Allied Telesis AT-S63 User manual

Category
Network switches
Type
User manual
613-001022 Rev. C
Management
Software
AT-S63
â—†
Features Guide
For Stand-alone AT-9400 Switches
and AT-9400Ts Stacks
AT-S63 Version 2.2.0 for AT-9400 Layer 2+ Switches
AT-S63 Version 4.1.0 for AT-9400 Basic Layer 3 Switches
Copyright  2009 Allied Telesis, Inc.
All rights reserved. No part of this publication may be reproduced without prior written permission from Allied Telesis, Inc.
Allied Telesis and the Allied Telesis logo are trademarks of Allied Telesis, Incorporated. Microsoft and Internet Explorer are registered
trademarks of Microsoft Corporation. All other product names, company names, logos or other designations mentioned herein are
trademarks or registered trademarks of their respective owners.
Allied Telesis, Inc. reserves the right to make changes in specifications and other information contained in this document without prior
written notice. The information provided herein is subject to change without notice. In no event shall Allied Telesis, Inc. be liable for any
incidental, special, indirect, or consequential damages whatsoever, including but not limited to lost profits, arising out of or related to this
manual or the information contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have known, the possibility of
such damages.
3
Preface ............................................................................................................................................................ 21
How This Guide is Organized........................................................................................................................... 22
Product Documentation.................................................................................................................................... 25
Where to Go First............................................................................................................................................. 26
Starting a Management Session ...................................................................................................................... 27
Document Conventions.................................................................................................................................... 28
Contacting Allied Telesis.................................................................................................................................. 29
Online Support........................................................................................................................................... 29
Email and Telephone Support.................................................................................................................... 29
Returning Products .................................................................................................................................... 29
Sales or Corporate Information.................................................................................................................. 29
Management Software Updates................................................................................................................. 29
Section I: Basic Operations ......................................................................................31
Chapter 1: Overview ...................................................................................................................................... 33
Layer 2+ and Basic Layer 3 Switches .............................................................................................................. 34
AT-S63 Management Software........................................................................................................................ 40
Management Interfaces.................................................................................................................................... 41
Management Access Methods......................................................................................................................... 47
Local Management Sessions..................................................................................................................... 47
Remote Telnet Sessions............................................................................................................................ 47
Remote Secure Shell (SSH) Sessions....................................................................................................... 48
Remote Web Browser Session.................................................................................................................. 48
Remote SNMP Management..................................................................................................................... 48
Manager Access Levels ................................................................................................................................... 49
Installation and Management Configurations ................................................................................................... 50
Stand-alone Switches ................................................................................................................................ 50
AT-9400Ts Stacks...................................................................................................................................... 50
Enhanced Stacking.................................................................................................................................... 50
IP Configuration................................................................................................................................................ 51
Configuration Files............................................................................................................................................ 52
Stand-alone Switches ................................................................................................................................ 52
AT-9400Ts Stacks...................................................................................................................................... 52
Selecting a Configuration File.................................................................................................................... 52
Redundant Twisted Pair Ports.......................................................................................................................... 53
History of New Features................................................................................................................................... 55
Version 4.1.0.............................................................................................................................................. 55
Version 4.0.0.............................................................................................................................................. 55
Version 3.2.0.............................................................................................................................................. 57
Version 3.0.0.............................................................................................................................................. 58
Version 2.1.0.............................................................................................................................................. 59
Version 2.0.0.............................................................................................................................................. 59
Version 1.3.0.............................................................................................................................................. 60
Version 1.2.0.............................................................................................................................................. 61
Contents
Contents
4
Chapter 2: AT-9400Ts Stacks .......................................................................................................................63
Supported Platforms .........................................................................................................................................64
Introduction .......................................................................................................................................................65
AT-S63 Management Software.........................................................................................................................66
Supported Models.............................................................................................................................................66
AT-StackXG Stacking Module ..........................................................................................................................67
Maximum Number of Switches in a Stack.........................................................................................................68
Management Interfaces ....................................................................................................................................68
Management Access Methods..........................................................................................................................68
Enhanced Stacking...........................................................................................................................................69
Stack Topology .................................................................................................................................................70
Discovery Process ............................................................................................................................................72
Master and Member Switches ..........................................................................................................................73
Module ID Numbers..........................................................................................................................................74
Stack Configuration Files..................................................................................................................................75
MAC Address Tables........................................................................................................................................77
File Systems .....................................................................................................................................................77
Compact Flash Memory Card Slots..................................................................................................................77
Stack IP Address ..............................................................................................................................................78
Upgrading the AT-S63 Management Software.................................................................................................79
Chapter 3: Enhanced Stacking .....................................................................................................................81
Supported Platforms .........................................................................................................................................82
Overview...........................................................................................................................................................83
Master and Slave Switches...............................................................................................................................84
Common VLAN.................................................................................................................................................85
Master Switch and the Local Interface..............................................................................................................86
Slave Switches..................................................................................................................................................87
Enhanced Stacking Compatibility .....................................................................................................................88
Enhanced Stacking Guidelines.........................................................................................................................89
General Steps...................................................................................................................................................90
Chapter 4: SNMPv1 and SNMPv2c ...............................................................................................................91
Supported Platforms .........................................................................................................................................92
Overview...........................................................................................................................................................93
Community String Attributes .............................................................................................................................94
Community String Name ............................................................................................................................94
Access Mode..............................................................................................................................................94
Operating Status.........................................................................................................................................94
Open or Closed Access Status...................................................................................................................94
Trap Receivers...........................................................................................................................................94
Default SNMP Community Strings....................................................................................................................96
Chapter 5: MAC Address Table ....................................................................................................................97
Overview...........................................................................................................................................................98
Chapter 6: Static Port Trunks .....................................................................................................................101
Supported Platforms .......................................................................................................................................102
Overview.........................................................................................................................................................103
Load Distribution Methods ..............................................................................................................................104
Guidelines.......................................................................................................................................................106
Chapter 7: LACP Port Trunks .....................................................................................................................107
Supported Platforms .......................................................................................................................................108
Overview.........................................................................................................................................................109
LACP System Priority .....................................................................................................................................110
Adminkey Parameter ......................................................................................................................................111
LACP Port Priority Value.................................................................................................................................111
AT-S63 Management Software Features Guide
5
Load Distribution Methods.............................................................................................................................. 112
Guidelines....................................................................................................................................................... 113
Chapter 8: Port Mirror ................................................................................................................................. 115
Supported Platforms....................................................................................................................................... 116
Overview......................................................................................................................................................... 117
Guidelines....................................................................................................................................................... 117
Chapter 9: Link-flap Protection .................................................................................................................. 119
Supported Platforms....................................................................................................................................... 120
