Home
Allied Telesis
Software
AT-S63
Allied Telesis AT-S63 Features Guide
5
of 1
of 1 rating
538 pages
Give review
Manual
Specs
To Next Page
To Next Page
To Previous Page
To Previous Page
Loading...
Section VII: Internet Proto
col Routing
319
Section VII
Routing
This section has the following chapters:
Chapter 29, “Internet Protoco
l V
ersion 4 Packet Routing” on p
age 321
Chapter 30, “BOOTP Relay Agent” on
page 355
Chapter 31, “V
irtual Router Redundancy Pro
tocol” on p
age 361
318
320
Table of Contents
Table of Contents
3
Table of Contents
16
Default Chapter
19
Preface
19
How this Guide Is Organized
20
Product Documentation
22
Where to Go First
23
Starting a Management Session
24
Document Conventions
25
Contacting Allied Telesis
26
Online Support
26
Email and Telephone Support
26
Returning Products
26
Sales or Corporate Information
26
Management Software Updates
26
Section I: Basic Operations
27
Chapter 1: Overview
29
Layer 2+ and Basic Layer 3 Switches
30
AT-S63 Management Software
36
Management Interfaces
37
Management Access Methods
43
Local Management Sessions
43
Remote Telnet Sessions
43
Remote Secure Shell (SSH) Sessions
44
Remote Web Browser Session
44
Remote SNMP Management
44
Manager Access Levels
45
Installation and Management Configurations
46
Stand-Alone Switches
46
AT-9400Ts Stacks
46
Enhanced Stacking
46
IP Configuration
47
Configuration Files
48
Stand-Alone Switches
48
AT-9400Ts Stacks
48
Selecting a Configuration File
48
Redundant Twisted Pair Ports
49
History of New Features
51
Version 4.0.0
51
Version 3.2.0
53
Version 3.0.0
53
Version 2.1.0
54
Version 2.0.0
55
Version 1.3.0
55
Version 1.2.0
56
Chapter 2: AT-9400Ts Stacks
59
Supported Platforms
60
Introduction
61
AT-S63 Management Software
62
Supported Models
62
AT-Stackxg Stacking Module
63
Figure 1: AT-Stackxg Stacking Module
63
Maximum Number of Switches in a Stack
64
Management Interfaces
64
Management Access Methods
64
Enhanced Stacking
65
Stack Topology
66
Figure 2: Duplex-Chain Topology
66
Figure 3: Duplex-Ring Topology
67
Discovery Process
68
Master and Member Switches
69
Module ID Numbers
70
Stack Configuration Files
71
MAC Address Tables
73
File Systems
73
Compact Flash Memory Card Slots
73
Stack IP Address
74
Upgrading the AT-S63 Management Software
75
Chapter 3: Enhanced Stacking
77
Supported Platforms
78
Overview
79
Master and Slave Switches
80
Common VLAN
81
Master Switch and the Local Interface
82
Slave Switches
83
Enhanced Stacking Compatibility
84
Enhanced Stacking Guidelines
85
General Steps
86
Chapter 4: Snmpv1 and Snmpv2C
87
Supported Platforms
88
Overview
89
Community String Attributes
90
Community String Name
90
Access Mode
90
Operating Status
90
Open or Closed Access Status
90
Trap Receivers
90
Default SNMP Community Strings
92
Chapter 5: MAC Address Table
93
Overview
94
Chapter 6: Static Port Trunks
97
Supported Platforms
98
Overview
99
Figure 4: Static Port Trunk Example
99
Load Distribution Methods
100
Guidelines
102
Chapter 7: LACP Port Trunks
103
Supported Platforms
104
Overview
105
LACP System Priority
106
Adminkey Parameter
107
LACP Port Priority Value
107
Load Distribution Methods
108
Guidelines
109
Chapter 8: Port Mirror
111
Supported Platforms
112
Overview
113
Guidelines
113
Section II: Advanced Operations
115
Chapter 9: File System
117
Overview
118
File Naming Conventions
119
Using Wildcards to Specify Groups of Files
120
Chapter 10: Event Logs and the Syslog Client
121
Supported Platforms
122
Overview
123
Event Messages
123
Syslog Client
124
Chapter 11: Classifiers
125
Supported Platforms
126
Overview
127
Classifier Criteria
129
Figure 5: User Priority and VLAN Fields Within an Ethernet Frame
130
Figure 6: Tos Field in an IP Header
131
Guidelines
134
Chapter 12: Access Control Lists
135
Supported Platforms
136
Overview
137
Parts of an ACL
139
Guidelines
140
Examples
141
Figure 7: ACL Example 1
