CoS does not change the priority level in a
tagged packet. The packet leaves the switch with the same priority it had
when it entered. This is true even if you change the default priority-to-
egress queue mappings.
Scheduling A switch port needs a mechanism for knowing the order in which it should
handle the packets in its eight egress queues. For example, if all the
queues contain packets, should the port transmit all packets from Q7, the
highest priority queue, before moving on to the other queues, or should it
instead just do a few packets from each queue and, if so, how many?
Strict priority
Weighted round robin priority
Note
Scheduling is set at the switch level. You cannot set this on a per-
port basis.
With this type of scheduling, a port transmits all packets out of higher
priority queues before transmitting any from the lower priority queues. For
instance, as long as there are packets in Q7 it does not handle any
packets in Q6.
The value to this type of scheduling is that high priority packets are always
handled before low priority packets.
The problem with this method is that some low priority packets might never
be transmitted out the port because a port might never get to the low
priority queues. A port handling a large volume of high priority traffic may
be so busy transmitting that traffic that it never has an opportunity to get to
any packets that are stored in its low priority queues.
To use this scheduling method, you need to specify the maximum number
of packets a port should transmit from a queue before moving to the next
queue. This is referred to as specifying the “weight” of a queue. In all
likelihood, you will want to give greater weight to the packets in the higher
priority queues over the lower queues.
Maximum Number of
Port Egress Queue
Packets
Q0 (lowest) 1
Q1 1
Q2 5
Q3 5
Q4 5
Maximum Number of
Port Egress Queue
Packets
Q5 5
Q6 10
Q7 15
Configuring CoS
You can override the mappings at the port level by assigning the packets a
temporary priority level. Note that this assignment is made when a packet
is received on the ingress port and before the frame is forwarded to the
egress port. Consequently, you need to configure this feature on the
ingress port.
For example, you can configure a switch port so that all ingress frames are
assigned a temporary priority level of 5, regardless of the actual priority
levels that might be in the frames themselves, as found in tagged frames.
Note
Items 7, 8, and 9 are not available in all versions of the AT-S63
management software. Contact your sales representative to
determine if these features are available for your locale.
3. From the Class of Service menu, type 1 to select Configure Port CoS
Priorities.
4. Enter the number of the port on the switch where you want to configure
CoS. You can specify only one port at a time.
7. If you are configuring a tagged port and you want the switch to ignore
the priority tag in ingress tagged frames, type 3 to select Override
Priority and type Y.
All ingress tagged frames use the temporary priority level specified in
Step 6.
Note
CoS does not change the tagged information in a frame. A tagged
frame leaves a switch with the same priority level that it had when it
entered.
The default for this parameter is No, meaning that the priority level of
tagged frames is determined by the priority level specified in the
frames themselves.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The Class of Service (CoS) menu is shown in Figure 106 on page 328.
3. From the Class of Service (CoS) menu, type 2 to select Map CoS
Priority to Egress Queue.
The Map CoS Priority to Egress Queue menu is shown in Figure 108.
4. Type the number of the CoS priority whose queue assignment you
want to change. This toggles the queue value through the possible
queue settings.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The Class of Service (CoS) menu is shown in Figure 106 on page 328.
If you select Strict Priority, skip the next step. Options 2 through 9 in
the menu do not apply to Strict Priority scheduling.
The following procedure displays a menu that lists the current CoS priority
level for each port.
The Class of Service (CoS) menu is shown in Figure 106 on page 328.
3. From the Class of Service (CoS) menu, type 4 to select Show Port
CoS Priorities.
01 1 0 No
02 1 0 No
03 1 0 No
04 1 0 No
05 1 0 No
06 1 0 No
07 1 0 No
N - Next Page
U - Update Display
R - Return to Previous Menu
The PVID column displays the identifier of the VLAN where the port is
an untagged member.
deactivated and the port is using the priority levels contained within the
frames. If Yes, the override is activated and the tagged packets are
assigned the temporary priority level shown in the Priority column.
Quality of Service
Quality of Service allows you to prioritize traffic and/or limit the bandwidth
available to it. The concept of QoS is a departure from the original
networking protocols, which treated all traffic on the Internet or within a
LAN in the same manner. Without QoS, every traffic type is equally likely
to be dropped if a link becomes oversubscribed. This approach is now
inadequate in many networks, because traffic levels have increased and
networks transport time-critical applications such as streams of video and
data. QoS also enables service providers to easily supply different
customers with different amounts of bandwidth.
Note
QoS is only performed on packets that are switched at wire speed.
This includes IP, IP multicast, IPX, and Layer 2 traffic within VLANs.
The QoS functionality described in this chapter sorts packets into various
flows, according to the QoS policy that applies to the port the traffic is
received on. The switch then allocates resources to direct this traffic
according to bandwidth or priority settings in the policy. A policy contains
traffic classes, flow groups, and classifiers. Therefore, to configure QoS,
you:
Note
The steps listed above are in a conceptually logical order, but the
switch cannot check a policy for errors until the policy is attached to
a port. To simplify error diagnosis, define your QoS configuration on
paper first, and then enter it into the management software starting
with classifiers.
Policies, traffic classes, and flow groups are created as individual entities.
When a traffic class is added to a policy, a logical link is created between
the two entities. Destroying the policy unlinks the traffic class, leaving the
traffic class in an unassigned state. Destroying a policy does not destroy
any of the underlying entities. Similarly, destroying a traffic class unlinks
flow groups, and destroying flow groups unlinks classifiers.
Classifiers Classifiers identify a particular traffic flow, and range from general to
specific. (See Chapter 14, “Classifiers” on page 283 for more information.)
Note that a single classifier should not be used in different flows that will
end up, through traffic classes, assigned to the same policy. A classifier
should only be used once per policy. Traffic is matched in the order of
classifiers. For example, if a flow group has classifiers 1, 3, 2 and 5, that is
the order in which the packets are matched.
Flow Groups Flow groups group similar traffic flows together, and allow more specific
QoS controls to be used, in preference to those specified by the traffic
class. Flow groups consist of a small set of QoS parameters and a group
of classifiers. After a flow group has been added to a traffic class it cannot
be added to another traffic class. A traffic class may have many flow
groups. Traffic is matched in the order of the flow groups. For example, if a
traffic class has flow groups 1, 3, 2 and 5, this is the order in which the
packets are matched.
QoS controls at the flow group level provide a QoS hierarchy. Non-default
flow group settings are always used, but if no setting is specified for a flow
group, the flow group uses the settings for the traffic class to which it
belongs. For example, you can use a traffic class to limit the bandwidth
available to web and FTP traffic combined. Within that traffic class, you
can create two different flow groups with different priorities, to give web
traffic a higher priority than FTP. Web traffic would then be given
preferential access to bandwidth, but would be limited to the bandwidth
limit of the traffic class.
Traffic Classes Traffic classes are the central component of the QoS solution. They
provide most of the QoS controls that allow a QoS solution to be deployed.
A traffic class can be assigned to only one policy. Traffic classes consist of
a set of QoS parameters and a group of QoS flow groups. Traffic can be
prioritized, marked (IP TOS or DSCP field set), and bandwidth limited.
Traffic is matched in the order of traffic class. For example, if a policy has
traffic classes 1, 3, 2 and 5, this is the order in which the packets are
matched.
Policies QoS policies consist of a collection of user defined traffic classes. A policy
can be assigned to more than one port, but a port may only have one
policy.
Note that the switch can only perform error checking of parameters and
parameter values for the policy and its traffic classes and flow groups
when the policy is set on a port.
Packet Processing You can use the switch’s QoS tools to perform any combination of the
following functions on a packet flow:
Limiting bandwidth
Prioritizing packets to determine the level of precedence the switch will
give to the packet for processing
Replacing the VLAN tag User Priority to enable the next switch in the
network to process the packet correctly
Replacing the TOS precedence or DSCP value to enable the next
switch in the network to process the packet correctly.
Packet The switch has eight Class of Service (CoS) egress queues, numbered
Prioritization from 0 to 7. Queue 7 has the highest priority. When the switch becomes
congested, it gives high priority queues precedence over lower-priority
queues. When the switch has information about a packet’s priority, it
sends the packet to the appropriate queue. You can specify the queue
where the switch sends traffic, how much precedence each queue has,
and whether priority remapping is written into the packet’s header for the
next hop to use.
You can set a packet’s priority by configuring a priority in the flow group or
traffic class to which the packet belongs. The packet is put in the
appropriate CoS queue for that priority. If the flow group and traffic class
do not include a priority, the switch can determine the priority from the
VLAN tag User Priority field of incoming tagged packets. The packet is put
in the appropriate CoS queue for its VLAN tag User Priority field. If neither
the traffic class / flow group priority nor the VLAN tag User Priority is set,
the packet is sent to the default queue, queue 1.
Both the VLAN tag User Priority and the traffic class / flow group priority
setting allow eight different priority values (0-7). These eight priorities are
mapped to the switch’s eight CoS queues. The switch’s default mapping is
shown in Table 7 on page 323. Note that priority 0 is mapped to CoS
queue 1 instead of CoS queue 0 because tagged traffic that has never
been prioritized has a VLAN tag User Priority of 0. If priority 0 was mapped
to CoS queue 0, this default traffic goes to the lowest queue, which is
probably undesirable. This mapping also makes it possible to give some
traffic a lower priority than the default traffic.
Replacing The traffic class or flow group priority (if set) determines the egress queue
Priorities a packet is sent to when it egresses the switch, but by default has no
effect on how the rest of the network processes the packet. To
permanently change the packet’s priority, you need to replace one of two
priority fields in the packet header:
The User Priority field of the VLAN tag header. Replacing this field
relabels VLAN-tagged traffic, so that downstream switches can
process it appropriately. Replacing this field is most useful outside
DiffServ domains.
The DSCP value of the IP header’s TOS byte (Figure 86 on page 287).
Replacing this field may be required as part of the configuration of a
DiffServ domain. See “DiffServ Domains” on page 343 for information
on using the QoS policy model and the DSCP value to configure a
DiffServ domain.
VLAN Tag User Within a flow group or traffic class, the VLAN tag User Priority value of
Priorities incoming packets can be replaced with the priority specified in the flow
group or traffic class. Replacement occurs before the packet is queued, so
this priority also sets the queue priority.
DSCP Values There are three methods for replacing the DSCP byte of an incoming
packet. You can use these methods together or separately. They are
described in the order in which the switch performs them.
The DSCP value can be overwritten at ingress, for all traffic in a policy.
The DSCP value in the packet can be replaced at the traffic class or
flow group level.
You can use these two replacements together at the edge of a DiffServ
domain, to initialize incoming traffic.
The DSCP value in a flow of packets can replaced if the bandwidth
allocated to that traffic class is exceeded. This option allows the next
switch in the network to identify traffic that exceeded the bandwidth
allocation.
A simple example of this process is shown in Figure 111, for limiting the
amount of bandwidth used by traffic from a particular IP address. In the
domain shown, this bandwidth limit is supplied by the class of service
represented by a DSCP value of 40. In the next DiffServ domain, this
traffic is assigned to the class of service represented by a DSCP value of
3.
DiffServ Domain
Classify by source IP address Classify by DSCP=40
Mark with DSCP=40 Limit bandwidth
Limit bandwidth Re-mark to DSCP=3
Classify by DSCP=40
Limit bandwidth
Assign the classifiers to flow groups and the flow groups to traffic
classes, with a different traffic class for each DiffServ code point
grouping within the DiffServ domain.
Give each traffic class the priority and/or bandwidth limiting
controls that are required for that type of packet within this part of
the domain.
Assign a DSCP value to each traffic class, to be written into the
TOS field of the packet header.
Assign the classifiers to flow groups and the flow groups to traffic
classes, with a different traffic class for each DiffServ code point
grouping within the DiffServ domain.
Give each traffic class the priority and/or bandwidth limiting
controls that are required for that type of packet within this part of
the domain. These QoS controls need not be the same for each
switch.
Assign the classifiers to flow groups and the flow groups to traffic
classes, with a different traffic class for each DiffServ code point
grouping within the DiffServ domain.
Give each traffic class the priority and/or bandwidth limiting
controls required for transmission of that type of packet to its next
destination, in accordance with any Service Level Agreement
(SLA) with the providers of that destination.
If necessary, assign a different DSCP value to each traffic class, to
be written into the TOS field of the packet header, to match the
DSCP or TOS priority values of the destination network.
Voice Applications
This example creates two policies that ensure low latency for all traffic sent
by and destined to a voice application located on a node with the IP
address 149.44.44.44. The policies raise the priority level of the packets to
7, the highest level. Policy 6 is for traffic from the application that enter the
switch on port 1. Policy 11 is for traffic arriving on port 8 going to the
application. The components of the policies are shown in Figure 112.
Policy 6 Policy 11
Video Applications
This example creates policies with low latency and jitter for video streams
(for example, net conference calls). The policies in Figure 113 assign the
packets a priority level of 4. The policies also limit the bandwidth for the
video streams to 5 Mbps to illustrate how you can combine a change to the
priority level with bandwidth restriction to further define traffic control. The
node containing the application has the IP address 149.44.44.44. Policy
17 is assigned to port 1, where the application is located, and Policy 32 is
assigned to port 8 where packets destined to the application enter the
switch.
Policy 17 Policy 32
Critical Database
Policy 15 Policy 17
The purpose of this example is to illustrate the hierarchy that exists among
the components of a QoS policy and how that hierarchy needs to be taken
into account when assigning new priority and DSCP values. A new priority
can be set at the flow group and traffic class levels, while a new DSCP
value can be set at all three levels—flow group, traffic class and policy.
The basic rules are:
This concept is illustrated in Figure 115 on page 351. It shows a policy for
a series of traffic flows consisting of subnets defined by their destination IP
addresses. New DSCP values for the traffic flows are established at
different levels within the policy.
The flow group for traffic flows 149.33.33.0 and 149.44.44.0, defined in
classifiers 3 and 4, does not contain a new DSCP value. Therefore, the
new value in the traffic class is used, in this case 30. The policy also has a
DSCP setting, but it is not used for these traffic flows because a new
DSCP setting in a traffic class takes precedence over that of a policy.
Finally, the new DSCP value for traffic flows 149.55.55.0 and 149.66.66.0,
defined in classifiers 5 and 6, is set at the policy level to a value of 55
because the flow group and traffic class do not specify a new value.
Create Classifier
01 - Classifier ID: ..... 1
. Create Flow Group
14 - Dst IP Addr ..... 149.11.11.0
15 - Dst IP Mask ..... 255.255.255.0 1 - Flow Group ID ......... 1
.
3 - DSCP Value ............. 10
Create Classifier .
9 - Classifier List ............1,2
01 - Classifier ID: ..... 2
. Create Traffic Class
14 - Dst IP Addr ..... 149.22.22.0
1 - Traffic Class ID: ........ 1
15 - Dst IP Addr ...... 255.255.255.0
.
5 - DSCP value ............. 30
Create Classifier .
01 - Classifier ID: ..... 3 E - Flow Group List ....... 1,2
. Create Flow Group
14 - Dst IP Addr ..... 149.33.33.0
15 - Dst IP Mask .... 255.255.255.0 1 - Flow Group ID ......... 2
.
3 - DSCP Value .............
Create Classifier . Create Policy
3. From the Quality of Service (QoS) menu, type 1 to select Flow Group
Configuration.
4. From the Flow Group Configuration menu, type 1 to select Create Flow
Group.
1 - Flow Group ID
Specifies an ID number for the flow group. Each flow group on the
switch must have a unique number. The range is 0 to 1023. The
default is 0. This parameter is required.
2 - Description
Specifies a description for the flow group. The description can be from
1 to 15 alphanumeric characters including spaces. This parameter is
optional, but recommended. Names can help you identify the groups
on the switch.
3 - DSCP value
Specifies a replacement value to write into the DSCP (TOS) field of the
packets. The range is 0 to 63.
A new DSCP value can be set at all three levels: flow group, traffic
class, and policy. A DSCP value specified in a flow group overrides a
DSCP value specified at the traffic class or policy level.
4 - Priority
Specifies a new user priority value for the packets. The range is 0 to 7.
If you specify a new user priority value here and in Traffic Class, the
value here overrides the value in Traffic Class. If you want the packets
to retain the new value when they exit the switch, change option 5,
Remark Priority, to Yes.
5 - Remark Priority
If set to Yes, replaces the user priority value in the packets with the
new value specified in option 4, Priority. If set to No, which is the
default, the packets retain their preexisting priority level.
6 - ToS
Specifies a replacement value to write into the Type of Service (ToS)
field of IPv4 packets. The range is 1 to 7.
A new ToS value can be set at all three levels: flow group, traffic class,
and policy. A ToS value specified in a flow group overrides a ToS value
specified at the traffic class or policy level.
9 - Classifier List
Specifies the classifiers to be assigned to the policy. The specified
classifiers must already exist. Separate multiple classifier IDs with
commas (e.g., 4,11,13).
7. To create another flow group, repeat this procedure starting with step
4. To assign the flow group to a traffic class, go to “Managing Traffic
Classes” on page 361.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Quality of Service (QoS) menu, type 1 to select Flow Group
Configuration.
4. From the Flow Group Configuration menu, type 2 to select Modify Flow
Group.
5. Enter the ID number of the flow group you want to modify. You can
modify only one flow group at a time.
8. To modify another flow group, repeat this procedure starting with step
4. To assign the flow group to a traffic class, go to “Managing Traffic
Classes” on page 361.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Quality of Service (QoS) menu, type 1 to select Flow Group
Configuration.
5. Enter the ID number of the flow group you want to delete. You can
delete only one flow group at a time.
The flow group is deleted from the switch. The group is removed from
any traffic classes to which it is assigned.
7. To delete another flow group, repeat this procedure starting with step
4.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Quality of Service (QoS) menu, type 1 to select Flow Group
Configuration.
4. From the Flow Group Configuration menu, type 4 to select Show Flow
Groups.
ID
The flow group’s ID number.
Description
A description of the flow group.
Active
The status of the flow group. If the flow group is part of a QoS policy
that is assigned to one or more ports, the flow group is deemed active.
If the flow group has not been assigned to a policy or if the policy has
not been assigned to any ports, the flow group is deemed inactive.
6. Enter the ID number of the flow group you want to view. You can
display only one flow group at a time.
U - Update Display
R - Return to Previous Menu
Flow Group ID
The flow group’s ID number.
Description
The flow group’s description.
DSCP value
The replacement value to write into the DSCP (TOS) field of the
packets.
Priority
The new user priority value for the packets.
Remark Priority
Replaces the user priority value in the packets with the Priority value.
ToS
Specifies a replacement value to write into the Type of Service (ToS)
field of IPv4 packets. The range is 1 to 7.
Classifier List
The classifiers assigned to the flow group.
3. From the Quality of Service (QoS) menu, type 2 to select Traffic Class
Configuration.
1 - Traffic Class ID
Specifies an ID number for the traffic class. Each traffic class on the
switch must be assigned a unique number. The range is 0 to 511. The
default is 0. This parameter is required.
2 - Description
Specifies a description for the traffic class. The description can be from
1 to 15 alphanumeric characters. Spaces are allowed. This parameter
is optional, but recommended. Names can help you identify the traffic
classes on the switch.
3 - Exceed Action
Specifies the action to be taken if the traffic of the traffic class exceeds
the maximum bandwidth, specified in option 6. There are two possible
exceed actions, drop and remark. If drop is selected, traffic exceeding
the bandwidth is discarded. If remark is selected, the packets are
forwarded after replacing the DSCP value with the new value specified
in option 4, Exceed Remark Value. The default is drop.
5 - DSCP value
Specifies a replacement value to write into the DSCP (TOS) field of the
packets. The range is 0 to 63.
A new DSCP value can be set at all three levels: flow group, traffic
class, and policy. A DSCP value specified in a flow group overrides a
DSCP value specified at the traffic class or policy level. A DSCP value
specified at the traffic class level is used only if no value has been
specified at the flow group level. It will override any value set at the
policy level.
6 - Max Bandwidth
Specifies the maximum bandwidth available to the traffic class. This
parameter determines the maximum rate at which the ingress port
accepts data belonging to this traffic class before either dropping or
remarking occurs, depending on option 3, Exceed Action. If the sum of
the maximum bandwidth for all traffic classes on a policy exceeds the
(ingress) bandwidth of the port to which the policy is assigned, the
bandwidth for the port takes precedence and the port discards packets
before they can be classified. The range is 0 to 1016 Mbps.
The value for this parameter is rounded up to the nearest Mbps value
when this traffic class is assigned to a policy on a 10/100 port, and up
to the nearest 8 Mbps value when assigned to a policy on a gigabit port
(for example, on a gigabit port, 1 Mbps is rounded to 8 Mbps, and 9 is
rounded to 16).
Note
If this option is set to 0 (zero), all traffic that matches that traffic class
is dropped. However, a access control list can be created to match
the traffic that is marked for dropping, or a subset of it, and given an
action of permit, to override this. This functionality can be used to
discard all but a certain type of traffic. For more information about
configuring access control lists, see Chapter 15, “Access Control
Lists” on page 303.
7 - Burst Size
Specifies the size of a token bucket for the traffic class. The token
bucket is used in situations where you have set a maximum bandwidth
for a class, but where traffic activity may periodically exceed the
maximum. A token bucket can provide a buffer for those periods where
the maximum bandwidth is exceeded.
Tokens are added to the bucket at the same rate as the traffic class’
maximum bandwidth, set with option 6, Max Bandwidth. For example,
a maximum bandwidth of 50 Mbps adds tokens to the bucket at that
rate.
Note
To use this parameter you must specify a maximum bandwidth
using item 6 - Max Bandwidth. Specifying a token bucket size
without also specifying a maximum bandwidth serves no function.
8 - Priority
Specifies the priority value in the IEEE 802.1p tag control field that
traffic belonging to this traffic class is assigned. Priority values range
from 0 to 7 with 0 being the lowest priority and 7 being the highest
priority. Incoming frames are mapped into one of four Class of Service
(CoS) queues based on the priority value.
If you want the packets to retain the new value when they exit the
switch, change option 9, Remark Priority, to Yes.
If you specify a new user priority value here and in Flow Group, the
value in Flow Group overwrites the value here.
9 - Remark Priority
Replaces the user priority value in the packets with the new value
specified in option 4, Priority, if set to Yes. If set to No, which is the
default, the packets retain their preexisting priority level when they
leave the switch.
A - ToS
Specifies a replacement value to write into the Type of Service (ToS)
field of IPv4 packets. The range is 1 to 7.
If you specify a new ToS value here and in Flow Group, the value in
Flow Group overwrites the value here.
value in the ToS priority field for IPv4 packet. If set to No, which is the
default, the packets retain their preexisting 802.1p priority level.
7. To create another traffic class, repeat this procedure starting with step
3. To assign the traffic class to a policy, go to “Managing Policies” on
page 371.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Quality of Service (QoS) menu, type 2 to select Traffic Class
Configuration.
5. Enter the ID number of the traffic class you want to modify. You can
modify only one traffic class at a time.
8. To modify another traffic class, repeat this procedure starting with step
4. To assign the traffic class to a policy, go to “Managing Policies” on
page 371.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Quality of Service (QoS) menu, type 2 to select Traffic Class
Configuration.
5. Enter the ID number of the traffic class you want to delete. You can
delete only one traffic class at a time.
The traffic class is deleted from the switch. The class is removed from
any policies to which it is assigned.
7. To delete another traffic class, repeat this procedure starting with step
4.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Quality of Service (QoS) menu, type 2 to select Traffic Class
Configuration.
ID
The traffic class’ ID number.
Description
A description of the traffic class.
Parent Policy ID
The ID number of the policy where the traffic class is assigned. A traffic
class can belong to only one policy at a time.
Active
The status of the traffic class. If the traffic class is part of a QoS policy
that is assigned to one or more ports, the traffic class is deemed active.
If the traffic class has not been assigned to a policy or if the policy has
not been assigned to any ports, the traffic class is deemed inactive.
6. When prompted, enter the ID number of the traffic class you want to
view. You can display only one traffic class at a time.
U - Update Display
R - Return to Previous Menu
Traffic Class ID
The traffic class ID number.
Description
The description of the traffic class.
Exceed Action
The action taken if the traffic of the traffic class exceeds the maximum
bandwidth.
DSCP value
The replacement value to write into the DSCP (TOS) field of the
packets.
Max Bandwidth
The maximum bandwidth available to the traffic class.
Burst Size
The size of a token bucket for the traffic class.
Priority
The priority value in the IEEE 802.1p tag control field that traffic
belonging to this traffic class is assigned.
Remark Priority
Replaces the user priority value in the packets with the Priority value.
ToS
Specifies a replacement value to write into the Type of Service (ToS)
field of IPv4 packets. The range is 1 to 7.
Managing Policies
C - Create Policy
R - Return to Previous Menu
1 - Policy ID
Specifies an ID number for the policy. Each policy on the switch must
be assigned a unique number. The range is 0 to 255. The default is 0.
This parameter is required.
2 - Description
Specifies a description for the policy. The description can be from 1 to
15 alphanumeric characters. Spaces are allowed. This parameter is
optional, but recommended. Names can help you identify the policies
on the switch.
3- Remark DSCP
Specifies the conditions under which the ingress DSCP value is
overwritten. If All is specified, all packets are remarked. If None is
specified, the function is disabled. The default is None.
4 - DSCP value
Specifies a replacement value to write into the DSCP (TOS) field of the
packets. The range is 0 to 63.
A new DSCP value can be set at all three levels: flow group, traffic
class, and policy. A DSCP value specified in a flow group overrides a
DSCP value specified at the traffic class or policy level. A DSCP value
specified at the policy level is used only if no value has been specified
at the flow group and traffic class levels.
5 - ToS
Specifies a replacement value to write into the Type of Service (ToS)
field of IPv4 packets. The range is 1 to 7. A ToS value specified at the
policy level is used only if no value has been specified at the flow
group and traffic class levels.
9 - Redirect Port
Specifies the port to which the classified traffic from the ingress port is
redirected.
B - Egress Port
Specifies the egress port to which the policy is to be assigned. You can
enter only one egress port.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
5. Enter the ID number of the policy you want to modify. You can modify
only one policy at a time.
M - Modify Policy
R - Return to Previous Menu
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
5. Enter the ID number of the policy you want to delete. You can delete
only one policy at a time.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Number of Policies: 4
ID Description Active
------------------------------------------------
0 P1-4 database No
1 Main video Yes
2 Dev eng Yes
3 Alt video Yes
ID
The policy’s ID number.
Description
A description of the policy.
Active
The status of the policy. A policy that is assigned to one or more ports
is deemed active while a policy that is not assigned to any ports is
deemed inactive.
6. Enter the ID number of the policy you want to view. You can display
only one policy at a time.
1 - Policy ID ................ 11
2 - Description .............. policy_ca2
3 - Remark DSCP .............. None
4 - DSCP value ............... 42
5 - ToS ......................
6 - Move ToS to Priority ..... No
7 - Move Priority to ToS ..... No
8 - Send to Mirror Port ...... No
9 - Traffic Class List .......
A - Redirect Port ............
B - Ingress Port List ........ 15
D - Egress Port ..............
U - Update Display
R - Return to Previous Menu
Policy ID
The policy ID number.
Description
The policy description.
Remark DSCP
The conditions under which the ingress DSCP value is overwritten.
DSCP value
The replacement value to write into the DSCP (TOS) field of the
packets.
ToS
Specifies a replacement value to write into the Type of Service (ToS)
field of IPv4 packets. The range is 1 to 7. A ToS value specified at the
policy level is used only if no value has been specified at the flow
group and traffic class levels.
Egress Port
The egress port to which the policy is assigned.
The AT-S63 management software can help protect your switch against
the following types of denial of service attacks.
The following subsections briefly describe each type of attack and the
mechanism employed by the AT-S63 management software to protect
your network.
Note
Be sure to read the following descriptions before implementing a
DoS defense on a switch. Some defense mechanisms are CPU
intensive and can impact switch behavior.
SYN Flood In this type of attack, an attacker sends a large number of TCP connection
Attack requests (TCP SYN packets) with bogus source addresses to the victim.
The victim responds with acknowledgements (SYN ACK packets), but
because the original source addresses are bogus, the victim node does
not receive any replies. If the attacker sends enough requests in a short
enough period, the victim may freeze operations when the number of
requests exceeds the capacity of its connections queue.
To defend against this form of attack, a switch port monitors the number of
ingress TCP connection requests it receives. If a port receives more than
60 requests per second, the following occurs.
This defense mechanism does not involve the switch’s CPU. You can
activate it on any number of ports without it impacting switch performance.
Smurf Attack This DoS attack is instigated by an attacker sending a ICMP Echo (Ping)
request containing the network’s IP broadcast address as the destination
address and the address of the victim as the source of the ICMP Echo
(Ping) request. This overwhelms the victim with a large number of ICMP
Echo (Ping) replies from the other network nodes.
This defense mechanism does not involve the switch’s CPU. You can
activate it on as many ports as you want without having it negatively
impact switch performance.
Land Attack In this attack, an attacker sends a bogus IP packet where the source and
destination IP addresses are the same. This leaves the victim thinking that
it is sending a message to itself.
The most direct approach for defending against this form of attack is for
the AT-S63 management software to check the source and destination IP
addresses in the IP packets, searching for and discarding those with
identical source and destination addresses. But this would require too
much processing by the switch’s CPU, and would adversely impact switch
performance.
Instead, the switch examines the IP packets that are entering and leaving
your network. IP packets generated within your network and containing a
local IP address as the destination address are not allowed to leave the
network, and IP packets generated outside the network but containing a
local IP address as the source address are not allowed into the network.
In order for this defense mechanism to work, you need to specify an uplink
port. This is the port on the switch that is connected to a device, such as a
DSL router, that leads outside your network. You can specify only one
uplink port.
Note
If the switch is not connected to a device that leads outside your
network, you should not use this defense mechanism.
You also need to enter the IP address of one of your network devices as
well as a mask which the switch uses to differentiate between the network
portion and node portion of the address. The switch uses the IP address
and mask to determine which IP addresses are local to your network and
The following is a overview of how the process takes place. This example
assumes that you have activated the feature on port 4, which is connected
to a device local to your network, and that you have specified port 1 as the
uplink port, which is connected to the device that leads outside your
network. The steps below review what happens when an ingress IP
packet from the local device arrives on port 4:
3. If the source IP address is local to the network, the port forwards the
packet to uplink port 1.
2. If the source IP address is local to the network, uplink port 1 does not
forward the packet to port 4 because it assumes that a packet with a
source IP address that is local to the network should not be entering
the network from outside the network on the uplink port.
3. If the source IP address is not local to the network, port 1 forwards the
packet to port 4.
This form of defense is not CPU intensive. Activating it on all ports should
not affect switch behavior.
Teardrop Attack An attacker sends an IP packet in several fragments with a bogus offset
value, used to reconstruct the packet, in one of the fragments to a victim.
The victim is unable to reassemble the packet, possibly causing it to
freeze operations.
The defense mechanism for this type of attack has all ingress fragmented
IP traffic received on a port sent to the switch’s CPU. The CPU samples
related, consecutive fragments, checking for fragments with invalid offset
values.
Because the CPU only samples the ingress IP traffic, this defense
mechanism may catch some, though not necessarily all, of this form of
attack.
Caution
This defense is extremely CPU intensive; use with caution.
Unrestricted use can cause a switch to halt operations if the CPU
becomes overwhelmed with IP traffic. To prevent this, Allied Telesyn
recommends activating this defense on only the uplink port and one
other switch port at a time.
Ping of Death The attacker sends an oversized, fragmented ICMP Echo (Ping) request
Attack (greater than 65,535 bits) to the victim, which, if lacking a policy for
handling oversized packets, may freeze.
To defend against this form of attack, a switch port searches for the last
fragment of a fragmented ICMP Echo (Ping) request and examines its
offset to determine if the packet size is greater than 63,488 bits. If it is, the
fragment is forwarded to the switch’s CPU for final packet size
determination. If the switch determines that the packet is oversized, the
following occurs:
Note
This defense mechanism requires some involvement by the switch’s
CPU, though not as much as the Teardrop defense. This does not
impact the forwarding of traffic between the switch ports, but it can
affect the handling of CPU events, such as the processing of IGMP
packets and spanning tree BPDUs. For this reason, Allied Telesyn
recommends limiting the use of this defense, activating it only on
those ports where an attack is most likely to originate.
This defense mechanism does not involve the switch’s CPU. You can
activate it on as many ports as you want without it impacting switch
performance.
Note
This defense does not actually check IP packets for bad IP options;
it can only alert you to a possible attack.
Denial of Service Below are guidelines to observe when using this feature:
Defense A switch port can support more than one DoS defense at a time.
Guidelines
The Teardrop and the Ping of Death defenses are CPU intensive. Use
these defenses with caution.
Some defenses allow you to specify a mirror port where offending
traffic is copied.
1 - LAN IP Subnet
2 - SYN Flood Configuration
3 - Smurf Configuration
4 - Land Configuration
5 - Teardrop Configuration
6 - Ping of Death Configuration
7 - IP Option Configuration
3. If you are implementing the Smurf or Land defense, you must provide
the IP address of a node connected to the switch and a subnet mask.
For the Land defense, you must also specify an uplink port. To do this,
complete the following steps. Otherwise, go to step 4.
Enter the subnet mask for your network. For example, the subnet
mask for a network with the IP address range 149.11.11.1 to
149.11.11.50 is 255.255.255.192.
d. If you are activating the Land defense, type 3 to select Uplink Port.
Enter the number of the port connected to the device (e.g., DSL
router) that leads outside your network. You can specify only one
uplink port.
4. Type the number of the DoS attack that you want to protect against.
Enter port-list:
Note
If you plan to use the Teardrop defense, Allied Telesyn recommends
activating it on only the uplink port and one other port. The defense
is CPU intensive and can overwhelm the switch’s CPU.
1 - DoS Status
Enables and disables the selected DoS defense on the selected ports.
The default is disabled.