Overview......................................................................................................................................................... 121
Guidelines....................................................................................................................................................... 122
Configuring the Feature.................................................................................................................................. 123
Section II: Advanced Operations ...........................................................................125
Chapter 10: File System .............................................................................................................................. 127
Overview......................................................................................................................................................... 128
File Naming Conventions ............................................................................................................................... 129
Using Wildcards to Specify Groups of Files ................................................................................................... 130
Chapter 11: Event Logs and the Syslog Client ......................................................................................... 131
Supported Platforms....................................................................................................................................... 132
Overview......................................................................................................................................................... 133
Event Messages............................................................................................................................................. 133
Syslog Client................................................................................................................................................... 134
Chapter 12: Classifiers ................................................................................................................................ 135
Supported Platforms....................................................................................................................................... 136
Overview......................................................................................................................................................... 137
Classifier Criteria............................................................................................................................................ 139
Guidelines....................................................................................................................................................... 144
Chapter 13: Access Control Lists .............................................................................................................. 145
Supported Platforms....................................................................................................................................... 146
Overview......................................................................................................................................................... 147
Parts of an ACL.............................................................................................................................................. 149
Guidelines....................................................................................................................................................... 150
Examples........................................................................................................................................................ 151
Chapter 14: Class of Service ...................................................................................................................... 157
Supported Platforms....................................................................................................................................... 158
Overview......................................................................................................................................................... 159
Scheduling...................................................................................................................................................... 162
Strict Priority Scheduling.......................................................................................................................... 162
Weighted Round Robin Priority Scheduling............................................................................................. 162
Chapter 15: Quality of Service ................................................................................................................... 165
Supported Platforms....................................................................................................................................... 166
Overview......................................................................................................................................................... 167
Classifiers....................................................................................................................................................... 169
Flow Groups................................................................................................................................................... 170
Traffic Classes................................................................................................................................................ 171
Policies........................................................................................................................................................... 172
QoS Policy Guidelines.................................................................................................................................... 173
Packet Processing.......................................................................................................................................... 174
Bandwidth Allocation...................................................................................................................................... 174
Packet Prioritization........................................................................................................................................ 174
Contents
6
Replacing Priorities.........................................................................................................................................176
VLAN Tag User Priorities................................................................................................................................176
DSCP Values..................................................................................................................................................176
DiffServ Domains............................................................................................................................................177
Examples ........................................................................................................................................................179
Voice Applications....................................................................................................................................179
Video Applications....................................................................................................................................181
Critical Database......................................................................................................................................183
Policy Component Hierarchy....................................................................................................................184
Chapter 16: Group Link Control .................................................................................................................187
Supported Platforms .......................................................................................................................................188
Overview.........................................................................................................................................................189
Guidelines.......................................................................................................................................................197
Configuring the Feature ..................................................................................................................................198
Chapter 17: Denial of Service Defenses ....................................................................................................201
Supported Platforms .......................................................................................................................................202
Overview.........................................................................................................................................................203
SYN Flood Attack............................................................................................................................................204
Smurf Attack ...................................................................................................................................................205
Land Attack.....................................................................................................................................................206
Teardrop Attack ..............................................................................................................................................208
Ping of Death Attack .......................................................................................................................................209
IP Options Attack ............................................................................................................................................210
Mirroring Traffic...............................................................................................................................................211
Denial of Service Defense Guidelines ............................................................................................................212
Chapter 18: Power Over Ethernet ...............................................................................................................213
Supported Platforms .......................................................................................................................................214
Overview.........................................................................................................................................................215
Power Budgeting.............................................................................................................................................216
Port Prioritization.............................................................................................................................................217
PoE Device Classes .......................................................................................................................................218
Section III: Snooping Protocols ..............................................................................219
Chapter 19: Internet Group Management Protocol Snooping .................................................................221
Supported Platforms .......................................................................................................................................222
Overview.........................................................................................................................................................223
Chapter 20: Internet Group Management Protocol Snooping Querier ...................................................225
Supported Platforms .......................................................................................................................................226
Overview.........................................................................................................................................................227
Guidelines.......................................................................................................................................................230
Configuring the Feature ..................................................................................................................................231
Chapter 21: Multicast Listener Discovery Snooping ................................................................................235
Supported Platforms .......................................................................................................................................236
Overview.........................................................................................................................................................237
Chapter 22: Router Redundancy Protocol Snooping ...............................................................................239
Supported Platforms .......................................................................................................................................240
Overview.........................................................................................................................................................241
Guidelines.......................................................................................................................................................242
AT-S63 Management Software Features Guide
7
Chapter 23: Ethernet Protection Switching Ring Snooping .................................................................... 243
Supported Platforms....................................................................................................................................... 244
Overview......................................................................................................................................................... 245
Restrictions..................................................................................................................................................... 247
Guidelines....................................................................................................................................................... 249
Section IV: SNMPv3 ...............................................................................................251
Chapter 24: SNMPv3 ................................................................................................................................... 253
Supported Platforms....................................................................................................................................... 254
Overview......................................................................................................................................................... 255
SNMPv3 Authentication Protocols.................................................................................................................. 256
SNMPv3 Privacy Protocol .............................................................................................................................. 257
SNMPv3 MIB Views ....................................................................................................................................... 258
SNMPv3 Storage Types................................................................................................................................. 260
SNMPv3 Message Notification....................................................................................................................... 261
SNMPv3 Tables.............................................................................................................................................. 262
SNMPv3 User Table ................................................................................................................................ 264
SNMPv3 View Table................................................................................................................................ 264
SNMPv3 Access Table ............................................................................................................................ 264
SNMPv3 SecurityToGroup Table............................................................................................................. 264
SNMPv3 Notify Table............................................................................................................................... 265
SNMPv3 Target Address Table ............................................................................................................... 265
SNMPv3 Target Parameters Table.......................................................................................................... 265
SNMPv3 Community Table...................................................................................................................... 265
SNMPv3 Configuration Example.................................................................................................................... 266
