Allied Telesis AT-GS924M Service Manual

GS900M Series
Gigabit Ethernet Switches
Management Software Web Browser User’s Guide
613-002051 Rev. A
Copyright © 2014, Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis,
Inc. This product includes software licensed under the Berkeley Software Distribution (BSD) License. As such, the following
language applies for those portions of the software licensed under the BSD License: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met: *Redistributions of source code must retain the above copyright notice, this list of conditions and the following
disclaimer.
*Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the follo wing
disclaimer in the documentation and/or other materials provided with the di stribution.
*Neither the name of Allied Telesis, Inc. nor the names of the respective companies above may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Allied Telesis, Inc., hereby disclaims all copyright interest of the following products: * Portmap: this product includes Portmap 5beta developed by the University of California, Berkeley and its contributors. * OpenSSL: this product includes OpenSSL 0.9.8d developed by the OpenSSL Project for use in the OpenSSL Toolkit. * Mathopd: this product includes Mathopd 1.6 copyright (c) 1996 - 2005 by Michiel Boland * zlib: this product includes zlib version 1.2.3 copyright (c) 1995 - 2005 by Jean-loup Gailly an d Mark Adler Allied Telesis is committed to meeting the requirements of the open source licenses including the GNU General Public
License (GPL) and will make all required source code available. If you would like a copy of the GPL source code contained in this product, please send us a request by registered mail
including a check for US$15 to cover production and shipping costs, and a CD with the GPL code will be mailed to you. GPL Code Request Allied Telesis, Inc. 3041 Orchard Parkway San Jose, California 95134
Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. All other product names, company names, logos or other designations mentioned herein are trademarks or registered trademarks of their respective owners.
Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document without prior written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesis, Inc. be liable for any incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this manual or the information contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of such damages.

