Allied Telesis AT-GS924M Service Manual

Page 1
GS900M Series
Gigabit Ethernet Switches
Management Software Web Browser User’s Guide
613-002051 Rev. A
Page 2
Copyright © 2014, Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis,
Inc. This product includes software licensed under the Berkeley Software Distribution (BSD) License. As such, the following
language applies for those portions of the software licensed under the BSD License: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met: *Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
*Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the follo wing
disclaimer in the documentation and/or other materials provided with the di stribution.
*Neither the name of Allied Telesis, Inc. nor the names of the respective companies above may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Allied Telesis, Inc., hereby disclaims all copyright interest of the following products: * Portmap: this product includes Portmap 5beta developed by the University of California, Berkeley and its contributors. * OpenSSL: this product includes OpenSSL 0.9.8d developed by the OpenSSL Project for use in the OpenSSL Toolkit. * Mathopd: this product includes Mathopd 1.6 copyright (c) 1996 - 2005 by Michiel Boland * zlib: this product includes zlib version 1.2.3 copyright (c) 1995 - 2005 by Jean-loup Gailly an d Mark Adler Allied Telesis is committed to meeting the requirements of the open source licenses including the GNU General Public
License (GPL) and will make all required source code available. If you would like a copy of the GPL source code contained in this product, please send us a request by registered mail
including a check for US$15 to cover production and shipping costs, and a CD with the GPL code will be mailed to you. GPL Code Request Allied Telesis, Inc. 3041 Orchard Parkway San Jose, California 95134
Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. All other product names, company names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners.
Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of such damages.
Page 3