Section V: Spanning Tree Protocols ......................................................................267
Chapter 25: Spanning Tree and Rapid Spanning Tree Protocols ........................................................... 269
Supported Platforms....................................................................................................................................... 270
Overview......................................................................................................................................................... 271
Bridge Priority and the Root Bridge................................................................................................................ 272
Path Costs and Port Costs....................................................................................................................... 273
Port Priority .............................................................................................................................................. 274
Forwarding Delay and Topology Changes ..................................................................................................... 276
Hello Time and Bridge Protocol Data Units (BPDU)................................................................................ 276
Point-to-Point and Edge Ports.................................................................................................................. 277
Mixed STP and RSTP Networks .................................................................................................................... 279
Spanning Tree and VLANs............................................................................................................................. 280
RSTP BPDU Guard........................................................................................................................................ 281
RSTP Loop Guard.......................................................................................................................................... 283
Chapter 26: Multiple Spanning Tree Protocol ........................................................................................... 289
Supported Platforms....................................................................................................................................... 290
Overview......................................................................................................................................................... 291
Multiple Spanning Tree Instance (MSTI)........................................................................................................ 292
MSTI Guidelines............................................................................................................................................. 296
VLAN and MSTI Associations ........................................................................................................................ 297
Ports in Multiple MSTIs................................................................................................................................... 298
Multiple Spanning Tree Regions .................................................................................................................... 299
Region Guidelines.................................................................................................................................... 301
Common and Internal Spanning Tree (CIST) .......................................................................................... 302
MSTP with STP and RSTP...................................................................................................................... 302
Summary of Guidelines.................................................................................................................................. 303
Contents
8
Associating VLANs to MSTIs..........................................................................................................................305
Connecting VLANs Across Different Regions.................................................................................................307
Section VI: Virtual LANs .......................................................................................309
Chapter 27: Port-based and Tagged VLANs ..............................................................................................311
Supported Platforms .......................................................................................................................................312
Overview.........................................................................................................................................................313
Port-based VLAN Overview............................................................................................................................315
VLAN Name..............................................................................................................................................315
VLAN Identifier .........................................................................................................................................315
Untagged Ports.........................................................................................................................................316
Port VLAN Identifier..................................................................................................................................316
Guidelines to Creating a Port-based VLAN..............................................................................................317
Drawbacks of Port-based VLANs.............................................................................................................317
Port-based Example 1..............................................................................................................................318
Port-based Example 2..............................................................................................................................319
Tagged VLAN Overview .................................................................................................................................321
Tagged and Untagged Ports ....................................................................................................................322
Port VLAN Identifier..................................................................................................................................322
Guidelines to Creating a Tagged VLAN ...................................................................................................322
Tagged VLAN Example............................................................................................................................323
Chapter 28: GARP VLAN Registration Protocol ........................................................................................325
Supported Platforms .......................................................................................................................................326
Overview.........................................................................................................................................................327
Guidelines.......................................................................................................................................................330
GVRP and Network Security...........................................................................................................................331
GVRP-inactive Intermediate Switches............................................................................................................332
Generic Attribute Registration Protocol (GARP) Overview.............................................................................333
Chapter 29: Multiple VLAN Modes ..............................................................................................................337
Supported Platforms .......................................................................................................................................338
Overview.........................................................................................................................................................339
802.1Q- Compliant Multiple VLAN Mode........................................................................................................340
Non-802.1Q Compliant Multiple VLAN Mode .................................................................................................342
Chapter 30: Protected Ports VLANs ...........................................................................................................343
Supported Platforms .......................................................................................................................................344
Overview.........................................................................................................................................................345
Guidelines.......................................................................................................................................................347
Chapter 31: MAC Address-based VLANs ..................................................................................................349
Supported Platforms .......................................................................................................................................350
Overview.........................................................................................................................................................351
Egress Ports ...................................................................................................................................................352
VLANs That Span Switches............................................................................................................................355
VLAN Hierarchy ..............................................................................................................................................357
Steps to Creating a MAC Address-based VLAN.............................................................................................358
Guidelines.......................................................................................................................................................359
AT-S63 Management Software Features Guide
9
Section VII: Internet Protocol Routing .................................................................361
Chapter 32: Internet Protocol Version 4 Packet Routing ......................................................................... 363
Supported Platforms....................................................................................................................................... 364
Overview......................................................................................................................................................... 366
Routing Interfaces .......................................................................................................................................... 368
VLAN ID (VID).......................................................................................................................................... 369
Interface Numbers.................................................................................................................................... 369
IP Address and Subnet Mask................................................................................................................... 369
Interface Names............................................................................................................................................. 371
Static Routes.................................................................................................................................................. 372
Routing Information Protocol (RIP)................................................................................................................. 374
Default Routes................................................................................................................................................ 376
Equal-cost Multi-path (ECMP) Routing........................................................................................................... 377
Routing Table................................................................................................................................................. 379
Route Selection Process................................................................................................................................ 380
Address Resolution Protocol (ARP) Table ..................................................................................................... 381
Internet Control Message Protocol (ICMP)..................................................................................................... 382
Routing Interfaces and Management Features.............................................................................................. 384
Accessing Network Servers..................................................................................................................... 384
Enhanced Stacking.................................................................................................................................. 385
Remote Telnet, SSH, and Web Browser Management Sessions............................................................ 385
Pinging a Remote Device......................................................................................................................... 386
Accessing DHCP or BOOTP Servers ...................................................................................................... 386
Local Interface................................................................................................................................................ 387
AT-9408LC/SP AT-9424T/GB, and AT-9424T/SP Switches.......................................................................... 388
Local Interface.......................................................................................................................................... 388
ARP Table................................................................................................................................................ 388
Default Gateway....................................................................................................................................... 389
Routing Command Example........................................................................................................................... 390
Creating the VLANs ................................................................................................................................. 391
Creating the Routing Interfaces ............................................................................................................... 391
Adding a Static Route and Default Route ................................................................................................ 392
Adding RIP............................................................................................................................................... 393
Selecting the Local Interface.................................................................................................................... 393
Non-routing Command Example .................................................................................................................... 394
Upgrading from AT-S63 Version 1.3.0 or Earlier............................................................................................ 396
Chapter 33: BOOTP Relay Agent ............................................................................................................... 397
Supported Platforms....................................................................................................................................... 398
Overview......................................................................................................................................................... 399
Guidelines....................................................................................................................................................... 401
Chapter 34: Virtual Router Redundancy Protocol .................................................................................... 403
Supported Platforms....................................................................................................................................... 404
Overview......................................................................................................................................................... 405
Master Switch................................................................................................................................................. 406
Backup Switches............................................................................................................................................ 407
Interface Monitoring...........................................................................................................