Contents

Preface ............................................................................................................................................................19
Safety Symbols Used in this Document ...........................................................................................................20
Contacting Allied Telesis..................................................................................................................................21
Chapter 1: Introduction .................................................................................................................................23
Introduction.......................................................................................................................................................24
Switch Models..... ... ... .... ... ... ....................................... ... ... .... ... ... ... .............................................................24
Management Interfaces .............................................................................................................................24
Main Software Features ...................................................................................................................................26
Differences Between the Management Interfaces............................................................................................27
Elements of the Web Browser Windows ..........................................................................................................28
Working with the Web Browser Interface .........................................................................................................31
Operating Systems.............................. .... ... ... .............................................................................................31
Web Browsers..................................... .... ... ... ... ... .... ...................................... .... ... ... ... .... ............................31
Menus and Options....................................................................................................................................31
Apply and Set Buttons................................................................................................................................31
Save Button................................... ... ... ....................................... ... .... ... ... ... ... .............................................32
Reset Button ..............................................................................................................................................33
Starting or Ending a Web Browser Management Session ...............................................................................34
Starting a Management Session................................................................................................................34
Ending a Management Session.................................... .......................................... ... .... ... ... ... ...................35
What to Configure During the First Management Session ...............................................................................36
Creating a Configuration File ..... ... ... .......................................... ... .......................................... ...................36
Changing the Manager Password..............................................................................................................37
Setting the System Name, Location, and Contact Information .. ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... ...39
Chapter 2: Basic Switch Parameters ...........................................................................................................41
Displaying the System Window........................................................................................................................42
Configuring the Switch Name, Location, and Contact......................................................................................44
Changing the Password to the Manager Account............................................................................................46
Changing the IP Address Configuration...........................................................................................................48
Specifying the Management VLAN...................................................................................................................50
Responding to Broadcast PING Queries..........................................................................................................51
Rebooting the Switch........................................................................................................................................52
Resetting Ports....................................................... ... .... ... ... ....................................... ... ...................................53
Chapter 3: System Date and Time ...............................................................................................................55
Displaying the System Date and Time Window................................................................................................56
Manually Setting the System Date and Time ...................................................................................................58
Setting the System Date and Time with an NTP Server...................................................................................59
Configuring Daylight Savings Time ..................................................................................................................61
Chapter 4: Event Log ....................................................................................................................................63
Introduction.......................................................................................................................................................64
Displaying the Event Log Window................................................................................................
Configuring the Event Log................................................................................................................................67
Displaying or Saving the Event Messages in the Event Log ............................................................................70
....................65
3
Contents
Deleting Messages in the Event Log ............................................................................................................... 74
Chapter 5: Syslog Client .............................................................................................................................. 75
Introduction ...................................................................................................................................................... 76
Configuring the Syslog Client........................................................................................................................... 77
Chapter 6: Management Tools and Alerts .................................................................................................. 81
Introduction ...................................................................................................................................................... 82
Configuring the Management Tools and Alerts................................................................................................ 83
Chapter 7: System Information and Packet Statistics ............................................................................... 87
Viewing Basic System and Port Information................................. .... ... ... ... .... ... ... ... ... .... ... ............................... 88
Detail Button.............................................................................................................................................. 89
Save to File Button........................... ... ... ... .... ... ....................................... ... ... ... ... .... ... ... ... ......................... 90
Displaying Port Configurations.................................................................................................................. 91
Refreshing the Window ................................. ... ... ... ... .... ... ....................................... ... ... ... .... ..................... 92
Displaying Statistics Counters ......................................................................................................................... 93
Chapter 8: Port LEDs .................................................................................................................................... 95
Displaying the Port LEDs Window ................................................................................................................... 96
Setting the Mode of the Speed/Duplex Mode LEDs ........................................................................................ 98
Setting the Traffic Thresholds for the Link/Activity LEDs................................................................................. 99
Chapter 9: SNMPv1 and SNMPv2c ............................................................................................................ 101
Introduction .................................................................................................................................................... 102
Displaying the SNMP Window ....................................................................................................................... 103
Configuring Basic SNMP Parameters............................................................................................................ 106
Adding New SNMP Community Strings............... ... ....................................................................................... 107
Modifying SNMP Communities ...................................................................................................................... 110
Deleting SNMP Communities ........................................................................................................................ 111
Chapter 10: Port Parameters ..................................................................................................................... 113
Displaying the Port Parameters Window ....................................................................................................... 114
Enabling or Disabling the Power Saving Mode.............................................................................................. 117
Configuring Port Parameters ......................................................................................................................... 118
Setting the Speed and Duplex Mode................................... ... .... ... ... ... .... ... ... ... ... .................................... 122
Setting the Wiring Configuration....................... ....................................................................................... 123
Displaying Port Configurations....................................................................................................................... 124
Chapter 11: MAC Address Table ............................................................................................................... 129
Displaying the MAC Address Window ........................................................................................................... 130
Displaying the MAC Address Table ............................................................................................................... 132
Adding Static Unicast MAC Addresses...... ... ... .... ... ... ... ... .... .......................................... ... ............................. 135
Deleting Static Unicast Addresses................................................................................................................. 136
Deleting All of the Dynamic MAC Addresses................................................................................................. 137
Changing the Aging Timer ............................................................................................................................. 138
Chapter 12: Packet Storm Protection ........................................................................................................ 141
Introduction .................................................................................................................................................... 142
Displaying the Packet Storm Protection Window..................................................................................
......... 143
Configuring Packet Storm Protection............................................................................................................. 145
Chapter 13: Port Mirroring ......................................................................................................................... 147
Introduction .................................................................................................................................................... 148
Enabling the Port Mirror................................................................................................................................. 149
Disabling the Port Mirror ................................................................................................................................ 151
4
GS900M Series Web Browser User’s Guide
Chapter 14: Static Port Trunks ...................................................................................................................153
Introduction.....................................................................................................................................................154
Creating a Port Trunk............................. ... .... ... ... ... .......................................... ... ...........................................156
Modifying a Port Trunk ...................................................................................................................................159
Deleting a Port Trunk......................................................................................................................................161
Chapter 15: Triggers ...................................................................................................................................163
Introduction.....................................................................................................................................................164
Guidelines................................................................................................................................................165
Displaying the Trigger Window.......................................................................................................................167
Enabling or Disabling the Trigger Feature......................................................................................................169
Adding Triggers......................... ....................................... ... ... .... ... ... ... .... ... ... ... ..............................................170
Modifying Triggers..........................................................................................................................................173
Deleting Triggers............................................................................................................................................174
Displaying Triggers.........................................................................................................................................175
Chapter 16: Port-based and Tagged VLANs Overview ............................................................................177
Overview.........................................................................................................................................................178
Advantages of VLANs..............................................................................................................................178
Types of VLANs...................................... ... ... ... ....................................... ... ... .... ... ... ... .... ... .......................179
Port-based VLAN Overview............................................................................................................................180
VLAN Name.............................................................................................................................................180
VLAN Identifier.........................................................................................................................................180
Port VLAN Identifier ............................................ .... ... ... ....................................... ... ... .... ... .......................181
Untagged Ports........................................................................................................................................181
Guidelines to Creating a Port-based VLAN..............................................................................................181
Drawbacks of Port-based VLANs.............................................................................................................182
Port-based Example 1..............................................................................................................................182
Port-based Example 2..............................................................................................................................184