Contents

Preface ............................................................................................................................................................19
Safety Symbols Used in this Document ...........................................................................................................20
Contacting Allied Telesis..................................................................................................................................21
Chapter 1: Introduction .................................................................................................................................23
Introduction.......................................................................................................................................................24
Switch Models..... ... ... .... ... ... ....................................... ... ... .... ... ... ... .............................................................24
Management Interfaces .............................................................................................................................24
Main Software Features ...................................................................................................................................26
Differences Between the Management Interfaces............................................................................................27
Elements of the Web Browser Windows ..........................................................................................................28
Working with the Web Browser Interface .........................................................................................................31
Operating Systems.............................. .... ... ... .............................................................................................31
Web Browsers..................................... .... ... ... ... ... .... ...................................... .... ... ... ... .... ............................31
Menus and Options....................................................................................................................................31
Apply and Set Buttons................................................................................................................................31
Save Button................................... ... ... ....................................... ... .... ... ... ... ... .............................................32
Reset Button ..............................................................................................................................................33
Starting or Ending a Web Browser Management Session ...............................................................................34
Starting a Management Session................................................................................................................34
Ending a Management Session.................................... .......................................... ... .... ... ... ... ...................35
What to Configure During the First Management Session ...............................................................................36
Creating a Configuration File ..... ... ... .......................................... ... .......................................... ...................36
Changing the Manager Password..............................................................................................................37
Setting the System Name, Location, and Contact Information .. ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... ...39
Chapter 2: Basic Switch Parameters ...........................................................................................................41
Displaying the System Window........................................................................................................................42
Configuring the Switch Name, Location, and Contact......................................................................................44
Changing the Password to the Manager Account............................................................................................46
Changing the IP Address Configuration...........................................................................................................48
Specifying the Management VLAN...................................................................................................................50
Responding to Broadcast PING Queries..........................................................................................................51
Rebooting the Switch........................................................................................................................................52
Resetting Ports....................................................... ... .... ... ... ....................................... ... ...................................53
Chapter 3: System Date and Time ...............................................................................................................55
Displaying the System Date and Time Window................................................................................................56
Manually Setting the System Date and Time ...................................................................................................58
Setting the System Date and Time with an NTP Server...................................................................................59
Configuring Daylight Savings Time ..................................................................................................................61
Chapter 4: Event Log ....................................................................................................................................63
Introduction.......................................................................................................................................................64
Displaying the Event Log Window................................................................................................
Configuring the Event Log................................................................................................................................67
Displaying or Saving the Event Messages in the Event Log ............................................................................70
....................65
3
Page 4
Contents
Deleting Messages in the Event Log ............................................................................................................... 74
Chapter 5: Syslog Client .............................................................................................................................. 75
Introduction ...................................................................................................................................................... 76
Configuring the Syslog Client........................................................................................................................... 77
Chapter 6: Management Tools and Alerts .................................................................................................. 81
Introduction ...................................................................................................................................................... 82
Configuring the Management Tools and Alerts................................................................................................ 83
Chapter 7: System Information and Packet Statistics ............................................................................... 87
Viewing Basic System and Port Information................................. .... ... ... ... .... ... ... ... ... .... ... ............................... 88
Detail Button.............................................................................................................................................. 89
Save to File Button........................... ... ... ... .... ... ....................................... ... ... ... ... .... ... ... ... ......................... 90
Displaying Port Configurations.................................................................................................................. 91
Refreshing the Window ................................. ... ... ... ... .... ... ....................................... ... ... ... .... ..................... 92
Displaying Statistics Counters ......................................................................................................................... 93
Chapter 8: Port LEDs .................................................................................................................................... 95
Displaying the Port LEDs Window ................................................................................................................... 96
Setting the Mode of the Speed/Duplex Mode LEDs ........................................................................................ 98
Setting the Traffic Thresholds for the Link/Activity LEDs................................................................................. 99
Chapter 9: SNMPv1 and SNMPv2c ............................................................................................................ 101
Introduction .................................................................................................................................................... 102
Displaying the SNMP Window ....................................................................................................................... 103
Configuring Basic SNMP Parameters............................................................................................................ 106
Adding New SNMP Community Strings............... ... ....................................................................................... 107
Modifying SNMP Communities ...................................................................................................................... 110
Deleting SNMP Communities ........................................................................................................................ 111
Chapter 10: Port Parameters ..................................................................................................................... 113
Displaying the Port Parameters Window ....................................................................................................... 114
Enabling or Disabling the Power Saving Mode.............................................................................................. 117
Configuring Port Parameters ......................................................................................................................... 118
Setting the Speed and Duplex Mode................................... ... .... ... ... ... .... ... ... ... ... .................................... 122
Setting the Wiring Configuration....................... ....................................................................................... 123
Displaying Port Configurations....................................................................................................................... 124
Chapter 11: MAC Address Table ............................................................................................................... 129
Displaying the MAC Address Window ........................................................................................................... 130
Displaying the MAC Address Table ............................................................................................................... 132
Adding Static Unicast MAC Addresses...... ... ... .... ... ... ... ... .... .......................................... ... ............................. 135
Deleting Static Unicast Addresses................................................................................................................. 136
Deleting All of the Dynamic MAC Addresses................................................................................................. 137
Changing the Aging Timer ............................................................................................................................. 138
Chapter 12: Packet Storm Protection ........................................................................................................ 141
Introduction .................................................................................................................................................... 142
Displaying the Packet Storm Protection Window..................................................................................
......... 143
Configuring Packet Storm Protection............................................................................................................. 145
Chapter 13: Port Mirroring ......................................................................................................................... 147
Introduction .................................................................................................................................................... 148
Enabling the Port Mirror................................................................................................................................. 149
Disabling the Port Mirror ................................................................................................................................ 151
4
Page 5
GS900M Series Web Browser User’s Guide
Chapter 14: Static Port Trunks ...................................................................................................................153
Introduction.....................................................................................................................................................154
Creating a Port Trunk............................. ... .... ... ... ... .......................................... ... ...........................................156
Modifying a Port Trunk ...................................................................................................................................159
Deleting a Port Trunk......................................................................................................................................161
Chapter 15: Triggers ...................................................................................................................................163
Introduction.....................................................................................................................................................164
Guidelines................................................................................................................................................165
Displaying the Trigger Window.......................................................................................................................167
Enabling or Disabling the Trigger Feature......................................................................................................169
Adding Triggers......................... ....................................... ... ... .... ... ... ... .... ... ... ... ..............................................170
Modifying Triggers..........................................................................................................................................173
Deleting Triggers............................................................................................................................................174
Displaying Triggers.........................................................................................................................................175
Chapter 16: Port-based and Tagged VLANs Overview ............................................................................177
Overview.........................................................................................................................................................178
Advantages of VLANs..............................................................................................................................178
Types of VLANs...................................... ... ... ... ....................................... ... ... .... ... ... ... .... ... .......................179
Port-based VLAN Overview............................................................................................................................180
VLAN Name.............................................................................................................................................180
VLAN Identifier.........................................................................................................................................180
Port VLAN Identifier ............................................ .... ... ... ....................................... ... ... .... ... .......................181
Untagged Ports........................................................................................................................................181
Guidelines to Creating a Port-based VLAN..............................................................................................181
Drawbacks of Port-based VLANs.............................................................................................................182
Port-based Example 1..............................................................................................................................182
Port-based Example 2..............................................................................................................................184
Tagged VLAN Overview.................................................................................................................................186
Tagged and Untagged Ports....................................................................................................................187
Port VLAN Identifier ............................................ .... ... ... ....................................... ... ... .... ... .......................187
Guidelines to Creating a Tagged VLAN...................................................................................................187
Tagged VLAN Example............................................................................................................................187
Chapter 17: Port-based and Tagged VLANs .............................................................................................191
Guidelines to Adding or Removing Ports from VLANs ............... ... ... ... .... ... .......................................... ... .......192
Displaying the VLAN Window.........................................................................................................................194
Creating a Port-based or IEEE 802.1Q Tagged VLAN............................ ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .196
Modifying a Port-based or Tagged VLAN.......................................................................................................201
Deleting a VLAN.............................................................................................................................................203
Chapter 18: Protected Ports VLANs Overview .........................................................................................205
Overview.........................................................................................................................................................206
Guidelines.......................................................................................................................................................208
Chapter 19: Protected Ports VLANs ..........................................................................................................209
Creating a New Protected Ports VLAN...........................................................................................................210
Modifying a Protected Ports VLAN.................................................................................................................214
Deleting a Protected Ports VLAN ...................................................................................................................215
Chapter 20: Quality of Service Overview .......................................................................................
...........217
IEEE 802.1p Priority Levels and Egress Priority Queues...............................................................................218
Scheduling......................................................................................................................................................221
Strict Priority Scheduling........ .... ... ... ... .... ... ..............................................................................................221
Weighted Round Robin Priority Scheduling............................................... ... ...........................................221
5
Page 6
Contents
Chapter 21: Quality of Service ................................................................................................................... 223
Displaying the Quality of Service Window ..................................................................................................... 224
Configuring Egress Packet Scheduling.......................................................................................................... 226
Mapping CoS Priorities to Egress Queues .................................................................................................... 227
Setting the Priority Values for DSCP Packets................................................................................................ 228
Setting the Priority Values for Ingress Untagged Packets ............................................................................. 230
Chapter 22: Classifier Overview ................................................... ... ... ... .... ... ... ... ....................................... 233
Overview........................................................................................................................................................ 234
Classifier Criteria............................................................................................................................................ 235
Destination or Source MAC Address (Layer 2) ....................................................................................... 235
Ethernet 802.2 and Ethernet II Frame Types (Layer 2)........................................................................... 235
802.1p Priority Level (Layer 2) .................................. .... ... ... ... .... ... ... ... .... ... ... ... ....................................... 235
Protocol (Layer 2).................................................................................................................................... 236
VLAN ID (Layer 2)................................................................................................................................... 236
IP ToS (Type of Service) (Layer 3).......................................................................................................... 236
IP DSCP (DiffServ Code Point) (Layer 3)................................................................................................ 237
IP Protocol (Layer 3)................................................................................................................................ 237
Source IP Address and Mask (Layer 3)................................................................................................... 238
Destination IP Address and Mask (Layer 3)............................................................................................ 238
TCP Source or Destination Ports (Layer 4)............................................................................................. 238
UDP Source or Destination Ports (Layer 4)............................................................................................. 238
TCP Flags................................................................................................................................................ 238
Guidelines...................................................................................................................................................... 240
Chapter 23: Classifiers ............................................................................................................................... 241
Displaying the Classifier Window................................................................................................................... 242
Creating a Classifier...... ... ....................................... ... ... ... .... ... ... ... .... ... ... ....................................................... 243
Modifying a Classifier..................................................................................................................................... 249
Deleting a Classifier....................................................................................................................................... 250
Chapter 24: Quality of Service Policies Overview ................................................................................... 251
Overview........................................................................................................................................................ 252
Classifiers ...................................................................................................................................................... 254
Flow Groups........... ....................................... ... .... ... ... ... ... .... ... ... ... ................................................................. 255
Traffic Classes ............................................................................................................................................... 256
Policies........................................................................................................................................................... 257
QoS Policy Guidelines ................................................................................................................................... 258
Packet Processing ......................................................................................................................................... 259
Bandwidth Allocation...................................................................................................................................... 259
Packet Prioritization ....................................................................................................................................... 259
Replacing Priorities....................................... ....................................... ... ... .... ... ... ... ... .... ................................ 261
VLAN Tag User Priorities................. ... .... ... ... ... .... ... ... ... ... .... .......................................... ... ............................. 261
DSCP Values................................................................................................................................................. 261
DiffServ Domains........................................................................................................................................... 262
Examples ....................................................................................................................................................... 264
Voice Applications........................ ....................................... ... .... ... ... ... .... ... ... ... ... ..............
...................... 264
Video Applications................................................................................................................................... 266
Critical Database..................................................................................................................................... 268
Policy Component Hierarchy................................................................................................................... 269
Chapter 25: Quality of Service Policies .................................................................................................... 271
Displaying the QoS Policies Window............................................................................................................. 272
Managing Flow Groups.............. ... ... ... .... ... ... ... ....................................... ... .... ... ... ... ... .... ... ... .......................... 275
Adding a Flow Group.............................. ... ....................................... ... .... ... ... ... ... .... ... ... .......................... 275
Modifying a Flow Group........................................................................................................................... 277
Deleting a Flow Group............................................................................................................................. 278
6
Page 7
GS900M Series Web Browser User’s Guide
Managing Traffic Classes.................................................... ... .... ... ... ... .... ... ... ... ... ...........................................279
Adding a Traffic Class...... ... ... .... ... ... ... ....................................... ... .... ... ... ... ... .... ... ... .................................279
Modifying a Traffic Class..........................................................................................................................284
Deleting a Traffic Class............................................................................................................................285
Managing Policies .................................. ... .... .................................................................................................286
Adding a Policy ... ... ... .... ... ... ... ....................................... ... .... ... ... ... .... .......................................................286
Modifying a QoS Policy............................................................................................................................290
Deleting a QoS Policy..............................................................................................................................290
Displaying QoS Policy Statistics.....................................................................................................................291
Chapter 26: Rapid Spanning Tree Protocol Overview ............................... ... .... ... ... ... .... ... ... ... ... .... ... ... ....293
Overview.........................................................................................................................................................294
Bridge Priority and the Root Bridge................................................................................................................295
Path Costs and Port Costs.......................................................................................................................295
Port Priority ... ... ... ... ... .... ... ... ....................................... ... ... .... ... ... ... ...........................................................296
Forwarding Delay and Topology Changes .....................................................................................................297
Hello Time and Bridge Protocol Data Units (BPDU)................................................................................297
Point-to-Point and Edge Ports..................................................................................................................298
Mixed STP and RSTP Networks ....................................................................................................................300
VLANs ............................................................................................................................................................301
Chapter 27: Rapid Spanning Tree Protocol ................................ ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ..........303
Displaying the RSTP Window.........................................................................................................................304
Configuring RSTP Bridge Settings .................................................................................................................308
Configuring RSTP Port Settings.....................................................................................................................311
Enabling or Disabling RSTP on the Ports.......................................................................................................314
Enabling or Disabling BPDU Transparency for RSTP....................................................................................315
Chapter 28: Multiple Spanning Tree Protocol Overview ............... .... ... ... ... ... .... ... ... ... .... ..........................317
Overview.........................................................................................................................................................318
Multiple Spanning Tree Instance (MSTI)........................................................................................................319
VLAN and MSTI Associations..................................................................................................................319
Ports in Multiple MSTIs............................................................................................................................319
Multiple Spanning Tree Regions ....................................................................................................................321
Region Guidelines....................................................................................................................................323
Common and Internal Spanning Tree (CIST)....................................................................... ... ... ... ... ..............324
MSTP with STP and RSTP.............................................................................................................................325
Summary of Guidelines....................... ... ... .... ... ... ... ... .......................................... .... .......................................326
Associating VLANs to MSTIs..................... .... ... ... ... ... .... ... ... ... .... ... .......................................... .......................328
Connecting VLANs Across Different Regions ............................ ... .......................................... ... ... ... .... ..........330
Chapter 29: Multiple Spanning Tree Protocol ................ ... .... ... ... ... .... ... ...................................... .... ..........333
Displaying the MSTP Window ........................................................................................................................334
Enabling or Disabling MSTP on the Ports ......................................................................................................338
Configuring the MSTP Bridge Parameters.....................................................................................................339
Configuring the CIST Priority..........................................................................................................................342
Managing MSTIs ................................. ... ... .... .................................................................................................344
Creating an MSTI............. ... ... .... ... ... ... .... ... ... ... ... .......................................... .... .......................................344
Modifying an MSTI..............................................................................................................
.....................346
Deleting an MSTI .....................................................................................................................................348
Configuring MSTP Port Parameters...............................................................................................................349
Displaying MSTP Statistics.............................................................................................................................356
Enabling or Disabling BPDU Transparency for MSTP .................................. ... ..............................................360
Chapter 30: Loop Detection Frame ............................................................................................................361
Introduction.....................................................................................................................................................362
Displaying the Loop Detection Frame Window...............................................................................................363
7
Page 8
Contents
Enabling or Disabling Loop Detection Frame ................................................................................................ 367
Configuring Loop Detection Frame................................................................................................................ 368
Displaying Statistics for Loop Detection Frame ............................................................................................. 371
Chapter 31: IGMP Snooping ...................................................................................................................... 373
Introduction .................................................................................................................................................... 374
Displaying the IGMP Snooping Window ........................................................................................................ 376
Configuring IGMP Snooping .......................................................................................................................... 378
Adding Static Multicast Addresses................................................................................................................. 380
Deleting Static Multicast Addresses............................................................................................................... 383
Displaying Multicast Groups .......................................................................................................................... 384
Chapter 32: MLD Snooping ........................................................................................................................ 387
Introduction .................................................................................................................................................... 388
Displaying the MLD Snooping Window.......................................................................................................... 389
Configuring MLD Snooping............................................................................................................................ 391
Adding Static Multicast Addresses................................................................................................................. 393
Deleting Static Multicast Addresses............................................................................................................... 396
Displaying Multicast Groups .......................................................................................................................... 397
Chapter 33: DHCP Snooping ............................................... ... ... .... ... .......................................................... 399
Displaying the DHCP Snooping Window ....................................................................................................... 400
Configuring Basic DHCP Snooping Parameters............................................................................................ 402
Configuring the Ports ..................................................................................................................................... 404
Adding Entries to the Binding Database ........................................................................................................ 407
Adding MAC Address Filtering Entries........................................................................................................... 409
Displaying DHCP Snooping........................................................................................................................... 411
Chapter 34: Switch Storm Detection .................. ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ................ 413
Introduction .................................................................................................................................................... 414
Displaying the Switch Storm Detection Window ............................................................................................ 416
Enabling or Disabling Switch Storm Detection............................................................................................... 421
Configuring Switch Storm Detection .............................................................................................................. 422
Displaying Statistics for Switch Storm Detection............................................................................................ 425
Chapter 35: Ethernet Protection Switching Ring ..................................................................................... 427
Displaying the EPSR Window........................................................................................................................ 428
Adding an EPSR Domain............................................................................................................................... 430
Modifying an EPSR Domain .......................................................................................................................... 433
Deleting an EPSR Domain............................................................................................................................. 434
Displaying EPSR Status Information ............................................................................................................. 435
Chapter 36: Access Filters ......................................................................................................................... 437
Introduction .................................................................................................................................................... 438
Displaying the Access Filter Window............................................................................................................. 440
Enabling or Disabling Access Filters.............................................................................................................. 442
Adding Filter Entries......... ....................................... ... ... ... .... ... ... ... .... ... ... ....................................................... 443
Deleting Filter Entries..................................................................................................................................... 446
Chapter 37: MAC Address-based Port Security Overview ...................................................................... 447
Overview........................................................................................................................................................ 448
Automatic................................................................................................................................................. 448
Secured................................................................................................................................................... 448
Limited..................................................................................................................................................... 449
Dynamic Limited...................................................................................................................................... 450
Invalid Frames and Intrusion Actions................... .......................................................................................... 451
Guidelines...................................................................................................................................................... 452
8
Page 9
GS900M Series Web Browser User’s Guide
Chapter 38: MAC Address-based Port Security ......................... ... .... ... ... ... ... .... ... ... ... .... ... ... ... .................453
Displaying the MAC Address-based Port Security Window ...........................................................................454
Changing the Port Security Settings...............................................................................................................456
Chapter 39: RADIUS Client .........................................................................................................................459
Introduction.....................................................................................................................................................460
Guidelines................................................................................................................................................460
Displaying the RADIUS Client Window ..........................................................................................................462
Configuring RADIUS Accounting....................................................................................................................464
Configuring the RADIUS Client ......................................................................................................................466
Configuring RADIUS Server Definitions .........................................................................................................468
Chapter 40: Port Authentication Overview ...............................................................................................471
Overview.........................................................................................................................................................472
Authentication Methods....................................................... ... .... ... ... ... .... ... ... ... ... .... ... ... .................................473
802.1x Port-based Network Access Control ........................... ... ... .... ... ....................................................473
MAC address-based authentication.........................................................................................................473
Web Browser Authentication.. .... ... ... ... .... ... ... ... .......................................... ... .... ... ... ... ..............................473
Authenticator Port Operational Settings................. ... .... ... ... ... .... ... ... ... .... ... ... .................................................474
Authenticator Port Operating Modes ..............................................................................................................475
Single Host Mode.....................................................................................................................................475
Single Host Mode with Piggy Backing......................................................................................................475
Multiple Host Mode ..................................................................................................................................477
Supplicant and VLAN Associations................................................................................................................479
Single Host Mode.....................................................................................................................................480
Multiple Host Mode ..................................................................................................................................480
Multiple Supplicant Mode.........................................................................................................................480
Supplicant VLAN Attributes on the RADIUS Server.................................................................................480
Guest VLAN......................................................... ... ... .... ... ... ... ....................................... .................................482
RADIUS Accounting.......................................................................................................................................483
General Steps...................... ... ... ....................................... ... ... .... ... ... ... .... ... ... ... ..............................................484
Guidelines.......................................................................................................................................................485
Chapter 41: Port Authentication ................................................................................................................487
Displaying the Port Authentication Window....................................................................................................488
Enabling Port Authentication on the Switch....................................................................................................492
Configuring Authenticator Ports......................................................................................................................495
Configuring the Web Authentication Server .................................. ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... .................505
Configuring Supplicant Ports..........................................................................................................................508
Configuring Log Events for Authenticator Ports .............................................................................................512
Designating Non-authenticated Network Devices ..........................................................................................514
Disabling Port Authentication on the Ports.....................................................................................................517
Disabling Port Authentication on the Switch...................................................................................................518
Enabling or Disabling EAP Transparency ......................................................................................................519
Chapter 42: Configuration Files ...............................................................................................
..................521
Introduction.....................................................................................................................................................522
Displaying the File Management Window ......................................................................................................523
Displaying the Configuration File Window......................................................................................................525
Creating a New Configuration File....................... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... .......................527
Designating the Active Configuration File.......................................................................................................528
Uploading Configuration Files from the Switch...............................................................................................529
Downloading Configuration Files to the Switch ..............................................................................................530
Deleting Configuration Files ...........................................................................................................................532
Displaying the Configuration Window.............................................................................................................533
9
Page 10
Contents
Chapter 43: Operating System Files ............... ... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ................ 535
Introduction .................................................................................................................................................... 536
Displaying the File Management Window...................................................................................................... 537
Deleting the Secondary Operating System File............................................................................................. 539
Downloading a New Operating System File to the Switch............................................................................. 540
Designating the Primary Operating System File............................................................................................ 542
10
Page 11