............................. 408
Port Monitoring............................................................................................................................................... 409
VRRP on the Switch....................................................................................................................................... 410
Contents
10
Section VIII: Port Security .....................................................................................413
Chapter 35: MAC Address-based Port Security ........................................................................................415
Supported Platforms .......................................................................................................................................416
Overview.........................................................................................................................................................417
Automatic..................................................................................................................................................417
Limited......................................................................................................................................................417
Secured....................................................................................................................................................418
Locked......................................................................................................................................................418
Invalid Frames and Intrusion Actions..............................................................................................................419
Guidelines.......................................................................................................................................................420
Chapter 36: 802.1x Port-based Network Access Control .........................................................................421
Supported Platforms .......................................................................................................................................422
Overview.........................................................................................................................................................423
Authentication Process ...................................................................................................................................425
Port Roles .......................................................................................................................................................426
None Role.................................................................................................................................................426
Authenticator Role....................................................................................................................................426
Supplicant Role ........................................................................................................................................428
Authenticator Ports with Single and Multiple Supplicants...............................................................................429
Single Operating Mode.............................................................................................................................429
Multiple Operating Mode ..........................................................................................................................433
Supplicant and VLAN Associations.................................................................................................................436
Single Operating Mode.............................................................................................................................437
Multiple Operating Mode ..........................................................................................................................437
Supplicant VLAN Attributes on the RADIUS Server.................................................................................437
Guest VLAN....................................................................................................................................................438
RADIUS Accounting........................................................................................................................................439
General Steps.................................................................................................................................................440
Guidelines.......................................................................................................................................................441
Section IX: Management Security .........................................................................445
Chapter 37: Web Server ..............................................................................................................................447
Supported Platforms .......................................................................................................................................448
Overview.........................................................................................................................................................449
Supported Protocols.................................................................................................................................449
Configuring the Web Server for HTTP............................................................................................................450
Configuring the Web Server for HTTPS..........................................................................................................451
General Steps for a Self-signed Certificate..............................................................................................451
General Steps for a Public or Private CA Certificate................................................................................451
Chapter 38: Encryption Keys ......................................................................................................................453
Supported Platforms .......................................................................................................................................454
Overview.........................................................................................................................................................455
Encryption Key Length....................................................................................................................................456
Encryption Key Guidelines..............................................................................................................................457
Technical Overview.........................................................................................................................................458
Data Encryption........................................................................................................................................458
Data Authentication..................................................................................................................................460
Key Exchange Algorithms ........................................................................................................................461
AT-S63 Management Software Features Guide
11
Chapter 39: PKI Certificates and SSL ........................................................................................................ 463
Supported Platforms....................................................................................................................................... 464
Overview......................................................................................................................................................... 465
Types of Certificates....................................................................................................................................... 465
Distinguished Names...................................................................................................................................... 467
SSL and Enhanced Stacking.......................................................................................................................... 469
Guidelines....................................................................................................................................................... 470
Technical Overview........................................................................................................................................ 471
SSL Encryption ........................................................................................................................................ 471
User Verification....................................................................................................................................... 472
Authentication .......................................................................................................................................... 472
Public Key Infrastructure.......................................................................................................................... 473
Public Keys .............................................................................................................................................. 473
Message Encryption................................................................................................................................. 473
Digital Signatures..................................................................................................................................... 473
Certificates............................................................................................................................................... 474
Elements of a Public Key Infrastructure................................................................................................... 475
Certificate Validation................................................................................................................................ 476
Certificate Revocation Lists (CRLs)......................................................................................................... 476
PKI Implementation.................................................................................................................................. 477
Chapter 40: Secure Shell (SSH) ................................................................................................................. 479
Supported Platforms....................................................................................................................................... 480
Overview......................................................................................................................................................... 481
Support for SSH ............................................................................................................................................. 482
SSH Server..................................................................................................................................................... 483
SSH Clients.................................................................................................................................................... 484
SSH and Enhanced Stacking......................................................................................................................... 485
SSH Configuration Guidelines........................................................................................................................ 487
General Steps to Configuring SSH................................................................................................................. 488
Chapter 41: TACACS+ and RADIUS Protocols ......................................................................................... 489
Supported Platforms....................................................................................................................................... 490
Overview......................................................................................................................................................... 491
Guidelines....................................................................................................................................................... 493
Chapter 42: Management Access Control List ......................................................................................... 497
Supported Platforms....................................................................................................................................... 498
Overview......................................................................................................................................................... 499
Parts of a Management ACE.......................................................................................................................... 500
IP Address................................................................................................................................................ 500
Mask......................................................................................................................................................... 500
Application................................................................................................................................................ 500
Guidelines....................................................................................................................................................... 501
Examples........................................................................................................................................................ 502
Appendix A: AT-S63 Management Software Default Settings ................................................................ 505
Address Resolution Protocol Cache............................................................................................................... 507
Boot Configuration File................................................................................................................................... 508
BOOTP Relay Agent ...................................................................................................................................... 509
Class of Service...............................................................................................................