Tagged VLAN Overview.................................................................................................................................186
Tagged and Untagged Ports....................................................................................................................187
Port VLAN Identifier ............................................ .... ... ... ....................................... ... ... .... ... .......................187
Guidelines to Creating a Tagged VLAN...................................................................................................187
Tagged VLAN Example............................................................................................................................187
Chapter 17: Port-based and Tagged VLANs .............................................................................................191
Guidelines to Adding or Removing Ports from VLANs ............... ... ... ... .... ... .......................................... ... .......192
Displaying the VLAN Window.........................................................................................................................194
Creating a Port-based or IEEE 802.1Q Tagged VLAN............................ ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .196
Modifying a Port-based or Tagged VLAN.......................................................................................................201
Deleting a VLAN.............................................................................................................................................203
Chapter 18: Protected Ports VLANs Overview .........................................................................................205
Overview.........................................................................................................................................................206
Guidelines.......................................................................................................................................................208
Chapter 19: Protected Ports VLANs ..........................................................................................................209
Creating a New Protected Ports VLAN...........................................................................................................210
Modifying a Protected Ports VLAN.................................................................................................................214
Deleting a Protected Ports VLAN ...................................................................................................................215
Chapter 20: Quality of Service Overview .......................................................................................
...........217
IEEE 802.1p Priority Levels and Egress Priority Queues...............................................................................218
Scheduling......................................................................................................................................................221
Strict Priority Scheduling........ .... ... ... ... .... ... ..............................................................................................221
Weighted Round Robin Priority Scheduling............................................... ... ...........................................221
5
Contents
Chapter 21: Quality of Service ................................................................................................................... 223
Displaying the Quality of Service Window ..................................................................................................... 224
Configuring Egress Packet Scheduling.......................................................................................................... 226
Mapping CoS Priorities to Egress Queues .................................................................................................... 227
Setting the Priority Values for DSCP Packets................................................................................................ 228
Setting the Priority Values for Ingress Untagged Packets ............................................................................. 230
Chapter 22: Classifier Overview ................................................... ... ... ... .... ... ... ... ....................................... 233
Overview........................................................................................................................................................ 234
Classifier Criteria............................................................................................................................................ 235
Destination or Source MAC Address (Layer 2) ....................................................................................... 235
Ethernet 802.2 and Ethernet II Frame Types (Layer 2)........................................................................... 235
802.1p Priority Level (Layer 2) .................................. .... ... ... ... .... ... ... ... .... ... ... ... ....................................... 235
Protocol (Layer 2).................................................................................................................................... 236
VLAN ID (Layer 2)................................................................................................................................... 236
IP ToS (Type of Service) (Layer 3).......................................................................................................... 236
IP DSCP (DiffServ Code Point) (Layer 3)................................................................................................ 237
IP Protocol (Layer 3)................................................................................................................................ 237
Source IP Address and Mask (Layer 3)................................................................................................... 238
Destination IP Address and Mask (Layer 3)............................................................................................ 238
TCP Source or Destination Ports (Layer 4)............................................................................................. 238
UDP Source or Destination Ports (Layer 4)............................................................................................. 238
TCP Flags................................................................................................................................................ 238
Guidelines...................................................................................................................................................... 240
Chapter 23: Classifiers ............................................................................................................................... 241
Displaying the Classifier Window................................................................................................................... 242
Creating a Classifier...... ... ....................................... ... ... ... .... ... ... ... .... ... ... ....................................................... 243
Modifying a Classifier..................................................................................................................................... 249
Deleting a Classifier....................................................................................................................................... 250
Chapter 24: Quality of Service Policies Overview ................................................................................... 251
Overview........................................................................................................................................................ 252
Classifiers ...................................................................................................................................................... 254
Flow Groups........... ....................................... ... .... ... ... ... ... .... ... ... ... ................................................................. 255
Traffic Classes ............................................................................................................................................... 256
Policies........................................................................................................................................................... 257
QoS Policy Guidelines ................................................................................................................................... 258
Packet Processing ......................................................................................................................................... 259
Bandwidth Allocation...................................................................................................................................... 259
Packet Prioritization ....................................................................................................................................... 259
Replacing Priorities....................................... ....................................... ... ... .... ... ... ... ... .... ................................ 261
VLAN Tag User Priorities................. ... .... ... ... ... .... ... ... ... ... .... .......................................... ... ............................. 261
DSCP Values................................................................................................................................................. 261
DiffServ Domains........................................................................................................................................... 262
Examples ....................................................................................................................................................... 264
Voice Applications........................ ....................................... ... .... ... ... ... .... ... ... ... ... ..............
...................... 264
Video Applications................................................................................................................................... 266
Critical Database..................................................................................................................................... 268
Policy Component Hierarchy................................................................................................................... 269
Chapter 25: Quality of Service Policies .................................................................................................... 271
Displaying the QoS Policies Window............................................................................................................. 272
Managing Flow Groups.............. ... ... ... .... ... ... ... ....................................... ... .... ... ... ... ... .... ... ... .......................... 275
Adding a Flow Group.............................. ... ....................................... ... .... ... ... ... ... .... ... ... .......................... 275
Modifying a Flow Group........................................................................................................................... 277
Deleting a Flow Group............................................................................................................................. 278
6
GS900M Series Web Browser User’s Guide
Managing Traffic Classes.................................................... ... .... ... ... ... .... ... ... ... ... ...........................................279
Adding a Traffic Class...... ... ... .... ... ... ... ....................................... ... .... ... ... ... ... .... ... ... .................................279
Modifying a Traffic Class..........................................................................................................................284
Deleting a Traffic Class............................................................................................................................285
Managing Policies .................................. ... .... .................................................................................................286
Adding a Policy ... ... ... .... ... ... ... ....................................... ... .... ... ... ... .... .......................................................286
Modifying a QoS Policy............................................................................................................................290
Deleting a QoS Policy..............................................................................................................................290
Displaying QoS Policy Statistics.....................................................................................................................291
Chapter 26: Rapid Spanning Tree Protocol Overview ............................... ... .... ... ... ... .... ... ... ... ... .... ... ... ....293
Overview.........................................................................................................................................................294
Bridge Priority and the Root Bridge................................................................................................................295
Path Costs and Port Costs.......................................................................................................................295
Port Priority ... ... ... ... ... .... ... ... ....................................... ... ... .... ... ... ... ...........................................................296
Forwarding Delay and Topology Changes .....................................................................................................297
Hello Time and Bridge Protocol Data Units (BPDU)................................................................................297
Point-to-Point and Edge Ports..................................................................................................................298
Mixed STP and RSTP Networks ....................................................................................................................300
VLANs ............................................................................................................................................................301
Chapter 27: Rapid Spanning Tree Protocol ................................ ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ..........303
Displaying the RSTP Window.........................................................................................................................304
Configuring RSTP Bridge Settings .................................................................................................................308
Configuring RSTP Port Settings.....................................................................................................................311
Enabling or Disabling RSTP on the Ports.......................................................................................................314
Enabling or Disabling BPDU Transparency for RSTP....................................................................................315
Chapter 28: Multiple Spanning Tree Protocol Overview ............... .... ... ... ... ... .... ... ... ... .... ..........................317
Overview.........................................................................................................................................................318
Multiple Spanning Tree Instance (MSTI)........................................................................................................319
VLAN and MSTI Associations..................................................................................................................319
Ports in Multiple MSTIs............................................................................................................................319
Multiple Spanning Tree Regions ....................................................................................................................321
Region Guidelines....................................................................................................................................323
Common and Internal Spanning Tree (CIST)....................................................................... ... ... ... ... ..............324
MSTP with STP and RSTP.............................................................................................................................325
Summary of Guidelines....................... ... ... .... ... ... ... ... .......................................... .... .......................................326
Associating VLANs to MSTIs..................... .... ... ... ... ... .... ... ... ... .... ... .......................................... .......................328
Connecting VLANs Across Different Regions ............................ ... .......................................... ... ... ... .... ..........330
Chapter 29: Multiple Spanning Tree Protocol ................ ... .... ... ... ... .... ... ...................................... .... ..........333
Displaying the MSTP Window ........................................................................................................................334
Enabling or Disabling MSTP on the Ports ......................................................................................................338
Configuring the MSTP Bridge Parameters.....................................................................................................339
