3
Table of Contents
Preface .................................................................................................................................................................................7
Safety Symbols Used in this Document ....................................................................................................................... 8
Contact Allied Telesis ................................................................................................................................................... 9
Chapter 1: Command-Line Interface Overview................................................................................................................11
Initially Configuring a Device .........................................................................................................................................11
Accessing the CLI .........................................................................................................................................................11
Understanding Command Syntax .................................................................................................................................12
Understanding Enable and Enable Secret Passwords..................................................................................................12
Abbreviating Commands ...............................................................................................................................................12
Chapter 2: Layer 2 Features ..............................................................................................................................................13
Port Configuration .........................................................................................................................................................14
Flow Control ..................................................................................................................................................................15
Port Mirror .....................................................................................................................................................................16
Link Aggregation ...........................................................................................................................................................17
802.1Q VLAN ................................................................................................................................................................20
MAC Address Table ......................................................................................................................................................23
Q-in-Q............................................................................................................................................................................25
GARP ............................................................................................................................................................................ 26
GVRP ............................................................................................................................................................................ 26
802.3az Energy Efficient Ethernet (EEE) ......................................................................................................................27
Multicast ........................................................................................................................................................................ 28
MLD Snooping...............................................................................................................................................................34
Jumbo Frame ................................................................................................................................................................39
Spanning Tree...............................................................................................................................................................39
X-Ring Elite ...................................................................................................................................................................44
Loop Detection / Prevention ..........................................................................................................................................45
Chapter 3: Security.............................................................................................................................................................47
Storm Control ................................................................................................................................................................47
Port Security..................................................................................................................................................................48
802.1X ...........................................................................................................................................................................49
Account Manager ..........................................................................................................................................................50
DoS Attack Prevention ..................................................................................................................................................50
IP Security .....................................................................................................................................................................52
Chapter 4: Quality of Service.............................................................................................................................................53
QoS ............................................................................................................................................................................... 53
Rate Limit ...................................................................................................................................................................... 56
Chapter 5: Management.....................................................................................................................................................57
IP Management .............................................................................................................................................................57
LLDP .............................................................................................................................................................................59
SNMP ............................................................................................................................................................................61
Power Over Ethernet.....................................................................................................................................................63
Configuration Management ........................................................................................................................................... 64
Firmware Management .................................................................................................................................................65
DHCP Server.................................................................................................................................................................66
DHCP Client Option 82 .................................................................................................................................................67
System Log (SYSLOG) ................................................................................................................................................. 68
SNTP - Network Time Protocol .....................................................................................................................................69