............................... 510
Denial of Service Defenses............................................................................................................................ 511
802.1x Port-Based Network Access Control .................................................................................................. 512
Enhanced Stacking......................................................................................................................................... 514
Ethernet Protection Switching Ring (EPSR) Snooping................................................................................... 515
Event Logs...................................................................................................................................................... 516
GVRP ............................................................................................................................................................. 517
IGMP Snooping.............................................................................................................................................. 518
Contents
12
Internet Protocol Version 4 Packet Routing....................................................................................................519
Link-flap Protection .........................................................................................................................................520
MAC Address-based Port Security .................................................................................................................521
MAC Address Table........................................................................................................................................522
Management Access Control List ...................................................................................................................523
Manager and Operator Account......................................................................................................................524
Multicast Listener Discovery Snooping...........................................................................................................525
Public Key Infrastructure.................................................................................................................................526
Port Settings ...................................................................................................................................................527
RJ-45 Serial Terminal Port..............................................................................................................................528
Router Redundancy Protocol Snooping..........................................................................................................529
Server-based Authentication (RADIUS and TACACS+).................................................................................530
Server-based Authentication....................................................................................................................530
RADIUS Client..........................................................................................................................................530
TACACS+ Client.......................................................................................................................................530
Simple Network Management Protocol...........................................................................................................531
Simple Network Time Protocol........................................................................................................................532
Spanning Tree Protocols (STP, RSTP, and MSTP)........................................................................................533
Spanning Tree Switch Settings ................................................................................................................533
Spanning Tree Protocol............................................................................................................................533
Rapid Spanning Tree Protocol .................................................................................................................533
Multiple Spanning Tree Protocol ..............................................................................................................534
Secure Shell Server........................................................................................................................................535
Secure Sockets Layer.....................................................................................................................................536
System Name, Administrator, and Comments Settings..................................................................................537
Telnet Server ..................................................................................................................................................538
Virtual Router Redundancy Protocol...............................................................................................................539
VLANs.............................................................................................................................................................540
Web Server.....................................................................................................................................................541
Appendix B: SNMPv3 Configuration Examples ........................................................................................543
SNMPv3 Configuration Examples...................................................................................................................544
SNMPv3 Manager Configuration..............................................................................................................544
SNMPv3 Operator Configuration..............................................................................................................545
SNMPv3 Worksheet.................................................................................................................................546
Appendix C: Features and Standards ........................................................................................................549
10/100/1000Base-T Twisted Pair Ports ..........................................................................................................550
Denial of Service Defenses.............................................................................................................................550
Ethernet Protection Switching Ring Snooping ................................................................................................550
Fiber Optic Ports (AT-9408LC/SP Switch)......................................................................................................551
File System .....................................................................................................................................................551
DHCP and BOOTP Clients .............................................................................................................................551
Internet Protocol Multicasting.................................................................................................
.........................551
Internet Protocol Version 4 Routing................................................................................................................551
MAC Address Table........................................................................................................................................552
Management Access and Security .................................................................................................................552
Management Access Methods........................................................................................................................553
Management Interfaces ..................................................................................................................................553
Management MIBs..........................................................................................................................................553
Port Security ...................................................................................................................................................554
Port Trunking and Mirroring ............................................................................................................................554
Spanning Tree Protocols ................................................................................................................................554
System Monitoring ..........................................................................................................................................554
Traffic Control .................................................................................................................................................555
Virtual LANs....................................................................................................................................................555
Virtual Router Redundancy Protocol...............................................................................................................556
AT-S63 Management Software Features Guide
13
Appendix D: MIB Objects ............................................................................................................................ 557
Access Control Lists....................................................................................................................................... 558
Class of Service.............................................................................................................................................. 559
Date, Time, and SNTP Client ......................................................................................................................... 560
Denial of Service Defenses............................................................................................................................ 561
Enhanced Stacking......................................................................................................................................... 562
GVRP ............................................................................................................................................................. 563
MAC Address Table ....................................................................................................................................... 565
Management Access Control List................................................................................................................... 566
Miscellaneous................................................................................................................................................. 567
Port Mirroring.................................................................................................................................................. 568
Quality of Service ........................................................................................................................................... 569
Port Configuration and Status ........................................................................................................................ 571
Spanning Tree................................................................................................................................................ 572
Static Port Trunk............................................................................................................................................. 573
VLANs ............................................................................................................................................................ 574
Index ............................................................................................................................................................. 577
Contents
14
15
Figure 1: AT-StackXG Stacking Module...............................................................................................................................67
Figure 2: Duplex-chain Topology..........................................................................................................................................70
Figure 3: Duplex-ring Topology............................................................................................................................................71
Figure 4: Static Port Trunk Example...................................................................................................................................103
Figure 5: User Priority and VLAN Fields within an Ethernet Frame....................................................................................140
Figure 6: ToS field in an IP Header ....................................................................................................................................141
Figure 7: ACL Example 1 ...................................................................................................................................................151
Figure 8: ACL Example 2 ...................................................................................................................................................152
Figure 9: ACL Example 3 ...................................................................................................................................................153
Figure 10: ACL Example 4 .................................................................................................................................................154
Figure 11: ACL Example 5 .................................................................................................................................................154
Figure 12: ACL Example 6 .................................................................................................................................................155
Figure 13: DiffServ Domain Example .................................................................................................................................177
Figure 14: QoS Voice Application Example........................................................................................................................180
Figure 15: QoS Video Application Example........................................................................................................................182
Figure 16: QoS Critical Database Example........................................................................................................................183
Figure 17: Policy Component Hierarchy Example..............................................................................................................185
Figure 18: Group Link Control Example 1..........................................................................................................................190
Figure 19: Group Link Control Example 2..........................................................................................................................191
Figure 20: Group Link Control Example 3..........................................................................................................................192
Figure 21: Group Link Control Example 4..........................................................................................................................193
Figure 22: Group Link Control Example 5..........................................................................................................................194
Figure 23: Group Link Control Example 6..........................................................................................................................195
Figure 24: Group Link Control Example 7..........................................................................................................................196
Figure 25: IGMP Snooping Querier Example 1..................................................................................................................228
Figure 26: IGMP Snooping Querier Example 2..................................................................................................................229
Figure 27: SHOW IP INTERFACE Command....................................................................................................................231
Figure 28: SHOW IGMPSNOOPING Command................................................................................................................232
Figure 29: Double Fault Condition in EPSR Snooping.......................................................................................................248
Figure 30: MIB Tree............................................................................................................................................................258
Figure 31: SNMPv3 User Configuration Process...............................................................................................................262
Figure 32: SNMPv3 Message Notification Process............................................................................................................263
Figure 33: Point-to-Point Ports................................................................................................