Figures

Figure 1: Example of a Web Browser Management Window.............................................................................................. 28
Figure 2: Window Banner.................................................................................................................................................... 29
Figure 3: Main Menu............................................................................................................................................................ 30
Figure 4: Save Configuration Window................................................................................................................................. 32
Figure 5: Logon Window ...................................................................................................................................................... 35
Figure 6: Management - Configuration File Window ........................................................................................................... 36
Figure 7: System Settings - System Window....................................................................................................................... 38
Figure 8: Change Password Window.................................................................................................................................. 38
Figure 9: System Settings - System Window....................................................................................................................... 42
Figure 10: Change Password Window ................................................................................................................................ 46
Figure 11: Management - Port Reset Window..................................................................................................................... 53
Figure 12: System Settings - System Time Window............................................................................................................ 56
Figure 13: System Settings - Log Window........................................................................................................................... 65
Figure 14: Device Monitoring - Log Window........................................................................................................................ 70
Figure 15: Log - Display Window......................................................................................................................................... 72
Figure 16: System Settings - Others Window...................................................................................................................... 83
Figure 17: Device Monitoring - System Information Window............................................................................................... 88
Figure 18: System - Detail Window ..................................................................................................................................... 90
Figure 19: Display Port Status Window............................................................................................................................... 91
Figure 20: Device Monitoring - Switch Counter Window ..................................................................................................... 93
Figure 21: Port Counter Window......................................................................................................................................... 94
Figure 22: System Settings - LED Window.......................................................................................................................... 96
Figure 23: Port LED - Port Settings Window ..................................................................................................................... 100
Figure 24: System Settings - SNMP Window.................................................................................................................... 103
Figure 25: SNMP Community - Add Window.........................................................................................
Figure 26: Switch Settings - Port Window................................................................................................. ........................ 114
Figure 27: Port Settings Window..................................................................................................................... .................. 118
Figure 28: Display Port Status Window............................................................................................................. ... ... .......... 124
Figure 29: Device Monitoring - FDB Window..................................................................................................................... 130
Figure 30: FDB Display Filter Window....................................................................................................... ........................ 134
Figure 31: Switch Settings - Others Window................................................................................................................... .. 138
Figure 32: Switch Settings - Protection Window............................................................................................................ .... 143
Figure 33: Packet Storm Protection Settings Window................................................................................................ ....... 145
Figure 34: Switch Settings - Mirroring Window .................................................................................................................. 149
Figure 35: Static Port Trunk Example..................................................................................................... ... ........................ 154
Figure 36: Switch Settings - Trunking Window.................................................................................................................. 156
Figure 37: Trunk Settings - Add Window........................................................................................................................... 157
Figure 38: Trunk Settings - Edit Window....................................................................................................................... .... 160
Figure 39: System Settings - Trigger Window............................. ... .............................................................. ..................... 167
Figure 40: Trigger Settings - Add Window....................................................................................................... .. ................ 170
Figure 41: Trigger - Detail Window.................................................................................................................................... 175
Figure 42: Port-based VLAN - Example 1......................................................................................................................... 183
Figure 43: Port-based VLAN - Example 2......................................................................................................................... 184
Figure 44: Example of a Tagged VLAN............................................................................................................................. 188
Figure 45: Switch Settings - Virtual LAN Window....................................................................................................... ... .... 194
Figure 46: VLAN Settings - Add Window...................................................................................................... ..................... 197
Figure 47: VLAN Settings - Edit Window........................................................................................................................... 202
Figure 48: Example of the VLAN Settings - Add Window for a Protected Ports VLAN..................................................... 213
Figure 49: Switch Settings - QoS Window......................................................................................................................... 224
............................ 107
11
Page 12
List of Figures
Figure 50: QoS - DSCP Settings Window............................................................................................................... ........... 228
Figure 51: QoS DSCP Settings Window............................................................................................................................ 229
Figure 52: QoS - Port Settings Window.......................................................................................................................... ... 230
Figure 53: User Priority and VLAN Fields within an Ethernet Frame................................................................ ................. 235
Figure 54: ToS field in an IP Header................................................................................................................. ... .............. 237
Figure 55: Switch Settings - Classifier Window ................................................................................................ ... .............. 242
Figure 56: Classifier - Add Window...................................................................................................................... .............. 243
Figure 57: DiffServ Domain Example................................................................................................................... .............. 262
Figure 58: QoS Voice Application Example................................................................................................... .................... 265
Figure 59: QoS Video Application Example............................................................................................................ .. ......... 267
Figure 60: QoS Critical Database Example .................................................................................................................... ... 268
Figure 61: Policy Component Hierarchy Example ................................................................................... .......................... 270
Figure 62: Switch Settings - Policy Based QoS Window............................................................................................. ... ... 272
Figure 63: Flow Group - Add Window................................................................................................................................ 275
Figure 64: Traffic Class - Add Window.............................................................................................................................. 279
Figure 65: QoS Policy - Add Window................................................................................................................................. 286
Figure 66: Device Monitoring - Policy Based QoS window................................................................................................ 291
Figure 67: QoS Policy Counters Window........................................................................................................................... 292
Figure 68: Point-to-Point Ports................................................................................................................. ... ....................... 298
Figure 69: Edge Port.......................................................................................................................................................... 299
Figure 70: Point-to-Point and Edge Port............................................................................................................................ 299
Figure 71: VLAN Fragmentation....................................................................................................................... ................. 301
Figure 72: Switch Settings - RSTP Window................................................................................................................. ...... 304
Figure 73: RSTP Port Settings Window...................................................................................................... ....................... 311
Figure 74: Spanning Tree - Port Settings Window............................................................................................................. 312
Figure 75: Multiple Spanning Tree Region ................ .......................................................................................... .............. 322
Figure 76: CIST and VLAN Guideline - Example 1.................................................................................
Figure 77: CIST and VLAN Guideline - Example 2............................................................................................................ 329
Figure 78: Spanning Regions - Example 1........................................................................................................................ 330
Figure 79: Switch Settings - MSTP Window...................................................................................................................... 334
Figure 80: CIST - Edit Window ............................................................................................................................ .............. 342
Figure 81: MST Instance - Add Window............................................................................................................................ 345
Figure 82: MST Instance - Edit Window...................................................................................................................... ... ... 347
Figure 83: Port Settings / Instance ID Window.................................................................................................................. 350
Figure 84: CIST- Port Settings Window........................................................................................... ... ............................... 352
Figure 85: MST Instance - Port Settings Window.............................................................................................................. 353
Figure 86: Device Monitoring - MSTP Window............................................................................................................ ...... 356
Figure 87: MSTP Port Counters Window........................................................................................................................... 357
Figure 88: Switch Settings - Loop Detection Frame Window.......................................... ... ................................................ 363
Figure 89: LDF - Port Settings Window............................................................................................................................. 368
Figure 90: Device Monitoring - Loop Detection Frame Window ........................................................................................ 371
Figure 91: Switch Settings - IGMP Snooping Window....................................................................................................... 376
Figure 92: IP Multicast Address - Add Window............................................................................................................ ...... 381
Figure 93: Device Monitoring - IGMP Snooping Window..................................................................................... .............. 384
Figure 94: Switch Settings - MLD Snooping Window ............................................................................................. ........... 389
Figure 95: Multicast Group - Add Window.......................................................................................... ... ............................ 394
Figure 96: Device Monitoring - MLD Snooping................................................................................................. ... .............. 397
Figure 97: Switch Settings - DHCP Snooping Window...................................................................................................... 400
Figure 98: Port Settings Window for DHCP Snooping....................................................................................................... 404
Figure 99: DHCP Snooping - Port Settings Window................................................................................................. ... ...... 405
Figure 100: Binding Data Base Client Information - Add Window ..................................................................................... 407
Figure 101: MAC Address Filtering Entry - Add Window................................................................................................... 409
Figure 102: Device Monitoring - DHCP Snooping Window...........................................................................
Figure 103: Switch Settings - Switch Storm Detection Window......................................................................................... 416
Figure 104: Switch Storm Detection - Port Settings Window............................................................................................. 422
Figure 105: Device Monitoring - Switch Storm Database Window .................................................................................... 425
Figure 106: Switch Settings - EPSR Window ......................................................................................................... ........... 428
Figure 107: EPSR Domain - Add Window......................................................................................................................... 430
Figure 108: Device Monitoring - EPSR Window................................................................................................................ 435
Figure 109: System Settings - Access Filter Window.................................................................................... ... ................. 440
........................... 328
..................... 411
12
Page 13
GS900M Series Web Browser User’s Guide
Figure 110: Add Access Filter Window................................................................................................ ... ........................... 443
Figure 111: Security Settings - Port Security Window....................................................................................... ... ............. 454
Figure 112: Port Security Settings Window....................................................................................................................... 456
Figure 113: Security Settings - RADIUS Server Window ............................................................................. ... .................. 462
Figure 114: RADIUS Server Settings Window................................................................................................................... 468
Figure 115: Single Host Mode........................................................................................................................... ... ............. 475
Figure 116: Multiple Host Operating Mode................................................................................................... ..................... 476
Figure 117: Multiple Supplicant Mode.................................................................................................... ... ... ..................... 478
Figure 118: Security Settings - Port Authentication Window............................................................................................. 488
Figure 119: Port Authentication - Port Settings Window for Authenticator Ports................................. ... ........................... 496
Figure 120: Security Settings - Web Authenticator Window.............................................................................................. 506
Figure 121: Locations of the Messages in the Web Access Authentication Gateway....................................................... 507
Figure 122: Port Authentication - Port Settings Window for Supplicant Ports................................................................... 509
Figure 123: Authentication Log Settings Window............................................................................................ .. ................ 512
Figure 124: Port Authentication - Supplicant MAC Address Settings.............................................................................. .. 515
Figure 125: Management - File Management Window...................................................................................................... 523
Figure 126: Management - Configuration File Window ..................................................................................................... 525
Figure 127: Configuration Window................................................................................................... ... .............................. 534
Figure 128: Management - File Management Window...................................................................................................... 537
13
Page 14
List of Figures
14
Page 15