141
Figure 8: ACL Example 2
142
Figure 9: ACL Example 3
143
Figure 10: ACL Example 4
144
Figure 11: ACL Example 5
144
Figure 12: ACL Example 6
145
Chapter 13: Class of Service
147
Supported Platforms
148
Overview
149
Scheduling
152
Strict Priority Scheduling
152
Weighted Round Robin Priority Scheduling
152
Table 50: Example of Weighted Round Robin Priority
153
Table 51: Example of a Weight of Zero for Priority Queue 7
154
Chapter 14: Quality of Service
155
Supported Platforms
156
Table 52: Support for Quality of Service
156
Table 53: Management Interfaces for Quality of Service
156
Overview
157
Classifiers
159
Flow Groups
160
Traffic Classes
161
Policies
162
Qos Policy Guidelines
163
Packet Processing
164
Bandwidth Allocation
164
Packet Prioritization
164
Replacing Priorities
166
VLAN Tag User Priorities
166
DSCP Values
166
Diffserv Domains
167
Figure 13: Diffserv Domain Example
167
Examples
169
Voice Applications
169
Figure 14: Qos Voice Application Example
170
Video Applications
171
Figure 15: Qos Video Application Example
172
Critical Database
173
Figure 16: Qos Critical Database Example
173
Policy Component Hierarchy
174
Figure 17: Policy Component Hierarchy Example
175
Chapter 15: Denial of Service Defenses
177
Supported Platforms
178
Table 54: Support for the Denial of Service Defenses
178
Table 55: Management Interfaces for the Denial of Service Defenses
178
Overview
179
SYN Flood Attack
180
Smurf Attack
181
Land Attack
182
Teardrop Attack
184
Ping of Death Attack
185
IP Options Attack
186
Mirroring Traffic
187
Denial of Service Defense Guidelines
188
Chapter 16: Power over Ethernet
189
Supported Platforms
190
Table 56: Support for the Power over Ethernet Feature
190
Table 57: Management Interfaces for the Power over Ethernet Feature
190
Overview
191
Power Budgeting
192
Port Prioritization
193
Poe Device Classes
194
Section III: Snooping Protocols
195
Chapter 17: Internet Group Management Protocol Snooping
197
Supported Platforms
198
Table 58: Support for Internet Group Management Protocol Snooping
198
Table 59: Management Interfaces for Internet Group Management Protocol Snooping
198
Overview
199
Chapter 18: Multicast Listener Discovery Snooping
201
Supported Platforms
202
Table 60: Support for Multicast Listener Discovery Snooping
202
Table 61: Management Interfaces for Multicast Listener Discovery Snooping
202
Overview
203
Chapter 19: Router Redundancy Protocol Snooping
205
Supported Platforms
206
Table 62: Support for Router Redundancy Protocol Snooping
206
Table 63: Management Interfaces for Router Redundancy Protocol Snooping
206
Overview
207
Guidelines
208
Chapter 20: Ethernet Protection Switching Ring Snooping
209
Supported Platforms
210
Table 64: Support for Ethernet Protection Switching Ring Snooping
210
Table 65: Management Interfaces for Ethernet Protection Switching Ring Snooping
210
Overview
211
Restrictions
213
Figure 18: Double Fault Condition in EPSR Snooping
214
Guidelines
215
Section IV: Snmpv3
217
Chapter 21: Snmpv3
219
Supported Platforms
220
Table 66: Support for Snmpv3
220
Table 67: Management Interfaces for the Snmpv3
220
Overview
221
Snmpv3 Authentication Protocols
222
Snmpv3 Privacy Protocol
223
Snmpv3 MIB Views
224
Figure 19: MIB Tree
224
Snmpv3 Storage Types
226
Snmpv3 Message Notification
227
Snmpv3 Tables
228
Figure 20: Snmpv3 User Configuration Process
228
Figure 21: Snmpv3 Message Notification Process
229
Snmpv3 User Table
230
Snmpv3 View Table
230
Snmpv3 Access Table
230
Snmpv3 Securitytogroup Table
230
Snmpv3 Notify Table
231
Snmpv3 Target Address Table
231
Snmpv3 Target Parameters Table
231
Snmpv3 Community Table
231
Snmpv3 Configuration Example
232
Section V: Spanning Tree Protocols
233
Chapter 22: Spanning Tree and Rapid Spanning Tree Protocols
235
Supported Platforms
236
Table 68: Support for the Spanning Tree and Rapid Spanning Tree Protocols