...........................................277
Figure 34: Edge Port ..........................................................................................................................................................278
Figure 35: Point-to-Point and Edge Port.............................................................................................................................278
Figure 36: VLAN Fragmentation.........................................................................................................................................280
Figure 37: Loop Guard Example 1 .....................................................................................................................................284
Figure 38: Loop Guard Example 2 .....................................................................................................................................285
Figure 39: Loop Guard Example 3 .....................................................................................................................................285
Figure 40: Loop Guard Example 4 .....................................................................................................................................286
Figure 41: Loop Guard Example 5 .....................................................................................................................................287
Figure 42: VLAN Fragmentation with STP or RSTP...........................................................................................................293
Figure 43: MSTP Example of Two Spanning Tree Instances ............................................................................................294
Figure 44: Multiple VLANs in a MSTI..................................................................................................................................295
Figure 45: Multiple Spanning Tree Region.........................................................................................................................300
Figure 46: CIST and VLAN Guideline - Example 1.............................................................................................................305
Figure 47: CIST and VLAN Guideline - Example 2.............................................................................................................306
Figure 48: Spanning Regions - Example 1.........................................................................................................................307
Figure 49: Port-based VLAN - Example 1 ..........................................................................................................................318
Figure 50: Port-based VLAN - Example 2 ..........................................................................................................................319
Figures
Figures
16
Figure 51: Example of a Tagged VLAN..............................................................................................................................323
Figure 52: GVRP Example..................................................................................................................................................328
Figure 53: GARP Architecture............................................................................................................................................334
Figure 54: GID Architecture................................................................................................................................................335
Figure 55: Example of a MAC Address-based VLAN Spanning Switches..........................................................................355
Figure 56: Example of the Supplicant Role.........................................................................................................................428
Figure 57: Authenticator Port in Single Operating Mode with a Single Client.....................................................................430
Figure 58: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 1.................................431
Figure 59: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 2.................................432
Figure 60: Single Operating Mode with Multiple Clients Using the Piggy-back Feature - Example 3.................................433
Figure 61: Authenticator Port in Multiple Operating Mode - Example 1..............................................................................434
Figure 62: Authenticator Port in Multiple Operating Mode - Example 2..............................................................................435
Figure 63: SSH Remote Management of a Slave Switch...................................................................................................485
17
Table 1: Basic Operations ...................................................................................................................................................34
Table 2: Advanced Operations ............................................................................................................................................35
Table 3: Snooping Protocols ...............................................................................................................................................36
Table 4: SNMPv3 ................................................................................................................................................................37
Table 5: Spanning Tree Protocols .......................................................................................................................................37
Table 6: Virtual LANs ...........................................................................................................................................................37
Table 7: Internet Protocol Routing .......................................................................................................................................38
Table 8: Port Security ..........................................................................................................................................................39
Table 9: Management Security ............................................................................................................................................39
Table 10: Management Interfaces .......................................................................................................................................41
Table 11: Management Interfaces for Basic Operations .....................................................................................................42
Table 12: Management Interfaces for Advanced Operations ..............................................................................................43
Table 13: Management Interfaces for Snooping Protocols ..................................................................................................44
Table 14: Management Interfaces for SNMPv3 ...................................................................................................................44
Table 15: Management Interfaces for Spanning Tree Protocols .........................................................................................44
Table 16: Management Interfaces for Virtual LANs .............................................................................................................45
Table 17: Management Interfaces for Internet Protocol Routing .........................................................................................45
Table 18: Management Interfaces for Port Security ............................................................................................................46
Table 19: Management Interfaces for Management Security ..............................................................................................46
Table 20: Twisted Pair Ports Matched with GBIC and SFP Slots ........................................................................................53
Table 21: New Features in AT-S63 Version 3.0.0 ...............................................................................................................58
Table 22: New Features in AT-S63 Version 2.1.0 ...............................................................................................................59
Table 23: New Features in AT-S63 Version 2.0.0 ...............................................................................................................59
Table 24: New Features in AT-S63 Version 1.3.0 ...............................................................................................................60
Table 25: New Features in AT-S63 Version 1.2.0 ...............................................................................................................61
Table 26: Support for AT-9400Ts Stacks ............................................................................................................................64
Table 27: Management Interfaces for AT-9400Ts Stacks ...................................................................................................64
Table 28: Maximum Number of Switches in a Stack of both 24-port and 48-port Switches ................................................68
Table 29: Support for Enhanced Stacking ...........................................................................................................................82
Table 30: Management Interfaces for Enhanced Stacking ..................................................................................................82
Table 31: Support for SNMPv1 and SNMPv2c Community Strings ....................................................................................92
Table 32: Management Interfaces for SNMPv1 and SNMPv2c Community Strings ...........................................................92
Table 33: Support for Static Port Trunks ...........................................................................................................................102
Table 34: Management Interfaces for Static Port Trunks ..................................................................................................102
Table 35: Support for LACP Port Trunks ...........................................................................................................................108
Table 36: Management Interfaces for LACP Port Trunks ..................................................................................................108
Table 37: Support for the Port Mirror .................................................................................................................................116