Tables

Table 1. Management Interfaces .......................................................................................................................................24
Table 2. Differences in the Management Interfaces ..........................................................................................................27
Table 3. Window Banner ...................................................................................................................................................29
Table 4. Main Menu ...........................................................................................................................................................30
Table 5. Save Configuration Window ................................................................................................................................32
Table 6. Password Window Parameters ............................................................................................................................39
Table 7. Name, Location, and Contact Fields in the System Settings - System Window ..................................................40
Table 8. Switch Settings - System Window .......................................................................................................................43
Table 9. Name, Location, and Contact Fields in the System Settings - System Window ..................................................44
Table 10. Password Window Parameters ..........................................................................................................................46
Table 11. IP Address Configuration Parameters in the System Settings - System Window .............................................49
Table 12. System Settings - System Window ....................................................................................................................56
Table 13. System Time Section of the System Settings - System Time Window ..............................................................58
Table 14. NTP Client Parameters ......................................................................................................................................59
Table 15. Summer Time Parameters .................................................................................................................................61
Table 16. System Settings - Log Window .......................................................................................................................... 65
Table 17. Severity Levels ..................................................................................................................................................68
Table 18. Event Log Options .............................................................................................................................................69
Table 19. Log Counter Fields ............................................................................................................................................70
Table 20. Display Order Options .......................................................................................................................................71
Table 21. Columns in the Log - Display Window ...............................................................................................................72
Table 22. Syslog Client Parameters ...........................................................................................
Table 23. Facility Codes for the Syslog Client ...................................................................................................................78
Table 24. System Settings - Others Window .....................................................................................................................84
Table 25. Device Monitoring - System Information Window ..............................................................................................89
Table 26. Automatic Refresh Option in the Device Monitoring ..........................................................................................92
Table 27. System Settings - Log Window .......................................................................................................................... 97
Table 28. SNMP Window .................................................................................................................................................104
Table 29. SNMP Community Table .................................................................................................................................104
Table 30. SNMP Basic Settings .......................................................................................................................................106
Table 31. SNMP Community - Add Window ....................................................................................................................108
Table 32. Switch Settings - Port Window .........................................................................................................................115
Table 33. Port List Table in the Switch Settings - Port Window .......................................................................................115
Table 34. Port Settings Window ......................................................................................................................................119
Table 35. Display Port Status Window ...........................................................................................................................125
Table 36. Device Monitoring - FDB Window ....................................................................................................................130
Table 37. FDB Display Filter ............................................................................................................................................132
Table 38. Add Static Entry ...............................................................................................................................................135
Table 39. Switch Settings - Others Window ....................................................................................................................138
Table 40. Switch Settings - Protection Window ...............................................................................................................143
Table 41. Port Settings Table in the Switch Settings - Protection Window ......................................................................144
Table 42. Switch Settings - Trunking Window .................................................................................................................157
Table 43. Trunk Settings - Add Window ..........................................................................................................................157
Table 44. Trigger Actions ................................................................................................................................................164
Table 45. Trigger Variables .............................................................................................................................................164
Table 46. System Settings - Trigger Window ..................................................................................................................168
Table 47. Trigger Settings Table in System Settings - Trigger Window ................................. .........................................168
Table 48. Trigger Settings - Add Window ........................................................................................................................171
Table 49. Trigger - Detail Window ...................................................................................................................................175
.......................................77
15
Page 16
List of Tables
Table 50. Example 1 of Port-based VLANs .....................................................................................................................183
Table 51. Example 2 of Port-based VLANs .....................................................................................................................185
Table 52. Example of Tagged VLANs ..............................................................................................................................189
Table 53. Switch Settings - Virtual LAN Window .............................................................................................................194
Table 54. VLAN Group List Table ....................................................................................................................................195
Table 55. VLAN Settings - Add Window for Port-based or Tagged VLANs .....................................................................197
Table 56. Example of a Protected Ports VLAN - Part I ....................................................................................................207
Table 57. Example of a Protected Ports VLAN - Part II ...................................................................................................207
Table 58. VLAN Settings - Add Window for Protected Ports VLAN .................................................................................211
Table 59. Default Mappings of IEEE 802.1p Priority Levels to Priority Queues ..............................................................219
Table 60. Example of New Mappings of IEEE 802.1p Priority Levels to Priority Queues ................................................219
Table 61. Default Values for Weighted Round Robin ......................................................................................................222
Table 62. Switch Settings - QoS Window ........................................................................................................................225
Table 63. Switch Settings - Classifier Window .................................................................................................................242
Table 64. Classifier - Add Window ...................................................................................................................................244
Table 65. Switch Settings - Policy Based QoS Window ..................................................................................................273
Table 66. QoS Policy List Table .......................................................................................................................................273
Table 67. Traffic Class List Table ....................................................................................................................................273
Table 68. Flow Group List Table ......................................................................................................................................274
Table 69. Flow Group - Add Window ...............................................................................................................................276
Table 70. Traffic Class - Add Window ..............................................................................................................................280
Table 71. QoS Policy - Add Window ................................................................................................................................287
Table 72. RSTP Auto-Detect Port Costs ..........................................................................................................................296
Table 73. RSTP Auto-Detect Port Trunk Costs ...............................................................................................................296
Table 74. Switch Settings - RSTP Window ......................................................................................................................305
Table 75. Switch Settings - RSTP Window ......................................................................................
Table 76. RSTP Bridge Parameters ................................................................................................................................308
Table 77. Spanning Tree - Port Settings Window ............................................................................................................312
Table 78. Switch Settings - MSTP Window .....................................................................................................................335
Table 79. Status Parameters in the MSTP Window .........................................................................................................336
Table 80. Bridge MSTP Settings ......................................................................................................................................339
Table 81. MST Instance - Add Window ...........................................................................................................................345
Table 82. Port Settings / Instance ID Window .................................................................................................................350
Table 83. MST Instance - Port Settings ...........................................................................................................................353
Table 84. MSTI Statistics Window ...................................................................................................................................356
Table 85. MSTI Statistics Window ...................................................................................................................................358
Table 86. Actions for Loop Detection Frame ...................................................................................................................362
Table 87. Switch Settings - Loop Detection Frame Window ............................................................................................364
Table 88. Port Settings Table in the Switch Settings - Loop Detection Frame Window ..................................................364
Table 89. LDF - Port Settings Window .............................................................................................................................369
Table 90. Device Monitoring - Loop Detection Frame Window ........................................................................................371
Table 91. Switch Settings - IGMP Snooping Window ......................................................................................................376
Table 92. IP Multicast Address List Table ........................................................................................................................377
Table 93. Switch Settings - IGMP Snooping Window ......................................................................................................378
Table 94. IP Multicast Address - Add Window .................................................................................................................381
Table 95. Host List ...........................................................................................................................................................384
Table 96. Multicast Router List ........................................................................................................................................385
Table 97. Switch Settings - MLD Snooping Window ........................................................................................................389
Table 98. Multicast Group List Table ...............................................................................................................................390
Table 99. Switch Settings - MLD Snooping Window ........................................................................................................391
Table 100. Multicast Group - Add Window ......................................................................................
Table 101. Multicast Router List ......................................................................................................................................397
Table 102. Host List .........................................................................................................................................................398
Table 103. DHCP Snooping Window ...............................................................................................................................401
Table 104. Basic Settings for DHCP Snooping ................................................................................................................402
Table 105. DHCP Snooping - Port Settings Window .......................................................................................................405
Table 106. Binding Data Base Client Information - Add Window .....................................................................................407
Table 107. MAC Address Filtering Entry - Add Window ..................................................................................................410
Table 108. Actions for Switch Storm Detection ................................................................................................................414
Table 109. Switch Settings - Switch Storm Detection Window ........................................................................................417
................................305
................................394
16
Page 17
GS900M Series Web Browser User’s Guide
Table 110. Switch Settings - Switch Storm Detection Window ........................................................................................417
Table 111. Switch Storm Detection - Port Settings Window ............................................................................................423
Table 112. Device Monitoring - Switch Storm Database Window ...................................................................................425
Table 113. Switch Settings - EPSR Window ...................................................................................................................428
Table 114. EPSR Domain Settings in the EPSR Domain - Add Window .......................................................................431
Table 115. Device Monitoring - EPSR Window ............................................. ... ...............................................................435
Table 116. Access Filters ...............................................................................................................................................438
Table 117. System Settings - Access Filter Window .......................................................................................................440
Table 118. Add Access Filter Window .............................................................................................................................444
Table 119. Intrusion Actions for MAC Address-based Port Security ................................ ... ............................................451
Table 120. Security Settings - Port Security Window ......................................................................................................454
Table 121. Port Security Settings Window ......................................................................................................................457
Table 122. Security Settings - RADIUS Server Window ..................................................................................................463
Table 123. RADIUS Account Settings in the Security Settings - RADIUS Server Window .............................................464
Table 124. RADIUS Client Settings in the Security Settings - RADIUS Server Window .................................................466
Table 125. RADIUS Server Settings Window ..................................................................................................................469
Table 126. Security Settings - Port Authentication Window ............................................................................................489
Table 127. Port List Table in the Security Settings - Port Authentication Window ..........................................................489
Table 128. Port Access Settings .....................................................................................................................................492
Table 129. RADIUS Server MAC Address Format Settings ............................................................................................ 493
Table 130. Port Authentication - Port Settings Window for Authenticator Ports ..............................................................497
Table 131. Security Settings - Web Authenticator Window .............................................................................................506
Table 132. Port Authentication - Port Settings window for Supplicant Ports ...................................................................509
Table 133. Authenticator Log Settings Window .................................................................................
Table 134. Management - File Management Window .....................................................................................................524
Table 135. Management - Configuration File Window .....................................................................................................525
Table 136. Management - File Management Window .....................................................................................................538
Table 137. Download Firmware Options .........................................................................................................................541
..............................513
17
Page 18
List of Tables
18
Page 19

Preface

This guide explains how to use the web browser management interface in the Allied Telesis GS900M Series of Gigabit Ethernet switches to configure the features and view statistics. The preface contains the following sections:
“Safety Symbols Used in this Document” on page 20“Contacting Allied Telesis” on page 21
19
Page 20
Preface
Note
Caution
Warning
Warning

Safety Symbols Used in this Document

This document uses the following conventions.
Notes provide additional information.
Cautions inform you that performing or omitting a specific action may result in equipment damage or loss of data.
Warnings inform you that performing or omitting a specific action may result in bodily injury.
Laser warnings inform you that an eye or skin hazard exists due to the presence of a Class 1 laser device.
20
Page 21

Contacting Allied Telesis

If you need assistance with this product, you may contact Allied Telesis technical support by going to the Support page on the Allied Telesis web site at www.alliedtelesis.com/support. You can find links for the following services on this page:
24/7 Online Support — Enter our interactive support center to
search for answers to your product questions in our knowledge database, to check support tickets, to learn about RMAs, and to contact Allied Telesis technical experts.
USA and EMEA phone support — Select the phone number that
best fits your location and customer type.
Hardware warranty information — Learn about Allied Telesis
warranties and register your product online.
Replacement Services — Submit a Return Merchandise
Authorization (RMA) request via our interactive support center.
GS900M Series Web Browser User’s Guide
Documentation — View the most recent installation and user
guides, software release notes, white papers, and data sheets for your products.
Software Downloads — Download the latest software releases for
your managed products.
For sales or corporate information, go to www.alliedtelesis.com/ purchase and select your region.
21
Page 22
Preface
22
Page 23

Chapter 1

Introduction

This chapter contains introductory information about the web browser management interface on the switch and basic instructions on how to use the interface to configure the parameter settings of the features. The chapter contains the following sections:
“Introduction” on page 24“Main Software Features” on page 26“Differences Between the Management Interfaces” on page 27“Elements of the Web Browser Windows” on page 28“Working with the Web Browser Interface” on page 31“Starting or Ending a Web Browser Management Session” on page 34“What to Configure During the First Management Session” on page 36
23
Page 24
Chapter 1: Introduction

Introduction

This manual describes the web browser management interface for the GS900M Series of Gigabit Ethernet Switches. The instructions explain how to use the web browser windows to configure the parameter settings and features of the devices, as well as view status information and statistics.
Switch Models The manual applies to the following models of the GS900M Series of
Gigabit Ethernet Switches:
AT-GS908MAT-GS916MAT-GS924M
Management
Interfaces
The switches have three management interfaces: The interfaces are described in Table 1.
Table 1. Management Interfaces
Management Interface Description
Command line This management interface consists of a
series of commands. The interface is available locally through the Console port on the switch as well as remotely with a Telnet client on a management workstation. You may use the commands to manage and configure all of the features and parameters on the switch.
Web Browser This management interface consists of
web browser windows and is used remotely with web browsers from management workstations on your network. You may use this interface to manage nearly all of the features and parameters of the switch. The few exceptions are listed in “Differences Between the Management Interfaces” on page 27. This interface is not available through the Console port.
24
Page 25
GS900M Series Web Browser User’s Guide
Table 1. Management Interfaces (Continued)
Management Interface Description
SNMPv1 and v2c This management interface consists of
management information base (MIB) objects, which represent the parameters and settings of the features on the switch. This form of management requires a Simple Network Management Protocol (SNMP) application. The interface is available from remote management workstations that have SNMP applications. It is not available through the Console port.
The switches support the following MIBs: SNMP MIB-II (RFC 1213) Ethernet MIB (RFC 3635) Extended Interface MIB (RFC 2863) Bridge MIB (RFC 1493) Dot1q MIB (RFC 2674) Allied Telesis managed switch MIBs
25
Page 26
Chapter 1: Introduction

Main Software Features

Here are the main software features of the switches:
Port mirroringStatic port trunksPort-based and tagged VLANsProtected ports VLANsClass of ServiceQuality of Service PoliciesRapid Spanning Tree Protocol (STP compatible)Multiple Spanning Tree Protocol (STP compatible)Loop Detection FrameIGMP v3 SnoopingMLD v2 SnoopingDHCP SnoopingBroadcast, multicast, and unknown unicast packet filtersTraffic rate thresholds with actionsEthernet Protected Switched Ring (transit node only)RADIUS client with accountingPort authentication with 802.1x, MAC address, or web browserMAC address-based port securityTrigger actions for automated tasksEvent logSyslog serverSNTP clientStatisticsTelnet serverHTTP serverManagement access filterCommand line management interfaceWeb browser management interface
26
SNMPv1 and v2cBPDU/EAP forwarding
Page 27

Differences Between the Management Interfaces

There are several differences between the command line and web browser interfaces. The differences are listed in Table 2.
Table 2. Differences in the Management Interfaces
Feature Difference
DCHP client The switch has a DHCP client. You may
use it to assign the device an IP address configuration from a DHCP server on your network. You have to use the command line interface to enable or disable the client. You may use the web browser interface to assign a static IP address to the switch, but you cannot use it to control the DHCP client.
GS900M Series Web Browser User’s Guide
Ping utility The switch has a PING utility. You may
use it to test for active paths between the switch and other devices. The utility is only available from the command line interface. It is not supported from the web browser interface.
PURGE commands The command line interface has a series
of PURGE commands for returning the parameter settings of many of the individual features to their default settings. The web browser interface does not have a similar function.
Resetting Flash Memory The command line interface has the
CLEAR FLASH TOTAL command, which you may use to delete all of the files in flash memory. You may use the web browser interface to delete individual files in flash memory, but you cannot delete all of the files at one time.
27
Page 28
Chapter 1: Introduction