Configuring the CIST Priority..........................................................................................................................342
Managing MSTIs ................................. ... ... .... .................................................................................................344
Creating an MSTI............. ... ... .... ... ... ... .... ... ... ... ... .......................................... .... .......................................344
Modifying an MSTI..............................................................................................................
.....................346
Deleting an MSTI .....................................................................................................................................348
Configuring MSTP Port Parameters...............................................................................................................349
Displaying MSTP Statistics.............................................................................................................................356
Enabling or Disabling BPDU Transparency for MSTP .................................. ... ..............................................360
Chapter 30: Loop Detection Frame ............................................................................................................361
Introduction.....................................................................................................................................................362
Displaying the Loop Detection Frame Window...............................................................................................363
7
Contents
Enabling or Disabling Loop Detection Frame ................................................................................................ 367
Configuring Loop Detection Frame................................................................................................................ 368
Displaying Statistics for Loop Detection Frame ............................................................................................. 371
Chapter 31: IGMP Snooping ...................................................................................................................... 373
Introduction .................................................................................................................................................... 374
Displaying the IGMP Snooping Window ........................................................................................................ 376
Configuring IGMP Snooping .......................................................................................................................... 378
Adding Static Multicast Addresses................................................................................................................. 380
Deleting Static Multicast Addresses............................................................................................................... 383
Displaying Multicast Groups .......................................................................................................................... 384
Chapter 32: MLD Snooping ........................................................................................................................ 387
Introduction .................................................................................................................................................... 388
Displaying the MLD Snooping Window.......................................................................................................... 389
Configuring MLD Snooping............................................................................................................................ 391
Adding Static Multicast Addresses................................................................................................................. 393
Deleting Static Multicast Addresses............................................................................................................... 396
Displaying Multicast Groups .......................................................................................................................... 397
Chapter 33: DHCP Snooping ............................................... ... ... .... ... .......................................................... 399
Displaying the DHCP Snooping Window ....................................................................................................... 400
Configuring Basic DHCP Snooping Parameters............................................................................................ 402
Configuring the Ports ..................................................................................................................................... 404
Adding Entries to the Binding Database ........................................................................................................ 407
Adding MAC Address Filtering Entries........................................................................................................... 409
Displaying DHCP Snooping........................................................................................................................... 411
Chapter 34: Switch Storm Detection .................. ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ................ 413
Introduction .................................................................................................................................................... 414
Displaying the Switch Storm Detection Window ............................................................................................ 416
Enabling or Disabling Switch Storm Detection............................................................................................... 421
Configuring Switch Storm Detection .............................................................................................................. 422
Displaying Statistics for Switch Storm Detection............................................................................................ 425
Chapter 35: Ethernet Protection Switching Ring ..................................................................................... 427
Displaying the EPSR Window........................................................................................................................ 428
Adding an EPSR Domain............................................................................................................................... 430
Modifying an EPSR Domain .......................................................................................................................... 433
Deleting an EPSR Domain............................................................................................................................. 434
Displaying EPSR Status Information ............................................................................................................. 435
Chapter 36: Access Filters ......................................................................................................................... 437
Introduction .................................................................................................................................................... 438
Displaying the Access Filter Window............................................................................................................. 440
Enabling or Disabling Access Filters.............................................................................................................. 442
Adding Filter Entries......... ....................................... ... ... ... .... ... ... ... .... ... ... ....................................................... 443
Deleting Filter Entries..................................................................................................................................... 446
Chapter 37: MAC Address-based Port Security Overview ...................................................................... 447
Overview........................................................................................................................................................ 448
Automatic................................................................................................................................................. 448
Secured................................................................................................................................................... 448
Limited..................................................................................................................................................... 449
Dynamic Limited...................................................................................................................................... 450
Invalid Frames and Intrusion Actions................... .......................................................................................... 451
Guidelines...................................................................................................................................................... 452
8
GS900M Series Web Browser User’s Guide
Chapter 38: MAC Address-based Port Security ......................... ... .... ... ... ... ... .... ... ... ... .... ... ... ... .................453
Displaying the MAC Address-based Port Security Window ...........................................................................454
Changing the Port Security Settings...............................................................................................................456
Chapter 39: RADIUS Client .........................................................................................................................459
Introduction.....................................................................................................................................................460
Guidelines................................................................................................................................................460
Displaying the RADIUS Client Window ..........................................................................................................462
Configuring RADIUS Accounting....................................................................................................................464
Configuring the RADIUS Client ......................................................................................................................466
Configuring RADIUS Server Definitions .........................................................................................................468
Chapter 40: Port Authentication Overview ...............................................................................................471
Overview.........................................................................................................................................................472
Authentication Methods....................................................... ... .... ... ... ... .... ... ... ... ... .... ... ... .................................473
802.1x Port-based Network Access Control ........................... ... ... .... ... ....................................................473
MAC address-based authentication.........................................................................................................473
Web Browser Authentication.. .... ... ... ... .... ... ... ... .......................................... ... .... ... ... ... ..............................473
Authenticator Port Operational Settings................. ... .... ... ... ... .... ... ... ... .... ... ... .................................................474
Authenticator Port Operating Modes ..............................................................................................................475
Single Host Mode.....................................................................................................................................475
Single Host Mode with Piggy Backing......................................................................................................475
Multiple Host Mode ..................................................................................................................................477
Supplicant and VLAN Associations................................................................................................................479
Single Host Mode.....................................................................................................................................480
Multiple Host Mode ..................................................................................................................................480
Multiple Supplicant Mode.........................................................................................................................480
Supplicant VLAN Attributes on the RADIUS Server.................................................................................480
Guest VLAN......................................................... ... ... .... ... ... ... ....................................... .................................482
RADIUS Accounting.......................................................................................................................................483
General Steps...................... ... ... ....................................... ... ... .... ... ... ... .... ... ... ... ..............................................484
Guidelines.......................................................................................................................................................485
Chapter 41: Port Authentication ................................................................................................................487
Displaying the Port Authentication Window....................................................................................................488
Enabling Port Authentication on the Switch....................................................................................................492
Configuring Authenticator Ports......................................................................................................................495
Configuring the Web Authentication Server .................................. ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... .................505
Configuring Supplicant Ports..........................................................................................................................508
Configuring Log Events for Authenticator Ports .............................................................................................512
Designating Non-authenticated Network Devices ..........................................................................................514
Disabling Port Authentication on the Ports.....................................................................................................517
Disabling Port Authentication on the Switch...................................................................................................518
Enabling or Disabling EAP Transparency ......................................................................................................519
Chapter 42: Configuration Files ...............................................................................................
..................521
Introduction.....................................................................................................................................................522
Displaying the File Management Window ......................................................................................................523
Displaying the Configuration File Window......................................................................................................525
Creating a New Configuration File....................... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... .......................527
Designating the Active Configuration File.......................................................................................................528
Uploading Configuration Files from the Switch...............................................................................................529
Downloading Configuration Files to the Switch ..............................................................................................530
Deleting Configuration Files ...........................................................................................................................532
Displaying the Configuration Window.............................................................................................................533
9
Contents
Chapter 43: Operating System Files ............... ... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ................ 535
Introduction .................................................................................................................................................... 536
Displaying the File Management Window...................................................................................................... 537
Deleting the Secondary Operating System File............................................................................................. 539
Downloading a New Operating System File to the Switch............................................................................. 540
Designating the Primary Operating System File............................................................................................ 542
10