Table 38: Management Interfaces for the Port Mirror ........................................................................................................116
Table 39: Support for Link-flap Protection .........................................................................................................................120
Table 40: Management Interfaces for Link-flap Protection ................................................................................................120
Table 41: File Extensions and File Types ..........................................................................................................................129
Table 42: Support for the Event Logs and the Syslog Client .............................................................................................132
Table 43: Management Interfaces for the Event Logs and the Syslog Client ....................................................................132
Table 44: Support for Classifiers .......................................................................................................................................136
Table 45: Management Interfaces for Classifiers ..............................................................................................................136
Table 46: Support for the Access Control Lists .................................................................................................................146
Table 47: Management Interfaces for the Access Control Lists ........................................................................................146
Table 48: Support for the Class of Service Feature ...........................................................................................................158
Table 49: Management Interfaces for the Class of Service Feature .................................................................................158
Tables
Tables
18
Table 50: Default Mappings of IEEE 802.1p Priority Levels to Priority Queues ............................................................... 160
Table 51: Customized Mappings of IEEE 802.1p Priority Levels to Priority Queues ........................................................ 160
Table 52: Example of Weighted Round Robin Priority ...................................................................................................... 163
Table 53: Example of a Weight of Zero for Priority Queue 7 ............................................................................................ 163
Table 54: Support for Quality of Service ........................................................................................................................... 166
Table 55: Management Interfaces for Quality of Service .................................................................................................. 166
Table 56: Support for Group Link Control ......................................................................................................................... 188
Table 57: Management Interfaces for Group Link Control ................................................................................................188
Table 58: Link Control Groups on Switch 3 in Example 6 ................................................................................................. 195
Table 59: Link Control Groups on Switch 3 in Example 7 ................................................................................................. 196
Table 60: Support for the Denial of Service Defenses ...................................................................................................... 202
Table 61: Management Interfaces for the Denial of Service Defenses ............................................................................. 202
Table 62: Support for the Power Over Ethernet Feature .................................................................................................. 214
Table 63: Management Interfaces for the Power Over Ethernet Feature ......................................................................... 214
Table 64: Support for Internet Group Management Protocol Snooping ............................................................................ 222
Table 65: Management Interfaces for Internet Group Management Protocol Snooping .................................................. 222
Table 66: Support for IGMP Snooping Querier ................................................................................................................. 226
Table 67: Management Interfaces for IGMP Snooping Querier ........................................................................................ 226
Table 68: Support for Multicast Listener Discovery Snooping .......................................................................................... 236
Table 69: Management Interfaces for Multicast Listener Discovery Snooping ................................................................. 236
Table 70: Support for Router Redundancy Protocol Snooping ......................................................................................... 240
Table 71: Management Interfaces for Router Redundancy Protocol Snooping ................................................................ 240
Table 72: Support for Ethernet Protection Switching Ring Snooping ............................................................................... 244
Table 73: Management Interfaces for Ethernet Protection Switching Ring Snooping ...................................................... 244
Table 74: Support for SNMPv3 ......................................................................................................................................... 254
Table 75: Management Interfaces for the SNMPv3 .......................................................................................................... 254
Table 76: Support for the Spanning Tree and Rapid Spanning Tree Protocols ................................................................ 270
Table 77: Management Interfaces for the Spanning Tree and Rapid Spanning Tree Protocols ...................................... 2
70
Table 78: Bridge Priority Value Increments ...................................................................................................................... 272
Table 79: STP Auto-Detect Port Costs ............................................................................................................................. 273
Table 80: STP Auto-Detect Port Trunk Costs ................................................................................................................... 274
Table 81: RSTP Auto-Detect Port Costs ........................................................................................................................... 274
Table 82: RSTP Auto-Detect Port Trunk Costs ................................................................................................................ 274
Table 83: Port Priority Value Increments .......................................................................................................................... 275
Table 84: Support for the Multiple Spanning Tree Protocol .............................................................................................. 290
Table 85: Management Interfaces for the Multiple Spanning Tree Protocol ..................................................................... 290
Table 86: Support for Port-based and Tagged VLANs ..................................................................................................... 312
Table 87: Management Interfaces for Port-based and Tagged VLANs ............................................................................ 312
Table 88: Support for the GARP VLAN Registration Protocol .......................................................................................... 326
Table 89: Management Interfaces for the GARP VLAN Registration Protocol ................................................................. 326
Table 90: Support for the Multiple VLAN Modes ............................................................................................................... 338
Table 91: Management Interfaces for the Multiple VLAN Modes ..................................................................................... 338
Table 92: 802.1Q-Compliant Multiple VLAN Example ...................................................................................................... 340
Table 93: Support for Protected Ports VLANs .................................................................................................................. 344
Table 94: Management Interfaces for Protected Ports VLANs ......................................................................................... 344
Table 95: Support for MAC Address-based VLANs .......................................................................................................... 350
Table 96: Management Interfaces MAC Address-based VLANs ..................................................................................... 350
Table 97: Mappings of MAC Addresses to Egress Ports Example ................................................................................... 352
Table 98: Revised Example of Mappings of MAC Addresses to Egress Ports ................................................................. 353
Table 99: Example of a MAC Address-based VLAN Spanning Switches ......................................................................... 356
Table 100: Support for IPv4 Packet Routing ..................................................................................................................... 364
Table 101: Management Interfaces for IPv4 Packet Routing ........................................................................................... 364
Table 102: ICMP Messages Implemented on the AT-9400 Switch .................................................................................. 382
Table 103: IPv4 Routing Example .................................................................................................................................... 390
Table 104: Support for the BOOTP Relay Agent .............................................................................................................. 398
Table 105: Management Interfaces for the BOOTP Relay Agent .................................................................................... 398
Table 106: Support for the Virtual Router Redundancy Protocol .................................................................