Elements of the Web Browser Windows

Figure 1 is an example of a web browser window of the management interface. The interface displays this window first when you start a management session.
28
Figure 1. Example of a Web Browser Management Window
At the top of every window is a banner. The components of a banner are identified in Figure 2 on page 29.
Page 29
Figure 2. Window Banner
1
2
3
Table 3 defines the banner components.
Table 3. Window Banner
Section Description
GS900M Series Web Browser User’s Guide
1 Displays the model name of the switch you are currently
managing.
2 Displays the window name. The first part of the name is
the name of the submenu from where the window is accessed.
3 Displays the version number of the management
software and the MAC address of the switch.
The web browser interface has a main menu in the upper left corner of the browser windows. The elements of the main menu are shown in Figure 3 on page 30.
29
Page 30
Chapter 1: Introduction
2
1
3
Figure 3. Main Menu
Table 4 defines the main menu components.
Table 4. Main Menu
Section Description
1 Displays the main menu. 2 Saves your changes to the parameter settings of the
switch to the active configuration file in the file system. For more information, refer to the “Save Button” on page 32.
3 Ends a web browser management session.
30
Page 31

Working with the Web Browser Interface

Note
This section has guidelines on how to use the web browser interface.
GS900M Series Web Browser User’s Guide
Operating
Systems
The web browser interface has been tested on the following operating systems:
Microsoft Windows XPMicrosoft Windows VistaMicrosoft Windows 7
Web Browsers For general management functions and tasks, Allied Telesis recommends
Microsoft Internet Explorer 6 (Windows version) or later. For transferring configuration files or operating system files to the switch, Allied Telesis recommends Microsoft Internet Explorer 7 (Windows version) or later.
You may need to add the IP address of the switch to the Compatibility View Settings in the web browser if you have a newer version of the Microsoft Internet Explorer and the web browser interface on the switch displays some of the windows incorrectly or not at all.
Menus and
Options
The main menu shown in Figure 3 on page 30 has the following five options:
Apply and Set
Buttons
System SettingsSwitch SettingsSecurity SettingsDevice MonitoringManagement
The options have submenus. Clicking on an option in the main menu expands it to display the submenu. Clicking on a main menu option collapses the submenu again.
To select an option in a submenu, click on it. The switch displays the appropriate window. You may select only one submenu option at a time.
Management windows with adjustable parameters have Apply or Set buttons. After changing a parameter setting of a feature, you have to click one of these buttons to activate your change on the switch. Your changes are not implemented on the switch until you click the button.
31
Page 32
Chapter 1: Introduction
Save Button The switch stores its parameter settings in a configuration file in its file
system. The file enables the switch to retain its settings even when it is powered off or reset.
The switch does not automatically update the configuration file when you click the Apply or Set button to implement your changes to the parameter settings of a feature. Instead, you have to instruct the switch to update the file yourself with the Save button, located above the main menu. (Refer to Figure 3 on page 30.)
When you click the Save button, the switch displays the Save Configuration window, shown in Figure 4 on page 32.
32
Figure 4. Save Configuration Window
The options in the window are described Table 5.
Table 5. Save Configuration Window
Option Description
Save To Startup Configuration File
Use this option to save the parameter settings of the switch to the active configuration file. This is the option you are most likely to use.
Page 33
GS900M Series Web Browser User’s Guide
Table 5. Save Configuration Window (Continued)
Option Description
Save to an Existing File Use this option to save the parameter
settings of the switch to another configuration file in the file system. To use this option, select the desired configuration file from the pull-down menu.
Save as a New File Use this option to store the parameter
settings in a new configuration file in the file system. Enter the filename for the new configuration file in the File Name field to the right of the option. Here are the filename guidelines:
The filename must have the “.cfg” extension.
The main portion of the filename can be up to sixteen characters.
Spaces and special characters are not allowed in a filename.
Filename examples are Sales_switch.cfg and Bldg2_sw4.cfg.
For more information about configuration files, refer to Chapter 42, “Configuration Files” on page 521.
Reset Button Windows that have an Apply button also have a Reset button. You may
use this button to discard your changes to the parameter settings in a window. But this button only works if you have not clicked the Apply button to activate your changes. The Reset button has no affect after the Apply button is used. For example, let’s assume that you changed the parameters in a feature window and then decided you preferred to discard your changes and return the parameters in the window to their previous values. If you had not clicked the Apply button to implement your new changes, you could click the Reset button to return the values to their previous settings. But if you click the Apply button and then the Reset button, the values remain at their new settings.
33
Page 34
Chapter 1: Introduction
Note
Note

Starting or Ending a Web Browser Management Session

This section contains the procedures for starting or ending a web browser management session on the switch.
Starting a
Management
Session
To start a web browser management session with the switch, perform the following procedure:
If you are using the default IP address of the switch, start with step
1. If you have already assigned the switch a new address, start with step 3.
1. Change the IP address of your computer to 192.168.1.n, where n is a number from 2 to 254.
2. Connect the Ethernet network port on your computer to any of the Ethernet ports on the switch.
Do not use the Console port. The Console port does not support the web browser management interface.
3. Start the web browser on your computer and enter the IP address of the switch in the URL field.
34
The default address is 192.168.1.1 with the subnet mask
255.255.255.0. The switch displays the logon window, shown in Figure 5 on page 35.
Page 35
GS900M Series Web Browser User’s Guide
Figure 5. Logon Window
4. Enter the username and password for the switch. The default settings are “manager” and “friend”, respectively. The username and password are case sensitive. (The password appears in the Password field as a series of asterisks.)
Ending a
Management
Session
The switch displays the Device Monitoring - System Information window, shown in Figure 1 on page 28.
To end a web browser management session, click the End Web Session button above the main menu. Refer to Figure 3 on page 30. You should always end your management session and close the web browser window when you are finished managing the switch. This may protect the switch from unauthorized changes to its configuration settings should you leave your computer unattended.
35
Page 36
Chapter 1: Introduction

What to Configure During the First Management Session

Here are a few suggestions on what to configure during the first management session.
Creating a
Configuration
File
Your first step should be to create a configuration file in the file system of the switch. The device uses the file to store its parameter settings so that you do not have to reenter them when you power off or reset the unit. To create a configuration file, perform the following procedure:
1. Start a web browser management session on the switch. For instructions, refer to “Starting a Management Session” on page 34.
2. Click on the Management menu in the main menu to display the menu options.
3. Click on the Configuration File option in the Management menu. The switch displays the Management - Configuration File window.
Refer to Figure 6.
36
Figure 6. Management - Configuration File Window
4. Click the dialog circle for the Save Configuration to a New File option in the Save Configuration section of the window.
5. Click the File Name field and enter a name for the new configuration file.
Page 37
GS900M Series Web Browser User’s Guide
Here are the filename guidelines:
The filename must have the “.cfg” extension.The main portion of the filename can be up to sixteen characters.Spaces and special characters are not allowed in a filename.
Filename examples are Sales_switch.cfg and Bldg2_sw4.cfg.
6. After entering the filename, click the Save Button. The switch creates the new configuration file and stores it in its file
system. It also updates the window by displaying the name of the new configuration file in the Change Start-up Configuration File pull-down menu in the Configuration File section of the window.
7. Click the Apply button in the Configuration File section of the window. This step designates the new file as the active configuration file. The
switch now uses the file to store its parameter settings when you click the Save button. For more information, refer to Chapter 42, “Configuration Files” on page 521.
Changing the
Manager
Password
To change the password to the manager account, perform the following procedure:
1. Click on the System Settings menu in the main menu to display the menu options.
2. Click on the System option in the Management menu. The switch displays the System Settings - System window. Refer to
Figure 7 on page 38.
37
Page 38
Chapter 1: Introduction
Figure 7. System Settings - System Window
3. Click the Update Password button in the Password section of the window.
The Password window is shown in Figure 8.
38
Figure 8. Change Password Window
4. Use the three fields in the Change Password window to change the manager password. The password is case sensitive. The fields are described in Table 6 on page 39.
Page 39
GS900M Series Web Browser User’s Guide
Caution
Table 6. Password Window Parameters
Parameter Description
Current Password Use this field to enter the current manager
password. The default password is “friend.”
New Password Use this field to enter the new manager
password. The password can be from 0 to 16 characters in length. The password is case sensitive.
Confirm New Password Use this field to confirm the new
password.
Do not use spaces or special characters, such as asterisks (*) and exclamation points (!), in a password if you are managing the switch from a web browser. Many web browsers cannot handle special characters in passwords.
Setting the
System Name,
Location, and
Contact
Information
5. Click the Apply button to activate your change on the switch.
6. To permanently save your changes in the configuration file, click the Save button option above the main menu.
Changing the manager password requires that you log on again.
7. Log on using the new password. The username is “manager” and the password is the new password you assigned the switch in this procedure.
Changing the manager password is not the only management function of the System Settings - System window. It is used for several functions, including setting the system name, location, and contact information of the switch, which can be useful information if you are having to manage a large number of network devices. If you still have the window open from changing the manager password, you might as well set that information, as well. The corresponding fields in the window are described in Table 7 on page 40.
39
Page 40
Chapter 1: Introduction
Table 7. Name, Location, and Contact Fields in the System Settings -
System Window
Parameter Description
Sysname Use this parameter to specify a name for
the switch (for example, Sales Ethernet switch). The name can be from 1 to 39 characters. The name can include spaces and special characters, such as exclamation points and asterisks. The default is no name. This parameter is optional.
Syslocation Use this parameter to specify the location
of the switch, (for example, 4th Floor - rm 402B). The location can be from 1 to 20 characters. The location can include spaces and special characters, such as dashes and asterisks. The default is no location. This parameter is optional.
Syscontact Use this parameter to specify the name of
a network administrator who is responsible for managing the switch. The name can be from 1 to 20 characters. It can include spaces and special characters, such as dashes and asterisks. The default is no name. This parameter is optional.
40
Page 41

Chapter 2

Basic Switch Parameters

This chapter contains the following sections:
“Displaying the System Window” on page 42“Configuring the Switch Name, Location, and Contact” on page 44“Changing the Password to the Manager Account” on page 46“Changing the IP Address Configuration” on page 48“Specifying the Management VLAN” on page 50“Responding to Broadcast PING Queries” on page 51“Rebooting the Switch” on page 52“Resetting Ports” on page 53
41
Page 42
Chapter 2: Basic Switch Parameters
4
3
1
2
5

Displaying the System Window

The system window is used to perform the following management tasks:
Change the name, location, or administrator of the switch.Change the password of the manager account.Set the IP address of the management VLAN.Designate the management VLAN.Enable or disable broadcast responses.
To display the system window, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the System option from the System Settings menu. The System Settings - System window is shown in Figure 9.
42
Figure 9. System Settings - System Window
The sections in the System Settings - System window are defined in Table 8 on page 43.
Page 43
GS900M Series Web Browser User’s Guide
Table 8. Switch Settings - System Window
Section Description
1 Use the fields in this section to set the name, location,
and administrator of the switch. For instructions, refer to “Configuring the Switch Name, Location, and Contact” on page 44.
2 Use this field to change the password of the manager
account on the switch. For instructions, refer to “Changing the Password to the Manager Account” on page 46,
3 Use the fields in this section to manually change the IP
address, subnet mask, and default gateway of the switch. For instructions, refer to “Changing the IP Address Configuration” on page 48.
4 Use this field to specify the management VLAN on the
switch. For instructions, refer to “Specifying the Management VLAN” on page 50.
5 Use this field to control whether the switch responds to
broadcast IP PING queries from network devices. For instructions, refer to “Responding to Broadcast PING Queries” on page 51.
43
Page 44
Chapter 2: Basic Switch Parameters

Configuring the Switch Name, Location, and Contact

To configure the name, location, and administrator of the switch, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the System option from the System Settings menu. The System Settings - System window is shown in Figure 9 on page
42.
3. Configure the Sysname, Syslocation, and Syscontact parameters in the window in Figure 9 on page 42.
The parameters are described in Table 9.
Table 9. Name, Location, and Contact Fields in the System Settings -
System Window
Parameter Description
Sysname Use this parameter to specify a name for
the switch (for example, Sales Ethernet switch). The name can be from 1 to 39 characters. The name can include spaces and special characters, such as exclamation points and asterisks. The default is no name. This parameter is optional.
Syslocation Use this parameter to specify the location
of the switch, (for example, 4th Floor - rm 402B). The location can be from 1 to 20 characters. The location can include spaces and special characters, such as dashes and asterisks. The default is no location. This parameter is optional.
Syscontact Use this parameter to specify the name of
a network administrator who is responsible for managing the switch. The name can be from 1 to 20 characters. It can include spaces and special characters, such as dashes and asterisks. The default is no name. This parameter is optional.
44
4. Click the Apply button to activate your changes on the switch.
Page 45
GS900M Series Web Browser User’s Guide
5. To permanently save your changes in the configuration file, click the Save button above the main menu.
45
Page 46
Chapter 2: Basic Switch Parameters

Changing the Password to the Manager Account

The switch has one manager account. The login name is “manager” and the default password is “friend.” You may not change the manager name, but you may change the password. To change the password, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the System option from the System Settings menu. The System Settings - System window is shown in Figure 9 on page
42.
3. Click the Update Password button in the Password section of the window.
The Password window is shown in Figure 10.
46
Figure 10. Change Password Window
4. Use the three fields in the Change Password window to change the manager password. The password is case sensitive. The fields are described in Table 10.
Table 10. Password Window Parameters
Parameter Description
Current Password Use this field to enter the current manager
password.
Page 47
GS900M Series Web Browser User’s Guide
Caution
Table 10. Password Window Parameters (Continued)
Parameter Description
New Password Use this field to enter the new manager
password. The password can be from 0 to 16 characters in length. The password is case sensitive.
Confirm New Password Use this field to confirm the new
password.
Do not use spaces or special characters, such as asterisks (*) and exclamation points (!), in a password if you are managing the switch from a web browser. Many web browsers cannot handle special characters in passwords.
5. Click the Apply button to activate your change on the switch.
6. To permanently save your changes in the configuration file, click the Save button option above the main menu.
Changing the manager password requires that you log on again.
7. Log on again using the new password. The username is “manager” and the password is the new password you assigned the switch in this procedure.
47
Page 48
Chapter 2: Basic Switch Parameters
Note
Note

Changing the IP Address Configuration

The IP address configuration of the switch consists of the following components:
IP addressSubnet maskGateway address
Changing the IP address of the switch from a web browser management session will interrupt your session. To resume managing the switch, start a new session using the new IP address.
The switch has a DHCP client and can obtain its IP configuration from a DHCP server on a network. However, you cannot enable or disable the client from the web browser interface. You have to use the command line interface. For instructions, refer to the AT-GS900M Command Line Interface User’s Guides.
To change the IP address configuration of the switch, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the System option from the System Settings menu. The System Settings - System window is shown in Figure 9 on page
42.
3. Configure the IP Address, Subnet Mask, and Default Gateway Address fields in the window, as needed.
The parameters are described in Table 11 on page 49.
48
Page 49
GS900M Series Web Browser User’s Guide
Note
Table 11. IP Address Configuration Parameters in the System Settings -
System Window
Parameter Description
IP Address Use this parameter to specify the IP
address of the switch for remote management functions. The switch can have only one IP address. The address must be a unique member of the subset or network of the switch.
Subnet Mask Use this parameter to specify the subnet
mask of the IP address. Subnet masks can be of variable length, provided that the “1” bits are consecutive (e.g., 128, 192, 224, etc.
Default Gateway Address Use this parameter to specify the default
gateway of the switch. This is the IP address of an interface on a router or Layer 3 routing device that is acting as the first hop to reaching management devices, such as management workstations or a syslog server , on remote subnets or networks. The switch can have only one default gateway and the network portion of the address must be the same as the IP address of the switch.
4. Click the Apply button to activate your changes on the switch.
At this point, the switch will probably stop responding to your management commands. To resume managing the device, try starting a new web browser management session using the new IP address or start a local session on the Console port,
5. To permanently save your changes in the configuration file, click the Save button above the main menu.
49
Page 50
Chapter 2: Basic Switch Parameters
Note

Specifying the Management VLAN

Please review the following information before changing the management VLAN on the switch.
You can specify only one VLAN as the management VLAN.The VLAN must already exist on the switch. For information on
VLANs, refer to Chapter 16, “Port-based and Tagged VLANs Overview” on page 177 and Chapter 17, “Port-based and Tagged VLANs” on page 191.
Changing the management VLAN may interrupt your remote web
browser management session of the switch.
To specify a different management VLAN on the switch, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the System option from the System Settings menu. The System Settings - System window is shown in Figure 9 on page
42.
3. Select the Interface (VLAN) field and enter the name or VID of the new management VLAN. You may specify only one VLAN.
4. Click the Apply button to activate your changes on the switch.
If the switch stops responding to your management session, it probably means that changing the management VLAN has interrupted the session. To resume managing the switch, try connecting your management workstation to a switch port that is a member of the new management VLAN or start a local management session on the Console port of the unit.
5. To permanently save your change in the configuration file, click the Save button above the main menu.
50
Page 51

Responding to Broadcast PING Queries

Note
The PING utility is a convenient tool for testing for active paths between network devices or for determining whether a network device is operating properly. However, the utility can also be used to breach the security of a network. By sending broadcast PING queries, network intruders can learn the IP addresses of the network devices or flood a network with PING queries and responses.
Once the switch has an IP address configuration, it does respond to PING queries. However, you may configure the device to respond to or ignore broadcast PING queries as opposed to unicast queries. The default setting is to ignore broadcast PINGS.
To permit or prevent responses by the switch to broadcast PING queries, perform the following procedure:
1. Expand the System Settings menu in the main menu.
GS900M Series Web Browser User’s Guide
2. Select the System option from the System Settings menu. The System Settings - System window is shown in Figure 9 on page
42.
3. Set the Directed Broadcast Response to either Yes or No. When the parameter is set to Yes, the switch responds to broadcast
PING queries. When the parameter is set to No, the default setting, the switch ignores broadcast PING queries.
The switch responds to unicast PING requests that contain its IP address even when the Directed Broadcast Response parameter is set to No.
4. Click the Apply button to activate your changes on the switch.
5. To permanently save your change in the configuration file, click the Save button above the main menu.
51
Page 52
Chapter 2: Basic Switch Parameters

Rebooting the Switch

To reboot the switch, perform the following procedure:
1. Expand the Management menu in the main menu.
2. Select the Reboot option from the Management menu.
3. Click OK to reboot the switch or Cancel to cancel the procedure.
4. Wait approximately thirty seconds for the switch to initialize its
5. Start a new management session, if desired.
The switch displays a confirmation prompt.
operating system.
52
Page 53

Resetting Ports

GS900M Series Web Browser User’s Guide
This procedure is used to perform software resets on individual ports on the switch. Resetting a port clears the MAC address table of the addresses learned on the port and deletes the port statistics counters. To perform software resets on individual ports on the switch, perform the following procedure:
1. Expand the Management menu in the main menu.
2. Select the Port Reset option from the Management menu. The switch displays the Management - Port Reset window, shown in
Figure 11.
Figure 11. Management - Port Reset Window
3. Click the dialog boxes of the ports you want to reset.
4. Click the Apply button.
53
Page 54
Chapter 2: Basic Switch Parameters
54
Page 55

Chapter 3

System Date and Time

This chapter contains the following sections:
“Displaying the System Date and Time Window” on page 56“Manually Setting the System Date and Time” on page 58“Setting the System Date and Time with an NTP Server” on page 59“Configuring Daylight Savings Time” on page 61
55
Page 56
Chapter 3: System Date and Time
1
2
3

Displaying the System Date and Time Window

To display the window for setting the date and time on the switch, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Time option from the System Settings menu. The System Settings - System Time window is shown in Figure 12.
Figure 12. System Settings - System Time Window
The sections in the window are defined in Table 12.
Table 12. System Settings - System Window
Section Description
56
1 Use the options in this section to manually set the date
and time. For instructions, refer to “Manually Setting the System Date and Time” on page 58.
Page 57
GS900M Series Web Browser User’s Guide
Table 12. System Settings - System Window (Continued)
Section Description
2 Use the options in this section of the window to configure
the NTP client so that the switch obtains its date and time from an NTP server on your network or the Internet. For instructions, refer to “Setting the System Date and Time with an NTP Server” on page 59.
3 Use the options in this section to configure the switch for
Daylight Savings Time (DST). For instructions, refer to “Configuring Daylight Savings Time” on page 61
57
Page 58
Chapter 3: System Date and Time

Manually Setting the System Date and Time

To manually set the date and time on the switch, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Time option from the System Settings menu. The System Settings - System Time window is shown in Figure 12 on
page 56.
3. Configure the parameters in the System Time section of the window. The fields are defined in Table 13.
Table 13. System Time Section of the System Settings - System Time
Window
Parameter Description
Year/Month/Day Enter the current year, month, and day in
the three fields. The year must be represented with four digits. The month and day can be represented by one or two digits. For example, August 2, 2014 can be entered as 2014/8/2 or 2014/08/02.
HH:MM:SS Enter the current hours, minutes, and
seconds. The hours are entered in 24-hour format. The numbers can have one or two digits. For example, the time of 9:02 am can be entered as 9:2:0 or 09:02:00.
4. After configuring the fields, click the Apply button to activate your changes on the switch.
5. To permanently save your changes in the configuration file, click the Save button above the main menu.
58
Page 59
GS900M Series Web Browser User’s Guide

Setting the System Date and Time with an NTP Server

The switch has a Network Time Protocol (NTP) client so that it can se t the date and time from an SNTP or NTP server on your network or the Internet. Here are the guidelines to using the NTP client:
The switch must have an IP address. For instructions, refer to
“Changing the IP Address Configuration” on page 48.
If the switch and NTP server are in different networks or
subnetworks, the switch must also have the IP address of a default gateway. This is the IP address of a routing interface that represents the first hop to reaching the remote network of the SNTP or NTP server. For instructions, refer to “Changing the IP Address Configuration” on page 48.
When you configure the client, you must specify the offset of the
location of the switch from Coordinated Universal Time (UTC).
The switch polls the NTP server for the date and time when you
configure the client and whenever the unit is powered on or reset.
To configure the NTP client, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Time option from the System Settings menu. The System Settings - System Time window is shown in Figure 12 on
page 56.
3. Configure the parameters in the NTP section of the window. The fields are defined in Table 14.
Table 14. NTP Client Parameters
Parameter Description
Enable NTP Use this parameter to enter or disable the
NTP client. The NTP client is enabled when the dialog box has a check mark and disabled when the dialog box is empty.
Time Zone Use this parameter to select the correct
time zone for the location of the switch from the pull-down menu.
59
Page 60
Chapter 3: System Date and Time
Table 14. NTP Client Parameters (Continued)
Parameter Description
UTC Offset Use this pull-down menu to select the
difference between the UTC and local time.
NTP Peer Use this parameter to enter the IP
address of the NTP server.
NTP Port Use this parameter to enter the listening
port number for the NTP client. The range is 1 to 65535. The default is 123.
4. After configuring the fields, click the Apply button to activate your changes on the switch.
If you enabled the NTP client, the switch immediately polls the designated SNTP or NTP server for the current date and time. The switch automatically polls the server whenever a change is made to any of the parameters in this menu, as long as NTP is enabled.
5. To permanently save your changes in the configuration file, click the Save button above the main menu.
60
Page 61

Configuring Daylight Savings Time

This procedure is for locations that observe Daylight Saving T ime (DST). It explains how to add the start and end dates of DST and the number of minutes of the time change so that the switch adjusts its clock automatically. To configure the switch to observe Daylight Savings Time (DST), perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Time option from the System Settings menu. The System Settings - System Time window is shown in Figure 12 on
page 56.
3. Configure the parameters in the Summer Time section of the window. The fields are defined in Table 15.
GS900M Series Web Browser User’s Guide
Table 15. Summer Time Parameters
Parameter Description
Enable summer time Use this option to enable or disable
Daylight Savings Time on the switch. DST is enabled when the dialog box has a check mark and disabled when the dialog box is empty. The default setting is disabled.
Starts Year/Month/Day HH:MM
Ends Year/Month/Day HH:MM
Offset Use this option to specify the number of
Enter the start date and time for DST. The years must have four digits.
Enter the end date and time for DST. The years must have four digits.
minutes the clock is to move forward at the start of DST and move back at the return to Standard Time (ST). The range is 1 to 180 minutes (3 hours). The default is 60 minutes.
4. After configuring the fields, click the Apply button to activate your changes on the switch.
5. To permanently save your changes in the configuration file, click the Save button above the main menu.
61
Page 62
Chapter 3: System Date and Time
62
Page 63

Chapter 4

Event Log

This chapter describes how to view switch activity by displaying or saving the contents of the event log. Sections in the chapter include:
“Introduction” on page 64“Displaying the Event Log Window” on page 65“Configuring the Event Log” on page 67“Displaying or Saving the Event Messages in the Event Log” on
page 70
“Deleting Messages in the Event Log” on page 74
63
Page 64
Chapter 4: Event Log

Introduction

A managed switch is a complex piece of computer equipment that includes both hardware and software components. Multiple software features operate simultaneously, interoperating with each other and processing large amounts of network traffic. It is often difficult to determine exactly what is happening when a switch appears not to be operating normally, or what happened when a problem occurred.
The operation of the switch can be monitored by viewing the event messages generated by the device. These events and the vital information about system activity that they provide can help you identify and solve system problems.
The events are stored by the switch in an event log, in permanent memory. The events in the log are retained even when you reset or po wer cycle the switch.
The event messages include the following information:
The time and date of the eventThe severity of the eventAn event description
The switch also has a syslog client. You may use the client to send the event messages from the switch to a syslog server on your network for storage. For more information, refer to Chapter 5, “Syslog Client” on page
75.
64
Page 65

Displaying the Event Log Window

1
2
3
To display the event log window, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Log option from the System Settings menu. The System Settings - Log window is shown in Figure 13.
GS900M Series Web Browser User’s Guide
Figure 13. System Settings - Log Window
The sections in the System Settings - Log window are described in Table 16.
Table 16. System Settings - Log Window
Section Description
1 Use the options in this section to enable or disable the
event log or syslog client. When the event log is enabled, the switch stores event messages in its event log in permanent memory. When the syslog client is enabled, the switch transmits the event messages to a syslog server on your network. Refer to “Configuring the Event
2 Use the options in this section to specify the types of
Log” on page 67.
messages the switch is to store in the event log. Refer to “Configuring the Event Log” on page 67.
65
Page 66
Chapter 4: Event Log
Table 16. System Settings - Log Window (Continued)
Section Description
3 Use the options in this section to configure the syslog
client so that the switch transmits the event messages to a syslog server on your network. Refer to Chapter 5, “Syslog Client” on page 75.
66
Page 67

Configuring the Event Log

Note
This procedure explains how to enable or disable the event log. It also describes how to specify the types of event messages the switch is to store in the log.
Allied Telesis recommends setting the switch’s date and time if you intend to use the event log or syslog client. Otherwise, the entries will not have the correct date and time. For instructions, refer to Chapter 3, “System Date and Time” on page 55.
To configure the event log, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Log option from the System Settings menu.
GS900M Series Web Browser User’s Guide
The System Settings - Log window is shown in Figure 13 on page 65.
3. To enable the event log, do the following: a. Verify that the Enable Log option has a check mark in its dialog
box. If it does not have a check mark, click it.
b. Verify that the Permanent option under Log Outputs has a check
mark in its dialog box. If it does not have a check mark, click it.
c. Continue with step 5.
4. To disable the event log, do the following: a. Remove the check mark from either the Enable Log option or the
Permanent option under Log Outputs. If you are using the syslog client to send the event messages to a syslog server, do not remove the check mark from the Enable Log option. Instead, remove the check mark only from the Permanent option. This will stop the switch from storing messages in the event log, but allow it to continue to send them to the syslog server.
b. Go to step 7.
5. Click the Log Level (Severity) pull-down menu and select the severity of the messages the switch is to store in the event log. You may choose only one severity level. The severity levels are listed in Table 17 on page 68.
67
Page 68
Chapter 4: Event Log
Table 17. Severity Levels
Severity Level Description
7 Critical Event messages of this level contain
information about critical failures that have affected switch operations.
6 Urgent Event messages of this level contain
information about possible pending failures that require immediate attention.
5 Important Event messages of this level contain
information about possible pending failures.
4 Notice Event messages of this level contain
information about events that do not af fect switch operations.
3 Info Event messages of this level contain
information about events that do not af fect switch operations.
2 Detail Event messages of this level contain
information about events that do not af fect switch operations.
1 Trivial Event messages of this level contain
information about events that do not af fect switch operations.
0 Debug Event messages of this level contain
debug information.
6. Click the pull-down menu directly below the Severity parameter and select the option that represents the range of messages, by severity, to be stored in the event log. The options are described in Table 18 on page 69.
68
Page 69
GS900M Series Web Browser User’s Guide
Table 18. Event Log Options
Option Description
Less Than Use this option to designate event
messages with the same or less severity as the severity chosen in the previous step. For example, if you choose Info(3) in the previous step and this option, the switch stores messages with severity levels 0 to 3. As another example, if you choose Critical(7) in the previous step and this option, the switch stores all of the messages.
Greater Than Use this option to designate event
messages with the same or greater severity as the severity chosen in the previous step. For example, if you choose Info(3) in the previous step and this option, the switch stores messages with severity levels 3 to 7. As another example, if you choose Debug(0) in the previous step and this option, the switch stores all of the messages.
No Equal Use this option to designate all severity
levels of event messages except the level chosen in the previous step. For example, if you choose Info(3) in the previous step and this option, the switch stores messages with the levels 0 to 2 and 4 to
7.
Equal To Use this option to designate only the
event messages with the same severity level chosen in the previous step. For example, if you choose Info(3) in the previous step and this option, the switch stores only messages with the severity level 3.
7. After configuring the fields, click the Apply button to activate your changes on the switch.
8. To permanently save your changes in the configuration file, click the Save button above the main menu.
69
Page 70
Chapter 4: Event Log

Displaying or Saving the Event Messages in the Event Log

To view or save the messages in the event log, perform the following procedure:
1. Expand the Device Monitoring menu in the main menu.
2. Select the Log option from the Monitoring menu. The Device Monitoring - Log window is shown in Figure 14.
Figure 14. Device Monitoring - Log Window
The fields in the Log Counter portion of the window are described in Table 19.
Table 19. Log Counter Fields
Field Description
Messages Generated field Displays the total number of messages
the switch has generated.
Messages Processed Permanent field
Messages Processed Syslog field
Displays the total number of messages the switch has stored in the event log. This number may be the same as or less than the number displayed in the Messages Generated field, depending on how you configure the log in “Configuring the Event Log” on page 67.
Displays the total number of messages the switch has sent to a syslog server on your network.
70
Clear Log button Clears the above counters and deletes all
of the messages from the event log.
Page 71
GS900M Series Web Browser User’s Guide
3. Use the Display Order pull-down menu to specify the order in which the messages in the event log are to be displayed on your screen or saved in a file. Your options are listed in Table 20.
Table 20. Display Order Options
Field Description
Reverse Chronological Use this option to display or save the
messages from newest to oldest.
Chronological Use this option to display or save the
messages from oldest to newest.
Latest Use this option to display or save the
messages newest to oldest. This selection is identical to the Reverse Chronological option.
4. In the Display Number field, enter the number of messages to be displayed on the screen or saved in a file. The range is 1 to 3000 messages. The default is 3000 messages.
5. To display the messages on the screen, click the Display Log button. An example of the event log is shown in Figure 15 on page 72.
71
Page 72
Chapter 4: Event Log
72
Figure 15. Log - Display Window
The columns in the window are described in Table 21.
Table 21. Columns in the Log - Display Window
Column Description
Date Displays the date the event message was
generated, in year, month, day format.
Time Displays the time of the event message,
in hours, minutes, and seconds format.
Level Displays the severity level of the event
message. Refer to Table 17 on page 68.
Message Displays the event message.
Page 73
GS900M Series Web Browser User’s Guide
6. To save the messages in the log to a file on your management workstation, click the Save Log button.
7. At the prompt, enter a name for the file.
8. The switch saves the log as a text file on your management workstation.
73
Page 74
Chapter 4: Event Log
Note

Deleting Messages in the Event Log

To delete the messages in the event log, perform the following procedure:
1. Expand the Device Monitoring menu in the main menu.
2. Select the Log option from the Device Monitoring menu. The Device Monitoring - Log window is shown in Figure 14 on page
70.
3. Click the Clear Log button to delete all of the messages in the event log and return the log counters to zero.
You may not delete individual messages from the event log.
74
Page 75

Chapter 5

Syslog Client

This chapter explains how to use the syslog client on the switch to transmit the event messages to a syslog server on your network. Sections in the chapter include:
“Introduction” on page 76“Configuring the Syslog Client” on page 77
75
Page 76
Chapter 5: Syslog Client

Introduction

The syslog client allows the switch to send its event messages to a syslog server on your network. Here are the guidelines to using the syslog client:
You can specify only one syslog server.The switch must have a management IP address. For instructions,
refer to “Changing the IP Address Configuration” on page 48.
The syslog server must be a member of the management VLAN on
the switch, or must be able to access the VLAN through routers or other Layer 3 devices.
If the syslog server is not a member of the management VLAN, the
switch must have a default gateway that specifies the first hop to reaching the server. For instructions on specifying the default gateway, refer to “Changing the IP Address Configuration” on page 48.
The event messages are transmitted when they are generated.
Any event messages that already exist in the event log are not transmitted when you configure the syslog client.
76
Page 77

Configuring the Syslog Client

To configure the syslog client, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Log option from the System Settings menu. The System Settings - Log window is shown in Figure 13 on page 65.
3. To enable the syslog client, do the following: a. Verify that the Enable Log option has a check mark in its dialog
box. If it does not have a check mark, click it.
b. Verify that the Syslog option under Log Outputs has a check mark
in its dialog box. If it does not have a check mark, click it.
c. Continue with step 5.
GS900M Series Web Browser User’s Guide
4. To disable the syslog client, do the following: a. Remove the check mark from either the Enable Log option or the
Syslog option under Log Outputs. If you are storing event messages in the event log, do not remove the check mark from the Enable Log option. Instead, remove the check mark only from the Syslog option This will stop the switch from sending messages to the syslog server but allows it to continue to save the event messages in the event log.
b. Go to step 6.
5. Configure the syslog client parameters in the System Settings - Log window. The parameters are described in Table 22.
Table 22. Syslog Client Parameters
Parameter Description
Syslog Server Address Use this parameter to specify the IP
address of the syslog server on your network. You may enter only one IP address.
Syslog Port Number Use this parameter to specify the UDP
port for the syslog client. The syslog server and client must use the same value. The range is 1 to 65535. The default value is 514.
77
Page 78
Chapter 5: Syslog Client
Table 22. Syslog Client Parameters (Continued)
Parameter Description
Syslog Severity (severity) Use the top pull-down menu to specify the
severity of messages the switch is to send to the syslog server. You may choose only one severity. The severities are listed in Table 17 on page 68.
Use the bottom pull-down menu to select the option that represents the range of messages, by severity, to be sent to the syslog server. The symbols are described in Table 18 on page 69.
Facility Use the pull-down menu to select a facility
code for the event messages. The switch adds the code to the messages as it transmits them to the syslog server on your network. You may use the code to group the event messages on the syslog server by the switch that generated them. This can be useful when the syslog server collects events from multiple network devices. For example, the default setting adds the facility code 24 to the event messages. You may select only one facility code. The codes are described in Table 23.
78
The facility codes are listed in Table 23.
Table 23. Facility Codes for the Syslog Client
Facility Value Description Facility Code
DEFAULT Default value. 24 LOCAL7 Local use 7 (local7) 23 LOCAL6 Local use 6 (local6) 22 LOCAL5 Local use 5 (local5) 21 LOCAL4 Local use 4 (local4) 20 LOCAL3 Local use 3 (local3) 19 LOCAL2 Local use 2 (local2) 18 LOCAL1 Local use 1 (local1) 17
Page 79
GS900M Series Web Browser User’s Guide
Table 23. Facility Codes for the Syslog Client (Continued)
Facility Value Description Facility Code
LOCAL0 Local use 0 (local0) 16 CRON2 Clock daemon. 15 ALERT Log alert. 14 AUDIT Log audit. 13 NTP NTP subsystem. 12 FTP FTP daemon. 11 AUTHPRIV Security/authorization
messages CRON Clock daemon. 9 UUCP UUCP subsystem. 8 NEWS Network news subsystem. 7 LPR Line printer subsystem 6 SYSLOG Messages generated by
the syslog client. AUTH Security/authorization
messages DAEMON System Daemons 3 MAIL Mail system 2 USER User-level messages 1 KERNEL Kernel messages 0
6. After configuring the syslog client parameters, click the Apply button to activate your changes on the switch.
10
5
4
The switch begins to send new event messages to the designated syslog server. Any messages already in the event log are not sent.
7. To permanently save your changes in the configuration file, click the Save button above the main menu.
79
Page 80
Chapter 5: Syslog Client
80
Page 81

Chapter 6

Management Tools and Alerts

This chapter contains instructions on how to configure the management tools and alerts. The chapter contains the following sections:
“Introduction” on page 82“Configuring the Management Tools and Alerts” on page 83
81
Page 82
Chapter 6: Management Tools and Alerts