Figures

Figure 1: Example of a Web Browser Management Window.............................................................................................. 28
Figure 2: Window Banner.................................................................................................................................................... 29
Figure 3: Main Menu............................................................................................................................................................ 30
Figure 4: Save Configuration Window................................................................................................................................. 32
Figure 5: Logon Window ...................................................................................................................................................... 35
Figure 6: Management - Configuration File Window ........................................................................................................... 36
Figure 7: System Settings - System Window....................................................................................................................... 38
Figure 8: Change Password Window.................................................................................................................................. 38
Figure 9: System Settings - System Window....................................................................................................................... 42
Figure 10: Change Password Window ................................................................................................................................ 46
Figure 11: Management - Port Reset Window..................................................................................................................... 53
Figure 12: System Settings - System Time Window............................................................................................................ 56
Figure 13: System Settings - Log Window........................................................................................................................... 65
Figure 14: Device Monitoring - Log Window........................................................................................................................ 70
Figure 15: Log - Display Window......................................................................................................................................... 72
Figure 16: System Settings - Others Window...................................................................................................................... 83
Figure 17: Device Monitoring - System Information Window............................................................................................... 88
Figure 18: System - Detail Window ..................................................................................................................................... 90
Figure 19: Display Port Status Window............................................................................................................................... 91
Figure 20: Device Monitoring - Switch Counter Window ..................................................................................................... 93
Figure 21: Port Counter Window......................................................................................................................................... 94
Figure 22: System Settings - LED Window.......................................................................................................................... 96
Figure 23: Port LED - Port Settings Window ..................................................................................................................... 100
Figure 24: System Settings - SNMP Window.................................................................................................................... 103
Figure 25: SNMP Community - Add Window.........................................................................................
Figure 26: Switch Settings - Port Window................................................................................................. ........................ 114
Figure 27: Port Settings Window..................................................................................................................... .................. 118
Figure 28: Display Port Status Window............................................................................................................. ... ... .......... 124
Figure 29: Device Monitoring - FDB Window..................................................................................................................... 130
Figure 30: FDB Display Filter Window....................................................................................................... ........................ 134
Figure 31: Switch Settings - Others Window................................................................................................................... .. 138
Figure 32: Switch Settings - Protection Window............................................................................................................ .... 143
Figure 33: Packet Storm Protection Settings Window................................................................................................ ....... 145
Figure 34: Switch Settings - Mirroring Window .................................................................................................................. 149
Figure 35: Static Port Trunk Example..................................................................................................... ... ........................ 154
Figure 36: Switch Settings - Trunking Window.................................................................................................................. 156
Figure 37: Trunk Settings - Add Window........................................................................................................................... 157
Figure 38: Trunk Settings - Edit Window....................................................................................................................... .... 160
Figure 39: System Settings - Trigger Window............................. ... .............................................................. ..................... 167
Figure 40: Trigger Settings - Add Window....................................................................................................... .. ................ 170
Figure 41: Trigger - Detail Window.................................................................................................................................... 175
Figure 42: Port-based VLAN - Example 1......................................................................................................................... 183
Figure 43: Port-based VLAN - Example 2......................................................................................................................... 184
Figure 44: Example of a Tagged VLAN............................................................................................................................. 188
Figure 45: Switch Settings - Virtual LAN Window....................................................................................................... ... .... 194
Figure 46: VLAN Settings - Add Window...................................................................................................... ..................... 197
Figure 47: VLAN Settings - Edit Window........................................................................................................................... 202
Figure 48: Example of the VLAN Settings - Add Window for a Protected Ports VLAN..................................................... 213
Figure 49: Switch Settings - QoS Window......................................................................................................................... 224
............................ 107
11
List of Figures
Figure 50: QoS - DSCP Settings Window............................................................................................................... ........... 228
Figure 51: QoS DSCP Settings Window............................................................................................................................ 229
Figure 52: QoS - Port Settings Window.......................................................................................................................... ... 230
Figure 53: User Priority and VLAN Fields within an Ethernet Frame................................................................ ................. 235
Figure 54: ToS field in an IP Header................................................................................................................. ... .............. 237
Figure 55: Switch Settings - Classifier Window ................................................................................................ ... .............. 242
Figure 56: Classifier - Add Window...................................................................................................................... .............. 243
Figure 57: DiffServ Domain Example................................................................................................................... .............. 262
Figure 58: QoS Voice Application Example................................................................................................... .................... 265
Figure 59: QoS Video Application Example............................................................................................................ .. ......... 267
Figure 60: QoS Critical Database Example .................................................................................................................... ... 268
Figure 61: Policy Component Hierarchy Example ................................................................................... .......................... 270
Figure 62: Switch Settings - Policy Based QoS Window............................................................................................. ... ... 272
Figure 63: Flow Group - Add Window................................................................................................................................ 275
Figure 64: Traffic Class - Add Window.............................................................................................................................. 279
Figure 65: QoS Policy - Add Window................................................................................................................................. 286
Figure 66: Device Monitoring - Policy Based QoS window................................................................................................ 291
Figure 67: QoS Policy Counters Window........................................................................................................................... 292
Figure 68: Point-to-Point Ports................................................................................................................. ... ....................... 298
Figure 69: Edge Port.......................................................................................................................................................... 299
Figure 70: Point-to-Point and Edge Port............................................................................................................................ 299
Figure 71: VLAN Fragmentation....................................................................................................................... ................. 301
Figure 72: Switch Settings - RSTP Window................................................................................................................. ...... 304
Figure 73: RSTP Port Settings Window...................................................................................................... ....................... 311
Figure 74: Spanning Tree - Port Settings Window............................................................................................................. 312
Figure 75: Multiple Spanning Tree Region ................ .......................................................................................... .............. 322
Figure 76: CIST and VLAN Guideline - Example 1.................................................................................
Figure 77: CIST and VLAN Guideline - Example 2............................................................................................................ 329
Figure 78: Spanning Regions - Example 1........................................................................................................................ 330
Figure 79: Switch Settings - MSTP Window...................................................................................................................... 334
Figure 80: CIST - Edit Window ............................................................................................................................ .............. 342
Figure 81: MST Instance - Add Window............................................................................................................................ 345
Figure 82: MST Instance - Edit Window...................................................................................................................... ... ... 347
Figure 83: Port Settings / Instance ID Window.................................................................................................................. 350
Figure 84: CIST- Port Settings Window........................................................................................... ... ............................... 352
Figure 85: MST Instance - Port Settings Window.............................................................................................................. 353
Figure 86: Device Monitoring - MSTP Window............................................................................................................ ...... 356
Figure 87: MSTP Port Counters Window........................................................................................................................... 357
Figure 88: Switch Settings - Loop Detection Frame Window.......................................... ... ................................................ 363
Figure 89: LDF - Port Settings Window............................................................................................................................. 368
Figure 90: Device Monitoring - Loop Detection Frame Window ........................................................................................ 371
Figure 91: Switch Settings - IGMP Snooping Window....................................................................................................... 376
Figure 92: IP Multicast Address - Add Window............................................................................................................ ...... 381
Figure 93: Device Monitoring - IGMP Snooping Window..................................................................................... .............. 384
Figure 94: Switch Settings - MLD Snooping Window ............................................................................................. ........... 389
Figure 95: Multicast Group - Add Window.......................................................................................... ... ............................ 394
Figure 96: Device Monitoring - MLD Snooping................................................................................................. ... .............. 397
Figure 97: Switch Settings - DHCP Snooping Window...................................................................................................... 400
Figure 98: Port Settings Window for DHCP Snooping....................................................................................................... 404
Figure 99: DHCP Snooping - Port Settings Window................................................................................................. ... ...... 405
Figure 100: Binding Data Base Client Information - Add Window ..................................................................................... 407
Figure 101: MAC Address Filtering Entry - Add Window................................................................................................... 409
Figure 102: Device Monitoring - DHCP Snooping Window...........................................................................
Figure 103: Switch Settings - Switch Storm Detection Window......................................................................................... 416
Figure 104: Switch Storm Detection - Port Settings Window............................................................................................. 422
Figure 105: Device Monitoring - Switch Storm Database Window .................................................................................... 425
Figure 106: Switch Settings - EPSR Window ......................................................................................................... ........... 428
Figure 107: EPSR Domain - Add Window......................................................................................................................... 430
Figure 108: Device Monitoring - EPSR Window................................................................................................................ 435
Figure 109: System Settings - Access Filter Window.................................................................................... ... ................. 440
........................... 328
..................... 411
12
GS900M Series Web Browser User’s Guide
Figure 110: Add Access Filter Window................................................................................................ ... ........................... 443
Figure 111: Security Settings - Port Security Window....................................................................................... ... ............. 454
Figure 112: Port Security Settings Window....................................................................................................................... 456
Figure 113: Security Settings - RADIUS Server Window ............................................................................. ... .................. 462
Figure 114: RADIUS Server Settings Window................................................................................................................... 468
Figure 115: Single Host Mode........................................................................................................................... ... ............. 475
Figure 116: Multiple Host Operating Mode................................................................................................... ..................... 476
Figure 117: Multiple Supplicant Mode.................................................................................................... ... ... ..................... 478
Figure 118: Security Settings - Port Authentication Window............................................................................................. 488
Figure 119: Port Authentication - Port Settings Window for Authenticator Ports................................. ... ........................... 496
Figure 120: Security Settings - Web Authenticator Window.............................................................................................. 506
Figure 121: Locations of the Messages in the Web Access Authentication Gateway....................................................... 507
Figure 122: Port Authentication - Port Settings Window for Supplicant Ports................................................................... 509
Figure 123: Authentication Log Settings Window............................................................................................ .. ................ 512
Figure 124: Port Authentication - Supplicant MAC Address Settings.............................................................................. .. 515
Figure 125: Management - File Management Window...................................................................................................... 523
Figure 126: Management - Configuration File Window ..................................................................................................... 525
Figure 127: Configuration Window................................................................................................... ... .............................. 534
Figure 128: Management - File Management Window...................................................................................................... 537
13
List of Figures
14