..................... 404
Table 107: Management Interfaces for the Virtual Router Redundancy Protocol ............................................................. 404
Table 108: Support for MAC Address-based Port Security .............................................................................................. 416
Table 109: Management Interfaces for MAC Address-based Port Security ..................................................................... 416
AT-S63 Management Software Features Guide
19
Table 110: Support for 802.1x Port-based Network Access Control .................................................................................422
Table 111: Management Interfaces for 802.1x Port-based Network Access Control ........................................................422
Table 112: Support for the Web Server .............................................................................................................................448
Table 113: Management Interfaces for the Web Server ....................................................................................................448
Table 114: Support for Encryption Keys ............................................................................................................................454
Table 115: Management Interfaces for Encryption Keys ...................................................................................................454
Table 116: Support for PKI Certificates and SSL ..............................................................................................................464
Table 117: Management Interfaces for PKI Certificates and SSL .....................................................................................464
Table 118: Support for the Secure Shell Protocol .............................................................................................................480
Table 119: Management Interfaces for the Secure Shell Protocol ...................................................................................480
Table 120: Support for the TACACS+ and RADIUS Protocols ..........................................................................................490
Table 121: Management Interfaces for the TACACS+ and RADIUS Protocols ...............................................................490
Table 122: Support for the Management Access Control List ...........................................................................................498
Table 123: Management Interfaces for the Management Access Control List .................................................................498
Table 124: Access Control Lists (AtiStackSwitch MIB) ......................................................................................................558
Table 125: CoS Scheduling (AtiStackSwitch MIB) ............................................................................................................559
Table 126: CoS Priority to Egress Queue Mappings (AtiStackSwitch MIB) ......................................................................559
Table 127: CoS Packet Weights of Egress Queues (AtiStackSwitch MIB) .......................................................................559
Table 128: CoS Port Settings (AtiStackSwitch MIB) ..........................................................................................................559
Table 129: Date, Time, and SNTP Client (AtiStackSwitch MIB) ........................................................................................560
Table 130: LAN Address and Subnet Mask (AtiStackSwitch MIB) ....................................................................................561
Table 131: Denial of Service Defenses (AtiStackSwitch MIB) ...........................................................................................561
Table 132: Switch Mode and Discovery (AtiStackInfo MIB) ..............................................................................................562
Table 133: Switches of an Enhanced Stack (AtiStackInfo MIB) ...................................................................
.....................562
Table 134: GVFP Switch Configuration (AtiStackSwitch MIB) ..........................................................................................563
Table 135: GVRP Port Configuration (AtiStackSwitch MIB) ..............................................................................................563
Table 136: GVRP Counters (AtiStackSwitch MIB) ............................................................................................................563
Table 137: MAC Address Table (AtiStackSwitch MIB) ......................................................................................................565
Table 138: Static MAC Address Table (AtiStackSwitch MIB) ............................................................................................565
Table 139: Management Access Control List Status (AtiStackSwitch MIB) ......................................................................566
Table 140: Management Access Control List Entries (AtiStackSwitch MIB) .....................................................................566
Table 141: System Reset (AtiStackSwitch MIB) ................................................................................................................567
Table 142: Local Interface (AtiStackSwitch MIB) ...............................................................................................................567
Table 143: Saving the Configuration and Returning to Default Settings (AtiStackSwitch MIB) .........................................567
Table 144: Port Mirroring (AtiStackSwitch MIB) ................................................................................................................568
Table 145: Flow Groups (AtiStackSwitch MIB) ..................................................................................................................569
Table 146: Traffic Classes (AtiStackSwitch MIB) ..............................................................................................................569
Table 147: Policies (AtiStackSwitch MIB) ..........................................................................................................................570
Table 148: Port Configuration and Status (AtiStackSwitch MIB) ......................................................................................571
Table 149: Spanning Tree (AtiStackSwitch MIB) ...............................................................................................................572
Table 150: Static Port Trunks (AtiStackSwitch MIB) .........................................................................................................573
Table 151: VLAN Table (AtiStackSwitch MIB) ...................................................................................................................574
Table 152: VLAN Table (AtiStackSwitch MIB) ...................................................................................................................574
Table 153: VLAN Mode and Uplink Port (AtiStackSwitch MIB) .........................................................................................574
Table 154: PVID Table (AtiStackSwitch MIB) ....................................................................................................................575
Tables
20
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504
  • Page 505 505
  • Page 506 506
  • Page 507 507
  • Page 508 508
  • Page 509 509
  • Page 510 510
  • Page 511 511
  • Page 512 512
  • Page 513 513
  • Page 514 514
  • Page 515 515
  • Page 516 516
  • Page 517 517
  • Page 518 518
  • Page 519 519
  • Page 520 520
  • Page 521 521
  • Page 522 522
  • Page 523 523
  • Page 524 524
  • Page 525 525
  • Page 526 526
  • Page 527 527
  • Page 528 528
  • Page 529 529
  • Page 530 530
  • Page 531 531
  • Page 532 532
  • Page 533 533
  • Page 534 534
  • Page 535 535
  • Page 536 536
  • Page 537 537
  • Page 538 538
  • Page 539 539
  • Page 540 540
  • Page 541 541
  • Page 542 542
  • Page 543 543
  • Page 544 544
  • Page 545 545
  • Page 546 546
  • Page 547 547
  • Page 548 548
  • Page 549 549
  • Page 550 550
  • Page 551 551
  • Page 552 552
  • Page 553 553
  • Page 554 554
  • Page 555 555
  • Page 556 556
  • Page 557 557
  • Page 558 558
  • Page 559 559
  • Page 560 560
  • Page 561 561
  • Page 562 562
  • Page 563 563
  • Page 564 564
  • Page 565 565
  • Page 566 566
  • Page 567 567
  • Page 568 568
  • Page 569 569
  • Page 570 570
  • Page 571 571
  • Page 572 572
  • Page 573 573
  • Page 574 574
  • Page 575 575
  • Page 576 576
  • Page 577 577
  • Page 578 578
  • Page 579 579
  • Page 580 580
  • Page 581 581
  • Page 582 582

Allied Telesis AT-S63 User manual

Category
Network switches
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI