EasyManua.ls Logo

Allied Telesis AT-9400 - User Manual

Allied Telesis AT-9400
668 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
613-001025 Rev. A
Management
Software
AT-S63
Menus
User’s Guide
For Stand-alone AT-9400 Switches
Version 2.2.0 for AT-9400 Layer 2+ Switches
Version 3.2.0 for AT-9400 Basic Layer 3 Switches

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Allied Telesis AT-9400 and is the answer not in the manual?

Allied Telesis AT-9400 Specifications

General IconGeneral
BrandAllied Telesis
ModelAT-9400
CategorySoftware
LanguageEnglish

Summary

Preface

How This Guide is Organized

Details the structure of the guide, outlining the different sections and chapters covering basic and advanced operations.

Product Documentation

Lists related product documentation, including features guides, installation guides, and user guides for various management interfaces.

Where to Go First

Recommends reading the 'Overview' section in the Features Guide for initial switch management information and concepts.

Starting a Management Session

Refers to the 'Starting an AT-S63 Management Session Guide' for instructions on initiating local or remote management sessions.

Document Conventions

Explains the document's conventions, defining the usage of 'Note', 'Caution', and 'Warning' for clarity and safety.

Where to Find Web-based Guides

Directs users to the Allied Telesis website (www.alliedtelesis.com) for installation and user guides in PDF format.

Contacting Allied Telesis

Provides contact information for technical support, sales, corporate information, and software updates via web and FTP.

Section I: Basic Operations

Chapter 1: Basic Switch Parameters

Covers fundamental switch configurations like name, location, passwords, system time, console settings, Telnet server, and information display.

Chapter 2: Port Parameters

Details procedures for viewing and changing individual port settings, including status, parameters, blocking, flow control, filtering, rate limiting, and statistics.

Chapter 3: Enhanced Stacking

Explains the enhanced stacking feature, including setting status, selecting switches within a stack, and returning to the master switch.

Chapter 4: SNMPv1 and SNMPv2 c

Covers activating SNMP management, setting authentication failure traps, and managing SNMPv1/v2c community strings.

Chapter 5: MAC Address Table

Explains how to view and manage static and dynamic MAC address tables, including adding, deleting, and changing aging times.

Chapter 6: Static Port Trunks

Provides procedures for managing static port trunks, including creation, modification, and deletion.

Chapter 7: LACP Port Trunks

Details the configuration of LACP port trunks, including enabling/disabling LACP, setting system priority, creating, modifying, and deleting aggregators.

Chapter 8: Port Mirroring

Explains how to create, disable, modify, and display port mirroring configurations to monitor traffic.

Section II: Advanced Operations

Chapter 9: File System

Covers AT-S63 file system operations: copying, renaming, deleting files, and managing boot configuration files.

Chapter 10: File Downloads and Uploads

Details procedures for downloading AT-S63 image files and system files onto the switch, and uploading files between switches.

Chapter 11: Event Logs and the Syslog Client

Explains how to monitor switch activity via event logs and send messages to a syslog server, including configuration and display.

Chapter 12: Classifiers

Provides procedures for creating, modifying, deleting, and displaying classifiers to define traffic flows for ACLs or QoS policies.

Chapter 13: Access Control Lists

Details how to manage access control lists (ACLs), including creating, modifying, deleting, and displaying ACEs.

Chapter 14: Class of Service

Covers Class of Service (CoS) configuration, including CoS settings, mapping priorities to egress queues, and egress scheduling.

Chapter 15: Quality of Service

Explains Quality of Service (QoS) features: managing flow groups, traffic classes, and policies for traffic prioritization.

Chapter 16: Denial of Service Defenses

Details configuring the switch's defense mechanisms against denial of service (DoS) attacks.

Chapter 17: Power Over Ethernet

Covers Power over Ethernet (PoE) configuration on the AT-924T/POE Switch, including setting thresholds and port configurations.

Section III: IGMP Snooping, MLD Snooping, and RRP Snooping

Chapter 18: IGMP Snooping

Explains how to activate and configure IGMP snooping, including status, host topology, timeouts, groups, and router ports.

Chapter 19: MLD Snooping

Covers activating and configuring Multicast Listener Discovery (MLD) snooping, including status, topology, timeouts, groups, and router ports.

Chapter 20: RRP Snooping

Explains how to configure RRP snooping, specifically enabling or disabling the feature.

Section IV: SNMPv3

Chapter 21: SNMPv3

Provides an overview of SNMPv3 implementation and procedures for creating and modifying SNMPv3 entities like users, views, and access tables.

Section V: Spanning Tree Protocols

Chapter 22: Spanning Tree and Rapid Spanning Tree Protocols

Provides background on STP and RSTP, and procedures for adjusting bridge and port parameters.

Chapter 23: Multiple Spanning Tree Protocol

Details configuring Multiple Spanning Tree Protocol (MSTP), including bridge settings, CIST priority, MSTI IDs, and port settings.

Section VI: Virtual LANs

Chapter 24: Port-based and Tagged VLANs

Covers basic VLAN information and procedures for creating, modifying, and deleting port-based and tagged VLANs.

Chapter 25: GARP VLAN Registration Protocol

Describes GARP VLAN Registration Protocol (GVRP) and how to configure it, including status, timers, and port parameters.

Chapter 26: Multiple VLAN Modes

Explains how to select VLAN modes, including user-configured, IEEE 802.1Q compliant multiple VLAN, and non-compliant multiple VLAN modes.

Chapter 27: Protected Ports VLANs

Details protected ports VLANs, providing procedures for creating, modifying, displaying, and deleting them.

Chapter 28: MAC Address-based VLANs

Covers procedures for creating MAC address-based VLANs, including adding/deleting MAC addresses and egress ports.

Section VII: Internet Protocol Routing

Chapter 29: Internet Protocol Version 4 Routing Interfaces

Details managing IPv4 routing interfaces, including creation, modification, deletion, and IP address settings.

Section VIII: Port Security

Chapter 30: MAC Address-based Port Security

Explains how to use MAC addresses to control end node packet forwarding, including configuration and display of port security levels.

Chapter 31: 802.1 x Port-based Network Access Control

Details 802.1x access control for network security, covering port roles, authenticator/supplicant parameters, and RADIUS accounting.

Section IX: Management Security

Chapter 32: Web Server

Provides an overview and procedures for configuring the web server, including HTTP/HTTPS settings and encryption.

Chapter 33: Encryption Keys

Describes encryption keys and their use for improving switch security, including creation, deletion, modification, and export/import.

Chapter 34: PKI Certificates and SSL

Details Public Key Infrastructure (PKI) certificates for web server security, including self-signed certificates and CA certificate management.

Chapter 35: Secure Shell (SSH)

Provides information on the Secure Shell (SSH) protocol and procedures for configuring the switch as an SSH server.

Chapter 36: TACACS+ and RADIUS Protocols

Describes how to configure parameter settings for TACACS+ and RADIUS authentication protocols.

Chapter 37: Management Access Control List

Explains how to manage access control lists (ACLs) for switch management, including enabling/disabling, creating, deleting, and displaying ACEs.

Related product manuals