Tables

Table 1. Management Interfaces .......................................................................................................................................24
Table 2. Differences in the Management Interfaces ..........................................................................................................27
Table 3. Window Banner ...................................................................................................................................................29
Table 4. Main Menu ...........................................................................................................................................................30
Table 5. Save Configuration Window ................................................................................................................................32
Table 6. Password Window Parameters ............................................................................................................................39
Table 7. Name, Location, and Contact Fields in the System Settings - System Window ..................................................40
Table 8. Switch Settings - System Window .......................................................................................................................43
Table 9. Name, Location, and Contact Fields in the System Settings - System Window ..................................................44
Table 10. Password Window Parameters ..........................................................................................................................46
Table 11. IP Address Configuration Parameters in the System Settings - System Window .............................................49
Table 12. System Settings - System Window ....................................................................................................................56
Table 13. System Time Section of the System Settings - System Time Window ..............................................................58
Table 14. NTP Client Parameters ......................................................................................................................................59
Table 15. Summer Time Parameters .................................................................................................................................61
Table 16. System Settings - Log Window .......................................................................................................................... 65
Table 17. Severity Levels ..................................................................................................................................................68
Table 18. Event Log Options .............................................................................................................................................69
Table 19. Log Counter Fields ............................................................................................................................................70
Table 20. Display Order Options .......................................................................................................................................71
Table 21. Columns in the Log - Display Window ...............................................................................................................72
Table 22. Syslog Client Parameters ...........................................................................................
Table 23. Facility Codes for the Syslog Client ...................................................................................................................78
Table 24. System Settings - Others Window .....................................................................................................................84
Table 25. Device Monitoring - System Information Window ..............................................................................................89
Table 26. Automatic Refresh Option in the Device Monitoring ..........................................................................................92
Table 27. System Settings - Log Window .......................................................................................................................... 97
Table 28. SNMP Window .................................................................................................................................................104
Table 29. SNMP Community Table .................................................................................................................................104
Table 30. SNMP Basic Settings .......................................................................................................................................106
Table 31. SNMP Community - Add Window ....................................................................................................................108
Table 32. Switch Settings - Port Window .........................................................................................................................115
Table 33. Port List Table in the Switch Settings - Port Window .......................................................................................115
Table 34. Port Settings Window ......................................................................................................................................119
Table 35. Display Port Status Window ...........................................................................................................................125
Table 36. Device Monitoring - FDB Window ....................................................................................................................130
Table 37. FDB Display Filter ............................................................................................................................................132
Table 38. Add Static Entry ...............................................................................................................................................135
Table 39. Switch Settings - Others Window ....................................................................................................................138
Table 40. Switch Settings - Protection Window ...............................................................................................................143
Table 41. Port Settings Table in the Switch Settings - Protection Window ......................................................................144
Table 42. Switch Settings - Trunking Window .................................................................................................................157
Table 43. Trunk Settings - Add Window ..........................................................................................................................157
Table 44. Trigger Actions ................................................................................................................................................164
Table 45. Trigger Variables .............................................................................................................................................164
Table 46. System Settings - Trigger Window ..................................................................................................................168
Table 47. Trigger Settings Table in System Settings - Trigger Window ................................. .........................................168
Table 48. Trigger Settings - Add Window ........................................................................................................................171
Table 49. Trigger - Detail Window ...................................................................................................................................175
.......................................77
15
List of Tables
Table 50. Example 1 of Port-based VLANs .....................................................................................................................183
Table 51. Example 2 of Port-based VLANs .....................................................................................................................185
Table 52. Example of Tagged VLANs ..............................................................................................................................189
Table 53. Switch Settings - Virtual LAN Window .............................................................................................................194
Table 54. VLAN Group List Table ....................................................................................................................................195
Table 55. VLAN Settings - Add Window for Port-based or Tagged VLANs .....................................................................197
Table 56. Example of a Protected Ports VLAN - Part I ....................................................................................................207
Table 57. Example of a Protected Ports VLAN - Part II ...................................................................................................207
Table 58. VLAN Settings - Add Window for Protected Ports VLAN .................................................................................211
Table 59. Default Mappings of IEEE 802.1p Priority Levels to Priority Queues ..............................................................219
Table 60. Example of New Mappings of IEEE 802.1p Priority Levels to Priority Queues ................................................219
Table 61. Default Values for Weighted Round Robin ......................................................................................................222
Table 62. Switch Settings - QoS Window ........................................................................................................................225
Table 63. Switch Settings - Classifier Window .................................................................................................................242
Table 64. Classifier - Add Window ...................................................................................................................................244
Table 65. Switch Settings - Policy Based QoS Window ..................................................................................................273
Table 66. QoS Policy List Table .......................................................................................................................................273
Table 67. Traffic Class List Table ....................................................................................................................................273
Table 68. Flow Group List Table ......................................................................................................................................274
Table 69. Flow Group - Add Window ...............................................................................................................................276