Introduction

This chapter explains how to configure the following management tools and functions:
Console portWeb browser serverTelnet serverFTP/TFTP serverTemperature alerts for the SFP modulesFan alert
82
Page 83

Configuring the Management Tools and Alerts

To configure the management tools and alerts, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Others option from the System Settings menu. The System Settings - Others window is shown in Figure 16.
GS900M Series Web Browser User’s Guide
Figure 16. System Settings - Others Window
The parameters in the window are defined in Table 24 on page 84.
83
Page 84
Chapter 6: Management Tools and Alerts
Table 24. System Settings - Others Window
Parameter Description
User Interface Enable Console Port Use this option to enable or disable the
Console port on the switch. When the Console port is enabled, you may use the port to manage the switch. This is the default setting. When the Console port is disabled, you may not use the port to manage the switch. The Console port is enabled when the dialog box has a check mark and disabled when the dialog box is empty.
Console Timeout Use this option to specify the
management session timeout value for the Console port. The timeout value controls the amount of time the switch waits before it ends inactive management sessions on the Console port. The range is 1 to 32767 seconds. The default is 300 seconds (five minutes).
Enable Telnet Server Use this option to enable or disable the
Telnet server on the switch. When the server is enabled, you may remotely manage the switch with a Telnet client on a network workstation. When the server is disabled, you may not manage the switch with a Telnet client. This is the default setting. The Telnet server is enabled when the dialog box has a check mark and disabled when the dialog box is empty.
Telnet Port Number Use this option to set the TCP port
number for the Telnet server. The range is 1 to 65535. The default value is 23.
Telnet Session Limit Use this option to specify the maximum
number of remote Telnet sessions the switch will support at one time. The range is 1 to 4 sessions. The default value is 4 sessions.
84
Page 85
GS900M Series Web Browser User’s Guide
Table 24. System Settings - Others Window (Continued)
Parameter Description
Enable Web Browser Use this option to enable or disable the
web browser server on the switch. When the server is enabled, you may use a web browser on a network workstation to remotely manage the switch. This is the default setting. When the server is disabled, you may not use a web browser to remotely manage the switch. The server is enabled when the dialog box has a check mark and disabled when the dialog box is empty.
HTTP Port Number Use this option to set the TCP port
number for the web browser server. The range is 1 to 65535. The default value is
80. FTP Server Enable FTP Server Use this option to enable or disable the
FTP server on the switch. When the server is enabled, you may use FTP or TFTP to upload or download files to the file system in the switch. When the server is disabled, you may not use FTP or TFTP to upload or download files to the switch. The server is enabled when the dialog box has a check mark and disabled when the dialog box is empty. The default setting is enabled.
Port Number Use this option to set the TCP port
number for the FTP server . The range is 1
to 65535. The default value is 21. TFTP Port Number Use this option to set the TCP port
number for the TFTP server. The range is
1 to 65535. The default value is 69. Temperature Alert SFP Temperature
Threshold
Use this option to set the temperature
threshold for the SFP modules. The
switch sends a trap if the temperature is
exceeded. The values are 40°, 45°, and
50° C. The default is 45° C.
85
Page 86
Chapter 6: Management Tools and Alerts
Table 24. System Settings - Others Window (Continued)
Parameter Description
Fan Alert Enable System Fan Start/
Stop Alarm
Use this option to enable or disable the fan alert. When the alert is enabled, the switch sends a trap when the fan starts or stops. This is the default setting. When the alert is disabled, the switch does not send a trap when the fan starts or stops. The alert is enabled when the dialog box has a check mark and disabled when the dialog box is empty . The default setting for the alert is enabled.
3. After configuring the parameters, click the Apply button to implement your changes on the switch.
4. To permanently save your changes in the configuration file, click the Save button above the main menu.
86
Page 87

Chapter 7

System Information and Packet Statistics

This chapter contains instructions on how to display system and port information. The chapter contains the following sections:
“Viewing Basic System and Port Information” on page 88“Displaying Statistics Counters” on page 93
87
Page 88
Chapter 7: System Information and Packet Statistics
1
4
5
2
6
3

Viewing Basic System and Port Information

To view basic system and port information, perform the following procedure:
1. Expand the Device Monitoring menu in the main menu.
2. Select the System Information option from the Device Monitoring menu.
The Device Monitoring - System Information window is shown in Figure 17.
88
Figure 17. Device Monitoring - System Information Window
Page 89
GS900M Series Web Browser User’s Guide
The sections in the window are defined in Table 25.
Table 25. Device Monitoring - System Information Window
Section Description
1 Use the image of the front panel of the switch to view the
status of the links on the ports and to display the port configuration settings. The possible states of the ports are listed here:
Black - The port has not established a link to a network device.
Green - The port has established a link to a network device.
Red - The port is disabled. For more information, refer to “Displaying Port
Configurations” on page 91.
2 Use the Update Page button to refresh the states of the
ports in the switch image and the information in the table.
3 Use the table to view software and hardware information
about the switch.
4 Use the Detail button to view configuration information
about the switch. For more information, refer to “Detail Button” on page 89.
5 Use the Save to File button to save the information
displayed by the Detail button to a file in the file system of the switch. For instructions, refer to “Save to File Button” on page 90.
6 Use the options of the Set button to control how
frequently the switch updates the information in the switch image and table. For instructions, refer to “Refreshing the Window” on page 92.
Detail Button You may use the Detail Button in the Device Monitoring - System
Information window to display the entire configuration of the switch, with debug information. The configuration settings of the features are displayed with the corresponding command line commands. The window contains only those parameter settings that have been changed from their default values. An example of the window is shown in Figure 18 on page 90.
89
Page 90
Chapter 7: System Information and Packet Statistics
Note
It may take the switch several seconds to assemble and display the information on your workstation.
90
Save to File
Button
Figure 18. System - Detail Window
You may use the Save to File button in the bottom right corner of the window to save the information from the Detail button to a file on your workstation or a network server. You might be asked to provide this file if your contact Allied Telesis for assistance in resolving a technical problem.
Page 91
GS900M Series Web Browser User’s Guide
Note
It may take the switch several seconds to assemble the information before it displays the prompt for saving the file on your workstation.
Displaying Port
Configurations
To display port parameter settings, click on a port in the image of th e front panel. The switch displays the Display Port Status window. You may view the parameters of only one port at a time. An example of the window is shown in Figure 19. The parameters in the window are defined in Figure 35 on page 125.
Figure 19. Display Port Status Window
91
Page 92
Chapter 7: System Information and Packet Statistics
Refreshing the
Window
There are two ways to update the information in the window, besides opening another window and then returning to it again. The first way is to click the Update Page button in the upper left corner of the window. The button immediately updates the information in the switch image and table.
The other way to update the window is have the switch do it for you, automatically. This approach is accomplished with the Auto Update/ Refresh and Duration/Interval options of the Set button. The options are defined in Table 26.
Table 26. Automatic Refresh Option in the Device Monitoring
Option Description
Auto Update/Refresh Use this option to enable or disable the
automatic refresh option. The options are defined here:
Enable - Select this option to enable automatic updates of the window.
Disable - Select this option to disable automatic updates of the window.
Duration/Interval Use this option to define how frequently
the switch updates the window if you enable the update feature. The range is 1 to 99 minutes.
After setting the options, click the Set button. To permanently save your changes in the configuration file, click the Save button above the main menu.
92
Page 93

Displaying Statistics Counters

The switch has statistics counters you might find useful when troubleshooting network problems. The first statistics window is displayed by selecting the Switch Counters option from the Device Monitoring window. The window is shown in Figure 20.
GS900M Series Web Browser User’s Guide
Figure 20. Device Monitoring - Switch Counter Window
To display additional port statistics, click the dialog circle of a port and click the Port Counter button. You may view the statistics of only one port at a time. An example of the port statistics window is shown in Figure 21 on page 94.
93
Page 94
Chapter 7: System Information and Packet Statistics
Figure 21. Port Counter Window
94
Page 95

Chapter 8

Port LEDs

This chapter describes how to control the port LEDs from the web browser windows. Sections in the chapter include:
“Displaying the Port LEDs Window” on page 96“Setting the Mode of the Speed/Duplex Mode LEDs” on page 98“Setting the Traffic Thresholds for the Link/Activity LEDs” on page 99
95
Page 96
Chapter 8: Port LEDs
1
2

Displaying the Port LEDs Window

To display the port LED window, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Port LED option from the System Settings menu. The System Settings - LED window is shown in Figure 22.
Figure 22. System Settings - LED Window
The sections in the System Settings - Log window are described in Table 27 on page 97.
96
Page 97
GS900M Series Web Browser User’s Guide
Table 27. System Settings - Log Window
Section Description
1 Use the pull-down menu in this section to control the
mode of the Speed/Duplex Mode LEDs. The menu performs the same function as the LED Mode button on the front panel of the switch. Refer to “Setting the Mode of the Speed/Duplex Mode LEDs” on page 98.
2 Use the options in this table to set ingress threshold
levels for the Link/Activity LEDs. Refer to “Setting the Traffic Thre sholds for the Link/Activity LEDs” on p age 99.
97
Page 98
Chapter 8: Port LEDs
Note

Setting the Mode of the Speed/Duplex Mode LEDs

The ports on the switch have two LEDs. The Link/Activity LEDs display the link and activity status of the ports and the Speed/Duplex Mode LEDs display the speed or duplex modes. The Speed/Duplex Mode LED can reflect either the speed or duplex mode of its port, but not both at the same time. To toggle the Speed/Duplex Mode LEDs between the modes, you may use the LED mode button on the front panel of the switch or the System Settings - LED window in the management software.
To toggle the modes of the Speed/Duplex Mode LEDs on the switch, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Port LED option from the System Settings menu. The System Settings - Port LED window is shown in Figure 22 on page
96.
3. To configure the LED mode of the Speed/Duplex Mode LEDs, use the LED Mode pull-down menu in the Basic Settings section of the window.
The LED Mode pull-down menu has the following options:
Speed LED - Sets the Speed/Duplex Mode LEDs to display port
speeds. This is the default setting.
Duplex LED - Sets the Speed/Duplex Mode LEDs to display the
duplex modes of the ports.
LED Off - Turns off the Link/Activity and Speed/Duplex Mode
LEDs.
Changing the mode of the LEDs does not affect the performance of the ports.
4. Click the Apply button to activate your changes on the switch.
5. To permanently save your changes in the configuration file, click the Save button above the main menu.
98
Page 99
GS900M Series Web Browser User’s Guide

Setting the Traffic Thresholds for the Link/Activity LEDs

The Link/Activity LEDs are usually used to view the link and activity status of the ports on the switch. But you can also configure the Link/Activity LED of a port to turn off if the ingress traffic falls below a defined threshold level for about thirty seconds. The LED remains off even if the traffic exceeds the threshold again. You might find this feature useful in identifying ports that periodically experience low traffic.
There is, however, one pre-condition to using this feature. You have to turn off all of the Speed/Duplex Mode LEDs. The switch cannot automatically turn off the Link/Activity LEDs if the Speed/Duplex Mode LEDs are on.
To configure the ingress traffic thresholds for the Link/Activity LEDs, perform the following procedure:
1. Expand the System Settings menu in the main menu.
2. Select the Port LED option from the System Settings menu. The System Settings - Port LED window is shown in Figure 22 on page
96.
3. Select the LED Off setting for the LED Mode pull-down menu in the Basic Settings section of the window.
This step turns off all of the port LEDs on the switch. In the Port Settings portion of the window, click the dialog box of the
port you want to configure. You may configure more than one port at a time.
4. Click the Edit button. To configure all of the ports on the switch, click the Edit All Ports button.
The switch displays the Port LED - Port Settings window shown in Figure 23 on page 100.
99
Page 100
Chapter 8: Port LEDs
Figure 23. Port LED - Port Settings Window
5. Set the LED Action pull-down menu to Off.
6. Set the Receiving Rate Threshold (Kbps) pull-down menu to Enable.
7. Click the field and enter the ingress traffic threshold in Kbps. The range is 1 to 1024000 Kbps.
The switch turns off the Link/Activity LED of the port if the ingress traffic drops below the specified threshold for about 30 seconds.
To turn on the LEDs of ports that have been turned off by this feature, change to LED mode on the switch with the LED mode button on the front panel or with the instructions in “Setting the Mode of the Speed/ Duplex Mode LEDs” on page 98.
8. Click the Apply button to activate your changes on the switch.
9. To permanently save your changes in the configuration file, click the Save button above the main menu.
100
Loading...