2 - Mirror Port
This option is displayed for the Land, Tear Drop, Ping of Death, and IP
options. You can use this option to copy offending traffic to another port
on the switch. You can specify only one mirror port. Specifying a mirror
port is not required.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 389
390 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
Chapter 19
IGMP Snooping
This chapter explains how to activate and configure the Internet Group
Management Protocol (IGMP) snooping feature on the switch. Sections in
the chapter include:
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 391
Chapter 19: IGMP Snooping
The IGMP protocol enables IPv4 routers to create lists of nodes that are
members of multicast groups. (A multicast group is a group of end nodes
that want to receive multicast packets from a multicast application.) The
router creates a multicast membership list by periodically sending out
queries to the local area networks connected to its ports.
After the router has received a report from a host node, it notes the
multicast group that the host node wants to join and the port on the router
where the node is located. Any multicast packets belonging to that
multicast group are then forwarded by the router out the port. If a particular
port on the router has no nodes that want to be members of multicast
groups, the router does not send multicast packets out the port. This
improves network performance by restricting multicast packets only to
router ports where host nodes are located.
Version 3 adds the ability of host nodes to join or leave specific sources in
a multicast group.
The IGMP snooping feature on the AT-9400 Series switch supports all
three versions of IGMP. The switch monitors the flow of queries from a
router and reports and leave messages from host nodes to build its own
multicast membership lists. It uses the lists to forward multicast packets
only to switch ports where there are host nodes that are members of
multicast groups. This improves switch performance and network security
by restricting the flow of multicast packets only to those switch ports
connected to host nodes.
392 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
Without IGMP snooping a switch would have to flood multicast packets out
all of its ports, except the port on which it received the packet. Such
flooding of packets can negatively impact network performance.
The AT-9400 Series switch maintains its list of multicast groups through an
adjustable timeout value, which controls how frequently it expects to see
reports from end nodes that want to remain members of multicast groups,
and by processing leave requests.
Note
By default, IGMP snooping is disabled on the switch.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 393
Chapter 19: IGMP Snooping
Note
Selection 1, RRP Snooping Configuration, is described in Chapter
21, “RRP Snooping” on page 413. Selection 3, MLD Snooping
Configuration, is described in Chapter 20, “MLD Snooping” on page
403.
394 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
2 - Host Topology
Defines whether there is only one host node per switch port or multiple
host nodes per port. The possible settings are:
Single-Host/Port (Edge)
The Single-Host/Port setting is appropriate when there is only one host
node connected to each port on the switch. This setting causes the
switch to immediately stop sending multicast packets out a switch port
when a host node signals its desire to leave a multicast group by
sending a leave request or when the host node stops sending reports.
The switch responds by immediately ceasing the transmission of
additional multicast packets out the port where the host node is
connected.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 395
Chapter 19: IGMP Snooping
Note
The combined number of multicast address groups for IGMP and
MLD snooping cannot exceed 256.
5 - Router Port(s)
Specifies the port on the switch to which a multicast router is detected.
You can let the switch determine this automatically by selecting Auto
Detect, or you can specify the port yourself by entering a port number.
You can specify more than one port. To specify all ports, enter ALL. To
specify no ports, enter NONE, To select Auto Detect, enter AUTO.
Note
A change to any parameter in this menu is immediately activated on
the switch.
Note
Selection 6, View IGMP Multicast Hosts List, is described in
“Displaying a List of Host Nodes” on page 398. Selection 7, View
IGMP Multicast Routers List, is described in “Displaying a List of
Multicast Routers” on page 400.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
396 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 397
Chapter 19: IGMP Snooping
You can use the AT-S63 management software to display a list of the
multicast groups on a switch, as well as the host nodes. To display the list,
perform the following procedure:
The View IGMP Multicast Host List menu is shown in Figure 139.
U - Update Display
R - Return to Previous Menu
The View IGMP Multicast Hosts List menu displays a table with the
following columns of information:
Multicast Group
The multicast address of the group.
398 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
VLAN
The VID of the VLAN where the port is an untagged member.
Port/Trunk
The port on the switch where the host node is connected. If the host
node is connected to the switch through a trunk, the trunk ID number,
not the port number, is displayed.
HostIP
The IP address of the host node connected to the port.
IGMP Ver.
The version of IGMP used by the host.
Exp. Time
The number of seconds remaining before the host is timed out if no
further IGMP reports are received from it.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 399
Chapter 19: IGMP Snooping
The View IGMP Multicast Routers List menu is shown in Figure 140.
U - Update Display
R - Return to Previous Menu
The View IGMP Multicast Routers List menu displays a table that
contains the following columns of information:
VLAN
The VID of the VLAN in which the port is an untagged member.
Port/Trunk ID
The port on the switch where the multicast router is connected. If the
400 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
switch learned the router on a port trunk, the trunk ID number, not the
port number, is displayed.
Router IP
The IP address of the multicast router.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 401
Chapter 19: IGMP Snooping
402 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
Chapter 20
MLD Snooping
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 403
Chapter 20: MLD Snooping
MLD snooping performs the same function as IGMP snooping. The switch
uses the feature to build multicast membership lists and uses the lists to
forward multicast packets only to switch ports where there are host nodes
that are members of the multicast groups. The difference between the two
is that MLD snooping is for IPv6 and IGMP snooping for IPv4
environments. (For background information on IGMP snooping, refer to
“IGMP Snooping Overview” on page 392.)
Note
The default setting for MLD snooping on the switch is disabled.
404 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
2 - Host Topology
Defines whether there is only one host node per switch port or multiple
host nodes per port. The possible settings are:
Single-Host/Port (Edge)
The Single-Host/Port setting is appropriate when there is only one host
node connected to each port on the switch. This setting causes the
switch to immediately stop sending multicast packets out a switch port
when a host node signals its desire to leave a multicast group by
sending a leave request or when the host node stops sending reports.
The switch responds by immediately ceasing the transmission of
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 405
Chapter 20: MLD Snooping
additional multicast packets out the port where the host node is
connected.
Note
The combined number of multicast address groups for IGMP and
MLD snooping cannot exceed 256.
5 - Router Port(s)
Specifies the port on the switch where a multicast router is located.
You can let the switch determine this automatically by selecting Auto
Detect, the default setting, or you can specify the port yourself by
entering a port number. You can specify more than one port. To specify
all ports, enter ALL. To specify no ports, enter NONE, To select Auto
Detect, enter AUTO.
406 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
Note
A change to any parameter in this menu is immediately activated on
the switch.
Note
Selection 6, View MLD Multicast Hosts List, is described in
“Displaying a List of Host Nodes” on page 409. Selection 7, View
MLD Multicast Routers List, is described in “Displaying a List of
Multicast Routers” on page 411.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 407
Chapter 20: MLD Snooping
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
408 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
You can use the AT-S63 management software to display a list of the
multicast groups on a switch, as well as the host nodes. To display the list,
perform the following procedure:
The View MLD Multicast Host List menu is shown in Figure 142.
U - Update Display
R - Return to Previous Menu
The View MLD Multicast Hosts List menu displays a table with the
following columns of information:
Multicast Group
The multicast address of the group.
VLAN
The VID of the VLAN where the port is an untagged member.
Port/Trunk
The port on the switch where the host node is connected. If the host
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 409
Chapter 20: MLD Snooping
HostIP
The IP address of the host node connected to the port.
Exp. Time
The number of seconds remaining before the host is timed out if no
further MLD reports are received from it.
410 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
The View MLD Multicast Routers List menu is shown in Figure 143.
U - Update Display
R - Return to Previous Menu
The View MLD Multicast Routers List menu displays a table that
contains the following columns of information:
VLAN
The VID of the VLAN in which the port is an untagged member.
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 411
Chapter 20: MLD Snooping
Port/Trunk ID
The port on the switch where the multicast router is connected. If the
switch learned the router on a port trunk, the trunk ID number, not the
port number, is displayed.
Router IP
The IP address of the multicast router.
412 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
Chapter 21
RRP Snooping
This chapter explains RRP snooping and contains the following sections:
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 413
Chapter 21: RRP Snooping
Because the master and slave routers are able to share the same virtual
IP address and MAC address, a change in data paths does not
necessitate adjusting the default gateways on the network nodes that
employ the routers. When a slave router transitions to master, it uses the
same IP address as the previous master router, making the transition
transparent to network end nodes. In large networks, these transparent
transitions can save the time and effort of manually reconfiguring default
gateway addresses on large numbers of network nodes when a router
pathway fails.
00:E0:2B:00:00:80-9F
00:A0:D2EB:FF:00
00:00:5E:00:01:00-FF
The switch responds by deleting all dynamic MAC addresses from the
MAC address table. As the switch relearns the addresses, the virtual MAC
address of the new master router is learned on the new master RRP port,
rather than the old port. Any packets received by the switch and destined
for the router are forwarded to the new master router.
414 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
AT-S63 Management Software Menus Interface User’s Guide
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping 415
Chapter 21: RRP Snooping
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
416 Section III: IGMP Snooping, MLD Snooping, and RRP Snooping
Section IV
SNMPv3
SNMPv3
SNMPv3 Overview
With the SNMPv3 protocol, you create users, determine the protocol used
for message authentication as well as determine if data transmitted
between two SNMP entities is encrypted. In addition, you can restrict user
privileges by determining the user’s view of the Management Information
Bases (MIB). In this way, you restrict which MIBs the user can display and
modify. In addition, you can restrict the types of messages, or traps, the
user can send. (A trap is a type of SNMP message.)
After you have created a user, you define SNMPv3 message notification.
This consists of determining where messages are sent and what types of
messages can be sent. This configuration is similar to the SNMPv1 and
SNMPv2c configuration because you configure IP addresses of trap
receivers, or hosts. In addition, with the SNMPv3 implementation you
decide what types of messages are sent.
Note
For the SNMP RFCs supported by this release of the AT-S63
software, see “Using an SNMP Network Management Application”
on page 37.
This section further describes the features of the SNMPv3 protocol. The
following subsections are included:
Note
The keys generated by the MD5 and SHA protocols are specific to
the SNMPv3 protocol. They have no relation to the SSL and SSH
keys for encryption.
SNMPv3 Privacy After you have configured an authentication protocol, you have the option
Protocol of assigning a privacy protocol if you have the encrypted version of the
AT-S63 software. In SNMPv3 protocol terminology, privacy is equivalent to
encryption. Currently, the DES protocol is the only encryption protocol
supported. The DES privacy protocol requires the authentication protocol
to be configured as either MD5 or SHA.
If you assign a DES privacy protocol to a user, then you are also required
to assign a privacy password. If you choose to not assign a privacy value,
then SNMPv3 messages are sent in plain text format.
SNMPv3 MIB The SNMPv3 protocol allows you to configure MIB views for users and
Views groups. The MIB tree is defined by RFC 1155 (Structure of Management
Information). See Figure 145.
root
dod (6)
internet (1)
mib-2 (1)
system (1) at (3) icmp (5) udp (7) cmot (9) snmp (11) host (25)
interfaces (2) ip (4) tcp (6) egp (8) transmission (10) dot1 dBridge (117)
The AT-S63 software supports the MIB tree, starting with the Internet
MIBs, as defined by 1.3.6.1. There are two ways to specify a MIB view.
You can enter the OID number of the MIB view or its equivalent text name.
For example, to specify MIBs in the Internet view, you can enter the OID
format “1.3.6.1” or the text name “internet.”
In addition, you can define a MIB view that the user can access or a MIB
view that the user cannot access. When you want to permit a user to
access a MIB view, you include a particular view. When you want to deny
a user access to a MIB view, you exclude a particular view.
After you specify a MIB subtree view you have the option of further
restricting a view by defining a subtree mask. The relationship between a
SNMPv3 Storage Each SNMPv3 table entry has its own storage type. You can choose
Types between nonvolatile storage which allows you to save the table entry or
volatile storage which does not allow you to save an entry. If you select the
volatile storage type, when you power off the switch your SNMPv3
configuration is lost and cannot be recovered.
SNMPv3 Message When you generate an SNMPv3 message from the switch, there are three
Notification basic pieces of information included in the message:
To configure the type of message, you need to define if you are sending a
Trap or Inform message. Basically, the switch expects a response to an
Inform message and the switch does not expect a response to a Trap
message. These two message types are defined in the SNMPv3 (RFC
2571-6).
User
View of the MIB Tree
Security Level
Security Model
Authentication Level
Privacy Protocol
Group
To configure the SNMP security information, you associate a user and its
related information—View, Security Level, Security Model, Authentication
Level, Privacy Protocol and Group—with the type of message and the
host IP address.
SNMPv3 Tables The SNMPv3 configuration is neatly divided into configuring SNMPv3 user
information and configuring the message notification. You must configure
all seven tables to successfully configure the SNMPv3 protocol. You use
the following tables for user configuration:
First, you create a user in the Configure SNMPv3 User Table. Then you
define the MIB view this user has access to in the Configure SNMPv3
View Table. To configure a security group and associate a MIB view to a
security group, you configure the Configure SNMPv3 Access Table.
Finally, configure the Configure SNMPv3 SecurityToGroup menu to
associate a user to a security group. See Figure 146 for an illustration of
how the user configuration tables are linked.
In general, you focus on configuring security groups and then add and
delete users from the groups as needed. For example, you may want to
have two groups—one for manager privileges and a second one for
operator privileges. See Appendix B, “SNMPv3” on page 419 for an
example of manager and operator configurations.
See Figure 147 for an illustration of how the message notification tables
are linked.
Linked by
SNMPv3 View Table Security Name
and
Linked by View Name Security Model
For a more detailed description of the SNMPv3 Tables, see the following
subsections:
The Configure SNMPv3 View Table menu allows you to create a view of
the MIB OID Table. First, you configure a view of a subtree. Then you
have the option of configuring a Subtree Mask that further refines the
subtree view. For example, you can use a Subtree Mask to restrict a
user’s view to one row of the MIB OID Table. In addition, you can chose to
include or exclude a view. As a result, you can let a user see a particular
view or prevent a user from seeing a particular view. Lastly, you can
configure a storage type for this table entry which allows you to save this
view to flash memory.
For each group, you can assign read, write, and notify views of the MIB
table. The views you assign here have been previously defined in the
Configure SNMPv3 View Table menu. For example, the Read View allows
group members to view the specified portion of the OID MIB table. The
Write View allows group members to write to, or modify, the MIBs in the
specified MIB view. The Notify View allows group members to send trap
messages defined by the MIB view. Lastly, you can configure a storage
type for this table entry which allows you to save this view to flash
memory.
The Configure SNMPv3 Notify Table menu allows you to define the type of
message that is sent from the switch to the SNMP host. In addition, you
have the option of defining the message type as either an Inform or a Trap
message. The difference between these two types of messages is that
when a switch sends an Inform message, the switch expects a response
from the host. In comparison, the switch does not expect the host to
respond to Trap messages.
In addition, you define a Notify Tag that links an SNMPv3 Notify Table
entry to the host IP address defined in the Configure SNMPv3 Target
Address Table menu. Lastly, you can configure a storage type for this
table entry which allows you to save the entry to flash memory.
Note
Allied Telesyn recommends that you use the procedures described
in Chapter 5, “SNMPv1 and SNMPv2c” on page 95 to configure the
SNMPv1 and SNMPv2c protocols.
SNMPv3 You may want to have two classes of SNMPv3 users—Managers and
Configuration Operators. In this scenario, you would configure one group, called
Managers, with full access privileges. Then you would configure a second
Example group, called Operators, with monitoring privileges only. For a detailed
example of this configuration, see Appendix B, “SNMPv3 Configuration
Examples” on page 885.
This section contains a description of the SNMPv3 User Table and how to
create, delete, and modify table entries. Configure the SNMPv3 User
Table first. Creating this table, allows you to create an entry in an SNMPv3
User Table for a User Name. In addition, this table allows you to associate
a User Name with the following parameters:
Authentication protocol
Authentication password
Privacy protocol
Privacy password
There are three functions you can perform with the SNMPv3 User Table.
Creating an To create an entry in the SNMPv3 User Table, perform the following
SNMPv3 User procedure:
Table Entry 1. From the Main Menu, type 5 to select System Administration.
Note
The SNMP Engine field is a read-only field. You cannot change the
setting. The field displays the SNMP engine identifier that is
assigned automatically to the switch.
U - Update Display
R - Return to Previous Menu
M-MD5
This value represents the MD5 authentication protocol. With this
selection, users (SNMP entities) are authenticated with the MD5
authentication protocol after a message is received. This algorithm
generates the message digest. The user is authenticated when the
authentication protocol checks the message digest. With the MD5
selection, you can configure a Privacy Protocol.
S-SHA
This value represents the SHA authentication protocol. With this
selection, users are authenticated with the SHA authentication
protocol after a message is received. This algorithm generates the
message digest. The user is authenticated when the authentication
protocol checks the message digest. With the SHA selection, you can
configure a Privacy Protocol.
N-None
This value represents no authentication protocol. When messages are
received, users are not authenticated. With the None selection, you
cannot configure a Privacy Protocol.
Note
You may want to assign NONE to a super user.
If you select NONE, you are prompted for the Storage Type. Go to
Step 13.
Note
You can only configure the Privacy Protocol if you have configured
the Authentication Protocol with the MD5 or SHA values.
D -DES
Select this value to make the DES privacy (or encryption) protocol the
privacy protocol for this User Table entry. With this selection,
messages transmitted between the host and the switch are encrypted
with the DES protocol.
N -None
Select this value if you do not want a privacy protocol for this User
Table entry. With this selection, messages transmitted between the
host and the switch are not encrypted.
If you select NONE, you are prompted for the Storage Type. Go to Step
13.
If you select DES, the following prompt is displayed:
11. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 User Table to nonvolatile memory. After making changes
to an SNMPv3 User Table entry with a Volatile storage type, the S -
Save Configuration Changes option does not appear on the Main
Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 User Table to nonvolatile memory. After making changes to
an SNMPv3 User Table entry with a NonVolatile storage type, the S -
Save Configuration Changes option appears on the Main Menu,
Note
The Row Status parameter is a read-only field. The Active value
indicates the SNMPv3 User Table entry takes effect immediately.
12. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an You may want to delete an entry from the SNMPv3 User Table. When you
SNMPv3 User delete an entry in the SNMPv3 User Table, there is no way to undelete, or
recover the entry.
Table Entry
To delete an entry in the SNMPv3 User Table, perform the following
procedure.
3. From the SNMPv3 User Table, type 2 to select Delete SNMPv3 Table
Entry.
4. Enter the User Name of the User Table entry you want to delete.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
9. From the SNMPv3 User Table, type 3 to select Modify SNMPv3 Table
Entry.
U - Update Display
R - Return to Previous Menu
11. Enter the User Name of the User Table you want to modify.
M-MD5
This value represents the MD5 authentication protocol. With this
selection, users (SNMP entities) are authenticated with the MD5
authentication protocol after a message is received. This algorithm
generates the message digest. The user is authenticated when the
authentication protocol checks the message digest. With the MD5
selection, you can configure a Privacy Protocol.
S-SHA
This value represents the SHA authentication protocol. With this
selection, users are authenticated with the SHA authentication
protocol after a message is received. This algorithm generates the
message digest. The user is authenticated when the authentication
protocol checks the message digest. With the SHA selection, you can
configure a Privacy Protocol.
N-None
This value represents no authentication protocol. When messages are
received, users are not authenticated. With the None selection, you
cannot configure a Privacy Protocol.
If you select None, go to step 9.
17. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
You can only configure the Privacy Protocol if you have configured
the Authentication Protocol with the MD5 or SHA values.
3. From the SNMPv3 User Table, type 3 to select Modify SNMPv3 Table
Entry.
The Modify SNMPv3 Table menu is shown in Figure 150 on page 435.
D -DES
Select this value to make the DES privacy (or encryption) protocol the
privacy protocol for this User Table entry. With this selection,
messages transmitted between the host and the switch are encrypted
with the DES protocol.
N -None
Select this value if you do not want a privacy protocol for this User
Table entry. With this selection, messages transmitted between the
host and the switch are not encrypted.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To modify the Storage Type in an SNMPv3 User Table entry, perform the
following procedure.
3. From the SNMPv3 User Table, type 3 to select Modify SNMPv3 Table
Entry.
The Modify SNMPv3 Table menu is shown in Figure 150 on page 435.
6. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 User Table to nonvolatile memory. After making changes
to an SNMPv3 User Table entry with a Volatile storage type, the S -
Save Configuration Changes option does not appear on the Main
Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 User Table to nonvolatile memory. After making changes to
an SNMPv3 User Table entry with a NonVolatile storage type, the S -
Save Configuration Changes option appears on the Main Menu,
allowing you to save your changes. Allied Telesyn recommends this
storage type.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This section contains a description of the SNMPv3 View Table and how to
create, delete, and modify table entries. Creating this table, allows you to
specify a view using the following parameters:
Subtree OID
Subtree Mask
MIB OID Table View
To configure the SNMPv3 View Table, you need to be very familiar with
the OID table. You can be very specific about the view a user can or
cannot access—down to a column or row of the table. AT-S63 supports
the Internet subtree of the OID table.
There are three functions you can perform with the SNMPv3 User Table:
Creating an To create an entry in the SNMPv3 View Table, perform the following
SNMPv3 View procedure.
Table Entry 1. Follow steps 1 through 5 in the procedure described in “Creating an
SNMPv3 User Table Entry” on page 430. Or, from the Main Menu type
5->1->1->8->5.
U - Update Display
R - Return to Previous Menu
3. From the Configure SNMPv3 View Table menu, type 1 to select Create
SNMPv3 Table Entry.
Note
The “defaultViewAll” value is the default entry for the SNMPv1 and
SNMPv2c configuration. You cannot use the default value for an
SNMPv3 View Table entry.
5. Enter the subtree that this view will or will not be permitted to display.
You can enter either a numeric value in hex format or the equivalent
text name. For example, the OID hex format for TCP/IP is:
1.3.6.1.2.1.6
tcp
1.3.6.1.2.1.2.2.1.0.3
To restrict the user’s view to the third row (all columns) of the ifEntry
MIB, enter the following value for the Subtree Mask parameter
ff:bf
I - Included
Enter this value to permit the View Name to see the subtree specified
above.
E - Excluded
Enter this value to not permit the View Name to see the subtree
specified above.
8. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 View Table to the configuration file. After making changes
to an SNMPv3 View Table entry with a Volatile storage type, the S -
Save Configuration Changes option does not appear on the Main
Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 View Table to the configuration file. After making changes to
an SNMPv3 View Table entry with a NonVolatile storage type, the S -
Save Configuration Changes option appears on the Main Menu,
allowing you to save your changes. Allied Telesyn recommends this
storage type.
Note
The Row Status parameter is a read-only field. The Active value
indicates the SNMPv3 View Table entry takes effect immediately.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an You may want to delete an entry from the SNMPv3 View Table. After you
SNMPv3 View delete an SNMPv3 View Table entry, there is no way to undelete, or
recover the entry.
Table Entry
To delete an entry in the SNMPv3 View Table, perform the following
procedure:
3. From the SNMPv3 View Table, type 2 to select Delete SNMPv3 Table
Entry.
4. Enter the View Name of the View Table entry you want to delete.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Configure SNMPv3 View Table menu, type 3 to select Modify
SNMPv3 Table Entry.
U - Update Display
R - Return to Previous Menu
4. To modify the Subtree Mask for this view, type 1 to select Set Subtree
Mask.
6. Enter Subtree that this view will or will not be permitted to display.
You can enter either a numeric value in hex format or the equivalent
text name. For example, the OID hex format for TCP/IP is:
1.3.6.1.2.1.6
tcp
1.3.6.1.2.1.2.2.1.0.3
To restrict the user’s view to the third row (all columns) of the ifEntry
MIB, enter the following value for the Subtree Mask parameter:
ff:bf
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Configure SNMPv3 View Table menu, type 3 to select Modify
SNMPv3 Table Entry.
The Modify SNMPv3 Table menu is shown in Figure 152 on page 445.
You can enter either a numeric value in hex format or the equivalent
text name. For example, the OID hex format for TCP/IP is:
1.3.6.1.2.1.6
tcp
I - Included
Enter this value to permit the View Name to see the subtree specified
above.
E - Excluded
Enter this value to not permit the View Name to see the subtree
specified above.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Configure SNMPv3 View Table menu, type 3 to select Modify
SNMPv3 Table Entry.
The Modify SNMPv3 Table menu is shown in Figure 152 on page 445.
7. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 View Table to the configuration file. After making changes
to an SNMPv3 View Table entry with a Volatile storage type, the S -
Save Configuration Changes option does not appear on the Main
Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 View Table to the configuration file. After making changes to
an SNMPv3 View Table entry with a NonVolatile storage type, the S -
Save Configuration Changes option appears on the Main Menu,
allowing you to save your changes. Allied Telesyn recommends this
storage type.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This section contains a description of the SNMPv3 Access Table and how
to create, delete, and modify table entries. The SNMPv3 Access Table
allows you to configure a security group. Each user must belong to a
security group. After you have configured a security group, use the
SecurityToGroup Table to assign users to security groups. See “Creating
an SNMPv3 SecurityToGroup Table Entry” on page 464.
For each security group, you can assign the following attributes:
Before you begin this procedure, you will need to configure entries in the
View Table. These values are used to configure the Read, Write, and
Notify View parameters in this procedure. See “Configuring the SNMPv3
View Table” on page 440.
There are three functions you can perform with the SNMPv3 Access
Table.
Creating an To create an entry in the SNMPv3 Access Table, perform the following
SNMPv3 Access procedure.
Table Entry 1. Follow steps 1 through 5 in the procedure described in “Creating an
SNMPv3 User Table Entry” on page 430. Or, from the Main Menu type
5->1->1->8->5.
U - Update Display
R - Return to Previous Menu
4. Enter a descriptive name of the group. The Group Name can consist of
up to 32 alphanumeric characters.
You are not required to enter a unique value here because the
SNMPv3 Access Table entry is index with the Group Name, Security
Model, and Security Level parameter values. However, unique group
names allow you to more easily distinguish the groups.
Note
The Context Prefix and the Context Match fields are a read only
fields. The Context Prefix field is always set to null. The Context
Match field is always set to exact.
5. Select one of the following SNMP protocols as the Security Model for
this Group Name.
1-v1
Select this value to associate the Group Name with the SNMPv1
protocol.
2-v2c
Select this value to associate the Group Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the Group Name with the SNMPv3
protocol. The SNMPv3 protocol allows you to configure the group to
authenticate SNMPv3 entities (users) and encrypt messages.
The following prompt is displayed:
N-NoAuthNoPriv
This option represents no authentication and no privacy protocol.
Select this security level if you do not want to authenticate SNMP
entities and you do not want to encrypt messages using a privacy
protocol. This security level provides the least security.
Note
If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the
only security level you can select.
A-AuthNoPriv
This option represents authentication, but no privacy protocol. Select
this security level if you want to authenticate SNMP users, but you do
not want to encrypt messages using a privacy protocol.You can select
this value if you configured the Security Model parameter with the
SNMPv3 protocol.
P-AuthPriv
This option represents authentication and the privacy protocol. Select
this security level to encrypt messages using a privacy protocol and
authenticate SNMP entities. This level provides the greatest level of
security. You can select this value if you configured the Security Model
parameter with the SNMPv3 protocol.
7. Enter a value that you configured with the View Name parameter in the
SNMPv3 View Table.
A Read View Name allows the users assigned to this Group Name to
view the information specified by the View Table entry. This value does
not need to be unique.
8. Enter a value that you configured with the View Name parameter in the
SNMPv3 View Table.
A Write View Name allows the users assigned to this Security Group to
write, or modify, the information in the specified View Table. This value
does not need to be unique.
The following prompt is displayed:
9. Enter a value that you configured with the View Name parameter in the
SNMPv3 View Table.
A Notify View Name allows the users assigned to this Group Name to
send traps permitted in the specified View. This value does not need to
be unique.
10. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Access Table to the configuration file. After making
changes to an SNMPv3 Access Table entry with a Volatile storage
type, the
S - Save Configuration Changes option does not appear on the Main
Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Access Table to the configuration file. After making changes
to an SNMPv3 Access Table entry with a NonVolatile storage type, the
S - Save Configuration Changes option appears on the Main Menu,
allowing you to save your changes. Allied Telesyn recommends this
storage type.
Note
The Row Status parameter is a read-only field. The Active value
indicates the SNMPv3 Access Table entry will take effect
immediately.
11. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an You may want to delete an entry from the SNMPv3 Access Table. After
SNMPv3 Access you delete an SNMPv3 Access Table, there is no way to undelete, or
recover, the entry.
Table Entry
To delete an entry in the SNMPv3 Access Table, perform the following
procedure:
Note
To display a particular Group Name and its associated parameters
from the Configure SNMPv3 Access Table menu, type N to display
the Next Page and P to display the previous page.
1-v1
Select this value to associate the Group Name with the SNMPv1
protocol.
2-v2c
Select this value to associate the Group Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the Group Name with the SNMPv3
protocol. The following prompt is displayed:
N-NoAuthNoPriv
This option represents no authentication and no privacy protocol.
Select this security level if you do not want to authenticate SNMP
entities and you do not want to encrypt messages using a privacy
protocol. This security level provides the least security.
Note
If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the
only security level you can select.
A-AuthNoPriv
This option represents authentication, but no privacy protocol. Select
this security level if you want to authenticate SNMP users, but you do
not want to encrypt messages using a privacy protocol.You can select
this value if you configured the Security Model parameter with the
SNMPv3 protocol.
P-AuthPriv
This option represents authentication and the privacy protocol. Select
this security level to encrypt messages using a privacy protocol and
authenticate SNMP entities. This level provides the greatest level of
security. You can select this value if you configured the Security Model
parameter with the SNMPv3 protocol.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Configure the values of the Read View Name, Write View Name, and
Notify View Name parameters with values previously configured with the
View Name parameter in the SNMPv3 View Table. This is the only way to
associate a Group Name with these Views. See “Creating an SNMPv3
View Table Entry” on page 440.
U - Update Display
R - Return to Previous Menu
4. To modify the Read View Name parameter, type 1 to select Set Read
View Name.
6. Enter the Security Model configured for this Group Name. You cannot
change the value of the Security Model parameter.
1-v1
Select this value to associate the Group Name with the SNMPv1
protocol.
2-v2c
Select this value to associate the Group Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the Group Name with the SNMPv3
protocol.
N-NoAuthNoPriv
This option represents no authentication and no privacy protocol.
Select this security level if you do not want to authenticate SNMP
entities and you do not want to encrypt messages using a privacy
protocol. This security level provides the least security.
Note
If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the
only security level you can select.
A-AuthNoPriv
This option represents authentication, but no privacy protocol. Select
this security level if you want to authenticate SNMP users, but you do
not want to encrypt messages using a privacy protocol.You can select
this value if you configured the Security Model parameter with the
SNMPv3 protocol.
P-AuthPriv
This option represents authentication and the privacy protocol. Select
this security level to encrypt messages using a privacy protocol and
authenticate SNMP entities. This level provides the greatest level of
security. You can select this value if you configured the Security Model
parameter with the SNMPv3 protocol.
8. Enter a value that you configured with the View Name parameter in the
SNMPv3 View Table. See “Creating an SNMPv3 View Table Entry” on
page 440.
A Read View Name allows the users assigned to this Security Group to
view the information specified in the View Table. This value does not
need to be unique.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The Modify SNMPv3 Table menu is shown in Figure 154 on page 456.
4. To modify the Write View Name parameter, type 2 to select Set Write
View Name.
6. Enter the Security Model configured for this Group Name. You cannot
change the value of the Security Model parameter.
2-v2c
Select this value to associate the Group Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the Group Name with the SNMPv3
protocol.
7. Enter the Security Level configured for this Group Name. You cannot
change the value of the Security Level parameter.
N-NoAuthNoPriv
This option represents no authentication and no privacy protocol.
Select this security level if you do not want to authenticate SNMP
entities and you do not want to encrypt messages using a privacy
protocol. This security level provides the least security.
Note
If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the
only security level you can select.
A-AuthNoPriv
This option represents authentication, but no privacy protocol. Select
this security level if you want to authenticate SNMP users, but you do
not want to encrypt messages using a privacy protocol.You can select
this value if you configured the Security Model parameter with the
SNMPv3 protocol.
P-AuthPriv
This option represents authentication and the privacy protocol. Select
this security level to encrypt messages using a privacy protocol and
authenticate SNMP entities. This level provides the greatest level of
security. You can select this value if you configured the Security Model
parameter with the SNMPv3 protocol.
The following prompt is displayed:
8. Enter a value that you configured with the View Name parameter in the
SNMPv3 View Table.
A Write View Name allows the people assigned to this Security Group
to write, or modify, to the information in the specified View Table. This
value does not need to be unique.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The Modify SNMPv3 Table menu is shown in Figure 154 on page 456.
4. To modify the Notify View Name parameter, type 3 to select Set Notify
View Name.
6. Enter the Security Model configured for this Group Name. You cannot
change the value of the Security Model parameter.
2-v2c
Select this value to associate the Group Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the Group Name with the SNMPv3
protocol.
7. Enter the Security Level configured for this Group Name. You cannot
change the value of the Security Level parameter.
N-NoAuthNoPriv
This option represents no authentication and no privacy protocol.
Select this security level if you do not want to authenticate SNMP
entities and you do not want to encrypt messages using a privacy
protocol. This security level provides the least security.
Note
If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the
only security level you can select.
A-AuthNoPriv
This option represents authentication, but no privacy protocol. Select
this security level if you want to authenticate SNMP users, but you do
not want to encrypt messages using a privacy protocol.You can select
this value if you configured the Security Model parameter with the
SNMPv3 protocol.
P-AuthPriv
This option represents authentication and the privacy protocol. Select
this security level to encrypt messages using a privacy protocol and
authenticate SNMP entities. This level provides the greatest level of
security. You can select this value if you configured the Security Model
parameter with the SNMPv3 protocol.
The following prompt is displayed:
8. Enter a value that you configured with the View Name parameter in the
SNMPv3 View Table.
A Notify View Name permits the users assigned to this Security Group
to send traps specified in this view of the MIB tree. This value does not
need to be unique.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The Modify SNMPv3 Table menu is shown in Figure 154 on page 456.
6. Enter the Security Model configured for this Group Name. You cannot
change the value of the Security Model parameter.
1-v1
Select this value to associate the Group Name with the SNMPv1
protocol.
2-v2c
Select this value to associate the Group Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the Group Name with the SNMPv3
protocol.
7. Enter the Security Level configured for this Group Name. You cannot
change the value of the Security Level parameter.
N-NoAuthNoPriv
This option represents no authentication and no privacy protocol.
Select this security level if you do not want to authenticate SNMP
entities and you do not want to encrypt messages using a privacy
protocol. This security level provides the least security.
Note
If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the
only security level you can select.
A-AuthNoPriv
This option represents authentication, but no privacy protocol. Select
this security level if you want to authenticate SNMP users, but you do
not want to encrypt messages using a privacy protocol.You can select
this value if you configured the Security Model parameter with the
SNMPv3 protocol.
P-AuthPriv
This option represents authentication and the privacy protocol. Select
this security level to encrypt messages using a privacy protocol and
authenticate SNMP entities. This level provides the greatest level of
security. You can select this value if you configured the Security Model
parameter with the SNMPv3 protocol. The following prompt is
displayed:
8. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Access Table to the configuration file. After making
changes to an SNMPv3 Access Table entry with a Volatile storage
type, the S - Save Configuration Changes option does not appear on
the Main Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Access Table to the configuration file. After making changes
to an SNMPv3 Access Table entry with a NonVolatile storage type, the
S - Save Configuration Changes option appears on the Main Menu,
allowing you to save your changes. Allied Telesyn recommends this
storage type.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
There are three functions you can perform with the SNMPv3 Access
Table.
N - Next Page
U - Update Display
R - Return to Previous Menu
4. Enter the User Name that you want to associate with a group.
5. Select the SNMP protocol that was configured for this User Name.
1-v1
Select this value to associate the Group Name with the SNMPv1
protocol.
2-v2c
Select this value to associate the Group Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the Group Name with the SNMPv3
protocol.
6. Enter a Group Name that you configured in the SNMPv3 Access Table.
See “Creating an SNMPv3 Access Table Entry” on page 449.
defaultV1GroupReadOnly
defaultV1GroupReadWrite
defaultV2cGroupReadOnly
defaultV2cGroupReadWrite
These values are reserved for SNMPv1 and SNMPv2c
implementations.
7. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 SecurityToGroup Table to the configuration file. After
making changes to an SNMPv3 SecurityToGroup Table entry with a
Volatile storage type, the S - Save Configuration Changes option does
not appear on the Main Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 SecurityToGroup Table to the configuration file. After making
changes to an SNMPv3 SecurityToGroup Table entry with a
NonVolatile storage type, the S - Save Configuration Changes option
appears on the Main Menu, allowing you to save your changes. Allied
Telesyn recommends this storage type.
Note
The Row Status parameter is a read-only field. The Active value
indicates the SNMPv3 SecurityToGroup Table entry will take effect
immediately.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an You may want to delete an entry from the SNMPv3 SecurityToGroup
SNMPv3 Table. When you delete an SNMPv3 SecurityToGroup Table entry, there
is no way to undelete, or recover, the entry.
SecurityToGroup
Table Entry To delete an entry in the SNMPv3 SecurityToGroup Table, perform the
following procedure:
Note
To display a Group Name and its associated parameters from the
Configure SNMPv3 SecurityToGroup Table menu, type N to display
the Next Page and P to display the previous page.
1-v1
Select this value to associate the Group Name with the SNMPv1
protocol.
2-v2c
Select this value to associate the Group Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the Group Name with the SNMPv3
protocol.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
N - Next Page
U - Update Display
R - Return to Previous Menu
6. Enter the Security Model configured for this User Name. You cannot
change the value of the Security Model parameter.
1-v1
Select this value if this User Name is configured with the SNMPv1
protocol.
2-v2c
Select this value to associate the User Name with the SNMPv2c
protocol.
3-v3
Select this value to associate the User Name with the SNMPv3
protocol.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
6. Enter the Security Model configured for this User Name. You cannot
change the value of the Security Model parameter.
1-v1
Select this value if this User Name is configured with the SNMPv1
protocol.
2-v2c
Select this value if this User Name is configured with the SNMPv2c
protocol.
3-v3
Select this value if this User Name is configured with the SNMPv3
protocol.
7. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 SecurityToGroup Table to the configuration file. After
making changes to an SNMPv3 SecurityToGroup Table entry with a
Volatile storage type, the S - Save Configuration Changes option does
not appear on the Main Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 SecurityToGroup Table to the configuration file. After making
changes to an SNMPv3 SecurityToGroup Table entry with a
NonVolatile storage type, the S - Save Configuration Changes option
appears on the Main Menu, allowing you to save your changes. Allied
Telesyn recommends this storage type.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This section contains a description of the SNMPv3 Notify Table menu and
how to create, delete, and modify table entries. The Configure SNMPv3
Notify Table menu allows you to define a name for sending traps. For each
Notify Name, you define if a trap or inform message ia sent. The two
message types, trap and inform, have different packet formats.
Notify Name
Notify Tag
Notify Type
Storage Type
The value of the Notify Tag is linked with the Tag List parameter in the
Configure SNMPv3 Target Address Table menu. As a result, the Notify
Tag parameter assigns a Target IP address to the Notify Table internally.
There are three functions you can perform with the Configure SNMPv3
Notify Table menu.
Creating an To create an entry in the SNMPv3 Notify Table menu, perform the
SNMPv3 Notify following procedure.
Table Entry 1. Follow steps 1 through 5 in the procedure described in “Creating an
SNMPv3 User Table Entry” on page 430. Or, from the Main menu type
5->1->1->8->5.
U - Update Display
R - Return to Previous Menu
T-Trap
Indicates this notify table is used to send traps. With this message
type, the switch does not expects a response from the host.
I-Inform
Indicates this notify table is used to send inform messages. With this
message type, the switch expects a response from the host.
7. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Notify Table to the configuration file. After making
changes to an SNMPv3 Notify Table entry with a Volatile storage type,
the
S - Save Configuration Changes option does not appear on the Main
Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Notify Table to the configuration file. After making changes to
an SNMPv3 Notify Table entry with a NonVolatile storage type, the S -
Save Configuration Changes option appears on the Main Menu,
allowing you to save your changes. Allied Telesyn recommends this
storage type.
Note
The Row Status parameter is a read-only field. The Active value
indicates the SNMPv3 Notify Table entry takes effect immediately.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an You may want to delete an entry from the Configure SNMPv3 Notify Table
SNMPv3 Notify menu. When you delete a Configure SNMPv3 Notify Table entry, there is
no way to undelete, or recover, the entry.
Table Entry
To delete an entry in the Configure SNMPv3 Notify Table menu, perform
the following procedure:
Note
To display a Group Name and its associated parameters from the
Configure SNMPv3 SecurityToGroup Table menu, type N to display
the Next Page and P to display the previous page.
5. Enter Y to delete the SNMPv3 Notify Table entry or N to save the entry.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Configure SNMPv3 Notify Table menu, type 3 to select Modify
SNMPv3 Table Entry.
N - Next Page
U - Update Display
R - Return to Previous Menu
Note
To display a Group Name and its associated parameters from the
Configure SNMPv3 SecurityToGroup Table menu, type N to display
the Next Page and P to display the previous page.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Configure SNMPv3 Notify Table menu, type 3 to select Modify
SNMPv3 Table Entry.
The Modify SNMPv3 Notify Table is shown in Figure 158 on page 476.
T-Trap
Indicates this notify table is used to send traps. With this message
type, the switch does not expect a response from the host.
I-Inform
Indicates this notify table is used to send inform messages. With this
message type, the switch expects a response from the host.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
3. From the Configure SNMPv3 Notify Table menu, type 3 to select Modify
SNMPv3 Table Entry.
The Modify SNMPv3 Notify Table is shown in Figure 158 on page 476.
6. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Notify Table to the configuration file. After making
changes to an SNMPv3 Notify Table entry with a Volatile storage type,
the
S - Save Configuration Changes option does not appear on the Main
Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Notify Table to the configuration file. After making changes to
an SNMPv3 Notify Table entry with a NonVolatile storage type, the S -
Save Configuration Changes option appears on the Main Menu,
allowing you to save your changes. Allied Telesyn recommends this
storage type.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
For each Target Address Table entry, you can configure the following
parameters:
The values for the Tag List parameter are configured with the Notify Tag
parameter in the Configure SNMPv3 Notify Table. See “Creating an
SNMPv3 Notify Table Entry” on page 472.
There are three functions you can perform with the Configure SNMPv3
Target Address Table menu.
Creating an To create an entry in the Configure SNMPv3 Target Address Table menu,
SNMPv3 Target perform the following procedure.
Address Table 1. Follow steps 1 through 5 in the procedure described in “Creating an
Entry SNMPv3 User Table Entry” on page 430. Or, from the Main Menu type
5->1->1->8->5.
U - Update Display
R - Return to Previous Menu
4. Enter the name of the SNMP manager, or host, that manages the
SNMP activity on your switch.
Enter IP Address:
You can enter a UDP port in the range of 0 to 65,535. The default UDP
port is 162.
8. Enter the number of times the switch will retry, or resend, an Inform
message.
11. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Target Address Table to the configuration file. After
making changes to an SNMPv3 Target Address Table entry with a
Volatile storage type, the S - Save Configuration Changes option does
not appear on the Main Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Target Address Table to the configuration file. After making
changes to an SNMPv3 Target Address entry with a NonVolatile
storage type, the S - Save Configuration Changes option appears on
the Main Menu, allowing you to save your changes. Allied Telesyn
recommends this storage type.
Note
The Row Status parameter is a read-only field. The Active value
indicates the SNMPv3 Target Address Table entry will take effect
immediately.
12. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an You may want to delete an entry from the SNMPv3 Target Address Table.
SNMPv3 Target After you delete an SNMPv3 Target Address Table entry, there is no way
to undelete, or recover, the entry.
Address Table
Entry To delete an entry in the SNMPv3 Target Address Table, perform the
following procedure:
Note
To display a Group Name and its associated parameters from the
Configure SNMPv3 SecurityToGroup Table menu, type N to display
the Next Page and P to display the previous page.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
You cannot modify the Target Address Name parameter.
U - Update Display
R - Return to Previous Menu
This is the name of the SNMP manager, or host, that manages the
SNMP activity on your switch. You can enter a name of up to 32
alphanumeric characters.
The following prompt is displayed:
Enter IP Address:
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
4. To change the Target Address UDP Port, type 2 to select Set Target
Address UDP Port.
This is the name of the SNMP manager, or host, that manages the
SNMP activity on your switch. You can enter a name of up to 32
alphanumeric characters.
You can enter a UDP port in the range of 0 to 65,535. The default UDP
port is 162.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The Target Address Timeout parameter only applies when the message
type is an Inform message. To modify the Target Address Timeout
parameter in an SNMPv3 Target Address Table entry, perform the
following procedure.
This is the name of the SNMP manager, or host, that manages the
SNMP activity on your switch. You can enter a name of up to 32
alphanumeric characters.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The Target Address Retries parameter only applies when the message
type is an Inform message. To modify the Target Address Retries
parameter in an SNMPv3 Target Address Table entry, perform the
following procedure.
This is the name of the SNMP manager, or host, that manages the
SNMP activity on your switch. You can enter a name of up to 32
alphanumeric characters.
6. Enter the number of times the switch will retry, or resend, the Inform
message.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
4. To modify the Target Address Tag List, type 5 to select Set Target
Address TagList.
This is the name of the SNMP manager, or host, that manages the
SNMP activity on your switch. You can enter a name of up to 32
alphanumeric characters.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This is the name of the SNMP manager, or host, that manages the
SNMP activity on your switch. You can enter a name of up to 32
alphanumeric characters.
The value configured here must match the value configured with the
Target Parameters Name parameter in the Configure SNMPv3 Target
Parameters Table. This name can consist of up to 32 alphanumeric
characters.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This is the name of the SNMP manager, or host, that manages the
SNMP activity on your switch. You can enter a name of up to 32
alphanumeric characters.
6. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Target Address Table to the configuration file. After
making changes to an SNMPv3 Target Address Table entry with a
Volatile storage type, the S - Save Configuration Changes option does
not appear on the Main Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Target Address Table to the configuration file. After making
changes to an SNMPv3 Target Address entry with a NonVolatile
storage type, the S - Save Configuration Changes option appears on
the Main Menu, allowing you to save your changes. Allied Telesyn
recommends this storage type.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
In the SNMPv3 Target Parameters Table, the Security Name
parameter is the equivalent to the User Name parameter in the
SNMPv3 User Table.
There are three functions you can perform with the Configure SNMPv3
Target Parameters Table menu.
U - Update Display
R - Return to Previous Menu
Note
You are prompted to enter a value for the Message Processing
Model parameter only if you select SNMPv1 or SNMPv2c as the
Security Model. If you select the SNMPv3 protocol as the Security
Model, then the Message Processing Model is automatically
assigned to SNMPv3.
6. Select one of the following SNMP protocols as the Security Model for
this Security Name, or User Name.
1-v1
Select this value to associate the Security Name, or User Name, with
the SNMPv1 protocol.
2-v2c
Select this value to associate the Security Name, or User Name, with
the SNMPv2c protocol.
3-v3
Select this value to associate the Security Name, or User Name, with
the SNMPv3 protocol. The SNMPv3 protocol allows you to configure
the group to authenticate SNMPv3 entities (users) and to encrypt
messages.
Note
The value you configure for the Security Level must match the value
configured for the User Name in the Configure SNMPv3 User Table
menu. See “Creating an SNMPv3 User Table Entry” on page 430.
N-NoAuthNoPriv
This option represents no authentication and no privacy protocol.
Select this security level if you do not want to authenticate SNMP
entities and you do not want to encrypt messages using a privacy
protocol. This security level provides the least security.
Note
If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the
only security level you can select.
A-AuthNoPriv
This option represents authentication, but no privacy protocol. Select
this security level if you want to authenticate SNMP users, but you do
not want to encrypt messages using a privacy protocol.You can select
this value if you configured the Security Model parameter with the
SNMPv3 protocol.
P-AuthPriv
This option represents authentication and the privacy protocol. Select
this security level to encrypt messages using a privacy protocol and
authenticate SNMP entities. This level provides the greatest level of
security. You can select this value if you configured the Security Model
parameter with the SNMPv3 protocol.
8. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Target Parameters Table to the configuration file. After
making changes to an SNMPv3 Target Parameters Table entry with a
Volatile storage type, the S - Save Configuration Changes option does
not appear on the Main Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Target Parameters Table to the configuration file. After
making changes to an SNMPv3 Target Parameters Table entry with a
NonVolatile storage type, the S - Save Configuration Changes option
appears on the Main Menu, allowing you to save your changes. Allied
Telesyn recommends this storage type.
Note
The Row Status parameter is a read-only field. The Active value
indicates the SNMPv3 Target Parameters Table entry will take effect
immediately.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an You may want to delete an entry from the SNMPv3 Target Parameters
SNMPv3 Target Table. When you delete an SNMPv3 Target Parameters Table entry, there
is no way to undelete, or recover, the entry.
Parameters Table
Entry To delete an entry in the SNMPv3 Target Parameters Table, perform the
following procedure:
Note
To display a Group Name and its associated parameters from the
Configure SNMPv3 SecurityToGroup Table menu, type N to display
the Next Page and P to display the previous page.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
You cannot modify the Target Params Name parameter.
Note
You cannot modify an entry in the SNMPv3 Target Parameter Table
that contains a value of “default” in the Target Parameters Name
field.
When you modify the Security Name parameter, you must use a value that
you configured with the User Name parameter in the Configure SNMPv3
User Table menu. If you do not use a value configured with the User
Name parameter, messages are not sent on behalf of this User Name.
See “Creating an SNMPv3 User Table Entry” on page 430.
U - Update Display
R - Return to Previous Menu
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
For the Security or User Name you have selected, the value of the
Security Model parameter in an SNMPv3 Target Parameter Table entry
must match the value of the Security Model parameter in the SNMPv3
Access Table entry.
Caution
If the values of the Security Model parameter in the SNMPv3 User
Table and the SNMPv3 Target Parameter Table entry do not match,
notification messages are not generated on behalf of this User
(Security) Name.
1-v1
Select this value if this User Name is associated with the SNMPv1
protocol.
2-v2c
Select this value if this User Name is associated with the SNMPv2c
protocol.
3-v3
Select this value if this User Name is associated with the SNMPv3
protocol.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
For the Security or User Name you have selected, the value of the
Security Level parameter in an SNMPv3 Target Parameter Table entry
must match the value of the Security Level parameter in the SNMPv3 User
Table entry.
5->1->1->8->5.
Note
The value you configure for the Security Level must match the value
configured for the User Name in the Configure SNMPv3 User Table
menu. See “Creating an SNMPv3 User Table Entry” on page 430.
N-NoAuthNoPriv
This option represents no authentication and no privacy protocol.
Select this security level if you do not want to authenticate SNMP
entities and you do not want to encrypt messages using a privacy
protocol. This security level provides the least security.
Note
If you have selected SNMPv1 or SNMPv2c, N-NoAuthNoPriv is the
only security level you can select.
A-AuthNoPriv
This option represents authentication, but no privacy protocol. Select
this security level if you want to authenticate SNMP users, but you do
not want to encrypt messages using a privacy protocol.You can select
this value if you configured the Security Model parameter with the
SNMPv3 protocol.
P-AuthPriv
This option represents authentication and the privacy protocol. Select
this security level to encrypt messages using a privacy protocol and
authenticate SNMP entities. This level provides the greatest level of
security. You can select this value if you configured the Security Model
parameter with the SNMPv3 protocol.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
You can modify the Message Process Model for SNMPv1 and SNMPv2c
protocol configurations only. When you configure the SNMPv3 protocol,
the Message Process Model is automatically assigned to the SNMPv3
protocol.
1-v1
Select this value to process messages with the SNMPv1 protocol.
2-v2c
Select this value to process messages with the Security Name, or User
Name, with the SNMPv2c protocol.
3-v3
Select this value to process messages with the SNMPv3 protocol.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
6. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Target Parameters Table to the configuration file. After
making changes to an SNMPv3 Target Parameters Table entry with a
Volatile storage type, the S - Save Configuration Changes option does
not appear on the Main Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Target Parameters Table to the configuration file. After
making changes to an SNMPv3 Target Parameters Table entry with a
NonVolatile storage type, the S - Save Configuration Changes option
appears on the Main Menu, allowing you to save your changes. Allied
Telesyn recommends this storage type.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Allied Telesyn does not recommend that you use the menu described in
this section to configure SNMPv1 and SNMPv2c communities. Instead,
use the procedures described in “Enabling or Disabling SNMP
Management” on page 99.
Note that you do not create an entry in the SNMPv3 User Table when you
are configuring SNMPv1 and SNMPv2c with the SNMPv3 Tables. When
you configure the SNMPv3 protocol, the various tables are linked with the
User Name parameter and its related information. With the SNMPv1 and
SNMPv2c configuration, the Security Name parameter and its related
information (configured in the SNMPv3 Community Table menu) links an
SNMPv3 Community Table entry to the other SNMPv3 Table entries.
Note
In the SNMPv3 Community Table entry, the Security Name
parameter is not related to the User Name parameter.
For each SNMPv3 Community Table entry, you can configure the
following parameters:
Community Index
Community Name
Security Name
Transport Tag
Storage Type
In addition, you can display the entries configured with the Configure
SNMPv1 & SNMPv2c Community menu in the Configure SNMPv3
Community Table menu. However, you cannot modify an SNMPv1 &
SNMPv2c Community Table entry with the Configure SNMPv3
Community Table menu.
There are three functions you can perform with the Configure SNMPv3
Target Parameters Table menu.
N - Next Page
U - Update Display
R - Return to Previous Menu
Note
Allied Telesyn recommends that you select SNMP Community
Names carefully to ensure these names are known only to
authorized personnel.
Note
Do not use a value configured with the User Name parameter in the
SNMPv3 User Table.
8. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to save an entry in
the SNMPv3 Community Table to the configuration file. After making
changes to an SNMPv3 Community Table entry with a Volatile storage
type, the S - Save Configuration Changes option does not appear on
the Main Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Community Table to the configuration file. After making
changes to an SNMPv3 Community Table entry with a NonVolatile
storage type, the S - Save Configuration Changes option appears on
the Main Menu, allowing you to save your changes. Allied Telesyn
recommends this storage type.
Note
The Row Status parameter is a read-only field. The Active value
indicates the SNMPv3 Community Table entry takes effect
immediately.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an You may want to delete an entry from the SNMPv3 Community Table.
SNMPv3 When you delete an entry in the SNMPv3 Community Table, there is no
way to undelete or recover the entry.
Community
Table Entry To delete an entry in the SNMPv3 Community Table, perform the following
procedure:
Y
Type Y to delete an SNMPv3 Community table entry.
N
Type N to retain the SNMPv3 Community table entry.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Modifying an For each entry in the SNMPv3 Community Table, you can modify the
SNMPv3 following parameters:
Community Community Name
Table Entry Security Name
Transport Tag
Storage Type
N - Next Page
U - Update Display
R - Return to Previous Menu
Note
Allied Telesyn recommends that you select SNMP Community
Names carefully to ensure these names are known only to
authorized personnel.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
5. Enter the Community Index of the Security Name you want to change.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
5. Enter the Community Index of the Transport Tag you want to change.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
5. Enter the Community Index of the Storage Type you want to change.
6. Select one of the following storage types for this table entry:
V - Volatile
Select this storage type if you do not want the ability to an entry in the
SNMPv3 Community Table to the configuration file. After making
changes to an SNMP Community Table entry with a Volatile storage
type, the
S - Save Configuration Changes option does not appear on the Main
Menu.
N-NonVolatile
Select this storage type if you want the ability to save an entry in the
SNMPv3 Community Table to the configuration file. After making
changes to an SNMPv3 Community Table entry with a NonVolatile
storage type, the S - Save Configuration Changes option appears on
the Main Menu, allowing you to save your changes. Allied Telesyn
recommends this storage type.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Displaying the This section describes how to display the Display SNMPv3 User Table
Display SNMPv3 menu. For information about the SNMPv3 User Table, see “Creating an
SNMPv3 User Table Entry” on page 430.
User Table Menu
To display the Display SNMPv3 User Table menu, perform the following
procedure.
N - Next Page
U - Update Display
R - Return to Previous Menu
Displaying the This section describes how to display the Display SNMPv3 View Table
Display SNMPv3 menu. For information about the SNMPv3 View Table parameters, see
“Creating an SNMPv3 View Table Entry” on page 440.
View Table Menu
To display the Display SNMPv3 View Table menu, perform the following
procedure.
Display SNMPv3 User Table Menu” on page 515. Or, from the Main
menu type 5->1->1->8->6.
N - Next Page
U - Update Display
R - Return to Previous Menu
Displaying the This section describes how to display the Display SNMPv3 Access Table
Display SNMPv3 menu. For information about the SNMPv3 Access Table parameters, see
“Creating an SNMPv3 Access Table Entry” on page 449.
Access Table
Menu To display the Display SNMPv3 Access Table menu, perform the following
procedure.
N - Next Page
U - Update Display
R - Return to Previous Menu
Displaying the This section describes how to display the Display SNMPv3
Display SNMPv3 SecurityToGroup Table menu. For more information about the parameters
in the SNMPv3 SecurityToGroup Table menu, see “Creating an SNMPv3
SecurityToGroup SecurityToGroup Table Entry” on page 464.
Table Menu
To display the Display SNMPv3 SecurityToGroup Table menu, perform
the following procedure.
N - Next Page
U - Update Display
R - Return to Previous Menu
Displaying the This section describes how to display the Display SNMPv3 Notify Table
Display SNMPv3 menu. For information about the SNMPv3 Notify Table parameters, see
“Creating an SNMPv3 Notify Table Entry” on page 472.
Notify Table
Menu To display the Display SNMPv3 Notify Table menu, perform the following
procedure.
N - Next Page
U - Update Display
R - Return to Previous Menu
Displaying the This section describes how to display the Display SNMPv3 Target
Display SNMPv3 Address Table menu. For information about the SNMPv3 Target Address
Table parameters, see “Creating an SNMPv3 Target Address Table Entry”
Target Address on page 479.
Table Menu
To display the Display SNMPv3 Target Address Table menu, perform the
following procedure.
U - Update Display
R - Return to Previous Menu
Displaying the This section describes how to display the Display SNMPv3 Target
Display SNMPv3 Parameters Table menu. For information about the SNMPv3 Target
Parameters Table parameters, see “Creating an SNMPv3 Target
Target Parameters Table Entry” on page 493.
Parameters Table
Menu To display the Display SNMPv3 Target Parameters Table menu, perform
the following procedure.
U - Update Display
R - Return to Previous Menu
Displaying the This section describes how to display the Display SNMPv3 Community
Display SNMPv3 Table menu. For information about the SNMPv3 Community Table
parameters, see “Creating an SNMPv3 Community Table Entry” on
Community page 506.
Table Menu
To display the Display SNMPv3 Community Table menu, perform the
following procedure.
U - Update Display
R - Return to Previous Menu
Note
For detailed information on the Spanning Tree Protocol, refer to
IEEE Std 802.1D. For detailed information on the Rapid Spanning
Tree Protocol, refer to IEEE Std 802.1w.
STP and RSTP prevent data loops from forming by ensuring that only one
path exists between the end nodes in your network. Where multiple paths
exist, these protocols place the extra paths in a standby or blocking mode,
leaving only one main active path.
STP and RSTP can also activate a redundant path if the main path goes
down. So not only do these protocols guard against multiple links between
segments and the risk of broadcast storms, but they can also maintain
network connectivity by activating a backup redundant path in case a main
link fails.
Where the two protocols differ is in the time each takes to complete the
process referred to as convergence. When a change is made to the
network topology, such as the addition of a new bridge, a spanning tree
protocol must determine whether there are redundant paths that must be
blocked to prevent data loops, or activated to maintain communications
between the various network segments. This is the process of
convergence.
Only one spanning tree can be active on the switch at a time. The default
is RSTP.
Bridge Priority The first task that bridges perform when a spanning tree protocol is
and the Root activated on a network is the selection of a root bridge. A root bridge
distributes network topology information to the other network bridges and
Bridge is used by the other bridges to determine if there are redundant paths in
the network.
You can change the bridge priority number in the AT-S63 management
software. You can designate which switch on your network you want as
the root bridge by giving it the lowest bridge priority number. You might
also consider which bridge should function as the backup root bridge in the
event you need to take the primary root bridge offline, and assign that
bridge the second lowest bridge identifier number.
Bridge Bridge
Increment Increment
Priority Priority
0 0 8 32768
1 4096 9 36864
2 8192 10 40960
3 12288 11 45056
4 16384 12 49152
5 20480 13 53248
6 24576 14 57344
7 28672 15 61440
After the root bridge has been selected, the bridges must determine if the
network contains redundant paths and, if one is found, they must select a
preferred path while placing the redundant paths in a backup or blocking
state.
Where there is only one path between a bridge and the root bridge, the
bridge is referred to as the designated bridge and the port through which
the bridge is communicating with the root bridge is referred to as the root
port.
If redundant paths exist, the bridges that are a part of the paths must
determine which path will be the primary, active path, and which path(s)
will be placed in the standby, blocking mode. This is accomplished by an
determination of path costs. The path offering the lowest cost to the root
bridge becomes the primary path and all other redundant paths are placed
into blocking state.
Path cost is simply the sum of the port costs between a bridge and the root
bridge.
Port cost also has an Auto-Detect feature. This feature allows spanning
tree to automatically set the port cost according to the speed of the port,
assigning a lower value for higher speeds. Auto-Detect is the default
setting. Table 13 lists the STP port costs with Auto-Detect.
10 Mbps 100
100 Mbps 10
1000 Mbps 4
Table 12 lists the STP port costs with Auto-Detect when a port is part of a
port trunk.
10 Mbps 4
100 Mbps 4
1000 Mbps 2
10 Mbps 2,000,000
100 Mbps 200,000
1000 Mbps 20,000
Table 14 lists the RSTP port costs with Auto-Detect when the port is part
of a port trunk.
10 Mbps 20,000
100 Mbps 20,000
1000 Mbps 2,000
You can override Auto-Detect and set the port cost manually.
Port Priority
If two paths have the same port cost, the bridges must select a preferred
path. In some instances this can involve the use of the port priority
parameter. This parameter is used as a tie breaker when two paths have
the same cost.
The range for port priority is 0 to 240. As with bridge priority, this range is
broken into increments, in this case multiples of 16. To select a port priority
for a port, you enter the increment of the desired value. Table 15 lists the
values and increments. The default value is 128, which is increment 8.
Bridge Bridge
Increment Increment
Priority Priority
0 0 8 128
1 16 9 144
2 32 10 160
3 48 11 176
4 64 12 192
Bridge Bridge
Increment Increment
Priority Priority
5 80 13 208
6 96 14 224
7 112 15 240
It might take time for the root bridge to notify all bridges that a topology
change has occurred, especially if it is a large network. If a topology
change is made before all bridges have been notified, a temporary data
loop could occur, and that could adversely impact network performance.
Note
The forwarding delay parameter applies only to ports on the switch
that are operating STP-compatible mode.
The bridges that are part of a spanning tree domain communicate with
each other using a bridge broadcast frame that contains a special section
devoted to carrying STP or RSTP information. This portion of the frame is
referred to as the bridge protocol data unit (BPDU). When a bridge is
Note
This section applies only to RSTP.
Part of the task of configuring RSTP is defining the port types on the
bridge. This relates to the device(s) connected to the port. With the port
types defined, RSTP can reconfigure a network much quicker than STP
when a change in network topology is detected.
Point-to-point port
Edge port
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Point-to-Point Ports
(Full-duplex Mode)
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Edge Port
1 2 3 4
1 2 3 4 5 6 7 8 5 6 7 8
A port can be both a point-to-point and an edge port at the same time. It
operates in full-duplex and has no STP or RSTP devices connected to it.
Figure 176 illustrates a port functioning as both a point-to-point and edge
port.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Workstation
(Full-duplex Mode)
Mixed STP and RSTP IEEE 802.1w is fully compliant with STP IEEE 802.1d. Your network
RSTP Networks can consist of bridges running both protocols. STP and RSTP in the same
network can operate together to create a single spanning tree domain.
Spanning Tree The spanning tree implementation in the AT-S63 management software is
and VLANs a single-instance spanning tree. The switch supports just one spanning
tree. You cannot define multiple spanning trees.
The single spanning tree encompasses all ports on the switch. If the ports
are divided into different VLANs, the spanning tree crosses the VLAN
boundaries. This point can pose a problem in networks containing multiple
VLANs that span different switches and are connected with untagged
ports. In this situation, STP blocks a data link because it detects a data
loop. This can cause fragmentation of your VLANs.
This issue is illustrated in Figure 177. Two VLANs, Sales and Production,
span two AT-9400 Series switches. Two links consisting of untagged ports
connect the separate parts of each VLAN. If STP or RSTP is activated on
the switches, one of the links is disabled. In the example, the port on the
top switch that links the two parts of the Production VLAN is changed to
the block state. This leaves the two parts of the Production VLAN unable
to communicate with each other.
Sales Production
VLAN VLAN
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Blocked Port
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Sales Production
VLAN VLAN
Note
Do not enable spanning tree on the switch until after you have
selected an activate spanning tree protocol and configured the
settings. If you want to disable spanning tree, go to step 5.
Note
A change to the active spanning tree is automatically saved on the
switch.
Note
After you have configured the spanning tree parameters, perform
steps 5 through 7 to enable spanning tree.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Configuring STP
Configuring STP This section contains the procedure for configuring a bridge’s STP
Bridge Settings settings.
Caution
The default STP parameters are adequate for most networks.
Changing them without prior experience and an understanding of
how STP works might have a negative effect on your network. You
should consult the IEEE 802.1d standard before changing any of the
STP parameters.
1 - Bridge Priority
The priority number for the bridge. This number is used to determine
the root bridge for RSTP. The bridge with the lowest priority number is
selected as the root bridge. If two or more bridges have the same
priority value, the bridge with the numerically lowest MAC address
becomes the root bridge. When a root bridge goes offline, the bridge
with the next priority number automatically takes over as the root
bridge. This parameter can be from 0 (zero) to 61,440 in increments of
4096, with 0 being the highest priority. For a list of the increments,
refer to Table 10, Bridge Priority Value Increments on page 527.
3 - Bridge Forwarding
The waiting period in seconds before a bridge changes to a new state,
for example, becomes the new root bridge after the topology changes.
If the bridge transitions too soon, not all links may have yet adapted to
the change, resulting in network loops. The range is 4 to 30 seconds.
The default is 15 seconds.
When you select a value for maximum age, observe the following
rules:
Note
The aging time for BPDUs is different from the aging time used by
the MAC address table.
5 - Bridge Identifier
The MAC address of the switch. This value cannot be changed.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Configuring STP To adjust STP port parameters, perform the following procedure:
Port Settings
1. From the Main Menu, type 3 to select Spanning Tree Configuration.
6. To configure just one port, enter the same port number here as you
entered in the previous step. To configure a range of ports, enter the
last port of the range.
Note
A change to the port priority parameter takes effect immediately. A
change to the port cost value requires you to reset the switch. A new
port cost value is not implemented until the unit is reset.
1 - Port Priority
This parameter is used as a tie breaker when two or more ports are
determined to have equal costs to the root bridge. The range is 0 to
240 in increments of 16. The default value is 8 (priority value 128). For
a list of the increments, refer to Table 15, “Port Priority Value
Increments” on page 529.
2 - Port Cost
The spanning tree algorithm uses the cost parameter to decide which
port provides the lowest cost path to the root bridge for that LAN. The
range is 0 to 65,535. The default setting is Automatic Update, which
sets port cost depending on the speed of the port. The Automatic
Update default values are shown in Table 11 on page 528 andTable 12
on page 528.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Displaying STP To display STP port settings, perform the following procedure:
Port Settings
1. From the Main Menu, type 3 to select Spanning Tree Configuration.
The STP Port Parameters menu is shown in Figure 180 on page 539.
4. From the STP Port Parameters menu, type 2 to select Display STP
Port Configuration.
N - Next Page
U - Update Display
R - Return to Previous Menu
Port
The port number.
State
Current state of the port. The possible states are Enabled or Disabled.
Cost
Port cost of the port. The default is Auto-Update.
Priority
The number used as a tie breaker when two or more ports have equal
costs to the root bridge.
Resetting STP to To reset STP to the default settings, perform the following procedure:
the Default
1. From the Main Menu, type 3 to select Spanning Tree Configuration.
Settings
The Spanning Tree Configuration menu is shown in Figure 178 on
page 535.
Configuring RSTP
Configuring This section contains the procedure for configuring a bridge’s RSTP
RSTP Bridge settings.
Settings
Caution
The default RSTP parameters are adequate for most networks.
Changing them without prior experience and an understanding of
how RSTP works might have a negative effect on your network. You
should consult the IEEE 802.1w standard before changing any of the
RSTP parameters.
1 - Force Version
This selection determines whether the bridge operates with RSTP or in
an STP-compatible mode. If you select RSTP, the bridge operates all
ports in RSTP, except for those ports that receive STP BPDU packets.
If you select Force STP Compatible, the bridge operates in RSTP,
using the RSTP parameter settings, but it sends only STP BPDU
packets out the ports.
2 - Bridge Priority
The priority number for the bridge. This number is used in determining
the root bridge for RSTP. The bridge with the lowest priority number is
selected as the root bridge. If two or more bridges have the same
priority value, the bridge with the numerically lowest MAC address
becomes the root bridge. When a root bridge goes off-line, the bridge
with the next priority number automatically takes over as the root
bridge. This parameter can be from 0 (zero) to 61,440 in increments of
4096, with 0 being the highest priority. For a list of the increments,
refer to Table 10, “Bridge Priority Value Increments” on page 527.
4 - Bridge Forwarding
The waiting period before a bridge changes to a new state, for
example, becomes the new root bridge after the topology changes. If
the bridge transitions too soon, not all links may have yet adapted to
the change, possibly resulting in a network loop. The range is 4 to 30
seconds. The default is 15 seconds. This setting applies only to ports
running in the STP-compatible mode.
5 - Bridge Max Age
The length of time after which stored bridge protocol data units
(BPDUs) are deleted by the bridge. All bridges in a bridged LAN use
this aging time to test the age of stored configuration messages called
bridge protocol data units (BPDUs). For example, if you use the default
20, all bridges delete current configuration messages after 20
seconds. This parameter can be from 6 to 40 seconds. The default is
20 seconds.
When you select a value for maximum age, observe the following
rules:
6 - Bridge Identifier
The MAC address of the bridge. The bridge identifier is used as a tie
breaker in the selection of the root bridge when two or more bridges
have the same bridge priority value. This value cannot be changed.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
7. To configure just one port, enter the same port number here as you
entered in the previous step. To configure a range of ports, enter the
last port of the range.
1 - Port Priority
This parameter is used as a tie breaker when two or more ports are
determined to have equal costs to the root bridge. The range is 0 to
240 in increments of 16. The default value is 8 (priority value 128). For
a list of the increments, refer to Table 15, “Port Priority Value
Increments” on page 529.
2 - Port Cost
The spanning tree algorithm uses the cost parameter to decide which
port provides the lowest cost path to the root bridge for that LAN. The
range is 0 to 20,000,000. The default setting is Automatic Update,
which sets port cost depending on the speed of the port. The
Automatic Update default values are shown in Table 13 on page 529
and Table 14 on page 529.
3 - Point-to-Point
This parameter defines whether the port is functioning as a point-to-
point port. The possible settings are Yes, No, and Auto Detect. For an
explanation of this parameter, refer to “Point-to-Point and Edge Ports”
on page 531.
4 - Edge Port
This parameter defines whether the port is functioning as an edge port.
The possible settings are Yes and No. For an explanation of this
parameter, refer to “Point-to-Point and Edge Ports” on page 531.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Displaying the To display the RSTP port configuration, perform the following procedure:
RSTP Port 1. From the Main Menu, type 3 to select Spanning Tree Configuration.
Configuration
The Spanning Tree Configuration menu is shown in Figure 178 on
page 535.
The RSTP Port Parameters menu is shown in Figure 184 on page 545.
4. From the RSTP Port Parameters menu, type 2 to select Display RSTP
Port Configuration.
N - Next Page
U - Update Display
R - Return to Previous Menu
Edge-Port
Whether or not the port is operating as an edge port. The possible
settings are Yes and No.
Point-to-Point
Whether or not the port is functioning as a point-to-point port. The
possible settings are Yes, No, and Auto Detect.
Cost
Port cost of the port. The default is Auto Update.
Priority
The number used as a tie breaker when two or more ports have equal
costs to the root bridge.
Displaying the To display the RSTP port state, perform the following procedure:
RSTP Port State
1. From the Main Menu, type 3 to select Spanning Tree Configuration.
The RSTP Port Parameters menu is shown in Figure 184 on page 545.
4. From the RSTP Port Parameters menu, type 3 to select Display RSTP
Port State.
N - Next Page
U - Update Display
R - Return to Previous Menu
The Display RSTP Port State menu displays a table that contains the
following information:
Port
The port number.
State
The RSTP state of the port. The possible states are:
Disabled - The port has not established a link with its end node.
Role
The RSTP role of the port. Possible roles are:
Root - The port that is connected to the root switch, directly or through
other switches, with the least path cost.
Alternate - The port offers an alternate path in the direction of the root
switch.
Version
Whether the port is operating in RSTP mode or STP-compatible mode.
Port Cost
The port cost of the port.
Resetting RSTP To reset RSTP to the default settings, perform the following procedure:
to the Default
1. From the Main Menu, type 3 to select Spanning Tree Configuration.
Settings
The Spanning Tree Configuration menu is shown in Figure 178 on
page 535.
Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)
are described in Chapter 23, “Spanning Tree and Rapid Spanning Tree
Protocols” on page 525.
MSTP Overview
As explained in “Spanning Tree and VLANs” on page 533, STP and RSTP
can result in VLAN fragmentation where VLANs that span multiple bridges
are connected together with untagged ports. The untagged ports creating
the links can represent a physical loop in the network, which are blocked
by spanning tree. The result can be a loss of communication between
different parts of the same VLAN.
One way to resolve this, other than by not activating spanning tree on your
network, is to link the switches using tagged ports, which can handle traffic
from multiple VLANs simultaneously. The drawback to this approach is
that the link formed by the tagged ports can create a bottleneck to your
Ethernet traffic, resulting in reduced network performance.
The following sections describe some of the terms and concepts relating
to MSTP. If you are not familiar with spanning tree or RSTP, you should
first review “STP and RSTP Overview” on page 526.
Note
Do not activate MSTP on an AT-9400 Series switch without first
familiarizing yourself with the following concepts and guidelines.
Unlike STP and RSTP, you cannot activate this spanning tree
protocol on a switch without first configuring the protocol
parameters.
Note
The AT-S63 MSTP implementation complies fully with the new IEEE
802.1s standard. Any other vendor’s fully compliant 802.1s
implementation is interoperable with the AT-S63 implementation.
To create a MSTI, you first assign it a number, referred to as the MSTI ID.
The range is 1 to 15. (The switch is shipped with a default MSTI with an
MSTI ID of 0. This default spanning tree instance is discussed later in
“Common and Internal Spanning Tree (CIST)” on page 563.)
After you have selected an MSTI ID, you need to define the scope of the
MSTI by assigning one or more VLANs to it. An instance can contain any
number of VLANs, but a VLAN can belong to only one MSTI at a time.
Following are several examples. Figure 188 illustrates two AT-9400 Series
switches, each containing the two VLANs Sales and Production. The two
parts of each VLAN are connected with a direct link using untagged ports
on both switches.
If the switches were running STP or RSTP, one of the links would be
blocked because the links constitute a physical loop. Which link would be
blocked depends on the STP or RSTP bridge settings.
In Figure 188, the link between the two parts of the Production VLAN is
blocked, resulting in a loss of communications between the two parts of
Sales Production
VLAN VLAN
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Blocked Port
Untagged Untagged
Ports Ports
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/GB Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
GBIC GBIC L/A FAULT
GBIC
D/C 1000 LINK / ACT MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Figure 189 illustrates the same two AT-9400 Series switches and the
same two virtual LANs. But in this example, the two switches are running
MSTP and the two VLANs have been assigned different spanning tree
instances. Now that they reside in different MSTIs, both links remain
active, enabling the VLANs to forward traffic over their respective direct
link.
Sales Production
VLAN in VLAN in
MSTI 1 MSTI 2
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Untagged Untagged
Ports Ports
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/GB Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
GBIC GBIC L/A FAULT
GBIC
D/C 1000 LINK / ACT MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
A MSTI can contain more than one VLAN. This is illustrated in Figure 190
where there are two AT-9400 Series switches with four VLANs. There are
two MSTIs, each containing two VLANs. MSTI 1 contains the Sales and
Presales VLANs and MSTI 2 contains the Design and Engineering
VLANs.
MSTI 1 MSTI 2
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Tagged
Tagged
Ports
Ports
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/GB Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
GBIC GBIC L/A FAULT
GBIC
D/C 1000 LINK / ACT MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
In this example, because an MSTI contains more than one VLAN, the links
between the VLAN parts is made with tagged, not untagged, ports so that
they can carry traffic from more than one virtual LAN. Referring again to
Figure 190, the tagged link in MSTI 1 is carrying traffic for both the
Presales and Sales VLANs while the tagged link in MSTI 2 is carrying
traffic for the Design and Engineering VLANs.
MSTI Guidelines Following are several guidelines to keep in mind about MSTIs:
VLAN and MSTI Part of the task to configuring MSTP involves assigning VLANs to
Associations spanning tree instances. The mapping of VLANs to MSTIs is called
associations. A VLAN, either port-based or tagged, can belong to only one
instance at a time, but an instance can contain any number of VLANs.
Ports in Multiple An AT-9400 Series switch allows a port to be a member of more than one
MSTIs MSTI at a time. This can happen if a port is a tagged member of one or
more VLANs and the VLANs are assigned to different MSTI’s. If this
occurs, a port might be required to operate in different spanning tree
states simultaneously, depending on the requirements of the MSTIs. For
example, a port that is a member of two VLANs assigned to two different
MSTIs might operate in the forwarding state in one MSTI and in the
blocking state in the other.
When you configure a port’s MSTI parameter settings you will notice that
the parameters are divided into two groups. The first group is referred to
as generic parameters. These are set just once on a port, regardless of the
number of MSTI’s where a port happens to be a member. One of these
parameters is the external path cost, which sets the operating cost of the
port in situations where it is connected to a device that is outside its region.
A port can have only one external path cost even if it belongs to multiple
MSTI’s. Other generic parameters are used to designate the port as an
edge port or a point-to-point port.
The second group can be applied independently on a port for each MSTI
where the port is a member. One of the parameters is the internal path
cost. This parameter specifies the port’s operating cost if it is connected to
a bridge that is a part of the same MSTP region. You can give a port a
different internal path cost for each MSTI where it is a member. This group
also has a parameter for setting port priority, used as a tie breaker when
two or more ports have equal costs to a regional root bridge. As with the
internal path cost, a port can have a different priority value for each of its
MSTI’s.
The bridges of a particular region must also have the same VLANs. The
names of the VLANs and the VIDs must be same on all bridges of a
region.
Finally, the VLANs in the bridges must be associated to the same MSTIs.
Figure 191 illustrates the concept of regions. It shows one MSTP region
consisting of two AT-9400 Series switches. Each switch in the region has
the same configuration name and revision level. The switches also have
the same five VLANs and the VLANs are associated with the same MSTIs.
MSTI ID 1
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
MSTI ID 2
VLAN: Accounting (VID 4)
GBIC
CLASS 1
LASER PRODUCT
GBIC
L/A
D/C
L/A
1000 LINK /
FDX
1 3 5
ACT
7
PORT ACTIVITY
9
10/100 LINK /
HDX /
11 13
COL
15
ACT
17 19 21 23R
GBIC
1000 LINK / ACT
AT-9424T/GB Gigabit Ethernet Switch
TERMINAL
PORT
STATUS
FAULT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
MSTI ID 1
VLAN: Sales (VID 2)
VLAN: Presales (VID 3)
MSTI ID 2
VLAN: Accounting (VID 4)
The same is true for any ports connected to bridges running the single-
instance spanning tree STP or RSTP. Those ports are also considered as
part of another region.
A regional root for an MSTI must be within the region where the MSTI is
located. An MSTI cannot have a regional root that is outside its region.
The range for this parameter is the same as the RSTP bridge priority; from
0 to 61,440 in sixteen increments of 4,096. To set the parameter, you
specify the increment that represents the desired MSTI priority value.
Table 15 on page 529 lists the increments.
Region Guidelines
A network can contain any number of regions and a region can contain
any number of AT-9400 Series switches.
An AT-9400 Series switch can belong to only one region at a time.
A region can contain any number of VLANs.
All of the bridges in a region must have the same configuration name,
revision level, VLANs, and VLAN to MSTI associations.
An MSTI cannot span multiple regions.
Each MSTI must have a regional root for locating loops in the instance.
MSTIs can share the same regional root or have different roots. A
regional root is determined by the MSTI priority value and a bridge’s
MAC address.
The regional root of a MSTI must be in the same region as the MSTI.
MSTP has a default spanning tree instance called the Common and
Internal Spanning Tree (CIST). This instance has an MSTI ID of 0.
This instance has unique features and functions that make it different from
the MSTIs that you create yourself. First, you cannot delete this instance
and you cannot change its MSTI ID.
MSTP uses CIST to form the spanning tree of an entire bridged network
because CIST can cross regional boundaries, while a MSTI cannot. If a
port is a boundary port, that is, if it is connected to another region, that port
automatically belongs solely to CIST, even if it was assigned to an MSTI,
because only CIST is active outside of a region.
The CIST regional root is set with the CIST Priority parameter. This
parameter, which functions similar to the RSTP bridge priority value,
selects the root bridge for the entire bridged network. If an AT-9400 Series
switch has the lowest CIST Priority value among all the spanning tree
bridges, it functions as the root bridge for all the MSTP regions and STP
and RSTP single-instance spanning trees in the network.
Note
The AT-S63 MSTP implementation complies fully with the new IEEE
802.1s standard. Any other vendor’s fully compliant 802.1s
implementation is interoperable with the AT-S63 implementation.
An MSTP BPDU contains the instance to which the port transmitting the
packet belongs. By default, all ports belong to the CIST instance. So CIST
is included in the BPDU. If the port is a member of a VLAN that has been
assigned to another MSTI, that information is also included in the BPDU.
BPDU Packet
Instances: CIST 0 and MSTI 10
Port 1
Switch A
1 3 5 7 9 11 13 15 17 19 21 23R AT-9424T/SP Gigabit Ethernet Switch 1 3 5 7 9 11 13 15 17 19 21 23R AT-9424T/SP Gigabit Ethernet Switch
Switch B
PORT ACTIVITY PORT ACTIVITY
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT LASER PRODUCT
D/C FDX HDX / COL
D/C FDX HDX / COL
TERMINAL STATUS TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT 1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A FAULT L/A
SFP FAULT
SFP SFP SFP
SFP SFP 1000 LINK / ACT
D/C 1000 LINK / ACT MASTER D/C MASTER
L/A
L/A
L/A RPS L/A RPS
23 24 23 24
D/C POWER D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R 2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24 2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Port 8
BPDU Packet
Instances: CIST 0 and MSTI 7
At first glance, it might appear that because both ports belong to CIST, a
loop would exist between the switches and that MSTP would block a port
to stop the loop. However, within a region, MSTI takes precedence over
CIST. When switch B receives a packet from switch A, it uses MSTI, not
CIST, to determine whether a loop exists. And because both ports on
switch A belong to different MSTIs, switch B determines that no loop
exists.
A problem can arise if you assign some VLANs to MSTIs while leaving
others just to CIST. The problem is illustrated in Figure 193. The network
is the same as the previous example. The only difference is that the VLAN
containing port 8 on Switch A has not been assigned to an MSTI, and
BPDU Packet
Instances: CIST 0 and MSTI 10
Port 1 Port 15
Switch A
1 3 5 7 9 11 13 15 17 19 21 23R AT-9424T/SP Gigabit Ethernet Switch 1 3 5 7 9 11 13 15 17 19 21 23R AT-9424T/SP Gigabit Ethernet Switch
Switch B
PORT ACTIVITY PORT ACTIVITY
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT LASER PRODUCT
D/C FDX HDX / COL
D/C FDX HDX / COL
TERMINAL STATUS TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT 1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A FAULT L/A
SFP FAULT
SFP SFP SFP
SFP SFP 1000 LINK / ACT
D/C 1000 LINK / ACT MASTER D/C MASTER
L/A
L/A
L/A RPS L/A RPS
23 24 23 24
D/C POWER D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R 2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24 2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Port 8 Port 4
BPDU Packet
Instances: CIST 0
When port 4 on switch B receives a BPDU, the switch notes the port
sending the packet belongs only to CIST. Therefore, switch B uses CIST
in determining whether a loop exists. The result would be that the switch
detects a loop because the other port is also receiving BPDU packets from
CIST 0. Switch B would block a port to cancel the loop.
To avoid this issue, always assign all VLANs on a switch, including the
Default_VLAN, to an MSTI. This guarantees that all ports on the switch
have an MSTI ID and that helps to ensure that loop detection is based on
MSTI, not CIST.
As mentioned previously, only the CIST can span regions. A MSTI cannot.
Consequently, you may run into a problem if you use more than one
physical data link to connect together various parts of VLANs that reside in
bridges in different regions. The result can be a physical loop, which
spanning tree disables by blocking ports.
This is illustrated in Figure 194. The example show two switches, each
residing in a different region. Port 1 in switch A is a boundary port. It is an
untagged member of the Accounting VLAN, which has been associated
with MSTI 4. Port 16 is a tagged and untagged member of three different
VLANs, all associated to MSTI 12.
determine that a loop exists between the regions, and Switch B would
block a port.
Switch A Switch B
Port 16
MSTI 12
VLAN (untagged port): Sales
VLAN (tagged port): Presales
VLAN (tagged port): Marketing
There are several ways to address this issue. One is to have only one
MSTP region for each subnet in your network.
Another approach is to group those VLANs that need to span regions into
the same MSTI. Those VLANs that do not span regions can be assigned
to other MSTIs.
Here is an example. Assume that you have two regions that contain the
following VLANS:
To select and activate MSTP as the active spanning tree protocol on the
switch, or to disable spanning tree, perform the following procedure:
Note
A change to the active spanning tree is automatically saved on the
switch.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
C - CIST Menu
M - MSTI Menu
V - VLAN-MSTI Association Menu
P - MSTP Port Parameters
D - Reset MSTP to Defaults
3 - Forwarding Delay
The waiting period before a bridge changes to a new state, for
example, becomes the new root bridge after the topology changes. If
the bridge transitions too soon, not all links may have yet adapted to
the change, possibly resulting in a network loop. The range is 4 to 30
seconds. The default is 15 seconds. This setting applies only to ports
running in the STP-compatible mode.
4 - Max Age
The length of time after which stored bridge protocol data units
(BPDUs) are deleted by the bridge. This parameter applies only if the
bridged network contains an STP or RSTP single-instance spanning
tree. Otherwise, the bridges use the Max Hop counter to delete
BPDUs.
All bridges in a single-instance bridged LAN use this aging time to test
the age of stored configuration messages called bridge protocol data
units (BPDUs). For example, if you use the default of 20, all bridges
delete current configuration messages after 20 seconds. The range of
this parameter is 6 to 40 seconds. The default is 20 seconds.
When you select a value for maximum age, observer the following
rules:
MaxAge must be greater than (2 x (HelloTime + 1)).
5 - Max Hops
MSTP regions use this parameter to discard BPDUs. The Max Hop
counter in a BPDU is decremented every time the BPDU crosses an
MSTP region boundary. After the counter reaches zero, the BPDU is
deleted.
6 - Configuration Name
The name of the MSTP region. The range is 0 (zero) to 32
alphanumeric characters in length. The name, which is case sensitive,
must be the same on all bridges in a region. Examples include Sales
Region and Production Region.
7 - Revision Level
The revision level of an MSTP region. The range is 0 (zero) to 255.
This is an arbitrary number that you assign to a region. The revision
level must be the same on all bridges in a region. Different regions can
have the same revision level without conflict.
8 - Bridge Identifier
The MAC address of the bridge. The bridge identifier is used as a tie
breaker in the selection of a root bridge when two or more bridges
have the same bridge priority value. This value cannot be changed.
9 - Root Identifier
If this MAC address is the same as the bridge’s MAC address, then the
switch is also functioning as a root bridge. If the two MAC addresses
are different, then a different switch is functioning as the root bridge.
You cannot change this parameter. This parameter is only displayed
with MSTP is enabled.
Note
Selection C, CIST menu, is described in “Configuring the CIST
Priority,” next.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The CIST Priority field in the menu displays the current value for this
MSTP parameter. This number is used in determining the root bridge
of the network spanning tree. This number is analogous to the RSTP
bridge priority value. The bridge in the network with the lowest priority
number is selected as the root bridge. If two or more bridges have the
same bridge or CIST priority values, the bridge with the numerically
lowest MAC address becomes the root bridge.
The Associated VLANs field displays the VIDs of the VLANs that are
currently associated with CIST and have not been assigned to a MSTI.
5. Enter the increment that represents the new CIST priority value. The
range is 0 (zero) to 61,440 in increments of 4,096, with 0 being the
highest priority. For a list of the increments, refer to Table 15, “Port
Priority Value Increments” on page 529.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
U - Update Display
R - Return to Previous Menu
The MSTI menu displays a table that contains the following columns of
information:
MSTI
Lists the MSTI IDs existing on the switch.
Priority
Specifies the MSTI priority value for the MSTI. The steps in this
procedure explain how you can assign this value when you create an
MSTI ID and how to modify the value for an existing MSTI ID.
Regional Root ID
Identifies the regional root for the MSTI by its MAC address.
Path Cost
Specifies the path cost from the bridge to the regional root. If the bridge
is the regional root, the value is 0.
Associated VLANs
Specifies the VIDs of the VLANs that have been associated with the
MSTI ID.
The table does not include the CIST. The table is empty if no MSTI IDs
have been created.
The following sections contain procedures for working with MSTI IDs:
5. Enter the new MSTP ID. The MSTI ID range is from 1 to 15. You can
specify only one MSTI ID at a time.
6. If you want to associate VLANs to the MSTI now, type Y for yes. If you
want to do it later, type N for no. (To add or remove VLANs from an
existing MSTI, go to “Adding, Removing, and Modifying VLAN
Associations to MSTI IDs” on page 579.)
7. Enter the VIDs of the VLANs that you want to associate with the MSTI
ID. You can specify more than one VLAN at a time (for example,
4,6,11) To view VIDs, refer to “Displaying VLANs” on page 623.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
5. Enter the MSTP IDs that you want to delete. The range is 1 to 15. (You
cannot delete CIST, which has a value of 0.)
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Modifying an To change the MSTI priority value for an MSTI, perform the following
MSTI ID procedure:
5. Enter the MSTP IDs that you want to modify. The range is 1 to 15. You
can specify only one MSTI ID at a time.
6. Enter a new MSTI priority number for this MSTI on the bridge. This
parameter is used in selecting a regional root for the MSTI. The range
is 0 (zero) to 61,440 in increments of 4,096, with 0 being the highest
priority. This parameter is used in selecting a regional root for the
MSTI. For a list of the increments, refer to Table 10, “Bridge Priority
Value Increments” on page 527.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
When you create a new MSTI ID, you are given the opportunity of
associating VLANs to it. But after an MSTI ID is created, you may want to
add more VLANs to it, or perhaps remove VLANs. This procedure explains
how to associate VLANs on the switch to an existing MSTI ID and also
how to remove VLANs. Before performing this procedure, note the
following:
You must create a MSTI ID before you can assign VLANs to it. To
create a MSTI ID, refer to “Creating, Deleting, and Modifying MSTI
IDs” on page 576.
You can assign a VLAN to only one MSTI. By default, a VLAN, when
created, is associated with the CIST instance, which has a MSTI ID of
0.
An MSTI can contain any number of VLANs.
Adding or To add or remove a VLAN from an MSTI ID, perform the following
Removing a procedure:
VLAN from an 1. From the Main Menu, type 3 to select Spanning Tree Configuration.
MSTI ID
The Spanning Tree Configuration menu is shown in Figure 178 on
page 535.
U - Update Display
R - Return to Previous Menu
MSTI / CIST
Lists the CIST and current MSTI IDs on the switch.
Associated VLANs
Specifies the VIDs of the VLANs associated with the CIST and MSTI
IDs. For instance, referring to Figure 198, the VLANs with the VIDs 7
and 22 are assigned to MSTI 7.
7. Enter the VLAN ID of the virtual LAN you want to associate with the
MSTI ID. You can enter more than one VLAN at a time (for example,
2,4,7). To view VIDs, refer to “Displaying VLANs” on page 623.
The MSTI ID retains any VLANs already associated with it when new
VLANs are added.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Removing a To remove a VLAN from an MSTP ID, perform the following procedure:
VLAN from an 1. From the Main Menu, type 3 to select Spanning Tree Configuration.
MSTI ID
The Spanning Tree Configuration menu is shown in Figure 178 on
page 535.
7. Enter the VLAN ID of the virtual LAN that you want to remove from the
MSTI ID. You can enter more than one VLAN at a time (for example,
2,4,7) To view VIDs, refer to “Displaying VLANs” on page 623.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Associating To associate VLANs to an MSTP ID while deleting all VLANs that are
VLANs to an already associated with it, perform the following procedure:
MSTI ID and 1. From the Main Menu, type 3 to select Spanning Tree Configuration.
Deleting All
The Spanning Tree Configuration menu is shown in Figure 178 on
Associated page 535.
VLANs
2. From the Spanning Tree Configuration menu, type 3 to select
Configure Active Protocol.
8. Enter the VLAN ID of the virtual LAN that you want to associate with
the MSTI ID. You can enter more than one VLAN at a time (for
example, 2,4,7) (To view VIDs, refer to “Displaying VLANs” on
page 623.)
The VLANs already associated with the MSTI ID are removed when
the new VLANs are added. The removed VLANs are returned to CIST.
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Clearing VLAN To clear VLAN to MSTI associations, perform the following procedure:
to MSTI 1. From the Main Menu, type 3 to select Spanning Tree Configuration.
Associations
The Spanning Tree Configuration menu is shown in Figure 178 on
page 535.
The second group of port parameters can be set independently for each
MSTI in which the port is a member. These parameters are:
Configuring To configure the external path cost of a port or to designate whether the
Generic MSTP port is an edge or point-to-point port, perform the following procedure:
Port Settings 1. From the Main Menu, type 3 to select Spanning Tree Configuration.
6. Enter the last port of the range. To configure just one port, enter the
same port here as in Step 5.
10 Mbps 2,000,000
100 Mbps 200,000
1000 Mbps 20,000
Table 17 lists the MSTP port costs with the Auto setting when the port
is part of a port trunk.
10 Mbps 20,000
100 Mbps 20,000
1000 Mbps 2,000
2 - Point-to-Point
This parameter defines whether the port is functioning as a point-to-
point port. For an explanation of this parameter, refer to “Point-to-Point
and Edge Ports” on page 531.
3 - Edge Port
This parameter defines whether the port is functioning as an edge port.
For an explanation of this parameter, refer to “Point-to-Point and Edge
Ports” on page 531.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Configuring This procedure explains how to set a port’s priority and internal path cost.
MSTI-specific These parameters can be set independently on a port for each MSTI in
which a port is a member. To configure the parameters, perform the
Port Parameters following procedure:
5. Enter the ID number of the CIST or MSTI where the VLAN containing
the port whose settings you want to configure has been assigned. You
can specify more than one ID number.
7. Enter the last port of the range. To configure just one port, enter the
same port here as in Step 6.
The Spanning Tree List displays the ID numbers of the MSTIs you
specified.
10 Mbps 2,000,000
100 Mbps 200,000
1000 Mbps 20,000
Table 19 lists the RSTP port costs with Auto-Detect when the port is
part of a port trunk.
10 Mbps 20,000
100 Mbps 20,000
1000 Mbps 2,000
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
4. From the MSTP Port Parameters menu, type 2 to select Display MSTP
Port Configuration.
| Cost |
Port | Edge-Port |Point-to-Point | External Internal|Priority
--------------------------------------------------------------
1 Yes Auto-Detect 200000 Auto 128
2 Yes Auto-Detect 200000 Auto 128
3 Yes Auto-Detect 200000 Auto 128
4 Yes Auto-Detect 200000 Auto 128
5 Yes Auto-Detect 200000 Auto 128
6 Yes Auto-Detect 200000 Auto 128
7 Yes Auto-Detect 200000 Auto 128
8 Yes Auto-Detect 200000 Auto 128
N - Next Page
U - Update Display
R - Return to Previous Menu
Port
The port number.
Edge-Port
Whether or not the port is functioning as an edge port. The possible
settings are Yes and No.
Point-to-Point
Whether or not the port is functioning as a point-to-point port. The
possible settings are Yes, No, and Auto-Detect.
Priority
This parameter is used as a tie breaker when two or more ports are
determined to have equal costs to the regional root bridge.
4. From the MSTP Port Parameters menu, type 3 to select Display MSTP
Port State.
N - Next Page
U - Update Display
R - Return to Previous Menu
The MSTP Port State menu displays a table that contains the following
columns of information:
Port
The port number.
State
The MSTP state of the port. The possible states are:
Discarding - The port is discarding received packets and is not
submitting forwarded packets for transmission.
Learning - The port is learning the MAC address from the received
packet, but does not process or forward the packet.
Role
The MSTP role of the port. The possible roles are:
Root - The port that is connected to the root switch, directly or through
other switches, with the least path cost.
Alternate - The port offers an alternate path in the direction of the root
switch.
Designated - The port on the designated switch for a LAN that has the
least cost path to the root switch. This port connects the LAN to the
root switch.
Master - Similar to the root port. When the port is a boundary port, the
MSTI port roles follow the CIST port roles. The MSTI port role is called
“master” when the CIST role is “root.”
P2P
Whether or not the port is functioning as a point-to-point port. The
possible settings are Yes, No, and Auto-Detect.
Version
Whether the port is operating in MSTP mode or STP-compatible
mode.
Internal Port-Cost
The port cost when the port is connected to a bridge in the same
MSTP region.
Virtual LANs
This chapter contains basic information about virtual LANs (VLANs) and
procedures for creating, modifying, and deleting VLANs from a local or
Telnet management session.
VLAN Overview
With VLANs, you can segment your network through the switch’s AT-S63
management software and so be able to group nodes with related
functions into their own separate, logical LAN segments. These VLAN
groupings can be based on similar data needs or security requirements.
For example, you could create separate VLANs for the different
departments in your company, such as one for Sales and another for
Accounting.
VLANs improve network perform because VLAN traffic stays within the
VLAN. The nodes of a VLAN receive traffic only from nodes of the
same VLAN. This reduces the need for nodes to handle traffic not
destined for them. It also frees up bandwidth within all the logical
workgroups.
In addition, because each VLAN constitutes a separate broadcast
domain, broadcast traffic remains within the VLAN. This too can
improve overall network performance.
Increased security
But with VLANS, you can change the LAN segment assignment of an
end node connected to the switch using the switch’s AT-S63
In addition, a virtual LAN can span more than one switch. This means
that the end nodes of a VLAN do not need to be connected to the
same switch and so are not restricted to being in the same physical
location.
The AT-9400 Series switch supports the following types of VLANs you can
create yourself:
Port-based VLANs
Tagged VLANs
Note
The AT-9400 Series switch is preconfigured with one port-based
VLAN. All ports on the switch are members of this VLAN, called the
Default_VLAN.
VLAN name
VLAN Identifier
Untagged ports
Port VLAN Identifier
VLAN Name To create a port-based VLAN, you must give it a name. The name should
reflect the function of the network devices that are be members of the
VLAN. Examples include Sales, Production, and Engineering.
VLAN Identifier Every VLAN in a network must have a unique number assigned to it. This
number is called the VLAN identifier (VID). This number uniquely identifies
a VLAN in the switch and the network.
If a VLAN spans multiple switches, then the VID for the VLAN on the
different switches should be the same. The switches are then able to
recognize and forward frames belonging to the same VLAN even though
the VLAN spans multiple switches.
For example, if you had a port-based VLAN titled Marketing that spanned
three AT-9400 Series switches, you would assign the Marketing VLAN on
each switch the same VID.
You can assign this number manually or allow the AT-S63 management
software to do it automatically. If you allow the management software to do
it automatically, it selects the next available VID. This is acceptable when
you are creating a new, unique VLAN.
If you are creating a VLAN on a switch that will be part of a larger VLAN
that spans several switch, then you will need to assign the number
yourself so that the VLAN has the same VID on all switches.
Untagged Ports You need to specify which ports on the switch are to be members of a port-
based VLAN. Ports in a port-based VLAN are referred to as untagged
ports and the frames received on the ports as untagged frames. The
names derive from the fact that the frames received on a port will not
contain any information that indicates VLAN membership, and that VLAN
membership will be determined solely by the port’s PVID. (There is
another type of VLAN where VLAN membership is determined by
information within the frames themselves, rather than by a port’s PVID.
This type of VLAN is explained in “Tagged VLAN Overview” on page 608.)
Port VLAN Each port in a port-based VLAN must have a port VLAN identifier (PVID).
Identifier The switch associates a frame to a port-based VLAN by the PVID
assigned to the port on which the frame is received, and forwards the
frame only to those ports with the same PVID. Consequently, all ports of a
port-based VLAN must have the same PVID. Additionally, the PVID of the
ports in a VLAN must match the VLAN’s VID.
For example, if you were creating a port-based VLAN on a switch and you
had assigned the VLAN the VID 5, the PVID for each port in the VLAN
would need to be assigned the value 5.
Some switches and switch management programs require that you assign
the PVID value for each port manually. However, the AT-S63
management software performs this task automatically. The software
automatically assigns a PVID to a port, making it identical to the VID of the
VLAN to which the port is a member, when you assign the port as an
untagged member to a VLAN.
Engineering VLAN
(VID 3)
1 3 5 7 9 11 13 15 17 19 21 23
AT-9424T/SP Gigabit Ethernet Switch
2 4 6 8 10 12 14 16 18 20 22 24
WAN
Router
The table below lists the port assignments for the Sales, Engineering, and
Production VLANs on the switch.
Each VLAN has been assigned a unique VID. This number is assigned
when you create a VLAN.
The ports have been assigned PVID values. A port’s PVID is assigned
automatically by the AT-S63 management software when you create the
VLAN. The PVID of a port is the same as the VID to which the port is an
untagged member.
In the example, each VLAN has one port connected to the router. The
router interconnects the various VLANs and functions as a gateway to the
WAN.
Port-based Figure 205 illustrates more port-based VLANs. In this example, two
Example 2 VLANs, Sales and Engineering, span two AT-9400 Series Gigabit
Ethernet switches.
Engineering VLAN
(VID 3)
Sales VLAN
(VID 2)
Production VLAN
(VID 4)
1 3 5 7 9 11 13 15 17 19 21 23
AT-9424T/SP Gigabit Ethernet Switch
2 4 6 8 10 12 14 16 18 20 22 24
WAN
1 3 5 7 9 11 13 15 17 19 21 23 Router
AT-9424T/GB Gigabit Ethernet Switch
2 4 6 8 10 12 14 16 18 20 22 24
The table below lists the port assignments for the Sales, Engineering, and
Sales VLAN - This VLAN spans both switches. It has a VID value of 2
and consists of six untagged ports on the top switch and five untagged
ports on the bottom switch.
The two parts of the VLAN are connected by a direct link from port 4 on
the top switch to port 3 on the bottom switch. This direct link allows the
two parts of the Sales VLAN to function as one logical LAN segment.
Port 6 on the top switch connects to the router. This port allows the
Sales VLAN to exchange Ethernet frames with the other VLANs and to
access the WAN.
Engineering VLAN - The workstations of this VLAN are connected to
ports 9 to 13 on the top switch and ports 16, 18 to 20, and 22 on the
bottom switch.
Because this VLAN spans multiple switches, it needs a direct
connection between its various parts to provide a communications
path. This is provided in the example with a direct connection from port
10 on the top switch to port 19 on the bottom switch.
This VLAN uses port 12 on the top switch as a connection to the router
and the WAN.
Production VLAN - This is the final VLAN in the example. It has the
VLAN of 4 and its ports have been assigned the PVID also of 4.
The nodes of this VLAN are connected only to the top switch. So this
VLAN does not require a direct connection to the bottom switch.
However, it uses port 20 as a connection to the router.
The benefit of a tagged VLAN is that the tagged ports can belong to more
than one VLAN at one time. This can greatly simplify the task of adding
shared devices to the network. For example, a server can be configured to
accept and return packets from many different VLANs simultaneously.
Tagged VLANs are also useful where multiple VLANs span across
switches. You can use one port per switch to connect all VLANs on the
switch to another switch.
The IEEE 802.1Q standard describes how this tagging information is used
to forward the traffic throughout the switch. The handling of frames tagged
with VIDs coming into a port is straightforward. If the incoming frame’s VID
tag matches one of the VIDs of a VLAN of which the port is a tagged
member, the frame is accepted and forwarded to the appropriate ports. If
the frame’s VID does not match any of the VLANs that the port is a
member of, the frame is discarded.
The parts of a tagged VLAN are much the same as those for a port-based
VLAN. They are:
VLAN Name
VLAN Identifier
Note
For explanations of VLAN name and VLAN identifier, refer back to
“VLAN Name” on page 602 and “VLAN Identifier” on page 602.
Tagged and You need to specify which ports will be members of the VLAN. In the case
Untagged Ports of a tagged VLAN, it is usually a combination of both untagged ports and
tagged ports. You specify which ports are tagged and which untagged
when you create the VLAN.
Port VLAN As explained earlier in the discussion on port-based VLANs, the AT-S63
Identifier management software automatically assigns a PVID to each port when a
port is made a member of a VLAN. The PVID is always identical to the
VLAN’s VID, and that in a port-based VLAN packets are forwarded based
on the PVID.
Tagged VLAN Figure 206 illustrates how tagged ports can be used to interconnect IEEE
Example 802.1Q-based products.
Engineering VLAN
(VID 3)
Sales VLAN
(VID 2)
Production VLAN
(VID 4)
Legacy Server
1 3 5 7 9 11 13 15 17 19 21 23
AT-9424T/SP Gigabit Ethernet Switch
2 4 6 8 10 12 14 16 18 20 22 24
IEEE 802.1Q-compliant
Server
WAN
Router
1 3 5 7 9 11 13 15 17 19 21 23
AT-9424T/GB Gigabit Ethernet Switch
2 4 6 8 10 12 14 16 18 20 22 24
AT-9424T/ 1, 3 to 5 2, 10 9, 11 to 13 2, 10 17, 19 to 21 2
SP Switch (PVID 2) (PVID 3) (PVID 4)
(top)
One of the tagged ports is port 2 on the top switch. This port has been
made a tagged member of the three VLANs. It is connected to an IEEE
802.1Q-compliant server, meaning the server can handle frames from
multiple VLANs. Now all three VLANs can access the server without going
through a router or other interconnection device.
It is important to note that even though the server is accepting frames from
and transmitting frames to more than one VLAN, data separation and
security remain.
Two other tagged ports are used to simplify network design in the
example. They are port 10 on the top switch and port 9 on the lower
switch. These ports have been made tagged members of the Sales and
Engineering VLANs so that they can carry traffic from both VLANs,
simultaneously. These ports provide a common connection that enables
different parts of the same VLAN to communicate with each other while
maintaining data separation between VLANs.
Note
If selection 4, Configure VLANs, is not displayed in the menu, the
switch is running in a multiple VLAN mode. To change a switch’s
VLAN mode, refer to “Selecting a VLAN Mode” on page 668.
1 - Create VLAN
2 - Modify VLAN
3 - Delete VLAN
4 - Reset to Default VLAN
C - Create VLAN
R - Return to Previous Menu
If the VLAN will be unique in your network, then the name should be
unique as well. If the VLAN will be part of a larger VLAN that spans
multiple switches, then the name for the VLAN should be the same on
each switch where nodes of the VLAN are connected.
Note
A VLAN must be assigned a name.
7. Type a VID value for the new VLAN. The range for the VID value is 1
to 4094.
Note
A VLAN must have a VID.
It is important to note that the switch is only aware of the VIDs of the
VLANs that exist on the device, and not those that might already be in
use in the network. For example, if you add a new AT-9400 Series
switch to a network that already contains VLANs that use VIDs 2
through 24, the AT-S63 management software still uses VID 2 as the
default value when you create the first VLAN on the new switch, even
though that VID number is already being used by another VLAN on the
network. To prevent inadvertently using the same VID for two different
VLANs, you should keep a list of all your network VLANs and their VID
values.
8. Type 3 to toggle VLAN Type so that it displays Port Based, the default
setting. This is the correct setting when creating a port-based or
tagged VLAN.
Note
The MAC Based setting for option 3 is used to create MAC address-
based VLANs. For instructions, refer to Chapter 29, “MAC Address-
based VLANs” on page 687.
9. If the VLAN will contain tagged ports, type 4 to select Tagged Ports
and specify the ports. If this VLAN will not contain any tagged ports,
leave this field empty.
You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-
9), or both (e.g., 2,5,7-9).
10. Type 5 to select Untagged Ports and specify the ports on the switch to
function as untagged ports in the VLAN. If this VLAN will not contain
any untagged ports, leave this field empty.
You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-
9), or both (e.g., 2,5,7-9).
Note
Option 6, Protected Ports, in the Create VLAN menu is not used to
create port-based or tagged VLANs. It should be left in the “No”
default setting. This option is used to create protected ports VLANs,
as explained in Chapter 28, “Protected Ports VLANs” on page 671.
13. To verify that the VLAN was created correctly, type 6 to select Show
VLANs.
14. Check to see that the VLAN contains the appropriate ports.
15. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
When you create a new VLAN, ports designated as untagged ports
of the new VLAN are automatically removed from their current
untagged VLAN assignment. For example, if you are creating a new
VLAN on a switch that contains only the Default_VLAN, the ports
that you specify as untagged ports of the new VLAN are
automatically removed from the Default_VLAN.
Note
Tagged ports are not removed from any current VLAN assignments
because tagged ports can belong to more than one VLAN at a time.
4. From the Create VLAN menu, type 1 to select VLAN Name and enter
“Sales”.
5. Type 2 to select VLAN ID (VID) and enter “2”. This is the VID value for
the new VLAN.
Note
Option 4, Tagged Ports, is left empty because this VLAN will not
contain any tagged ports.
7. Type 5 to select Untagged Ports and enter “1,3-5”. These are the
untagged ports of the VLAN. Press Return.
Note
Option 6, Protected Ports, must be left in the “No” default setting
when creating a port-based or tagged VLAN. This option is
explained in Chapter 28, “Protected Ports VLANs” on page 671.
9. After the switch displays the prompt notifying you that it created the
VLAN, press any key.
The following procedure creates the Engineering VLAN in the top switch
illustrated in “Tagged VLAN Example” on page 610. This VLAN will be
assigned a VID of 3. It will consist of four untagged ports, ports 9, 11 to 13,
and two tagged ports, ports 2 and 10.
4. From the Create VLAN menu, type 1 to select VLAN Name and enter
“Engineering”.
5. Type 2 to select VLAN ID (VID) and enter “3”. This is the VID value for
the new VLAN.
7. Type 4 to select Tagged Ports and enter “2,10”. These are the tagged
ports of the VLAN on the switch.
8. Type 5 to select Untagged Ports and enter “9,11-13”. These are the
untagged ports of the VLAN.
Note
Option 6, Protected Ports, must be left in the “No” default setting
when creating a port-based or tagged VLAN. This option is
explained in Chapter 28, “Protected Ports VLANs” on page 671.
10. After the switch displays the prompt notifying you that it created the
VLAN, press any key.
Note
To modify a VLAN, you need to know its VID. To view VLAN VIDs,
refer to “Displaying VLANs” on page 623.
Note
If selection 4, Configure VLANs, is not displayed in the menu, the
switch is running a multiple VLAN mode. To change a switch’s VLAN
mode, refer to “Selecting a VLAN Mode” on page 668.
Note
Selection 2, Change GARP VLAN, is described in Chapter 26,
“GARP VLAN Registration Protocol” on page 635. Selection 3,
Change MAC Associations, is explained in Chapter 29, “MAC
Address-based VLANs” on page 687.
5. Enter the VID of the port-based or tagged VLAN you want to modify.
M - Modify VLAN
R - Return to Previous Menu
1 - VLAN Name
This parameter changes the name of a VLAN. The name can be from
one to fifteen alphanumeric characters in length. The name should
reflect the function of the nodes that will be a part of the VLAN (for
example, Sales or Accounting). The name cannot contain spaces or
special characters, such as asterisks (*) or exclamation points (!).
Note
A VLAN must have a name.
2 - VLAN ID (VID)
This is the VLAN’s VID value. You cannot change this value.
3 - VLAN Type
VLAN type should be Port Based for a port-based or tagged VLAN.
You cannot change this value.
4 - Tagged Ports
Use this selection to add or remove tagged ports from the VLAN. You
can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-9), or
both (e.g., 2,5,7-9).
The new list of tagged ports will replace the existing tagged ports.
If the VLAN contains tagged ports and you want to remove them
all, enter 0 (zero) for this value.
5 - Untagged Ports
Use this selection to add or remove untagged ports from the VLAN.
You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-
9), or both (e.g., 2,5,7-9).
Note
Selection 6, Protected Ports, should be left in the “No” default setting
when modifying a port-based or tagged VLAN. This option is
explained in Chapter 28, “Protected Ports VLANs” on page 671.
SUCCESS
Please make sure to manually update any static
multicast MAC address(es) entries for this VLAN.
Press any key to continue...
The VLAN has been modified and is now ready for network operations.
If you added or removed from the VLAN a port with one or more static
MAC addresses assigned to it, you must update the static addresses
by deleting their entries from the MAC address table and reentering
them again using the VID of the VLAN to which the port has been
moved to. For information on how to add static MAC addresses, refer
to “Adding Static Unicast and Multicast MAC Addresses” on page 142.
For instructions on how to delete addresses, refer to “Deleting Unicast
and Multicast MAC Addresses” on page 144.
The Modify VLAN menu in Figure 210 on page 619 is displayed again.
Displaying VLANs
To view the name, VID number, and member ports of all the VLANs on a
switch, perform the following procedure:
U - Update Display
D - Detail Information Display
R - Return to Previous Menu
Note
Selection D, Detail Information Display, applies only to MAC
address-based VLANs.
The Show VLANs menu displays a table that contains the following
columns of information:
VID
The VLAN ID.
VLAN Name
Name of the VLAN.
VLAN Type
The VLAN type. The possible settings are:
Protocol
The protocol associated with this VLAN. The possible settings are:
Note
To delete a VLAN, you need to know its VID. To view VLAN VIDs,
refer to “Displaying VLANs” on page 623.
5. Enter the VID of the VLAN you want to delete. You can specify only
one VID at a time.
Note
You cannot delete the Default_VLAN, which has a VID of 1.
D - Delete VLAN
R - Return to Previous Menu
Are you sure you want to delete this VLAN [Yes/No] ->
If you select Yes, the VLAN is deleted and the following message is
displayed:
SUCCESS
Please make sure to manually delete any static multicast
MAC address(es) entries for this VLAN
Press any key to continue ...
Any static addresses assigned to the ports of the VLAN are now
obsolete, because the VLAN has been deleted. Those addresses
should be deleted from the MAC address table. For instructions on
how to delete addresses, refer to “Deleting Unicast and Multicast MAC
Addresses” on page 144.
10. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To return all ports to the default VLAN, perform the following procedure:
Note
If selection 4, Configure VLANs, is not displayed in the menu, the
switch is running in a multiple VLAN mode. To change a switch’s
VLAN mode, refer to “Selecting a VLAN Mode” on page 668.
If you select Yes, all VLANs are deleted and the following message is
displayed:
SUCCESS
Please make sure to manually update any static
multicast MAC address(es) entries.
Press any key to continue...
Any static addresses assigned to the ports of the VLANs are now
obsolete, except for the Default_VLAN, because the VLANs have
been deleted. Those addresses should be deleted from the MAC
address table. For instructions on how to delete addresses, refer to
“Deleting All Dynamic MAC Addresses” on page 145.
6. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Displaying PVIDs
The following procedure displays a menu that lists the PVIDs for all the
ports on the switch.
Port PVID
---------------------------------------------------------
01 22
02 22
03 1
04 1
05 1
06 1
07 24
08 24
N - Next Page
U - Update Display
R - Return to Previous Menu
The PVID column displays the current PVID value for each switch port.
There are rules a switch follows when it receives and forwards an Ethernet
frame. There are rules for frames as they enter a port (called ingress rules)
and rules for when a frame is transmitted out a port (called egress rules). A
switch does not accept and forward a frame unless the frame passes the
ingress and egress rules.
There are many ingress and egress rules for Gigabit Ethernet switches.
This discussion reviews only the rules as they apply to tagged frames,
because ingress filtering does not apply to untagged frames.
The ingress rules are applied to tagged frames when ingress filtering is
activated. The switch examines the tagged header of each tagged frame
that enters a port and determines whether the tagged frame and the port
that received the frame are members of the same VLAN. If they belong to
the same VLAN, the port accepts the frame. If they belong to different
VLANs, the port discards the frame.
How do the egress rules apply when ingress filtering is disabled? First, any
tagged frame is accepted on any port on the switch. It does not matter
whether the frame and the port belong to the same or different VLANs.
After the tagged frame is received, the switch examines the tagged header
and determines if the VID in the header corresponds to any VLANs on the
switch. If there is no corresponding VLAN, the switch discards the frame. If
there is, the switch transmits the frame out the port to the destination node,
assuming that the destination node’s MAC address is in the MAC address
table, or floods the port to all ports on the VLAN if the MAC address is not
in the table.
In addition, each tagged frame contains a priority tag that informs the
switch about the importance of the frame. Frames with a high priority are
handled ahead of frames with a low priority.
In most cases, you will probably want to leave ingress filtering activated on
the switch, which is the default. You can enable or disable ingress filtering
on a per switch basis. You cannot set this per port.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Now assume that you decide to create a VLAN called NMS with a VID of
24 for the sole purpose of remote network management. For this, you
need to create the NMS VLAN on each AT-9400 Series switch that you
want to manage remotely, being sure to assign each NMS VLAN the VID
of 24. Then you need to be sure that the uplink and downlink ports
connecting the switches together are either tagged or untagged members
of the NMS VLAN. You also need to specify the NMS VLAN as the
management VLAN on each switch using the AT-S63 management
software. Finally, you must be sure to connect your management station
to a port on a switch that is a tagged or untagged member of the
management VLAN.
Note
You cannot specify a management VLAN when the switch is
operating in a multiple VLAN mode.
SUCCESS
Press any key to continue ...
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This chapter describes the GARP VLAN Registration Protocol (GVRP) and
contains the following sections:
If the VLAN does not exist on the switch, it creates the VLAN and adds
the port as a tagged member to the VLAN. A VLAN created by GVRP
is called a dynamic GVRP VLAN.
If the VLAN already exists on the switch but the port is not a member
of it, the switch adds the port as a tagged member. A port that has
been added by GVRP to a static VLAN (that is a user-created VLAN) is
called a dynamic GVRP port.
You cannot modify a dynamic GVRP VLAN. After it is created, only GVRP
can modify or delete it. A dynamic GVRP VLAN exists only so long as
there are active nodes in the network that belong to the VLAN. If all nodes
of a dynamic GVRP VLAN are shut down and there are no active links, the
VLAN is deleted from the switch.
Port 1 Port 4
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/GB Gigabit Ethernet Switch
Port 3
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/GB Gigabit Ethernet Switch 1 3 5 7 9 11 13 15 17 19 21 23R PORT
GBIC GBIC L/A FAULT
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT GBIC
LASER PRODUCT 1000 LINK / ACT
D/C FDX HDX / COL
D/C MASTER
TERMINAL STATUS L/A
1 3 5 7 9 11 13 15 17 19 21 23R PORT L/A RPS
GBIC GBIC 23 24
L/A
GBIC FAULT D/C POWER
D/C 1000 LINK / ACT MASTER 2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/GB Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
GBIC GBIC L/A FAULT
GBIC
D/C 1000 LINK / ACT MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Port 2
Switch #1 Switch #3
Static VLAN Switch #2
Static VLAN
Sales VID=11 Sales VID=11
Switches #1 and #3 contain the Sales VLAN, but switch #2 does not.
Consequently, the end nodes of the two parts of the Sales VLANs are
unable to communicate with each other.
GVRP can make the configurations for you. Here is how GVRP would
resolve the problem in the example.
3. Switch #2 sends a PDU out port 3 containing all of the VIDs of the
VLANs on the switch, including the new GVRP_VLAN_11 with its VID
of 11. (Note that port 3 is not yet a member of the VLAN. Ports are
added to VLANs when they receive, not send a PDU.)
4. Switch #3 receives the PDU on port 4 and, after examining it, notes
that one of the VLANs on switch #2 has the VID 11, which matches the
VID of an already existing VLAN on the switch. So it does not create
the VLAN because it already exists. It then determines whether the
port that received the PDU, in this case port 4, is a member of the
VLAN. If it is not a member, it automatically adds the port to the VLAN
as an tagged dynamic GVRP port. If the port is already a member of
the VLAN, then no change is made.
6. Switch #2 receives the PDU on port 3 and then adds the port as a
tagged dynamic GVRP port to the dynamic GVRP_VLAN_11 VLAN.
There is now a communications path for the end nodes of the Sales VLAN
on switches #1 and #3. GVRP created the new GVRP_VLAN_11 dynamic
GVRP VLAN with a VID of 11 on switch #2 and added ports 2 and 3 to the
VLAN as tagged dynamic GVRP ports.
GVRP and Use GVRP with caution because it can expose your network to
Network Security unauthorized access. A network intruder can access restricted parts of the
network by connecting to a switch port running GVRP and transmitting a
bogus GVRP PDU containing VIDs of restricted VLANs. GVRP would
make the switch port a member of the VLANs and that could give the
intruder access to restricted areas of your network.
The second issue is that even if the GVRP-inactive switch forwards GVRP
PDUs, it does not create the VLANs, at least not automatically.
Consequently, even if the GVRP-active switches receive the PDUs and
create the necessary VLANs, the intermediate switch may block the VLAN
traffic, unless you modify its VLANs and port assignments manually.
Switch
GARP PDUs
GARP PDUs
GARP PDUs
LLC LLC
An instance of GID consists of the set of state machines that define the
current registration and declaration state of all attribute values associated
with the GARP participant. Separate state machines exist for the applicant
and registrar. This is shown in Figure 218.
GID
Attribute C state:
Attribute B state:
Attribute A state:
Applicant Registrar
State State
If a port enters the STP Forwarding state and the GARP application that
the port belongs to is enabled, then the port is added to the GIP connected
ring for the GARP application. All attributes registered by other ports in the
GIP connected ring is propagated to the recently connected port. All
attributes registered by the recently connected port is propagated to all
other ports in the GIP connected ring.
Similarly, if a port leaves the STP Forwarding state and the GARP
application that the port belongs to is enabled, then the port is removed
from the GIP connected ring for the GARP application. Prior to removal,
GID leave requests are propagated to all other ports in the GIP connected
ring if the port to be removed has previously registered an attribute and no
other port in the GIP connected ring has registered that attribute. You can
enable or disable GIP operations.
Configuring GVRP
Note
The timers in the following menus are in increments of centi seconds
which is one hundredth of a second.
GARP-GVRP
1 - GVRP Status ........... Disabled
2 - GVRP GIP Status ....... Enabled
3 - GVRP Join Timer ....... 20
4 - GVRP Leave Timer ...... 60
5 - GVRP Leave All Timer .. 1000
Note
Selection 8, Configure GARP-GVRP, is not shown in the VLAN
Configuration menu when the VLAN mode is multiple VLANs.
Note
Do not disable GIP if you intend to use GVRP. GIP is required to
propagate VLAN information among the ports of the switch.
Caution
The following steps change the three GVRP timers. Please note that
the settings for these timers must be the same on all GVRP-active
network devices.
8. Enter a new value for the Join Timer field in centi seconds which are
one hundredths of a second. The default is 20 centiseconds.
If you change this field, it must be in relation to the GVRP Leave Timer
according to the following equation:
Enter new value (in centi seconds): [500 to 3000] -> 1000
12. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This procedure enables and disables GVRP on a switch port. The default
setting for GVRP on a port is enabled. Only those ports where GVRP is
enabled transmit PDUs.
Note
Allied Telesyn recommends disabling GVRP on unused ports and
those ports that are connected to GVRP-inactive devices. This
protects against unauthorized access to restricted areas of your
network. For further information, refer to “GVRP and Network
Security” on page 639.
Enter port-list:
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This procedure converts a dynamic GVRP VLAN into a static VLAN. You
can perform this procedure to permanently retain the VLANs the switch
learned through GVRP.
Note
This procedure cannot convert a dynamic GVRP port in a static
VLAN into a static port. For that you must manually modify the static
VLAN by specifying the dynamic port as either a tagged or untagged
member of the VLAN.
Note
If selection 4, Configure VLANs, is not displayed in the menu, the
switch is running a multiple VLAN mode. To change a switch’s
VLAN mode, refer to “Selecting a VLAN Mode” on page 668.
4. From the Modify VLAN menu, type 2 to select Change GARP VLAN.
5. Enter the VID of the dynamic GVRP VLAN you want to convert into a
static VLAN. You can specify only one GVRP VLAN at a time.
3. From the GVRP Port Parameters menu, type 2 to select Display GVRP
Port Configuration.
U - Update
R - Return to Previous Menu
Mode None
A list of ports that do not process GVRP information or transmit PDUs.
4. From the Other GARP Port Parameters menu, type 1 to select Display
GVRP Counters.
GVRP Counters
Receive: Transmit:
-------- ---------
Total GARP Packets 41 Total GARP Packets 166
Invalid GARP Packets 0
Discarded:
-----------
GARP Disabled 0 GARP Disabled 0
Port Not Listening 0 Port Not Sending 3117
Invalid Port 0
Invalid Protocol 0
Invalid Format 0
Database Full 0
N - Next Page
U - Update Display
R - Return to Previous Menu
The statistics span two menus. To display the second menu, type N to
select Next Page. The second menu is shown in Figure 225. The
information in both menus is for display purposes only.
GVRP Counters
Receive: Transmit:
-------- ---------
GARP Messages:
---------------
LeaveAll 7 LeaveAll 77
JoinEmpty 0 JoinEmpty 58
JoinIn 68 JoinIn 285
LeaveEmpty 0 LeaveEmpty 1
LeaveIn 0 LeaveIn 0
Empty 5 Empty 21
Bad Message 0
Bad Attribute 0
P - Previous Page
U - Update Display
R - Return to Previous Menu
Parameter Meaning
Parameter Meaning
Parameter Meaning
4. From the Other GARP Port Parameters menu, type 2 to select Display
GVRP Database
GVRP Database
U - Update Display
R - Return to Previous Menu
The GVRP Database menu displays a table that contains the following
columns of information:
GARP Application
Identifies the GARP application, that is, “GVRP”.
GID index
Value of the GID index corresponding to the attribute. GID indexes
VLAN ID
The VLAN ID.
Used
Indicates whether the GID index is currently being used by any port in
the GARP application. The definition of “used” is whether the Applicant
and Registrar state machine for the GID index are in a non-initialized
state, that is, not in {Vo, Mt} state. The value of this parameter is either
“Yes” or “No”.
To display the GIP connected ports ring, perform the following procedure:
4. From the Other GARP Port Parameters menu, type 3 to select Display
GIP Connected Ports Ring.
4 -> 12 -> 18
U - Update Display
R - Return to Previous Menu
GARP Application
Identifies the GARP application, that is, “GVRP.”
GIP Context ID
A number assigned to the instance for the GIP context.
STP ID
Present if the GARP application is GVRP; identifies the spanning tree
instance associated with the GIP context.
Connected Ring
The ring of connected ports. Only ports presently in the spanning tree
Forwarding state are eligible for membership in the GIP connected
ring. If no ports exist in the GIP connected ring, “No ports are
connected” is displayed. If the GARP application has no ports, “No
ports have been assigned” is displayed.
U - Update Display
R - Return to Previous Menu
Parameter Meaning
Parameter Meaning
Parameter Meaning
This chapter describes the multiple VLAN modes and how to select a
mode.
The multiple VLAN modes are designed to simplify the task of configuring
the switch in network environments that require a high degree of network
segmentation. In a multiple VLAN mode, the ports on a switch are
prohibited from forwarding traffic to each other and are only allowed to
forward traffic to a user-designated uplink port. These configurations
isolate the traffic on each port from all other ports, while providing access
to the uplink port.
Each mode uses a different technique to isolate the ports and their traffic.
The first method uses VLANs while the second uses port mapping. The
uplink port is also different in each mode. In one the port is a tagged port
and in the other untagged. This is explained in the following subsections.
Note
The multiple VLAN mode feature is supported only in single switch
(i.e. edge switch) environments. This means that cascading of
switches while in Multiple VLANs mode is not allowed.
802.1Q- In this mode, each port is placed into a separate VLAN as an untagged
Compliant port. The VLAN names and VID numbers are based on the port numbers.
For example, the VLAN for port 4 is named Client_VLAN_4 and is given
Multiple VLAN the VID of 4, the VLAN for port 5 is named Client_VLAN_5 and has a VID
Mode of 5, and so on.
The uplink port also has its own VLAN, where it is an untagged member.
This VLAN is called Uplink_VLAN.
Note
In 802.1Q Multiple VLAN mode, the device connected to the uplink
port must be IEEE 802.1Q-compliant.
Client_VLAN_1 1 1 22
Client_VLAN_2 2 2 22
Client_VLAN_3 3 3 22
Client_VLAN_4 4 4 22
Client_VLAN_5 5 5 22
Client_VLAN_6 6 6 22
Client_VLAN_7 7 7 22
Client_VLAN_8 8 8 22
Client_VLAN_9 9 9 22
Client_VLAN_10 10 10 22
Client_VLAN_11 11 11 22
Client_VLAN_12 12 12 22
Client_VLAN_13 13 13 22
Client_VLAN_14 14 14 22
Client_VLAN_15 15 15 22
Client_VLAN_16 16 16 22
Client_VLAN_17 17 17 22
Client_VLAN_18 18 18 22
Client_VLAN_19 19 19 22
Client_VLAN_20 20 20 22
Client_VLAN_21 21 21 22
Uplink_VLAN 22 22
Client_VLAN_23 23 23 22
Client_VLAN_24 24 24 22
When you select the 802.1Q-compliant VLAN mode, you are asked to
specify the uplink VLAN port. You can specify only one uplink port. The
switch automatically configures the ports into the separate VLANs.
Note
The uplink VLAN is the management VLAN. Any remote
management of the switch must be made through the uplink VLAN.
Non-802.1Q Unlike the 802.1Q-compliant VLAN mode, which isolates port traffic by
Compliant placing each port in a separate VLAN, this mode forms one VLAN with a
VID of 1 that encompasses all ports. To establish traffic isolation, it uses
Multiple VLAN port mapping. The result, however, is the same. Ports are permitted to
Mode forward traffic only to the designated uplink port and to no other port, even
when they receive a broadcast packet.
Another difference with this mode is that the uplink port is untagged.
Consequently, you would use this mode when the device connected to the
uplink port is not IEEE 802.1Q compatible, meaning that the device cannot
handle tagged packets.
Note
When the uplink port receives a packet with a destination MAC
address that is not in the MAC address table, the port broadcasts the
packet to all switch ports. This can result in ports receiving packets
that are not intended for them.
Note
Any port-based or tagged VLANs that exist on the switch are not
retained when the VLAN mode is changed from the user-configured
mode to a multiple VLAN mode and, at some point, the switch is
reset. The user- configured VLAN information is lost and must be
recreated if you later return the switch to the user-configured VLAN
mode.
4. Enter the port number on the switch that will function as the uplink port
for the other ports. You can specify only one port.
SUCCESS
Press any key to continue ...
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To view the VLANs on the switch while the unit is operating in Multiple
VLAN mode, perform the following procedure:
N - Next Page
U - Update Display
R - Return to Previous Menu
The Show Multiple VLANs menu displays a table that contains the
following columns of information:
Name
Name of the VLAN.
Untagged Port
The untagged ports that are part of the VLAN.
Uplink Port
The uplink port for the VLAN.
VLAN ID
The VLAN ID.
This feature has some of the same characteristics as the multiple VLAN
modes described in the previous chapter, but it offers several advantages.
One is that it provides more flexibility. With the multiple VLAN modes, you
can select only one uplink port which is shared by all the other ports. Also,
you are not allowed to modify the configuration. With protected ports
VLANs, you can create LAN segments that consist of more than one port
and you can specify multiple uplink ports.
Another advantage is that the switch can support protected ports VLANs
as well as port-based and tagged VLANs simultaneously, something that
is not allowed with the multiple VLAN modes.
A protected ports VLAN can consist of two or more groups and a group
can consist of one or more ports. The ports of a group can be either
tagged or untagged.
This type of VLAN also shares some common features with tagged
VLANs, where one or more ports are shared by different LAN segments.
But there are significant differences. First, all the ports in a tagged VLAN
are considered a LAN segment, while the ports in a protected ports VLAN,
though residing within a single VLAN, are subdivided into the smaller unit
of groups, which represent the LAN segments.
Second, a tagged VLAN, by its nature, contains one or more tagged ports.
These are the ports that are shared among one or more tagged VLANs.
The device connected to a tagged port must be 802.1Q compliant and it
must be able to handle tagged packets.
Note
For explanations of VIDs and tagged and untagged ports, refer to
Chapter 25, “Port-based and Tagged VLANs” on page 599.
To create a protected ports VLAN, you perform many of the same steps
that you do when you create a new port-based or tagged VLAN. You give
it a name and a unique VID, and you indicate which of the ports will be
tagged and untagged. What makes creating this type of VLAN different is
that you must assign the ports of the VLAN to their respective groups.
Following is an example of a protected ports VLAN. The first table lists the
name of the VLAN, the VID, and the tagged and untagged ports. It also
indicates which port will function as the uplink port, in this case port 22.
The second table lists the different groups in the VLAN and the ports for
each group.
Name Internet_VLAN_1
VID 8
Untagged Ports in 1-10, 25
VLAN
Tagged Ports in none
VLAN
Uplink Port(s) 22
1 1-2
2 3
3 4
4 5-7
5 8
6 9-10
Allied Telesyn recommends that you create tables similar to this before
you create your own protected ports VLAN. You are prompted for this
information when you create the VLAN, and having the tables handy will
make the job easier.
Protected Ports Following are guidelines for implementing protected ports VLANS:
VLAN Guidelines
A protected ports VLAN should contain a minimum of two groups. A
protected ports VLAN of only one group has little value. Create a port-
based or tagged VLAN instead.
A protected ports VLAN can contain any number of groups.
A group can contain any number of ports.
The ports of a group can be tagged or untagged.
Each group must be assigned a unique group number on the switch.
The number can be from 1 to 256.
A protected ports VLAN can contain more than one uplink port.
The switch can support up to a total of 4094 port-based, tagged,
protected ports, and MAC address-based VLANs. (MAC address-
based VLANs are supported only on the AT-9424Ti/SP switch.)
An uplink port can be either tagged or untagged.
Uplink ports can be shared among more than one protected ports
VLAN, but only if they are tagged.
A switch can contain a combination of port-based and tagged VLANs
and protected ports VLANs.
A port that is a member of a group in a protected ports VLAN cannot
be a member of a port-based or tagged VLAN.
A group can be a member of more than one protected ports VLAN at a
time. However, the port members of the group must be identical in
both VLANs and the ports must be tagged.
You cannot create protected ports VLANs when the switch is operating
in a multiple VLAN mode.
A port that is already an untagged member of a protected ports VLAN
cannot be made an untagged member of another VLAN until it is first
removed from its current VLAN assignment and returned to the
Default_VLAN.
Note
If the menu does not include selection 4, Configure VLANs, the
switch is running a multiple VLAN mode. To change the switch’s
VLAN mode, refer to “Selecting a VLAN Mode” on page 668.
C - Create VLAN
R - Return to Previous Menu
Note
A VLAN must be assigned a name.
7. Type a VID value for the new VLAN. The range for the VID value is 1
to 4094.
Note
A VLAN must have a VID.
8. If the VLAN will contain tagged ports, type 3 to select Tagged Ports
and specify the ports. If this VLAN will not contain any tagged ports,
leave this field empty.
You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-
9), or both (e.g., 2,5,7-9).
9. Type 4 to select Untagged Ports and specify the ports on the switch to
function as untagged ports in the VLAN. If this VLAN will not contain
any untagged ports, leave this field empty.
You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-
9), or both (e.g., 2,5,7-9).
11. To make this a protected ports VLAN, type Y. If you do not want this to
be a protected ports VLAN and want it to be a port-based or tagged
VLAN, type N.
The prompt will shown the ports that you specified as belonging to the
VLAN.
13. Enter the port in the VLAN that will function as the uplink port for the
different VLAN groups. You can select more than one uplink port.
The prompt lists the ports in the VLAN, minus the uplink port you
specified in the previous step.
14. Specify the ports of one of the groups of the protected ports VLAN.
This can be a few as one port or as many as all the remaining ports of
the VLAN. You can specify the ports of the group individually (e.g.,
2,3,5), as a range (e.g., 7-9), or both (e.g., 2,5,7-9).
15. Enter a group number for the port(s). Each group on the switch must
be have a unique group number. The range is 1 to 256.
16. If there are ports within the VLAN that still need to be assigned to a
group, the prompt in Step 13 is displayed again, showing the
unassigned ports. You must repeat Steps 14 and 15, creating
additional groups, until all of the ports in the VLAN have been assigned
to a group.
After you create all of the groups, the following prompt is displayed:
The new protected ports VLAN and its groups are now active on the
switch.
18. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
To modify a VLAN, you need to know its VID. To view VLAN VIDs,
refer to “Displaying a Protected Ports VLAN” on page 682.
Note
If selection 4, Configure VLANs, is not displayed in the menu, the
switch is running a multiple VLAN mode. To change a switch’s
VLAN mode, refer to “Selecting a VLAN Mode” on page 668.
Modify VLAN
M - Modify VLAN
R - Return to Previous Menu
1 - VLAN Name
Use this selection to change the name of a VLAN. The name can be
from one to fifteen alphanumeric characters in length. The name
cannot contain spaces or special characters, such as asterisks (*) or
exclamation points (!).
Note
A VLAN must have a name.
2 - VLAN ID (VID)
This is the VLAN’s VID value. You cannot change this value.
3 - Tagged Ports
Use this selection to add or remove tagged ports from the VLAN. You
can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-9), or
both (e.g., 2,5,7-9). The new list of tagged ports will replace the
existing tagged ports.
4 - Untagged Ports
Use this selection to add or remove untagged ports from the VLAN.
You can specify the ports individually (e.g., 2,3,5), as a range (e.g., 7-
9), or both (e.g., 2,5,7-9). The new list of untagged ports will replace
the existing list of untagged ports.
5 - Protected Ports
This option cannot be changed. To convert a protected ports VLAN
into a tagged or port-based VLAN, you must first delete it and then
recreate it as a tagged or port-based VLAN.
This prompt will differ depending on the ports you specified as part of
the protected ports VLAN.
8. Enter the port in the VLAN that will function as the uplink port for the
different VLAN groups. You can select more than one uplink port.
The prompt now lists the ports in the VLAN, minus the uplink port you
specified in the previous step.
9. Specify the ports of one of the groups of the protected ports VLAN.
This can be a small as one port or as many as all the remaining ports
of the VLAN. You can specify the ports of the group individually (e.g.,
2,3,5), as a range (e.g., 7-9), or both (e.g., 2,5,7-9).
10. Enter a group number for the port(s). Each group on the switch must
be given a unique group number.
11. If there are ports within the VLAN that still need to be assigned to a
group, the prompt in Step 8 is displayed again, showing the
unassigned ports. You must repeat Steps 9 and 10, creating additional
groups, until all of the ports in the VLAN have been assigned to a
group.
After you have created all of the groups, this prompt is displayed:
The modified protected ports VLAN and its groups are now active on
the switch.
13. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To view the name, VID number, and member ports of all the VLANs on a
switch, perform the following procedure:
Show VLANs
VID VLAN Name VLAN Type Protocol Untagged (U) / Tagged (T)
------------------------------------------------------------------------
N - Next Page
U - Update Display
D - Detail Information Display
R - Return to Previous Menu
4. Enter the VID of the protected ports VLAN whose information you want
to view.
Show VLANs
VID VLAN Name VLAN Type Protocol Untagged (U) / Tagged (T)
------------------------------------------------------------------
5 Internet_VLAN Protected U: 12-24 Section 1
Protected T: 25
Group Ports
---------------------------------------------
Uplink 25
1 12-13 Section 2
2 14-15
3 16
4 17
5 18-20
N - Next Page
U - Update Display
R - Return to Previous Menu
Section 1 lists all the tagged and untagged ports in the protected ports
VLAN.
Section 2 lists each group in the VLAN, starting with the uplink port(s).
The groups are listed by group number followed by the port numbers.
For example, in Figure 235 the uplink port for the VLAN is port 25 and
Group 1 consists of ports 12 and 13.
Note
If option 4, Configure VLANs, is not displayed in the menu if the
switch is running a multiple VLAN mode. To change a switch’s
VLAN mode, refer to “Selecting a VLAN Mode” on page 668.
Delete VLAN
5. Enter the VID of the VLAN you want to delete. You can specify only
one VID at a time.
Note
You cannot delete the Default_VLAN, which has a VID of 1.
Delete VLAN
D - Delete VLAN
R - Return to Previous Menu
Are you sure you want to delete this VLAN [Yes/No] ->
If you select Yes, the VLAN is deleted and the following message is
displayed:
SUCCESS
Please make sure to manually delete any static multicast
MAC address(es) entries for this VLAN
Press any key to continue ...
Any static addresses assigned to the ports of the VLAN are now
obsolete, because the VLAN has been deleted. Those addresses
should be deleted from the MAC address table. For instructions on
how to delete addresses, refer to “Deleting Unicast and Multicast MAC
Addresses” on page 144.
10. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
MAC address-based VLANs are only supported on the
AT-9424Ti/SP switch.
This chapter describes VLANs that are based on the source MAC
addresses of the end nodes that are connected to the switch. With a MAC
address-based VLAN, only those nodes whose source MAC addresses
have been entered as members of the VLAN can share and access the
VLAN resources. This is in contrast to a port-based or tagged VLAN where
any node that has access a switch port can join a VLAN as a member.
One of the principle advantages of this type of VLAN is that it can make it
easier to manage network users that roam. These are users who access
the network from different points at different times. The challenge for a
network administrator is providing these users with the same resources
regardless of the point at which they access the network. If you employed
port-based or tagged VLANs for roaming users, you might have to
reconfigure the VLANs, moving ports to and from different virtual LANs, so
that the users always have access to the same network resources.
But with a MAC address-based VLAN, the switch can assign a network
user to the same VLAN and network resources regardless of the port from
which the user accesses the network.
Egress Ports Implementing a MAC address-based VLAN involves more than entering
the MAC addresses of the end nodes that are members of the VLAN. You
must also designate the egress ports on the switch for the packets from
the nodes. The egress ports define the limits of flooding of packets when a
port receives a unicast packet with an unknown destination address (that
is, an address that has not been learned by the MAC address table).
Without knowing the egress ports, the switch would be forced to flood the
packets on all ports, and that could result in a security violation where end
nodes receive packets from other nodes that are in different VLANs.
Switch Egress
MAC address End Node
Port
addresses or egress ports from a VLAN. Here is how the example might
look.
A switch can support more than one MAC-address VLAN at a time and a
port can be an egress member of more than one VLAN. While this can
prove useful in some situations, it can also result in VLAN leakage where
the traffic of one VLAN crosses the boundary into other VLANs.
The problem arises in the case of unknown unicast traffic. If the switch
receives a packet from a member of a MAC address-based VLAN with an
unknown destination address, it floods the packet on all egress ports of
the VLAN. If the VLAN contains a port that is also serving as an egress
port of another VLAN, the node connected to the port receives the flooded
packets, even if it does not belong to the same VLAN as the node that
generated the packet.
If security is a major concern for your network, you might not want to
assign a port as an egress port to more than one VLAN when planning
your MAC address-based VLANs.
VLANs That A MAC address-based VLAN can span switches, but it does require a
Span Switches large degree of management in terms of entering the MAC addresses.
Basically, in order for nodes connected to different switches to be
considered as members of the same MAC address-based VLAN, the MAC
addresses of the nodes must be replicated on all of the switches that
comprise the VLAN.
MAC Addresses:
Address_1
Address_2
Address_3
1 3 5 7 9 11 13 15 17 19 21 23 AT-9400 Series
Switch (A)
2 4 6 8 10 12 14 16 18 20 22 24
1 3 5 7 9 11 13 15 17 19 21 23 AT-9400 Series
2 4 6 8 10 12 14 16 18 20 22 24
Switch (B)
MAC Addresses:
Address_4
Address_5
Address_6
Switch A Switch B
VLAN Name: Sales VLAN Name: Sales
MAC Address Egress Ports MAC Address Egress Ports
Address_1 1,3,4,5 Address_1 11,12,14,16
Address_2 1 Address_2 11
Address_3 1 Address_3 11
Address_4 1 Address_4 11
Address_5 1 Address_5 11
Address_6 1 Address_6 11
VLAN Hierarchy The switch’s management software employs a VLAN hierarchy when
handling untagged packets that arrive on a port that is an egress port of a
MAC address-based VLAN as well as an untagged port of a port-based
VLAN. (A port can be a member of both types of VLANs at the same time.)
The rule is that a MAC address-based VLAN takes precedence over that
of a port-based VLAN.
When an untagged packet arrives on a port, the switch first compares the
source MAC address of the packet against the MAC addresses of all the
MAC address-based VLANs on the device. If there is a match, the switch
considers the packet as belonging to the corresponding MAC address-
based VLAN and not to the port-based VLAN, and forwards it out the
egress ports defined for the corresponding MAC address-based VLAN.
Steps to Creating Here are the three main steps to creating a MAC address-based VLAN:
a MAC Address-
1. The first step is to assign the VLAN a name and a VID. You must also
based VLAN set the VLAN type to MAC Based. This is explained in “Creating a
MAC Address-based VLAN” on page 694.
Note
If the VLAN Configuration menu does not include selection 4,
Configure VLANs, the switch is running in a multiple VLAN mode.
The switch must be in the User Configure VLAN mode in order for
you to create MAC address-based VLANs. To change the switch’s
VLAN mode, refer to “Selecting a VLAN Mode” on page 668.
multiple switches, then the name for the VLAN should be the same on
each switch where nodes of the VLAN are connected.
Note
A VLAN must be assigned a name.
7. Type a VID value for the new VLAN. The range for the VID value is 1 to
4094.
Note
A VLAN must have a VID.
It should be noted that the switch is only aware of the VIDs of the
VLANs that exist on the device, and not those that might already be in
use in the network. For example, if you add a new AT-9400 Series
switch to a network that already contains VLANs that use VIDs 2
through 24, the AT-S63 management software still uses VID 2 as the
default value when you create the first VLAN on the new switch, even
though that VID number is already being used by another VLAN on the
network. To prevent inadvertently using the same VID for two different
VLANs, you should keep a list of all your network VLANs and their VID
values.
8. Type 3 to toggle VLAN Type to display MAC Based. This is the correct
setting for a MAC address-based VLAN.
Note
The Port Based setting for VLAN type is used to create port-based
and tagged VLANs, as explained to Chapter 25, “Port-based and
Tagged VLANs” on page 599.
Note
Do not specify any tagged or untagged ports. Additionally, leave the
Protected Ports selection at the default setting of No.
10. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This procedure explains how to add and delete MAC addresses from a
MAC address-based VLAN. If you are creating a new VLAN, you perform
this procedure after you initially create the VLAN by giving it a name and a
VID and setting the VLAN type, as explained in “Creating a MAC Address-
based VLAN” on page 694. After you assign the MAC addresses to the
VLAN, you must specify the egress ports, as described in “Adding and
Deleting Egress Ports” on page 699.
You cannot remove a MAC address from a VLAN if the address has been
assigned egress ports. You must first remove the ports from the MAC
address before you can delete it. For instructions, refer to “Adding and
Deleting Egress Ports” on page 699.
6. Enter the VID of the MAC address-based VLAN where you want to
add or delete a MAC address. You can enter only one VID. To display
the VIDs, refer to “Displaying MAC Address-based VLANs” on
page 703.
7. Enter the MAC address to add to or delete from the VLAN. You can
enter the address in either of the following formats:
xx:xx:xx:xx:xx:xx or xxxxxxxxxxxx
9. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
This procedure explains how to add and delete egress ports from the MAC
addresses in a MAC address-based VLAN.
To add or delete egress ports from a MAC address, perform the following
procedure:
The MAC Based VLANs menu is shown in Figure 239 on page 697.
6. Enter the VID of the MAC address-based VLAN where you want to
add or delete an egress port. You can enter only one VID. To display
the VIDs, refer to “Displaying MAC Address-based VLANs” on
page 703.
7. Enter the MAC address where you want to add or delete an egress
port. You can specify only one address and the address must already
exist in the VLAN. For instructions on how to add an address to a
VLAN, refer to “Adding and Deleting MAC Addresses” on page 697.
You can enter the address in either of the following formats:
xx:xx:xx:xx:xx:xx or xxxxxxxxxxxx
8. Enter the egress port for the address. You can specify more than one
port. You can specify the ports individually (e.g., 2,4,15), as a range
(e.g., 11-15), or both (e.g., 2,4,11-17).
If you are adding an egress port, the port is immediately added to the
MAC address. If you are deleting an egress port, the port is deleted
from the address.
9. To add or delete more egress ports, repeat this procedure starting with
step 5.
10. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
To delete a VLAN, you need to know its VID. To view VLAN VIDs,
refer to “Displaying MAC Address-based VLANs” on page 703.
5. Enter the VID of the VLAN you want to delete. You can specify only
one VID at a time.
Note
You cannot delete the Default_VLAN, which has a VID of 1.
D - Delete VLAN
R - Return to Previous Menu
Are you sure you want to delete this VLAN [Yes/No] ->
If you select Yes, the VLAN is deleted and the following message is
displayed:
SUCCESS
Please make sure to manually delete any static multicast
MAC address(es) entries for this VLAN
Press any key to continue ...
10. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
VID VLAN Name VLAN Type Protocol Untagged (U) / Tagged (T)
----------------------------------------------------------------------
The Show VLANs menu displays a table that contains the following
columns of information:
VID
The VLAN ID.
VLAN Name
Name of the VLAN.
VLAN Type
The VLAN type. The possible settings are:
Protocol
The protocol associated with this VLAN. The possible settings are:
4. Enter the VID of the MAC address-based VLAN whose details you
want to view.
VID VLAN Name VLAN Type Protocol Untagged (U) / Tagged (T)
----------------------------------------------------------------------
MAC Associations:
Total number of associated MAC addresses: 5
-------------------------------------------------
MAC Address Ports
-------------------------------------------------
00:0A:22:22:22:22 12-20,22
00:0A:44:44:44:44 12
00:0A:66:66:66:66 12
00:0A:77:77:77:77 12
00:0A:88:88:88:88 12
U - Update Display
R - Return to Previous Menu
The lower portion of the display lists the MAC addresses that belong to the
VLAN along with their egress ports.
Port Security
This chapter explains how you can use the dynamic and static MAC
addresses learned or manually added to the switch’s MAC address table
to control which end nodes can forward packets through the device. The
sections in this chapter include:
Note
This type of port security does not apply to ports located on optional
GBIC or SFP modules.
This feature can enhance the security of your network. You can use it to
control which end nodes can forward frames through the switch, and so
prevent unauthorized individuals from accessing your network or particular
parts of the network.
Automatic
Limited
Secured
Locked
You set port security on a per port basis. Only one security level can be
active on a port at a time.
Automatic The Automatic security mode disables port security on a port. This is the
default security level for a port.
Limited The Limited security level allows you to specify the maximum number of
dynamic MAC addresses a port can learn. After a port has learned its
maximum number of addresses, it discards all ingress frames with source
MAC addresses not already learned.
When the Limited security mode is initially activated on a port, all dynamic
MAC addresses learned by the port are deleted from the MAC address
table. The port then begins to learn new addresses, up to the maximum
allowed. After the port has learned its maximum number of addresses, it
does not learn any new addresses, even when end nodes are inactive.
Static MAC addresses are retained by the port and are not included in the
count of maximum dynamic addresses. You can continue to add static
MAC addresses to a port operating with this security level, even after the
Secured The Secured security level instructs a port to forward frames using only
static MAC addresses. The port does not learn any dynamic MAC
addresses and deletes any dynamic addressees that it has already
learned. Only those end nodes whose MAC addresses are entered as
static addresses are able to forward frames through the port.
After you have activated this security level, you must enter the static MAC
addresses of the end nodes that are to be allowed to forward frames
through the port.
Locked The Locked security level causes a port to immediately stop learning new
dynamic MAC addresses. Frames are forwarded using the dynamic MAC
addresses that the port has already learned and any static MAC
addresses assigned to the port.
Dynamic MAC addresses learned by the port prior to the activation of this
security level never time out from the MAC address table, even when the
corresponding end nodes are inactive. However, the port does not learn
new dynamic addresses.
You can continue to add new static MAC addresses to a port operating
under this security level.
Note
For background information on MAC addresses and aging time,
refer to “MAC Address Overview” on page 136.
Invalid Frames When a port receives an invalid frame, it has to decide what action it takes.
and Intrusion This is what is referred to as intrusion action.
Actions Before defining the intrusion actions, it helps to understand what
constitutes an invalid frame. This differs for each security level, as
explained here:
Intrusion action defines what a port does when it receives an invalid frame.
For a port operating under either the Secured or Locked security mode,
the intrusion action is always the same. The port discards the frame.
But with the Limited security mode you can specify an intrusion action.
Here are the options:
MAC Address Following are several general guidelines to keep in mind when using this
Port Security type of port security:
Guidelines The filtering of a packet occurs on the ingress port, not on the egress
port.
You can configure MAC address port security from a local, Telnet, or
SSH management session, but not from a web browser management
session.
You cannot use MAC address port security and 802.1x port-based
access control on the same port. To configure a port as an
Authenticator or Supplicant in 802.1x port-based access control, you
must set its MAC address security level to Automatic, which is the
default setting.
This type of port security is not supported on optional GBIC or SFP
modules.
3. From the Port Security menu, type 1 to select Configure Port Security.
Enter Port-List:
4. Enter the port where you want to set MAC address port security. You
can specify one port or a range or ports (for example, 4-8).
The menu displays the current security level on the selected port. If
you are configuring a range of ports and the ports have different
security levels, the menu displays the security level of the lowest
number port.
Note
Option D, Select Default Port Security, sets the security mode for
the port to the default value of Automatic.
6. Select the desired security level. For definitions of the security levels,
refer to “MAC Address Port Security Overview” on page 710.
10. If you selected the trap or disable intrusion action, type 4 to toggle the
Port Participating option to Yes.
11. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To view the current security levels and intrusion actions for the ports on
the switch, perform the following procedure:
3. From the Port Security menu, type 2 to select Display Port Security.
N - Next Page
U - Update Display
R - Return to Previous Menu
The Display Port Security menu displays a table that contains the
following columns of information:
Port
The number of the port.
Security Mode
The active security mode on the port.
Threshold
The maximum number of dynamic MAC addresses the port learns. It
only applies when a port is operating in the Limited security mode.
Intruder Action
The action taken by a port if it receives an invalid frame while
operating in the Limited security mode. The possible settings are:
Note
Though this is not reflected in the Display Port Security menu, ports
operating in the Secure or Locked security mode discard all invalid
frames. For further information, refer to “Invalid Frames and
Intrusion Actions” on page 711
Participating
This column applies only when the intrusion action for a port operating
in the Limited security mode is set to trap or disable. This option does
not apply when intrusion action is set to No Action (discard). If this
option is set to No when intrusion action is set to trap or disable, the
port discards invalid packets, but it does not send a trap or disable the
port.
This chapter explains yet another way. This method, referred to as 802.1x
port-based network access control, uses the RADIUS protocol to control
who can send traffic through and receive traffic from a switch port. The
switch does not allow an end node to send or receive traffic through a port
until the user of the node has logged on by entering a username and
password that the RADIUS server has validated.
The benefit of this type of network security is obvious. You can use it to
prevent unauthorized individuals from connecting a computer to a switch
port or using an unattended workstation to access your network
resources. Only those users to whom you have assigned valid usernames
and passwords will be able to use the switch to access the network.
This port security method uses the RADIUS authentication protocol. The
AT-S63 management software is shipped with RADIUS client software. If
you have already read Chapter 36, “TACACS+ and RADIUS Protocols” on
page 825, then you know that you can use the RADIUS client software on
the switch, along with a RADIUS server on your network, to create new
manager accounts that control who can manage and change the AT-S63
parameter on the switch.
Note
RADIUS with Extensible Authentication Protocol (EAP) extensions
is the only supported authentication server for this feature. This
feature is not supported with the TACACS+ authentication protocol.
The switch supports only one authentication protocol at a time.
Therefore, if you want to implement IEEE 802.1 port access control
and also create new manager accounts as explained in Chapter 36,
“TACACS+ and RADIUS Protocols” on page 825, you must use the
RADIUS protocol.
Following are several terms to keep in mind when you use this feature.
The AT-9400 Series switch does not authenticate any of the username
and passwords from the end users. Rather, it acts as an intermediary
between a supplicant and the authentication server during the
authentication process.
Either the authenticator (that is, a switch port) or the supplicant initiates
an authentication message exchange. The switch initiates an
exchange when it detects a change in the status of a port (such as
when the port transitions from no link to valid link), or if it receives a
packet on the port with a source MAC address not in the MAC address
table.
An authenticator starts the exchange by sending an EAP-Request/
Identity packet. A supplicant starts the exchange with an EAPOL-Start
packet, to which the authenticator responds with a EAP-Request/
Identity packet.
The supplicant responds with an EAP-Response/Identity packet to the
authentication server via the authenticator.
The authentication server responds with an EAP-Request packet to
the supplicant via the authenticator.
The supplicant responds with an EAP-Response/MD5 packet
containing a username and password.
The authentication server sends either an EAP-Success packet or
EAP-Reject packet to the supplicant.
Upon successful authorization of the supplicant by the authentication
server, the switch adds the supplicant’s MAC address to the MAC
address as an authorized address and begins forwarding network
traffic to and from the port.
When the supplicant sends an EAPOL-Logoff message, the switch
removes the supplicant’s MAC address from the MAC address table,
preventing the supplicant from sending or receiving any further traffic
from the port.
Port Roles Part of the task of implementing this feature is specifying the roles of the
ports on the switch. A port can have one of three roles:
None
Authenticator
Supplicant
None Role
A switch port in the None role does not participate in port-based access
control. Any device can connect to the port and send traffic through it and
receive traffic from it without providing a username and password. This is
the default setting for the switch ports.
Set a port to this role if you do not want to require its client to log on to use
the network. This is also the correct role for a port that is connected to an
authentication server. Because an authentication server cannot
authenticate itself, the switch port to which it is connected must be set to
this role.
Authenticator Role
Placing a switch port in the authenticator role activates port access control
on the port. A port in the role of authenticator does not forward network
traffic to or from the end node until the client has entered a username and
password and the authentication server has validated them.
Figure 248 illustrates this concept. Port 2 on the switch has been set to the
authenticator role because it is connected to an end node with 802.1x
client software. The end user at the workstation must log on to use the
network.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Port 22 in
Port 2 in None
Authenticator Role
Role
RADIUS
Supplicant with Authentication
802.1x Client Server
Software
As mentioned earlier, the switch itself does not authenticate the user
names and passwords from the clients. That is the responsibility of the
authentication server, which contains the RADIUS server software.
Instead, a switch acts as an intermediary for the authentication server by
denying access to the network by the client until the client has provided a
username and password, which the authentication server validates.
Supplicant Role
A switch port in the supplicant role acts as a client. The port assumes it
must log in by providing a valid user name and password to whatever
device it is connected to, typically another switch port.
Figure 249 illustrates the port role. Port 11 on switch B has been set to the
supplicant role. Now, whenever switch B is power cycled or reset and
initiates a link with switch A, it must log on by providing a username and
password. (You enter this information when you configure the port for the
supplicant role.)
Switch A
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Port 6
in
Authenticator
Role RADIUS
Authentication
Server
Port 11
in Supplicant Role
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
Switch B
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
Authenticator An authenticator port has two supplicant modes. The modes relate to the
Ports with Single number of clients that are using the port and, in situations where an
authenticator port is supporting more than one client, whether just one
and Multiple client or all the clients must log on to use the switch port.
Supplicants
The operating modes are:
Single
Multiple
The Single operating mode is used in two situations. The first is when an
authenticator port supports only one client. In this scenario, the switch
allows only one client to log on and use the port.
You can also use the Single mode when an authenticator port supports
more than one client, but where only one client needs to log on in order for
all clients to use the port. This configuration can be useful in situations
where you want to add 802.1x port-based network access control to a
switch port that is supporting multiple clients, but do not want to assign
each client a username and password.
Note, however, that should the client who accomplished the initial log on
fail to periodically reauthenticate or log out, the switch port reverts to the
unauthenticated state. It bars all further traffic to and from all the clients on
the port, until the initial client or another client logs on by providing a valid
username and password combination.
Here are a couple examples that illustrated the Single operating mode and
the piggy-back mode of an authenticator port. In Figure 250, an
authenticator port on a switch, in this case port 6, is connected to a single
802.1x-compliant client. The authenticator port’s operating mode is set to
Single and the piggy-back feature is disabled so that only one client can
use the port at any one time.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
RADIUS
Port 6 Authentication
Role: Authenticator Server
Operating Mode: Single
Piggy-back Mode: Disabled
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
RADIUS
Port 6
Authentication
Role: Authenticator
Server
Operating Mode: Single
Piggy-back Mode: Enabled
Ethernet Hub or
Non-802.1x-compliant
Switch
Figure 251. Single Operating Mode with Multiple Clients Using the Piggy-
back Feature - Example 1
As mentioned early, should the client who performed the initial log on fail
to reauthenticate when necessary or log out, the port reverts to the
unauthenticated state, blocking all traffic to and from all clients.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
Port 6
Role: Authenticator RADIUS
Operating Mode: Single Authentication
Piggy-back Mode: Enabled Server
Port 11
Role: Supplicant
Username: sales_switch
Password: wind4411
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
Client Ports:
Role: None
Clients without
802.1x Client
Software
Figure 252. Single Operating Mode with Multiple Clients Using the Piggy-
back Feature - Example 2
Because the piggy-back mode is being used and the initial log on to switch
A is accomplished by the supplicant port on switch B, none of the
workstations connected to switch B need to have 802.1x client software
when accessing switch A. The log on to switch A and the subsequent
reauthentications are performed automatically by the supplicant port on
switch B. It should be noted, however, that in this particular scenario the
clients have full access to the resources of switch B even if the switch fails
to log on or reauthenticate to switch A.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
Port 6:
Role: None RADIUS
or Authentication
Role: Authenticator Server
Operating Mode: Single
Piggy-back Mode: Enabled
Port 11:
Role: None
or
Role: Supplicant
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
Client Ports:
Role: Authenticator
Operating Mode: Single
Piggy-back Mode: Disabled
Clients with
802.1x Client
Software
Figure 253. Single Operating Mode with Multiple Clients Using the Piggy-
back Feature - Example 3
The second type of operating mode for an authenticator port is the Multiple
mode. You use this mode when a port is supporting more than one client
and you want each client to log on individually before being permitted to
use the port, perhaps to increase network security. An authenticator port
in this mode can support up to a maximum of 20 clients, with a total
maximum of 480 per switch. You must provide each client with a separate
username and password combination and the clients must provide their
combinations to forward traffic through the switch port.
Selecting the Multiple mode for an authenticator port disables the piggy-
back mode, because this operating mode precludes piggy-backing.
log onto and forward traffic through the AT-9400 Series switch. Of course,
the combinations must be defined on the RADIUS authentication server.
The switch prompts a client for the information the first time they try to
pass a packet through the authenticator port. The port accepts and
forwards traffic only from those clients who successfully log on and denies
access to all other users.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
RADIUS
Port 6
Authentication
Role: Authenticator
Server
Operating Mode: Multiple
Piggy-back Mode: -----
Ethernet Hub or
Non-802.1x-compliant
Switch
Clients with
802.1x Client
Software
The next example of the multiple mode in Figure 255 shows two AT-9400
Series switches. The clients connected to switch B have to log on to port 6
on Switch A when they pass a packet to that switch for the first time.
Also note that the ports where the clients are connected on switch B are
set to the none role. This is because a client can log on only once. If, in this
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
Port 6
Role: Authenticator RADIUS
Operating Mode: Multiple Authentication
Piggy-back Mode: ----- Server
Port 11
Role: Supplicant
Username: switch24
Password: waveform
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
Client Ports:
Role: None
Clients with
802.1x Client
Software
The switch sends accounting information to the RADIUS server when one
of the following events occur:
Supplicant logs on
Supplicant logs off
A change in the status of an Authenticator port during an active
Supplicant session (for example, the port is reset or is changed from
the Authenticator role to None role while a Supplicant is logged on)
The information sent by the switch to the RADIUS server for an event
includes:
You can also configure the accounting feature to send interim updates so
you can monitor which clients are still active.
General Steps Following are the general steps to implementing 802.1x Port-based
Network Access Control and RADIUS accounting on the switch:
Note
This feature is not supported with the TACACS+ authentication
protocol.
3. You must configure and activate the RADIUS client software in the
AT-S63 management software. The default setting for the
authentication protocol is disabled. You will need to provide the
following information:
4. Next, you must configure the port access control settings on the
switch. This involves the following:
802.1x Port-based The following are general guidelines to using this feature:
Network Access
Ports operating under port-based access control do not support
Control dynamic MAC address learning.
Guidelines The appropriate port role for a port on an AT-9400 Series switch
connected to an authentication server is None.
The authentication server must be a member of the management
VLAN. For information about management VLANs, refer to “Specifying
a Management VLAN” on page 633.
If a switch port set to the supplicant role is connected to a port on
another switch that is not set to the authenticator role, the port, after a
timeout period, assumes that it can send traffic without having to log
on.
A username and password combination is not tied to the MAC address
of an end node. This allows end users to use the same username and
password when working at different workstations.
After a client has successfully logged on, the MAC address of the end
node is added to the switch’s MAC address table as an authenticated
address. It remains in the table until the client logs off the network or
fails to reauthenticate, at which point the address removed. The
address is not timed out, even if the node becomes inactive.
Note
End users of 802.1x port-based network access control should be
instructed to always log off when they are finished with a work
session. This prevents unauthorized individuals from accessing the
network through unattended network workstations.
You cannot use the MAC address port security feature, described in
Chapter 30, “MAC Address-based Port Security” on page 709, on
switch ports that are set to the authenticator or supplicant role. A port’s
MAC address security level must be Automatic.
An authenticator port can be tagged or untagged.
An authenticator port cannot be part of a static port trunk, LACP port
trunk, or port mirror.
GVRP must be disabled on an authenticator port.
When 802.1x Port-based Network Access Control is activated on a
switch, the feature polls all RADIUS servers specified in the RADIUS
configuration. If three servers have been configured, the switch polls
all three. If server 1 responds, all future requests go only to that server.
If server 1 stops responding, the switch again polls all RADIUS
servers. If server 2 responds, but not server 1, then all future requests
go to servers 1 and 2. If only server 3 responds, then all future
requests go to all three servers.
The AT-S63 management software only supports EAP-MD5
authentication for both authenticators and supplicants.
This procedure sets port roles. For an explanation of port roles, refer to
“Port Roles” on page 722. You must set up the port roles before you
enable port access control.
3. From the Port Access Control menu, type 3 to select Configure Port
Access Role.
4. Enter the port whose role you want to change. You can specify one
port or a range of ports (for example, 4-8), but not nonconsecutive
ports (for example, 4,6,11).
Configuring Port 3
1 - Port Role ......... None
6. If you type N for None, the port does not participate in port access
control. This is the default setting. If the port is connected to a
supplicant, type A to set the port’s role to Authenticator. If the port is
connected to an authenticator, type S to set the port’s roles to
Supplicant.
7. Repeat this procedure starting with Step 3 to configure the role of the
other ports on the switch.
3. From the Port Access Control menu, type 1 to select Port Access
Control.
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
A port must already be configured as an authenticator before you
can configure its settings. For instructions on how to change the role
of a port, refer to “Setting Port Roles” on page 734.
Configuring Port 3
1 - Supplicant Mode .......... Single
2 - Port Control ............. Auto
3 - Quiet Period ............. 60 Seconds
4 - TX Period ................ 30 Seconds
5 - Reauth Enabled ........... Enabled
6 - Reauth Period ............ 3600 Seconds
7 - Supplicant Timeout ....... 30 Seconds
8 - Server Timeout ........... 30 Seconds
9 - Max Requests ............. 2
A - Control Direction ........ Both
B - Piggyback Mode ........... Disabled
1 - Supplicant Mode
This parameter can take the following values:
Note
For addition information on the authenticator modes, refer to
“Authenticator Ports with Single and Multiple Supplicants” on
page 724.
2 - Port Control
The possible settings for this parameter are:
3 - Quiet Period
The quiet period is the number of seconds that the port remains in the
quiet state following a failed authentication exchange with the client.
The default value is 60 seconds. The range is 0 to 65,535 seconds.
4 - TX Period
This parameter sets the number of seconds that the switch waits for a
response to an EAP-request/identity frame from the client before
retransmitting the request. The default value is 30 seconds. The range
is 1 to 65,535 seconds.
5 - Reauth Enabled
Specifies if reauthentication should occur according to the
reauthentication period. The options are Enabled or Disabled.
6 - Reauth Period
The reauth period enables periodic reauthentication of the client, which
is disabled by default. The default value is 3600 seconds. The range is
1 to 65,535 seconds.
7 - Supplicant Timeout
This parameter sets the switch-to-client retransmission time for the
EAP-request frame. The default value for this parameter is 30
seconds. The range is 1 to 600 seconds.
8 - Server Timeout
This parameter sets the timer used by the switch to determine
authentication server timeout conditions. The default value for this
parameter is 30 seconds. The range is 1 to 65,535 seconds.
9 - Max Requests
This parameter specifies the maximum number of times that the switch
retransmits an EAP Request packet to the client before it times out the
authentication session. The default value for this parameter is 2
retransmissions. The range is 1 to 10 retransmissions.
A - Control Direction
This parameter specifies how the port handles ingress and egress
broadcast and multicast packets when in the unauthorized state. When
a port is set to the authenticator role, it remains in the unauthorized
state until a client logs on by providing a username and password
combination. In the unauthorized state, the port only accepts EAP
packets from the client. All other ingress packets that the port might
receive from the client, including multicast and broadcast traffic, is
discarded until the supplicant has logged in. The options are:
Both - A port, when in the unauthorized state, does not forward ingress
or egress broadcast and multicast packets from or to the same client
until the client logs in. This is the default.
Note
This parameter is only available when the authenticator’s mode is
set to Single. When set to Multiple, a port does not forward ingress
or egress broadcast or multicast packets until at least one client has
logged on.
B - Piggyback Mode
This parameter controls who can use the switch port in cases where
there are multiple clients using the port (e.g., the switch port is
connected to an Ethernet hub). If set to enabled, the port allows all
clients on the port to piggy-back onto the initial client’s authentication,
forwarding all packets after one client is authenticated. If set to
Disabled, the switch port forwards only those packets from the client
who is authenticated and discards packets from all other users.
Note
This parameter is only available when the authenticator’s mode is
set to Single. For further information, refer to “Authenticator Ports
with Single and Multiple Supplicants” on page 724.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Note
A port must already be configured as an supplicant before you can
configure its settings. For instructions on how to change the role of a
port, refer to “Setting Port Roles” on page 734.
1 - Auth Period
This parameter specifies the period of time in seconds that the
supplicant waits for a reply from the authenticator after sending an
EAP-Response frame. The range is 1 to 60 seconds. The default is 30
seconds.
2 - Held Period
The held period specifies the amount of time in seconds the supplicant
is to refrain from retrying to re-contact the authenticator in the event
the end user provides an invalid username and/or password. After the
time period has expired, the supplicant can attempt to log on again.
The range is 0 to 65,535. The default value is 60.
3 - Max Start
Max start is the maximum number of times the supplicant sends
EAPOL-Start frames before assuming that there is no authenticator
present. The range is 1 to 10. The default is 3.
4 - Start Period
The start period is the time period in seconds between successive
attempts by the supplicant to establish contact with an authenticator
when there is no reply. The range is 1 to 60. The default is 30.
5 - User Name
The user name is the username for the switch port. The port sends the
name to the authentication server for verification when the port logs on
to the network. The username can be from 1 to 16 alphanumeric
characters (A to Z, a to z, 1 to 9). Do not use spaces or special
6 - User Password
This parameter specifies the password for the switch port. The port
sends the password to the authentication server for verification when
the port logs on to the network. The password can be from 1 to 16
alphanumeric characters (A to Z, a to z, 1 to 9). Do not use spaces or
special characters, such as asterisks or exclamation points. The
password is case sensitive.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
To display the port access parameters for the ports on the switch, perform
the following procedure:
3. From the Port Access Control menu, type 6 to select Display Port
Access status.
N - Next Page
U - Update Display
R - Return to Previous Menu
The Display Port Access Status menu displays a table that contains
the following columns of information:
Port
Port number.
Port Role
Port access role configured for the port. The possible settings are
None, Authenticator, or Supplicant.
State
State of the port. The state field is dependent on whether a port is
configured as an authenticator or a supplicant.
When you configure a port with an Authenticator Role, the State field
can have the following values:
Aborting
Authenticated
Authenticating
Connecting
Disconnected
Force_Auth
Force_Unauth
Held
Initialize
When you configure a port with a Supplicant role, the State field can
have the following values:
Acquired
Authenticated
Authenticating
Connecting
Disconnected
Held
Logoff
Additional Info
When you assign a port the role of Authenticator and it has a status of
Authenticated, this field also displays the MAC address of the
Authenticator.
1 - Status............ Disabled
2 - Port.............. 1813
3 - Type.............. Network
4 - Trigger Type...... Start_Stop
5 - Update Status..... Disabled
6 - Update Interval... 60
1 - Status
This parameter activates or deactivates RADIUS accounting on the
2 - Port
This parameter specifies the UDP port for RADIUS accounting. The
default is port 1813.
3 - Type
This parameter specifies the type of RADIUS accounting. The default
is Network. This value cannot be changed.
4 - Trigger Type
This parameter specifies the action that causes the switch to send
accounting information to the RADIUS server. The options are:
Start_Stop
The switch sends accounting information whenever a client logs on or
logs off the network. This is the default.
Stop
The switch sends accounting information only when a client logs off.
5 - Update Status
This parameter controls whether the switch is to send interim
accounting updates to the RADIUS server. The default is disabled. If
you enable this feature, use the next option in the menu to specify the
intervals at which the switch is to send the accounting updates.
6 - Update Interval
This parameter specifies the intervals at which the switch sends
interim accounting updates to the RADIUS server. The range is 30 to
300 seconds. The default is 60 seconds.
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Management Security
Web Server
The AT-S63 management software comes with web server software. The
software is available so that you can remotely manage the switch with a
web browser from any management station on your network. (The
instructions for managing a switch with a web browser are described in the
AT-S63 Network Management Web Browser Interface User’s Guide.)
The web server can operate in two modes. The first is referred to as non-
secure HTTP mode. In this mode, packets sent between the switch and
the web browser during a management session are transmitted in
plaintext. Anyone monitoring your network with a sniffer can view the
contents of the management packets.
The web server can also operate in the secure HTTPS mode where all
communications between the switch and a web browser are encrypted.
This feature uses the Secure Sockets Layer (SSL) protocol. It can help
protect your switch from intruders who might be monitoring your network.
If you intend to use the secure HTTPS mode of the web server, there are
several procedures you need to perform before you can configure the web
server. You must create an encryption key, as explained in Chapter 33,
“Encryption Keys” on page 759. You must also create a certificate and add
the certificate to the certificate database. This latter part is explained in
Chapter 34, “PKI Certificates and SSL” on page 781. For an overview of
all the steps, see “General Steps for Configuring the Web Server for
Encryption” on page 756.
The default setting for the web server is enabled, with the non-secure
HTTP mode as the default active mode.
Note
To use SSL in an enhanced stack, all switches in the stack must use
SSL. For further information, refer to “SSL and Enhanced Stacking”
on page 784.
Supported The switch supports the following HTTP and HTTPs protocols:
Protocols HTTP v1.0 and v1.1 protocols
HTTPS v1.0 and v1.1 protocols running over SSL
This procedure explains how to enable and disable the web server and
how to configure the HTTP and HTTPS settings from a local or Telnet
management session. The default setting for the web server is enabled,
with the non-secure HTTP mode as the active web server mode.
You cannot make any changes to the HTTP or HTTPS settings while
the web server is enabled. You must first disable the web server before
making changes.
To configure the web server for the HTTPS secure mode, you must
first create an encryption key and a certificate, and add the certificate
to the certificate database. The AT-S63 management software does
not allow you to configure the web server for the HTTPS secure mode
until those steps have been completed. For instructions, refer to
Chapter 33, “Encryption Keys” on page 759, and Chapter 34, “PKI
Certificates and SSL” on page 781. For an overview of all the steps,
see “General Steps for Configuring the Web Server for Encryption” on
page 756.
To change an HTTP or HTTPS setting, you must perform the entire
procedure. For example, to change the port number for HTTP, you
must first disable the web server and then reselect HTTP.
Disabled - Disables the web server. (If you are making any changes to
the web server settings, you must first disable it.)
1 - HTTP to select the non-secure HTTP mode for the web server. This
is the default value.
2 - HTTPS to select the secure HTTPS mode. This setting activates
the SSL protocol on the web server.
Enter the ID number of an encryption key on the switch. (To view the
encryption key IDs, refer to “Creating an Encryption Key” on
page 767.) You must have already created the encryption key and a
certificate using the key. You must also have already added the
certificate to the certificate database.
The default port number for HTTP is 80. The default port number for
HTTPS is 443.
1. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
General Steps for Below are the general steps for setting up the web server with a self-
a Self-signed signed certificate.
Certificate 1. Set the switch’s date and time. You must do this before you create a
certificate because the date and time are stamped in the digital
document. For instructions, refer to “Setting the System Time” on
page 67.
General Steps for Below are the steps for setting up the web server with a public or private
a Public or CA certificate. This requires generating an enrollment request.
Private CA 1. Set the switch’s date and time. You must do this before you create the
Certificate enrollment request. The date and time at stamped in the request. The
instructions for this are in “Setting the System Time” on page 67.
4. Upload the enrollment request from the AT-S63 file system onto your
management station or a TFTP server, as explained in “Uploading a
System File” on page 252.
6. After you have received the appropriate certificates from the CA,
download them into the AT-S63 file system from your management
station or a TFTP server, as explained in “Downloading a System File”
on page 244.
Encryption Keys
This chapter describes encryption keys and how you can use keys to
improve the security of your switches. Because of the complexity of the
feature, this chapter contains several overview sections. The Basic
Overview section offers a general review of the purpose of this feature
along with relevant guidelines. For additional information, refer to the two
Technical Overview sections. The sections in this chapter include:
Note
This feature is only supported in the version of AT-S63 management
software that features the Secure Sockets Layer (SSL) protocol and
Public Key Infrastructure (PKI).
Basic Overview
The Telnet protocol does not support encryption. To have encryption when
you remotely manage a switch using the menus interface, you must first
obtain a Secure Shell (SSH) protocol application. SSH offers the same
function as Telnet, but with encryption.
SSH encryption requires that you create two key pairs on the switch— a
server key pair and a host key pair and then configure the Secure Shell
protocol server software on the switch, as explained in Chapter 35,
“Secure Shell (SSH)” on page 815.
Encryption Key To create a key pair, you must specify its length. The length is given in
Length bits. The range is 512 to 1,536 bits, in increments of 256 bits. The default
is 512 bits.
The general rule on key lengths is that the longer the key, the more difficult
it is for someone to break (decipher). So if you are particularly concerned
about the safety of your management sessions, use a longer key length
than the default, although the default will be more than sufficient.
Creating a key is a very CPU intensive operation for the switch. The switch
does not stop forwarding packets between the ports, but the process can
impact the CPU’s handling of network events, such as the processing of
spanning tree BPDU packets. This can result in unexpected and unwanted
switch behavior.
A key with the default length should take the switch less than a minute to
create. Longer keys can take up to 15 minutes. Consider this information
when you create a key so that you do not to impact the operations of your
network. If you want a longer key, consider creating it before you connect
the switch to the network, or during periods of low network traffic.
Encryption Key Below are guidelines to observe when creating an encryption key pair:
Guidelines
Web browser encryption requires only one key pair.
SSH encryption requires two key pairs. The keys must be of different
lengths of at least one increment (256 bits) apart. The recommended
size for the server key is 768 bits and the recommended size for the
host key is 1024 bits.
An AT-9400 Series switch can only use those key pairs it has
generated itself. The switch cannot use a key created on another
system and imported onto the switch.
The AT-S63 management software does not allow you to copy or
export a private key from a switch. However, you can export a public
key.
The AT-S63 management software uses the RSA public key algorithm.
Web browser and SSH encryption can share a key pair.
Technical Overview
Data encryption
Data authentication
Key exchange algorithms
Key creation and storage
Data Encryption Data encryption for switches is driven by the need for organizations to
keep sensitive data private and secure. Data encryption operates by
applying an encryption algorithm and key to the original data (the
plaintext) to convert it into an encrypted form (the ciphertext). The
ciphertext produced by encryption is a function of the algorithm used and
the key. Because it is easy to discover what type of algorithm is being
used, the security of an encryption system relies on the secrecy of its key
information. When the ciphertext is received by the remote router, the
decryption algorithm and key are used to recover the original plaintext.
Often, a checksum is added to the data before encryption. The checksum
allows the validity of the data to be checked on decryption.
Symmetrical Encryption
algorithm and key. For a given input block of plaintext ECB always
produces the same block of ciphertext.
Cipher Block Chaining (CBC) is the most popular form of DES
encryption. CBC also operates on 64-bit blocks of data, but includes a
feedback step which chains consecutive blocks so that repetitive
plaintext data, such as ASCII blanks, does not yield identical
ciphertext. CBC also introduces a dependency between data blocks
which protects against fraudulent data insertion and replay attacks.
The feedback for the first block of data is provided by a 64-bit
Initialization Vector (IV). This is the DES mode used for the switch’s
data encryption process.
Cipher FeedBack (CFB) is an additive-stream-cipher method which
uses DES to generate a pseudo-random binary stream that is
combined with the plaintext to produce the ciphertext. The ciphertext is
then fed back to form a portion of the next DES input block.
Output FeedBack (OFB) combines the first IV DES algorithms with
the plaintext to form ciphertext. The ciphertext is then used as the next
IV.
The DES algorithm has been optimized to produce very high speed
hardware implementations, making it ideal for networks where high
throughput and low latency are essential.
The two-key algorithm encrypts the data with the first key, decrypts it with
the second key and then encrypts the data again with the first key. The
three-key algorithm uses a different key for each step. The three-key
algorithm is the most secure algorithm due to the long key length.
Inner CBC mode encrypts the entire packet in CBC mode three times
and requires three different initial is at ion vectors (IV’s).
Outer CBC mode triple encrypts each 8-byte block of a packet in CBC
mode three times and requires one IV.
secret. Only the decryption, or private key, needs to be kept secret. The
other name for this type of algorithm is public key encryption. The public
and private key pair cannot be randomly assigned, but must be generated
together. In a typical scenario, a decryption station generates a key pair
and then distributes the public key to encrypting stations. This distribution
does not need to be kept secret, but it must be protected against the
substitution of the public key by a malicious third party. Another use for
asymmetrical encryption is as a digital signature. The signature station
publishes its public key, and then signs its messages by encrypting them
with its private key. To verify the source of a message, the receiver
decrypts the messages with the published public key. If the message that
results is valid, then the signing station is authenticated as the source of
the message.
Data Data authentication for switches is driven by the need for organizations to
Authentication verify that sensitive data has not been altered.
It is easy to calculate the hash from the message and the key
It is very hard to compute the message and the key from the hash
It is very hard to find another message and key which give the same
hash
The two most commonly used one-way hash algorithms are MD5
(Message Digest 5, defined in RFC 1321) and SHA-1 (Secure Hash
Algorithm, defined in FIPS-180-1). MD5 returns a 128-bit hash and SHA-1
returns a 160-bit hash. MD5 is faster in software than SHA-1, but SHA-1 is
generally regarded to be slightly more secure.
Key Exchange Key exchange algorithms are used by switches to securely generate and
Algorithms exchange encryption and authentication keys with other switches. Without
key exchange algorithms, encryption and authentication session keys
must be manually changed by the system administrator. Often, it is not
practical to change the session keys manually. Key exchange algorithms
enable switches to re-generate session keys automatically and on a
frequent basis.
The most important property of any key exchange algorithm is that only
the negotiating parties are able to decode, or generate, the shared secret.
Because of this requirement, public key cryptography plays an important
role in key exchange algorithms. Public key cryptography provides a
method of encrypting a message which can only be decrypted by one
party. A switch can generate a session key, encrypt the key using public
key cryptography, transmit the key over an insecure channel, and be
certain that the key can only be decrypted by the intended recipient.
Symmetrical encryption algorithms can also be used for key exchange, but
commonly require an initial shared secret to be manually entered into all
switches in the secure network.
This section contains the procedure for creating an encryption key pair.
Caution
Key generation is a CPU-intensive process. Because this process
may affect switch behavior, Allied Telesyn recommends creating
keys when the switch is not connected to a network or during
periods of low network activity.
1 - Create Key
2 - Delete Key
3 - Modify Key
4 - Export Key to File
5 - Import Key from File
N - Next Page
U - Update Display
R - Return to Previous Menu
1 - Key ID ............. 0
2 - Key Type ........... RSA-Private
3 - Key Length ......... 512
4 - Key Description ....
5 - Generate Key
U - Update Display
R - Return to Previous Menu
6. Enter an identification number for the key. This number can be from 0
to 65,535. This number is used only for identification purposes and not
in generating the actual encryption key. The ID for each key on the
switch must be unique.
Note
You cannot change the value for option 2, Key Type. This value is
always RSA - Private.
8. Enter a key length. The range is 512 to 1,536 bits, in increments of 256
bits (for example, 512, 768, 1024, etc). Before selecting a key length,
note the following
For SSL and web browser encryption, key length can be any valid
value within the range.
For SSH host and server key pairs, the two keys must be created
separately and be of different lengths of at least one increment
(256 bits) apart. The recommended length is 768 bits for the server
key and 1024 bits for the host key.
10. Enter a description for the key. For instance, the description could
reflect the name of the switch (for example, Production switch web
server key). You can enter up to 40 alphanumeric values including
spaces.
The new key is added to the list of keys in the Key Management menu.
This section contains the procedure for deleting an encryption key pair
from the switch. Note the following before performing this procedure.
Deleting a key pair from the key management database also deletes
the key’s corresponding “.ukf” file from the AT-S63 file system.
You cannot delete a key pair if it is being used by SSL or SSH. You
must either disable the SSL or SSH server software or reconfigure the
software by specifying another key.
Deleting a key pair used in creating an SSL certificate voids the
certificate.
To delete a public and private key pair, perform the following procedure:
The key pair is deleted from the key database and its corresponding
“.UKF” file is deleted from the file system.
The Key Management menu has a selection for modifying the description
of an encryption key. This is the only item of a key that you can modify.
You cannot change a key’s ID, type, or length.
4. From the Key Management menu, type, type 3 to select Modify Key.
6. Enter the new description for the key. The description can be up to 40
alphanumeric characters including spaces. To help identify the key,
you might make the description the name of the web server the key will
be used to protect (for example, Production switch web server).
The following procedure exports the public key of a key pair into the
AT-S63 file system. (The management software does not allow you to
export a private key.) Before performing this procedure, please note the
following:
To export a public key into the file system, perform the following
procedure:
4. From the Key Management menu, type, type 4 to select Export Key to
File.
1 - Key ID ............ 0
2 - Key Type .......... RSA-Public
3 - Key File Format ... HEX
4 - Key File Name
5 - Export Key to File
5. From the Export Key to File menu, type 1 to select Key ID.
6. Enter the key ID of the public key you want to export into the file
system.
Note
Key Type is a read-only field. You cannot change this value.
7. Type 3 to toggle Key File Format to specify the format of the key.
Possible options are:
HEX - An internal format for storing files. Select this option for SSL
configuration. This is the default.
9. Specify the file name of the key. The file name can be from one to
eight alphanumeric characters, not including the extension. Spaces
are allowed. The file name must include the extension “.key”.
10. Type 5 to select Export Key to File to export the key to a file.
To view the public key in the switch’s file system, refer to “Displaying
System Files” on page 220.
Use the following procedure to import a public key from the AT-S63 file
system into the key management database. If a file contains both public
and private keys, only the public key is imported. The private key is
ignored.
Note
It is unlikely that you will ever need to perform this procedure. A
switch can only use those public keys that it has generated itself.
This procedure starts from the Key Management menu. If you are unsure
how to display the menu, perform steps 1 to 3 in “Creating an Encryption
Key” on page 767.
4. From the Key Management menu, type 5 to select Import Key From
File to import an RSA - Public key.
1 - Key ID ............ 0
2 - Key Type .......... RSA-Public
3 - Key File Format ... HEX
4 - Key File Name .....
5 - Import Key from File
5. From the Import Key from File menu, type 1 to select Key ID.
This must be an unused key ID. It cannot match any of the key IDs that
are already in use on the switch.
Note
You cannot change Option 2, Key Type.
7. Type 3 to select Key File Format to choose the format of the key. The
possible options are:
HEX - An internal format for storing files. Select this option for SSL
configuration. This is the default.
The key file name must include the “.key” extension. If you are unsure
of the file name, display the files in the switch’s file system by referring
to “Displaying System Files” on page 220.
10. Type 5 to select Import Key From File to import a key to the switch
from an external file.
After you receive this message, the key is added to the Key
Management database. See the Key Management menu in Figure 267
on page 768.
1 - Create Key
2 - Delete Key
3 - Modify Key
4 - Export Key to File
5 - Import Key to File
N - Next Page
U - Update Display
R - Return to Previous Menu
ID
The identification number of the key.
Algorithm
The algorithm used in creating the encryption. This is always
RSA-Private.
Length
The length of the key in bits.
Digest
The CRC32 value of the MD5 digest of the public key.
Description
The key’s description.
This chapter contains the procedures for creating public key infrastructure
(PKI) certificates for web server security. Because of the complexity of this
feature, two overview sections are provided. The Basic Overview section
offers a general review of the purpose of certificates along with relevant
guidelines. For additional information refer to the Technical Overview
section. This chapter contains the following sections:
Note
This feature is only supported on the version of AT-S63
management software that features secure sockets layer (SSL) and
public key infrastructure (PKI).
Basic Overview
This chapter describes the second part of the encryption feature of the
AT-S63 management software—PKI certificates. The first part is
explained in Chapter 33, “Encryption Keys” on page 759. Encryption keys
and certificates allow you to encrypt the communications between your
management station and a switch when you manage the device with a
web browser. Encryption helps protect your switch from any intruder who
might be using a sniffer to monitor the network.
An encryption key consists of two parts: a private key and a public key.
The private key remains on the switch and is used by the device to encrypt
its messages.
The public key is incorporated into a certificate. This is the key that your
management station uses when you perform a web browser management
session. Your web browser downloads the certificate from the switch when
you begin a management session.
The quickest and easiest way to create a certificate is to have the switch
create it itself. This type of certificate is called a self-signed certificate. If
you have a small to medium sized network, then this might be the way to
go. The procedure for creating this kind of certificate can be found in
“Creating a Self-signed Certificate” on page 793. To review all the steps to
configuring the web server for this type of certificate, refer to “General
Steps for Configuring the Web Server for Encryption” on page 756.
Another option is to create the key but have someone else issue the
certificate. That person, group, or organization is called a certification
authority (CA).
There are two kinds of CAs: public and private. A public CA issues
certificates for other companies and organizations. A prominent example
of a public CA is VeriSign. A public CA requires proof of the identify of the
company or organization that wants a certificate before it issues it.
Public CAs issue certificates that are typically intended for use by the
general public. Because a certificate for an AT-9400 Series switch is used
only by you and other network managers, you might decide that it is not
necessary to have a public CA issue an AT-9400 Series switch certificate.
Some large companies have private CAs. This is a person or group within
the company that is responsible for issuing certificates for the company’s
network equipment. The value of a private CA is that the company can
keep track of the certificates and control access to various network
devices.
If your company is large enough, it might have a private CA and you might
want that group to issue any AT-9400 Series switch certificates, if for no
other reason than to follow company policy.
cn - common name
This can be the name of the person who will use the certificate.
ou - organizational unit
st - state
This is the state.
c - country
A certificate name does not need to contain all of these parts. You can use
as many or as few as you want. You separate the parts with a comma. You
can use alphanumeric characters, as well as spaces in the name strings.
You cannot use quotation marks. To use the following special characters
{=,+<>#;\<CR>}, type a “\” before the character.
Following are a few examples. This distinguished name contains only one
part, the name of the switch:
cn=Production Switch
This distinguished name omits the common name, but includes everything
else:
cn=149.11.11.11
If your network has a Domain Name System and you mapped a name to
the IP address of a switch, you can specify the switch’s name instead of
the IP address as the distinguished name.
Note
If the certificate will be issued by a private or public CA, you should
check with the CA to see if they have any rules or guidelines on
distinguished names for the certificates they issue.
SSL and Secure Sockets Layer (SSL) is supported in an enhanced stack, but only
Enhanced when all switches in the stack are using the feature.
Stacking When a switch’s web server is operating in HTTP, management packets
are transmitted in plaintext. When it operates in HTTPS, management
packets are sent encrypted. The web server on an AT-9400 Series switch,
can operate in either mode. Enhanced stacking switches that do not
support SSL, such as the AT-8000 Series switches, use HTTP exclusively.
that the master switch is using is the same for all the switches in the stack.
As an example, if the master switch is using HTTPS, a web browser
management session assumes that all the other switches in the stack are
also using HTTPS, and it does not allow you to manage any switches
running HTTP.
Technical Overview
This section describes the Secure Sockets Layer (SSL) feature, a security
protocol that provides a secure and private TCP connection between a
client and server.
SSL can be used with many higher layer protocols including HTTP, File
Transfer Protocol (FTP) and Net News Transfer Protocol (NNTP). Most
web browsers and servers support SSL, and its most common deployment
is for secure connections between a client and server over the Internet.
The switch supports SSL versions 2.0 (client hello only) and 3.0 which
were developed by Netscape, and the Internet Engineering Task Force
(IETF) standard for SSL, known as SSL version 3.1 or Transport Layer
Security (TLS).
By default, HTTP and HTTPS use the separate well-known ports 80 and
443, respectively. Secure connections over the Internet are important
when transmitting confidential data such as credit card details or
passwords. SSL allows the client to verify the server’s identity before
either side sends any sensitive information. SSL also prevents a third
party from interfering with the message because only trusted devices have
access to the unprotected data.
SSL Encryption SSL uses encryption to ensure the security of data transmission.
Encryption is a process that uses an algorithm to encode data so it can
only be accessed by a trusted device. An encrypted message remains
confidential.
User Verification An SSL connection has two phases: handshake and data transfer. The
handshake initiates the SSL session, during which data is securely
transmitted between a client and server. During the handshake, the
following occurs:
The client and server establish the SSL version they are to use.
The client and server negotiate the cipher suite for the session, which
includes encryption, authentication, and key exchange algorithms.
The symmetrical key is exchanged.
The client authenticates the server (optionally, the server authenticates
the client).
Handshake
Change Cipher Spec
Alert
Application data (HTTP, FTP or NNTP)
The Change Cipher Spec message informs the receiving party that all
subsequent messages are encrypted using previously negotiated security
options. The parties use the strongest cryptographic systems that they
both support.
The Alert message is used if the client or server detects an error. Alert
messages also inform the other end that the session is about to close. In
addition, the Alert message contains a severity rating and a description of
the alert. For example, an alert message is sent if either party receives an
invalid certificate or an unexpected message.
Authentication Authentication is the process of ensuring that both the web site and the
end user are genuine. In other words, they are not imposters. Both the
server and an individual users need to be authenticated. This is especially
important when transmitting secure data over the Internet.
To verify the authenticity of a server, the server has a public and private
key. The public key is given to the user.
Public Key The public key infrastructure (PKI) feature is part of the switch’s suite of
Infrastructure security modules, and consists of a set of tools for managing and using
certificates. The tools that make up the PKI allow the switch to securely
exchange public keys, while being sure of the identity of the key holder.
Public Keys Public key encryption involves the generation of two keys for each user,
one private and one public. Material encrypted with a private key can only
be decrypted with the corresponding public key, and vice versa. An
individual’s private key must be kept secret, but the public key may be
distributed as widely as desired, because it is impossible to calculate the
private key from the public key. The advantage of public key encryption is
that the private key need never be exchanged, and so can be kept secure
more easily than a shared secret key.
Message One of the two main services provided by public key encryption is the
Encryption exchange of encrypted messages. For example, user 1 can send a secure
message to user 2 by encrypting it with user 2’s public key. Only user 2
can decrypt it, because only user 2 has access to the corresponding
private key.
Digital Signatures The second main service provided by public key encryption is digital
signing. Digital signatures both confirm the identity of the message’s
supposed sender and protect the message from tampering. Therefore
they provide message authentication and non-repudiation. It is very
difficult for the signer of a message to claim that the message was
corrupted, or to deny that it was sent.
Caution
Although a certificate binds a public key to a subject to ensure the
public key’s security, it does not guarantee that the security of the
associated private key has not been breached. A secure system is
dependent upon private keys being kept secret, by protecting them
from malicious physical and virtual access.
The switch can generate a self-signed certificate but this should only be
used with an SSL enabled HTTP server, or where third party trust is not
required.
X.509 Certificates
End entities own public keys and may use them for encryption and digital
signing. An entity which uses its private key to digitally sign certificates is
not considered to be an end entity, but is a certification authority.
Certification Authorities
The usefulness of certificates depends on how much you trust the source
of the certificate. You must be able to trust the issuing CA to verify
identities reliably. The level of verification required in a given situation
depends on the organization’s security needs.
Certificate To validate a certificate, the end entity verifies the signature in the
Validation certificate, using the public key of the CA who issued the certificate.
Root CA Certificates
A root CA must sign its own certificate. The root CA is the most critical link
in the certification chain, because the validity of all certificates issued by
any CA in the hierarchy depends on the root CA’s validity. Therefore,
every device which uses the root CA’s certificate must verify it out-of-band.
Certificate A certificate may become invalid because some of the details in it change
Revocation Lists (for example, the address changes), because the relationship between the
Certification Authority (CA) and the subject changes (for example, an
(CRLs) employee leaves a company), or because the associated private key is
compromised. Every CA is required to keep a publicly accessible list of its
certificates which have been revoked.
PKI The following sections discuss Allied Telesyn’s implementation of PKI for
Implementation the AT-9400 Series switches. The following topics are covered:
PKI Standards
Certificate Retrieval and Storage
Certificate Validation
Root CA Certificates
PKI Standards
Before the switch can use a certificate, it must be retrieved and manually
added to the switch’s certificate database, which is stored in RAM
memory. The switch attempts to validate the certificate, and if validation is
successful the certificate’s public key is available for use.
For a general review of all the steps to configuring the switch for a self-
signed certificate, refer to “General Steps for a Self-signed Certificate”
on page 756.)
The switch’s time and date must be set before you create a certificate.
You can set this manually or you can configure the switch to obtain the
date and time from an SNTP server on your network. For instructions,
refer to “Setting the System Time” on page 67.
You must generate an encryption key pair before you create a
certificate. For instructions, refer to “Creating an Encryption Key” on
page 767.
During this procedure you are prompted to enter the ID number of the
encryption key pair you want to use to create the certificate. If you
have forgotten the ID number of the key, refer to “Creating an
Encryption Key” on page 767 to view key ID numbers.
Note
You can specify the distinguished name for the certificate from this
menu by selecting option 1, Distinguished Name, in the Keys/
Certificates Configuration menu and entering the name. Or, you can
wait and specify the distinguished name later in this procedure. For
information about distinguished names, refer to “Distinguished
Names” on page 783.
Certificate Database:
Name State MTrust Type Source
-----------------------------------------------------
Switch43cert Trusted False Self Command
U - Update Display
R - Return to Previous Menu
The Certificate Database portion of the menu lists the certificates that
you created (or had a CA create) and added to the database. The
switch’s web server can only use a certificate if it is in the database.
Note
In the X509 Certificate Management menu, MTrust means manually
trusted. This field indicates that you verified the certificate. The
Source field indicates the certificate was generated on the switch.
Both MTrust and Source are read-only fields.
1 - Certificate Name.............
2 - Key Pair ID.................. 0
3 - Format....................... DER
4 - Serial Number................ 0
5 - Subject DN...................
6 - Create Self-Signed Certificate
7. Enter a file name for the certificate. This is the file name under which
the certificate will be stored in the AT-S63 file system. The name can
be up to 24 alphanumeric characters. Spaces are allowed.
Note
The AT-S63 management software automatically adds a “.cer”
extension to the filename.
9. Enter the ID number of the encryption key that you want to use to
create this certificate. The encryption key must already exist on the
switch. (If you have forgotten the key ID number, return to the Key
Management menu to view the keys on the switch.) The value can be
from 0 to 65,535.
10. Type 3 to select Format to choose the encoding format for the
certificate. The possible options are:
13. Type 5 to select Subject DN and enter a distinguished name for the
certificate. (Do not enclose the distinguished name in quotes.)
Note
If you did not enter a distinguished name in step 2, then you need to
enter one here. A certificate must have a distinguished name. For
further information, refer to “Distinguished Names” on page 783. If
you enter a name both here and in Step 2, the certificate will contain
the name entered here.
This is the name for the certificate as it will appear in the certificate
database list. You can enter up to 24 alphanumeric characters. Spaces
are allowed. No extension is needed.
You might want the name to include the filename of the certificate in
the file system. This will make it easier for you to correlate a certificate
in the database with its corresponding file in the file system. Here is an
example:
Switch 12 - sw12.cer
Trusted
This value indicates you have verified that the certificate is from a
trusted CA. This is the default.
Untrusted
This value indicates the certificate is from an untrusted CA either
because you have not verified the CA or you have verified the CA is
untrusted.
Note
This parameter has no affect on the operation of a certificate. The
parameter is included only for informational purposes when the
certificate is displayed in the certificate database.
EE
The certificate was issued by a CA, such as VeriSign. This is the
default.
CA
The certificate belongs to a CA.
Self
This certificate is a self-signed certificate. The switch treats this type of
certificate as its own.
Note
This parameter has no affect on the operation of a certificate. The
parameter is included only for informational purposes when the
certificate is displayed in the certificate database.
This is the filename of the certificate in the AT-S63 file system. The
filename has a “.cer” extension. For example, if you created a self-
signed certificate and gave it the name “webserver127”, the filename
of the certificate would be “webserver127.cer”. If you have forgotten
the filename of the certificate, refer to “Displaying System Files” on
page 220.
12. Type 5 to select Add Certificate to add the certificate to the certificate
database.
13. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Modifying a Certificate
Note
These parameters have no affect on the operation of a certificate.
They are included only for informational purposes when the
certificate is displayed in the certificate database.
This procedure starts from the X509 Certificate Management menu. If you
are unsure how to access the menu, perform steps 1 to 4 in the procedure
“Adding a Certificate to the Database” on page 797.
6. Enter the name of the certificate you want to modify. (This field is case
sensitive.)
Note
You cannot change selection 1, Certificate Name.
Trusted
This value indicates you have verified that the certificate is from a
trusted CA. This is the default.
Untrusted
This value indicates the certificate is from an untrusted CA either
because you have not verified the CA or you have verified the CA is
untrusted.
EE
The certificate was issued by a CA, such as VeriSign. This is the
default.
CA
The certificate belongs to a CA.
Self
This certificate is a self-signed certificate. The switch treats this type of
certificate as its own.
10. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting a Certificate
Deleting a certificate from the database does not delete it from the
switch. It continues to reside in the AT-S63 file system. To completely
remove a certificate from the switch, you must also delete it from the
file system. For instructions, refer to “Copying a System File” on
page 215.
You cannot delete a certificate from the database if you specified its
corresponding encryption key as the active key in the web server
configuration. The switch will consider the certificate as in use and will
not allow you to delete it. You must first configure the web server with
another encryption key pair for a different certificate. For instructions,
refer to “Configuring the Web Server” on page 753.
This procedure starts from the X509 Certificate Management menu. If you
are unsure how to access the menu, perform steps 1 to 4 in the procedure
“Adding a Certificate to the Database” on page 797.
6. Enter the name of the certificate you want to delete. (This field is case
sensitive.) To delete all the certificates, enter ALL.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Viewing a Certificate
This procedure starts from the X509 Certificate Management menu. If you
are unsure how to access the menu, perform steps 1 to 4 in the procedure
“Adding a Certificate to the Database” on page 797.
6. Enter a name of the certificate you want to view. (This field is case
sensitive.)
Certificate Details:
Name ............... Switch12
State .............. Trusted
Manually Trusted ... True
Type ............... Self
Source ............. Command
N - Next Page
R - Return to Previous Menu
Name
The name of the certificate.
State
Whether the certificate is Trusted or Untrusted.
Manually Trusted
You verified the certificate is from a trusted or untrusted authority.
Type
The type of the certificate. The options are EE, SELF, and CA.
Source
The certificate was created on the switch.
Version
The version number of the AT-S63 management software.
Serial Number
The certificate’s serial number.
Signature Alg
The signature algorithm of the certificate.
N - Previous Page
R - Return to Previous Menu
Issuer
The certificate issuer’s distinguished name.
MD5 Fingerprint
The MD5 algorithm. This value provides a unique sequence for each
certificate consisting of 16 bytes.
SHA1 Fingerprint
The Secure Hash Algorithm. This value provides a unique sequence
for each certificate consisting of 20 bytes.
During this procedure you are prompted to enter the ID number of the
encryption key pair you want to use to create the enrollment request. If
you have forgotten the ID number, refer to “Displaying the Encryption
Keys” on page 779 to view key ID numbers.
You must first create a key pair before performing this procedure. For
instructions, refer to “Creating an Encryption Key” on page 767.
For a review of all the steps to creating an enrollment request and
downloading a certificate from a CA onto a switch, refer to “General
Steps for a Public or Private CA Certificate” on page 756.
1 - Request Name....................
2 - KeyPair ID ..................... 0
3 - Format ......................... PEM
4 - Type ........................... PKCS10
5 - Generate Enrollment Request
Note
You cannot change option 4, Type. The PKCS10 value indicates the
internal format of an enrollment request.
The enrollment request is now stored in the AT-S63 file system. To see
the file, refer to “Displaying System Files” on page 220.
13. Press any key to return to the Public Key Infrastructure (PKI)
Configuration menu.
14. To submit the request to a CA, you must upload it from the file system
on the switch to your management station or to an FTP server on your
network. For instructions, refer to “Uploading a System File” on
page 252.
This section lists the procedures that you will need to perform if the
switch’s certificate was created by a public or private CA. It should be
noted that a CA generated certificate actually consists of several
certificates. There is a minimum of two. All the certificates from the CA
must be installed on the switch.
Note
A certificate from a CA can only be used on the switch where you
created the encryption key pair and enrollment request. Do not
install the certificate on any other switch.
You can specify the maximum number of certificates that can be stored on
the certificate database. The range is a maximum of 12 to 256. The default
value is 256. There should be little cause or need for you to adjust this
value.
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Configuring SSL
2. From the Security and Services menu, type 9 to select Secure Socket
Layer (SSL).
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
The chapter contains overview information about the Secure Shell (SSH)
protocol as well a procedure for configuring this protocol on a switch using
a local or Telnet management session. It contains the following sections:
SSH Overview
Support for SSH The AT-S63 implementation of the SSH protocol is compliant with the
SSH protocol versions 1.3, 1.5, and 2.0.
RSA public keys with lengths of 512 to 2048 bits are supported. Keys
are stored in a format compatible with other Secure Shell
implementations, and mechanisms are provided to copy keys to and
from the switch.
Compression of SSH traffic.
Note
Non-encrypted Secure Shell sessions serve no purpose.
SSH Server When the SSH server is enabled, connections from SSH clients are
accepted. When the SSH server is disabled, connections from SSH clients
are rejected by the switch. Within the switch, the AT-S63 management
software uses well-known port 22 as the SSH default port.
Note
If your switch is in a network that is protected by a firewall, you may
need to configure the firewall to permit SSH connections.
SSH Clients The SSH protocol provides a secure connection between the switch and
SSH clients. After you have configured the SSH server, you need to install
SSH client software on your management PC. The AT-S63 management
software supports both SSH1 and SSH2 clients.
You can download client software from the Internet. Two popular SSH
clients are PuTTY and CYGWIN. To install SSH client software, follow the
directions from the vendor.
After you have configured the SSH client software, you can use the client
software to log in to the SSH server as a manager, operator, or as
RADIUS/TACACS+ users. The SSH server supports multiple client
connections. The maximum number of SSH clients allowed is 10 users
with one manager login.
SSH and The AT-S63 management software allows for encrypted SSH
Enhanced management sessions between a management station and a master
switch of an enhanced stack, but not with slave switches, as explained in
Stacking this section.
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/SP Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
Slave Switch
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
1 3 5 7 9 11 13 15 17 19 21 23R PORT
L/A
SFP FAULT
SFP SFP 1000 LINK / ACT
D/C MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
1 3 5 7 9 11 13 15 17 19 21 23R
PORT ACTIVITY
AT-9424T/GB Gigabit Ethernet Switch
CLASS 1 L/A 1000 LINK / ACT 10/100 LINK / ACT
LASER PRODUCT
D/C FDX HDX / COL
TERMINAL STATUS
Master Switch
1 3 5 7 9 11 13 15 17 19 21 23R PORT
GBIC GBIC L/A FAULT
GBIC
D/C 1000 LINK / ACT MASTER
L/A
L/A RPS
23 24
D/C POWER
2 4 6 8 10 12 14 16 18 20 22 24R
2 4 6 8 10 12 14 16 18 20 22 24R 23 24
SSH
Management
Workstation
SSH Below are the guidelines to observe when you configure SSH:
Configuration
SSH requires two encryption key pairs. One key pair will function as
Guidelines the host key and the other the server key. For instructions on creating
keys, refer to “Creating an Encryption Key” on page 767.
The two encryption key pairs must be of different lengths of at least
one increment (256 bits) apart. The recommended bit size for a server
key is 768 bits. The recommended size for the host key is 1024 bits.
You activate and configure SSH on the master switch of an enhanced
stack, not on slave switches.
The AT-S63 software uses well-known port 22 as the SSH default port.
General Steps for Configuring the SSH server involves several procedures. This section lists
Configuring SSH the procedures you need to complete to configure the SSH feature.
1. Create two encryption key pairs on the master switch of the enhanced
switch. One pair will function as the host key and the other the server
key.
Follow the directions provided with the client software. You can
download SSH client software from the Internet. Two popular SSH
clients are PuTTY and CYGWIN.
Although the switch allows the SSH and Telnet servers to be enabled
simultaneously, allowing Telnet to be enabled negates the security of
the SSH feature. To disable the Telnet server, see “Configuring the
Telnet Server” on page 73.
Configuring SSH
This section describes how to configure the switch as an SSH server. For
a description of all the steps required to configure an SSH server, see
“General Steps for Configuring SSH” on page 819.
Before you begin this procedure, you need to configure a host and server
keys for SSH. See Chapter 33, “Encryption Keys” on page 759. The
minimum bit size of the server key is 512 bits. The recommended bit size
for a server key is 768 bits. The recommended size for the host key is
1024 bits. In addition, the bit size of the host and server keys must differ
by 128 bits.
While you are configuring the SSH feature, you must disable the SSH
server. When you have completed your configuration changes, enable the
SSH server to permit SSH client connections.
Note
Allied Telesyn recommends disabling the Telnet server before you
enable SSH. Otherwise, the security functions provided by SSH are
lost. See “Configuring the Telnet Server” on page 73.
2. From the Security and Services menu, type 8 to select Secure Shell
(SSH).
Enter the ID number of the encryption key that will function as the host
key. The default is Not Defined. For instructions on creating encryption
keys, see Chapter 33, “Encryption Keys” on page 759.
Enter the ID number of the encryption key that will function as the
server key. The default is Not Defined. For instructions on creating
encryption keys, see Chapter 33, “Encryption Keys” on page 759.
5. Type 4 to select Server Key Expiry Time to set the time, in hours, for
the server key to expire.
This is the time it takes to release the SSH server from an incomplete
SSH client connection. Enter a time in seconds. The default is 180
seconds (3 minutes). The range is 60 to 600 seconds.
Type E to enable the SSH server. Select this value after you have
finished configuring SSH and want to log on to the server. Or, type D to
disable SSH while you are configuring the protocol. SSH must be
disabled while you are configuring the protocol. This is the default.
Note
When there are active SSH connections, you cannot disable the
SSH server. If you attempt to disable the SSH server when it is in
this state, you receive a warning message.
Note
Allied Telesyn recommends disabling the Telnet server before you
enable SSH. Otherwise, the security provided by SSH is lost.
8. After making changes, type R to until you return to the Main Menu.
Then type S to select Save Configuration Changes.
2. From the Security and Services menu, type 8 to select Secure Shell
(SSH).
The Secure Shell (SSH) menu is shown in Figure 282 on page 820.
3. From the Secure Shell (SSH) menu, type 6 to select Show Server
Information.
Versions Supported
The versions of SSH which are supported by the AT-S63 management
software.
Server Status
Whether or not the SSH server is enabled or disabled.
Server Port
The well-known port for SSH. The default is port 22.
Host Key ID
The host key ID defined for SSH.
Login Timeout
Time, in seconds, until a SSH server is released from an incomplete
connection with a SSH client.
Authentication Available
Authentication method available. Currently, password authentication is
the only supported method.
Ciphers Available
SSH ciphers that are available on the switch.
MACs Available
Message Authorization Code (MAC) that is used to validate incoming
SSH messages to the server. Two algorithms are supported.
Data Compression
Whether or not data compression is available on the switch. Data
compression is useful for networks that have a slow throughput speed.
This chapter describes how to configure the parameter settings for the two
authentication protocols TACACS+ and RADIUS. Sections in the chapter
include:
The AT-S62 software comes with TACACS+ and RADIUS client software.
You can use the client software to add two security features to the switch.
The first feature, described in this chapter, involves creating new manager
accounts for controlling who can log onto a switch to change its parameter
settings. The second feature is 802.1x Port-based Access Control,
explained in Chapter 30, “802.1x Port-based Network Access Control” on
page 606, which controls which end users and end nodes can send
packets through the switch.
For those networks that are managed by just one or two network
managers, the standard accounts may be all you need. However, for
larger networks managed by several network managers, you might want
to give each manager his or her own management login account rather
than have them share an account.
With the protocols you can create a series of username and password
combinations that define who can manage an AT-9400 Series switch.
Authentication
Authorization
Accounting
Note
The AT-S63 management software does not support the two earlier
versions of the TACACS+ protocol, TACACS and XTACACS.
TACACS+ and What do you need to use the TACACS+ and RADIUS protocols?
RADIUS Following are the main points.
Implementation First, you need to install TACACS+ or RADIUS server software on one
Guidelines or more of your network servers or management stations.
Authentication protocol server software is not available from Allied
Telesyn.
The authentication protocol server can be on the same subnet or a
different subnet as the AT-9400 Series switch. If the server and switch
are on different subnets, be sure to specify a default gateway in the
System Configuration menu (Figure 5 on page 55) so that the switch
and server can communicate with each other.
Note
The switch communicates with the authentication server via the
switch’s management VLAN. Consequently, the node functioning as
the authentication server must be communicating with a switch
through a port that is a member of that VLAN. The default
management VLAN is Default_VLAN. For further information, refer
to “Specifying a Management VLAN” on page 633.
Note
This manual does not explain how to configure TACACS+ or
RADIUS server software. For that you need to refer to the
documentation that came with the software.
Note
For more information on TACACS+, refer to the RFC 1492 standard.
For more information on RADIUS, refer to the RFC 2865 standard.
Note
Option 1 - Server-based Authentication in the menu applies only to
the manager accounts feature described in this chapter. This menu
selection has no affect on the 802.1x port-based access control
feature described in Chapter 31, “802.1x Port-based Network
Access Control” on page 719. When Option 1 is set to disabled, the
default setting, the switch uses the default manager and operator
accounts. When set to enabled, the switch seeks its manager
accounts on a TACACS+ or RADIUS authentication server.
Note
Selection 5, Passwords Configuration, is described in “Changing the
Manager and Operator Passwords” on page 63.
After enabling the feature, you must use the new manager username
and password accounts that you defined on the TACACS+ or RADIUS
authentication server when you initiate future management sessions
on the switch.
7. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
5. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Configuring TACACS+
1 - TAC Server 1
2 - TAC Server 2
3 - TAC Server 3
Use these parameters to specify the IP addresses of up to three
network servers containing TACACS+ server software. After you have
entered an IP address, you will see the following prompt:
If you will be specifying more than one TACACS+ server and if all of
the servers use the same encryption secret, you can answer No to this
prompt and enter the encryption secret using the TAC Global Secret
parameter.
Use this prompt to enter the encryption secret for the TACACS+ server
whose IP address you are specifying.
5 - TAC Timeout
This parameter specifies the maximum amount of time the switch waits
for a response from a TACACS+ server before assuming the server is
not responding. If the timeout expires and the server has not
responded, the switch queries the next TACACS+ server in the list. If
there are no more servers, the switch defaults to the standard
Manager and Operator accounts. The default is 30 seconds. The
range is 1 to 300 seconds.
TAC Server 1
TAC Server 2
TAC Server 3
The IP addresses of the TACACS+ servers.
TAC Timeout
The maximum amount of time the switch waits for a response from a
TACACS+ server before assuming the server is not responding.
Configuring RADIUS
1 - Server IP Address
Use this option to specify the IP address of the RADIUS server.
If you are using the RADIUS client software to support 802.1x port-
based network access control, but not new manager accounts, no
further steps are required after you configure the parameters in the
RADIUS Server Configuration menu. You can return to the main menu
and type S to select Save Configuration Changes.
However, if you are using the RADIUS client software to support new
manager accounts, you must perform steps 5 to 7 to activate the
feature.
Server IP Address Auth Port Encryption Key Auth Req Auth Resp
---------------------------------------------------------------
149.11.11.11 1812 WRRT 100 96
149.22.22.22 1812 LLST 4 4
149.22.22.22 1812 OORT 0 0
U - Update Display
R - Return to Previous Menu
The Show Status menu displays a table that contains the following
columns of information:
Server IP Address
IP address of the RADIUS server.
Auth Port
UDP port of the RADIUS protocol.
Encryption Key
Encryption key for the RADIUS server.
Auth Req
Number of authentication requests the switch has made to the
RADIUS server.
Auth Resp
Number of responses that the switch has received back from the
server.
This chapter explains how to create an access control list (ACL) to restrict
Telnet and web browser management access to the switch. Sections in
this chapter include:
The switch uses the management ACL to filter the management packets
that it receives. The switch accepts and processes only those
management packets that meet the criteria stated in the ACL. Those
management packets that do not meet the criteria are discarded.
The benefit of this feature is that you can prevent unauthorized access to
the switch by controlling which workstations are to have remote
management access. You can even control which method, Telnet or web
browser, that a remote manager can use.
For example, you can create a management ACL that allows the switch to
accept management packets only from the management stations in one
subnet or from just one or two specific management stations.
An access control list (ACL) is a list of one or more statements that define
which management packets the switch accepts. Each statement, referred
to as an access control entry (ACE), contains criteria that the switch uses
in making the determination.
IP Address
Mask
You need to enter a mask that indicates the parts of the IP address the
switch should filter on. A binary “1” indicates the switch should filter on the
corresponding bit of the address, while a “0” indicates that it should not. If
you are filtering on a specific IP address, use the mask 255.255.255.255.
If you are filtering on a subnet, enter the appropriate mask. For example,
to allow all management stations in the subnet 149.11.11.0 to manage the
switch, you would enter the mask 255.255.255.0.
Protocol
This specifies the protocol of the management packets. You can only
select TCP because Telnet and web browser management packets for an
AT-9400 Series switch are exclusively that protocol.
Interface
Management Below are guidelines to observe when you create a management ACL:
ACL Guidelines
The default setting for this feature is disabled.
A switch has only one management ACL.
A management ACL can have up to 256 ACEs.
An ACE must have an IP address and mask.
All management ACEs are implicit “permit” statements. A management
packet that meets the criteria of an ACE is accepted by the switch.
Consequently, the ACEs that you enter into the management ACL
should specify which management packets you want the switch to
process. Management packets that do not meet any of the ACEs in the
management ACL are discarded.
A management packet that meets an ACE is immediately processed
by the switch and is not compared against any remaining ACEs in the
management ACL.
The ACEs are performed in the order in which they are entered in the
ACL. Because all ACEs in a management ACL are implicit permit
statements, it does not matter in which order you enter them.
The protocol is always TCP.
The management ACL does not control local management or remote
SSH or SNMP management of a switch.
Activating this feature without specifying any ACEs prohibits you from
managing the switch remotely using a Telnet application or web
browser because the switch discards all Telnet and web browser
management packets.
You can apply management ACLs to both master and slave switches
in an enhanced stack. A management ACL on a master switch filters
management packets intended for the master switch as well as those
intended for any slave switches that you manage through the master
switch. A management ACL applied to a slave switch filters only those
management packets directed to the slave switch.
IP Address 149.11.11.11
Mask 255.255.255.255
Protocol TCP
Interface All
If the management ACL contained only the above ACE, then only that
management station would be allowed to remotely manage the switch.
IP Address 149.11.11.0
Mask 255.255.255.0
Protocol TCP
Interface All
IP Address 149.11.11.0
Mask 255.255.255.0
Protocol TCP
Interface Web
A management ACL can contain multiple ACEs. The two ACEs in this ACL
allow all management packets from the subnets 149.11.11.0 and
149.22.22.0 to manage the switch using the Telnet application, but not a
web browser:
ACE #1
IP Address 149.11.11.0
Subnet Mask 255.255.255.0
Protocol TCP
Interface Telnet
ACE #2
IP Address 149.22.22.0
Subnet Mask 255.255.255.0
Protocol TCP
Interface Telnet
The two ACEs in this management ACL permit remote management from
the management station with the IP address 149.11.11.11 and all
management stations in the subnet 149.22.22.0:
ACE #1
IP Address 149.11.11.11
Mask 255.255.255.255
Protocol TCP
Interface All
ACE #2
IP Address 149.22.22.0
Mask 255.255.255.0
Protocol TCP
Interface All
Note
Do not activate the management ACL until you have specified the
access control entries (ACEs). Otherwise, the switch will discard all
remote management packets, making it impossible for you to
remotely manage the unit from a Telnet or web browser
management session. For instructions on how to add ACEs, refer to
“Adding an ACE” on page 848.
Note
If you activate the feature while managing the switch from a Telnet
management session, your management session will end and you
will not be able to reestablish it if the management ACL does not
contain an ACE that specifies your management workstation.
4. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Adding an ACE
5. Enter a mask that indicates the parts of the IP address the switch
should filter on. A binary “1” indicates the switch should filter on the
corresponding bit of the address, while a “0” indicates that it should
not. If you are filtering on a specific IP address, use the mask
255.255.255.255. If you are filtering on a subnet, enter the appropriate
mask. For example, to allow all management stations in the subnet
149.11.11.0 to manage the switch, you would enter the mask
255.255.255.0.
6. Enter TCP.
8. After making changes, type R until you return to the Main Menu. Then
type S to select Save Configuration Changes.
Deleting an ACE
To delete an ACE, you need to know its details, such as its IP address,
mask, protocol, and interface. The management software prompts you for
this information when you delete it. You can simplify this procedure by first
displaying the contents of the Management ACL and jotting down on
paper the specifics of the ACE you want to delete. That way you will have
the information when the management software prompts you for it.
Note
If you are managing the switch from a Telnet management session
and the management ACL is active, your management session will
end and you will be unable to reestablish it if you delete the ACE that
specifies your management workstation.
6. Enter TCP.
U - Update display
R - Return to Previous Menu
IP Address
The IP address of a management station.
Mask
The parts of the IP address the switch is filtering on.
Protocol
The protocol used for the management packets. This is always TCP.
Interface
The interface that the management station uses to manage the switch.
The options are Telnet, Web, and All (both Telnet and Web).
This appendix lists the factory default settings for the AT-S63 management
software. It contains the following sections in alphabetical order:
853
Appendix A: AT-S63 Management Software Default Settings
854
AT-S63 Management Software Menus Interface User’s Guide
855
Appendix A: AT-S63 Management Software Default Settings
Class of Service
The following table lists the default mappings of IEEE 802.1p priority
levels to egress port priority queues
0 Q1
1 Q0 (lowest)
2 Q2
3 Q3
4 Q4
5 Q5
6 Q6
7 Q7 (highest)
856
AT-S63 Management Software Menus Interface User’s Guide
The following table lists the default settings for the Denial of Service
prevention feature.
IP Address 0.0.0.0
Subnet Mask 0.0.0.0
SYN Flood Defense Disabled
Smurf Defense Disabled
Land Defense Disabled
Teardrop Defense Disabled
Ping of Death Defense Disabled
IP Options Defense Disabled
857
Appendix A: AT-S63 Management Software Default Settings
The following table lists the default settings for RADIUS accounting.
Status Disabled
Port 1813
Type Network
Trigger Type Start_Stop
Update Status Disabled
Update Interval 60
858
AT-S63 Management Software Menus Interface User’s Guide
859
Appendix A: AT-S63 Management Software Default Settings
Status Enabled
Full Log Action Wrap
860
AT-S63 Management Software Menus Interface User’s Guide
Status Disabled
GIP Status Enabled
Join Timer 20 centiseconds
Leave Timer 60 centiseconds
Leave All Timer 1000 centiseconds
Port Mode Normal
861
Appendix A: AT-S63 Management Software Default Settings
862
AT-S63 Management Software Menus Interface User’s Guide
IP Default Settings
IP Setting Default
IP Address 0.0.0.0
Subnet Mask 0.0.0.0
Gateway Address 0.0.0.0
System Name None
Administrator None
Comments None
BOOTP Disabled
DHCP Disabled
863
Appendix A: AT-S63 Management Software Default Settings
The following table lists the MAC address-based port security default
settings.
864
AT-S63 Management Software Menus Interface User’s Guide
The following table lists the default setting for the MAC address table.
865
Appendix A: AT-S63 Management Software Default Settings
The following table lists the default setting for the Management Access
Control List.
Status Disabled
866
AT-S63 Management Software Menus Interface User’s Guide
The following table lists the manager and operator account default
settings.
Note
Login names and passwords are case sensitive.
867
Appendix A: AT-S63 Management Software Default Settings
868
AT-S63 Management Software Menus Interface User’s Guide
869
Appendix A: AT-S63 Management Software Default Settings
The following table lists the PKI default settings, including the generate
enrollment request settings.
870
AT-S63 Management Software Menus Interface User’s Guide
Status Enabled
10/100/1000Base-T Speed Auto-Negotiation
Duplex Mode Auto-Negotiation
MDI/MDI-X Auto-MDI/MDIX
Packet Filtering Disabled
Packet Rate Limiting Disabled
Override Priority No override
HOL Blocking Disabled
Back Pressure Disabled
Flow Control Auto
Flow Control/Back Pressure Limit 7935
871
Appendix A: AT-S63 Management Software Default Settings
The following table lists the RJ-45 serial terminal port default settings.
Data Bits 8
Stop Bits 1
Parity None
Flow Control None
Baud Rate 9600 bps
872
AT-S63 Management Software Menus Interface User’s Guide
873
Appendix A: AT-S63 Management Software Default Settings
RADIUS Default The following table lists the RADIUS configuration default settings.
Settings
RADIUS Configuration Setting Default
TACACS+ Client The following table lists the TACACS+ client configuration default settings.
Default Settings
TACACS+ Client Configuration Setting Default
874
AT-S63 Management Software Menus Interface User’s Guide
875
Appendix A: AT-S63 Management Software Default Settings
876
AT-S63 Management Software Menus Interface User’s Guide
This section provides the spanning tree, STP RSTP, and MSTP, default
settings.
Spanning Tree The following table describes the Spanning Tree Protocol default settings
Switch Settings for the switch.
STP Default The following table describes the STP default settings.
Settings
STP Setting Default
RSTP Default The following table describes the RSTP default settings.
Settings
RSTP Setting Default
877
Appendix A: AT-S63 Management Software Default Settings
MSTP Default The following table lists the MSTP default settings.
Settings
MSTP Setting Default
Status Disabled
Force Version MSTP
Bridge Hello Time 2
Bridge Forwarding Delay 15
Bridge Max Age 20
Maximum Hops 20
Configuration Name null
Revision Level 0
CIST Priority Increment 8 (32768)
Port Priority Increment 8 (128)
Port Internal Path Cost Auto Update
Port External Path Cost Auto Detect
Point-to-Point Auto Detect
Edge Port Yes
878
AT-S63 Management Software Menus Interface User’s Guide
Status Disabled
Host Key ID Not Defined
Server Key ID Not Defined
Server Key Expiry Time 0 hours
Login Timeout 180 seconds
SSH Port Number 22
879
Appendix A: AT-S63 Management Software Default Settings
880
AT-S63 Management Software Menus Interface User’s Guide
881
Appendix A: AT-S63 Management Software Default Settings
882
AT-S63 Management Software Menus Interface User’s Guide
Status Enabled
Operating Mode HTTP
HTTP Port Number 80
HTTPS Port Number 443
883
Appendix A: AT-S63 Management Software Default Settings
884
Appendix B
885
Appendix B: SNMPv3 Configuration Examples
For more information about the SNMPv3 protocol, see Chapter 22,
“SNMPv3” on page 419.
SNMPv3 This section provides a sample configuration for a Manager with a User
Manager Name of systemadmin24. Each table is listed with its parameters.
Configuration Configure SNMPv3 User Table Menu
User Name: systemadmin24
Authentication Protocol: MD5
Privacy Protocol: DES
Storage Type: NonVolatile
886
AT-S63 Management Software Menus Interface User’s Guide
SNMPv3 This section provides a sample configuration for an Operator with a User
Operator Name of nikoeng73. Because this user will only send messages to a group
and not an SNMP host, you do not need to configure message notification
Configuration for this user.
887
Appendix B: SNMPv3 Configuration Examples
SNMPv3 This section supplies a table that you can use a worksheet when
Worksheet configuring SNMPv3. Each SNMPv3 Table is listed with its associated
parameters.
SNMPv3 Parameters
Authentication Protocol
Authentication Password
Privacy Protocol
Privacy Password
Storage Type
Subtree Mask
View Type
Storage Type
888
AT-S63 Management Software Menus Interface User’s Guide
Security Model
Security Level
Storage Type
Security Model
Group Name
Storage Type
Notify Tag
Notify Type
Storage Type
UDP Port
Timeout
Retries
Tag List
Storage Type
889
Appendix B: SNMPv3 Configuration Examples
Security Model
Security Level
Storage Type
890
Index
891
Index
B guidelines 785
back pressure 119 installing CA 811
default setting 871 maximum number in database, configuring 812
baud rate, terminal port 74 modifying 800
boot configuration file. See configuration file PKI, validating 791
Boot Protocol (BootP) type, configuring 799
activating 57 X.509 789
deactivating 57 certification authority (CA)
default setting 863 described 790
defined 57 root 791
BPDU. See bridge protocol data unit ciphers available parameter 824
bridge forwarding delay CIST priority parameter 572
default setting 877, 878 CIST. See Common and Internal Spanning Tree
Multiple Spanning Tree Protocol (MSTP) 570 Class of Service (CoS)
Rapid Spanning Tree Protocol (RSTP) 544 configuring 327
Spanning Tree Protocol (STP) 538 described 322
bridge hello time displaying port priorities 334
default setting 877 mapping priorities to egress queues 330
Multiple Spanning Tree Protocol (MSTP) 569 priority level and egress queue mappings 323
Rapid Spanning Tree Protocol (RSTP) 544 scheduling
Spanning Tree Protocol (STP) 538 configuring 332
bridge identifier described 324
described 527 classifier
Multiple Spanning Tree Protocol (MSTP) 570 components of 285
Rapid Spanning Tree Protocol (RSTP) 545 creating 291
Spanning Tree Protocol (STP) 538 defined 284
bridge max age deleting 297, 298
default setting 877 displaying 299
Multiple Spanning Tree Protocol (MSTP) 570 guidelines 290
Rapid Spanning Tree Protocol (RSTP) 544 modifying 295
Spanning Tree Protocol (STP) 538 Common and Internal Spanning Tree (CIST)
bridge priority configuring 572
default setting 877 defined 563
described 527 priority 563
Rapid Spanning Tree Protocol (RSTP) 544 priority, displaying 574
Spanning Tree Protocol (STP) 538 community name
bridge protocol data unit (BPDU) 530, 538, 544 SNMPv1 and SNMPv2c 96
SNMPv3 protocol 507
C compact flash card
CA certificate, steps for 756 changing directory on 227
CA. See certification authority (CA) displaying information about 225
certificate database 792 listing files on 222
certificate enrollment request compact flash card slot, described 225
creating 808 configuration file
described 783 creating 207
steps for 756 default name 855
uploading from switch 252 displaying 212
certificate format 809 downloading switch to switch 241
certificate revocation list (CRL), described 791 downloading to switch 244
certificates editing 213
adding to database 797 overview 207
creating saving changes to 49
enrollment request 808 selecting active 210
self-signed 793 uploading from switch 252
deleting 803 configuration name 560, 570
described 782, 788, 789 console disconnect interval
displaying 805 configuring 72
format 796 default setting 867
892
AT-S63 Management Software Menus Interface User’s Guide
893
Index
894
AT-S63 Management Software Menus Interface User’s Guide
895
Index
896
AT-S63 Management Software Menus Interface User’s Guide
897
Index
R S
RADIUS scheduling, CoS
configuring 836 configuring 332
default settings 874 described 324
disabling 832 strict priority
displaying settings 838 configuring 332
enabling 830 described 325
guidelines 827 weighted round robin
overview 826 configuring 332
settings, displaying 838 described 325
status, displaying 838 Secure Shell (SSH)
RADIUS accounting and enhanced stacking 817
configuring 746 AT-S63 implementation 816
described 730 ciphers 816
Rapid Spanning Tree Protocol (RSTP) clients, described 817
bridge forwarding delay 544 configuration overview 819
bridge hello time 544 default settings 879
bridge max age 544 encryption algorithms 816
bridge parameters, configuring 543 encryption keys 816
bridge priority 544 overview 816
default settings 877 server
disabling 535 configuring 820
edge port, configuring 547 described 817
enabling 535 displaying information 823
force version 544 users
MCHECK 547 adding 817
point-to-point port, configuring 546 deleting 817
port configuration, displaying 547 modifying 817
port cost 546 Secure Sockets Layer (SSL)
port parameters, configuring 545 See also certificates, encryption key
port priority 546 and enhanced stacking 784
port state, displaying 549 configuring 813
898
AT-S63 Management Software Menus Interface User’s Guide
899
Index
900
AT-S63 Management Software Menus Interface User’s Guide
system temperature 79 U
system time UDP destinaton ports 289
default setting 876 UDP source ports 289
setting 67 unavailable status, defined 87
untagged ports
T adding to VLAN 615, 621
TACACS+ deleting from VLAN 621
configuring 833 described 603
default settings 874 User-based Security Model (USM) authentication 420
disabling 832 user-configured VLAN mode, selecting 668
displaying settings 835 UTC offset
enabling 830 default setting 876
guidelines 827 setting 69
overview 826
server IP address 833 V
server timeout view type, modifying 446
configuring 834 Virtual LAN. See MAC address-based VLAN, multiple
default setting 874 VLAN modes, port-based VLAN, protected ports
displaying 835 VLAN, tagged VLAN
tagged ports VLAN and MSTI associations 559
adding to VLAN 615, 621 VLAN ID, described 602
deleting from VLAN 621 volatile storage 423
described 609
tagged VLAN W
creating 612 web server
creating, example 618 configuring 753
defined 608 default settings 883
deleting 625, 628 described 752
displaying 623 disabling 754
example 610 enabling 754
guidelines 609 overview 752
modifying 619 web server mode, configuring 754
target IP address 472 weighted round robin priority scheduling 325
TCP connections table 195 wildcards, in file names 205
TCP destination ports 289
TCP flags 289 X
TCP Global Information table 199 X.509
TCP source ports 289 certificate 789
Teardrop attack specification 789
configuring defense 385
described 383
Telnet server
enabling or disabling 73
NULL character 73
Telnet, default setting for remote management 881
terminal port baud rate, setting 74
TFTP
downloading and uploading files 230
traffic class
creating 361
deleting 367
described 340
displaying 368
modifying 365
traffic flow, defined 284
trap receivers 97
Triple DES (3DES) encryption algorithms, described 763
Type of Service field 287
901
Index
902