Table 70. Traffic Class - Add Window ..............................................................................................................................280
Table 71. QoS Policy - Add Window ................................................................................................................................287
Table 72. RSTP Auto-Detect Port Costs ..........................................................................................................................296
Table 73. RSTP Auto-Detect Port Trunk Costs ...............................................................................................................296
Table 74. Switch Settings - RSTP Window ......................................................................................................................305
Table 75. Switch Settings - RSTP Window ......................................................................................
Table 76. RSTP Bridge Parameters ................................................................................................................................308
Table 77. Spanning Tree - Port Settings Window ............................................................................................................312
Table 78. Switch Settings - MSTP Window .....................................................................................................................335
Table 79. Status Parameters in the MSTP Window .........................................................................................................336
Table 80. Bridge MSTP Settings ......................................................................................................................................339
Table 81. MST Instance - Add Window ...........................................................................................................................345
Table 82. Port Settings / Instance ID Window .................................................................................................................350
Table 83. MST Instance - Port Settings ...........................................................................................................................353
Table 84. MSTI Statistics Window ...................................................................................................................................356
Table 85. MSTI Statistics Window ...................................................................................................................................358
Table 86. Actions for Loop Detection Frame ...................................................................................................................362
Table 87. Switch Settings - Loop Detection Frame Window ............................................................................................364
Table 88. Port Settings Table in the Switch Settings - Loop Detection Frame Window ..................................................364
Table 89. LDF - Port Settings Window .............................................................................................................................369
Table 90. Device Monitoring - Loop Detection Frame Window ........................................................................................371
Table 91. Switch Settings - IGMP Snooping Window ......................................................................................................376
Table 92. IP Multicast Address List Table ........................................................................................................................377
Table 93. Switch Settings - IGMP Snooping Window ......................................................................................................378
Table 94. IP Multicast Address - Add Window .................................................................................................................381
Table 95. Host List ...........................................................................................................................................................384
Table 96. Multicast Router List ........................................................................................................................................385
Table 97. Switch Settings - MLD Snooping Window ........................................................................................................389
Table 98. Multicast Group List Table ...............................................................................................................................390
Table 99. Switch Settings - MLD Snooping Window ........................................................................................................391
Table 100. Multicast Group - Add Window ......................................................................................
Table 101. Multicast Router List ......................................................................................................................................397
Table 102. Host List .........................................................................................................................................................398
Table 103. DHCP Snooping Window ...............................................................................................................................401
Table 104. Basic Settings for DHCP Snooping ................................................................................................................402
Table 105. DHCP Snooping - Port Settings Window .......................................................................................................405
Table 106. Binding Data Base Client Information - Add Window .....................................................................................407
Table 107. MAC Address Filtering Entry - Add Window ..................................................................................................410
Table 108. Actions for Switch Storm Detection ................................................................................................................414
Table 109. Switch Settings - Switch Storm Detection Window ........................................................................................417
................................305
................................394
16
GS900M Series Web Browser User’s Guide
Table 110. Switch Settings - Switch Storm Detection Window ........................................................................................417
Table 111. Switch Storm Detection - Port Settings Window ............................................................................................423
Table 112. Device Monitoring - Switch Storm Database Window ...................................................................................425
Table 113. Switch Settings - EPSR Window ...................................................................................................................428
Table 114. EPSR Domain Settings in the EPSR Domain - Add Window .......................................................................431
Table 115. Device Monitoring - EPSR Window ............................................. ... ...............................................................435
Table 116. Access Filters ...............................................................................................................................................438
Table 117. System Settings - Access Filter Window .......................................................................................................440
Table 118. Add Access Filter Window .............................................................................................................................444
Table 119. Intrusion Actions for MAC Address-based Port Security ................................ ... ............................................451
Table 120. Security Settings - Port Security Window ......................................................................................................454
Table 121. Port Security Settings Window ......................................................................................................................457
Table 122. Security Settings - RADIUS Server Window ..................................................................................................463
Table 123. RADIUS Account Settings in the Security Settings - RADIUS Server Window .............................................464
Table 124. RADIUS Client Settings in the Security Settings - RADIUS Server Window .................................................466
Table 125. RADIUS Server Settings Window ..................................................................................................................469
Table 126. Security Settings - Port Authentication Window ............................................................................................489
Table 127. Port List Table in the Security Settings - Port Authentication Window ..........................................................489
Table 128. Port Access Settings .....................................................................................................................................492
Table 129. RADIUS Server MAC Address Format Settings ............................................................................................ 493
Table 130. Port Authentication - Port Settings Window for Authenticator Ports ..............................................................497
Table 131. Security Settings - Web Authenticator Window .............................................................................................506
Table 132. Port Authentication - Port Settings window for Supplicant Ports ...................................................................509
Table 133. Authenticator Log Settings Window .................................................................................
Table 134. Management - File Management Window .....................................................................................................524
Table 135. Management - Configuration File Window .....................................................................................................525
Table 136. Management - File Management Window .....................................................................................................538
Table 137. Download Firmware Options .........................................................................................................................541
..............................513
17
List of Tables
18

Preface

This guide explains how to use the web browser management interface in the Allied Telesis GS900M Series of Gigabit Ethernet switches to configure the features and view statistics. The preface contains the following sections:
“Safety Symbols Used in this Document” on page 20“Contacting Allied Telesis” on page 21
19
Preface
Note
Caution
Warning
Warning

Safety Symbols Used in this Document

This document uses the following conventions.
Notes provide additional information.
Cautions inform you that performing or omitting a specific action may result in equipment damage or loss of data.
Warnings inform you that performing or omitting a specific action may result in bodily injury.
Laser warnings inform you that an eye or skin hazard exists due to the presence of a Class 1 laser device.
20

Contacting Allied Telesis

If you need assistance with this product, you may contact Allied Telesis technical support by going to the Support page on the Allied Telesis web site at www.alliedtelesis.com/support. You can find links for the following services on this page:
24/7 Online Support — Enter our interactive support center to
search for answers to your product questions in our knowledge database, to check support tickets, to learn about RMAs, and to contact Allied Telesis technical experts.
USA and EMEA phone support — Select the phone number that
best fits your location and customer type.
Hardware warranty information — Learn about Allied Telesis
warranties and register your product online.
Replacement Services — Submit a Return Merchandise
Authorization (RMA) request via our interactive support center.
GS900M Series Web Browser User’s Guide
Documentation — View the most recent installation and user
guides, software release notes, white papers, and data sheets for your products.
Software Downloads — Download the latest software releases for
your managed products.
For sales or corporate information, go to www.alliedtelesis.com/ purchase and select your region.
21
Preface
22

Chapter 1

Introduction

This chapter contains introductory information about the web browser management interface on the switch and basic instructions on how to use the interface to configure the parameter settings of the features. The chapter contains the following sections:
“Introduction” on page 24“Main Software Features” on page 26“Differences Between the Management Interfaces” on page 27“Elements of the Web Browser Windows” on page 28“Working with the Web Browser Interface” on page 31“Starting or Ending a Web Browser Management Session” on page 34“What to Configure During the First Management Session” on page 36
23
Chapter 1: Introduction

Introduction

This manual describes the web browser management interface for the GS900M Series of Gigabit Ethernet Switches. The instructions explain how to use the web browser windows to configure the parameter settings and features of the devices, as well as view status information and statistics.
Switch Models The manual applies to the following models of the GS900M Series of
Gigabit Ethernet Switches:
AT-GS908MAT-GS916MAT-GS924M
Management
Interfaces
The switches have three management interfaces: The interfaces are described in Table 1.
Table 1. Management Interfaces
Management Interface Description
Command line This management interface consists of a
series of commands. The interface is available locally through the Console port on the switch as well as remotely with a Telnet client on a management workstation. You may use the commands to manage and configure all of the features and parameters on the switch.
Web Browser This management interface consists of
web browser windows and is used remotely with web browsers from management workstations on your network. You may use this interface to manage nearly all of the features and parameters of the switch. The few exceptions are listed in “Differences Between the Management Interfaces” on page 27. This interface is not available through the Console port.
24
GS900M Series Web Browser User’s Guide
Table 1. Management Interfaces (Continued)
Management Interface Description
SNMPv1 and v2c This management interface consists of
management information base (MIB) objects, which represent the parameters and settings of the features on the switch. This form of management requires a Simple Network Management Protocol (SNMP) application. The interface is available from remote management workstations that have SNMP applications. It is not available through the Console port.
The switches support the following MIBs: SNMP MIB-II (RFC 1213) Ethernet MIB (RFC 3635) Extended Interface MIB (RFC 2863) Bridge MIB (RFC 1493) Dot1q MIB (RFC 2674) Allied Telesis managed switch MIBs
25
Chapter 1: Introduction

Main Software Features

Here are the main software features of the switches:
Port mirroringStatic port trunksPort-based and tagged VLANsProtected ports VLANsClass of ServiceQuality of Service PoliciesRapid Spanning Tree Protocol (STP compatible)Multiple Spanning Tree Protocol (STP compatible)Loop Detection FrameIGMP v3 SnoopingMLD v2 SnoopingDHCP SnoopingBroadcast, multicast, and unknown unicast packet filtersTraffic rate thresholds with actionsEthernet Protected Switched Ring (transit node only)RADIUS client with accountingPort authentication with 802.1x, MAC address, or web browserMAC address-based port securityTrigger actions for automated tasksEvent logSyslog serverSNTP clientStatisticsTelnet serverHTTP serverManagement access filterCommand line management interfaceWeb browser management interface
26
SNMPv1 and v2cBPDU/EAP forwarding

Differences Between the Management Interfaces

There are several differences between the command line and web browser interfaces. The differences are listed in Table 2.
Table 2. Differences in the Management Interfaces
Feature Difference
DCHP client The switch has a DHCP client. You may
use it to assign the device an IP address configuration from a DHCP server on your network. You have to use the command line interface to enable or disable the client. You may use the web browser interface to assign a static IP address to the switch, but you cannot use it to control the DHCP client.
GS900M Series Web Browser User’s Guide
Ping utility The switch has a PING utility. You may
use it to test for active paths between the switch and other devices. The utility is only available from the command line interface. It is not supported from the web browser interface.
PURGE commands The command line interface has a series
of PURGE commands for returning the parameter settings of many of the individual features to their default settings. The web browser interface does not have a similar function.
Resetting Flash Memory The command line interface has the
CLEAR FLASH TOTAL command, which you may use to delete all of the files in flash memory. You may use the web browser interface to delete individual files in flash memory, but you cannot delete all of the files at one time.
27
Chapter 1: Introduction

Elements of the Web Browser Windows

Figure 1 is an example of a web browser window of the management interface. The interface displays this window first when you start a management session.
28
Figure 1. Example of a Web Browser Management Window
At the top of every window is a banner. The components of a banner are identified in Figure 2 on page 29.
Figure 2. Window Banner
1
2
3
Table 3 defines the banner components.
Table 3. Window Banner
Section Description
GS900M Series Web Browser User’s Guide
1 Displays the model name of the switch you are currently
managing.
2 Displays the window name. The first part of the name is
the name of the submenu from where the window is accessed.
3 Displays the version number of the management
software and the MAC address of the switch.
The web browser interface has a main menu in the upper left corner of the browser windows. The elements of the main menu are shown in Figure 3 on page 30.
29
Chapter 1: Introduction
2
1
3
Figure 3. Main Menu
Table 4 defines the main menu components.
Table 4. Main Menu
Section Description
1 Displays the main menu. 2 Saves your changes to the parameter settings of the
switch to the active configuration file in the file system. For more information, refer to the “Save Button” on page 32.
3 Ends a web browser management session.
30
Loading...
+ 514 hidden pages