236
Table 69: Management Interfaces for the Spanning Tree and Rapid Spanning Tree Protocols
236
Overview
237
Bridge Priority and the Root Bridge
238
Table 70: Bridge Priority Value Increments
238
Path Costs and Port Costs
239
Table 71: STP Auto-Detect Port Costs
239
Port Priority
240
Table 72: STP Auto-Detect Port Trunk Costs
240
Table 73: RSTP Auto-Detect Port Costs
240
Table 74: RSTP Auto-Detect Port Trunk Costs
240
Table 75: Port Priority Value Increments
241
Forwarding Delay and Topology Changes
242
Hello Time and Bridge Protocol Data Units (BPDU)
242
Point-To-Point and Edge Ports
243
Figure 22: Point-To-Point Ports
243
Figure 23: Edge Port
244
Figure 24: Point-To-Point and Edge Port
244
Mixed STP and RSTP Networks
245
Spanning Tree and Vlans
246
Figure 25: VLAN Fragmentation
246
Chapter 23: Multiple Spanning Tree Protocol
247
Supported Platforms
248
Table 76: Support for the Multiple Spanning Tree Protocol
248
Table 77: Management Interfaces for the Multiple Spanning Tree Protocol
248
Overview
249
Multiple Spanning Tree Instance (MSTI)
250
Figure 26: VLAN Fragmentation with STP or RSTP
251
Figure 27: MSTP Example of Two Spanning Tree Instances
252
Figure 28: Multiple Vlans in a MSTI
253
MSTI Guidelines
254
VLAN and MSTI Associations
255
Ports in Multiple Mstis
256
Multiple Spanning Tree Regions
257
Figure 29: Multiple Spanning Tree Region
258
Region Guidelines
259
Common and Internal Spanning Tree (CIST)
260
MSTP with STP and RSTP
260
Summary of Guidelines
261
Associating Vlans to Mstis
263
Figure 30: CIST and VLAN Guideline - Example 1
263
Figure 31: CIST and VLAN Guideline - Example 2
264
Connecting Vlans Across Different Regions
265
Figure 32: Spanning Regions - Example 1
265
Section VI: Virtual Lans
267
Chapter 24: Port-Based and Tagged Vlans
269
Supported Platforms
270
Table 78: Support for the Port-Based and Tagged Vlans
270
Table 79: Management Interfaces for the Port-Based and Tagged Vlans
270
Overview
271
Port-Based VLAN Overview
273
VLAN Name
273
VLAN Identifier
273
Untagged Ports
274
Port VLAN Identifier
274
Guidelines to Creating a Port-Based VLAN
275
Drawbacks of Port-Based Vlans
275
Port-Based Example 1
276
Figure 33: Port-Based VLAN - Example 1
276
Port-Based Example 2
277
Figure 34: Port-Based VLAN - Example 2
277
Tagged VLAN Overview
279
Tagged and Untagged Ports
280
Port VLAN Identifier
280
Guidelines to Creating a Tagged VLAN
280
Tagged VLAN Example
281
Figure 35: Example of a Tagged VLAN
281
Chapter 25: GARP VLAN Registration Protocol
283
Supported Platforms
284
Table 80: Support for the GARP VLAN Registration Protocol
284
Table 81: Management Interfaces for the GARP VLAN Registration Protocol
284
Overview
285
Figure 36: GVRP Example
286
Guidelines
288
GVRP and Network Security
289
GVRP-Inactive Intermediate Switches
290
Generic Attribute Registration Protocol (GARP) Overview
291
Figure 37: GARP Architecture
292
Figure 38: GID Architecture
293
Chapter 26: Multiple VLAN Modes
295
Supported Platforms
296
Table 82: Support for the Multiple VLAN Modes
296
Table 83: Management Interfaces for the Multiple VLAN Modes
296
Overview
297
Q- Compliant Multiple VLAN Mode
298
Table 84: 802.1Q-Compliant Multiple VLAN Example
298
Non-802.1Q Compliant Multiple VLAN Mode
300
Chapter 27: Protected Ports Vlans
301
Supported Platforms
302
Table 85: Support for the Protected Ports Vlans
302
Table 86: Management Interfaces for the Protected Ports Vlans
302
Overview
303
Guidelines
305
Chapter 28: MAC Address-Based Vlans
307
Supported Platforms
308
Table 87: Support for the MAC Address-Based Vlans
308
Table 88: Management Interfaces for MAC Address-Based Vlans
308
Overview
309
Egress Ports
310
Table 89: Mappings of MAC Addresses to Egress Ports Example
310
Table 90: Revised Example of Mappings of MAC Addresses to Egress Ports
311
Vlans that Span Switches
313
Figure 39: Example of a MAC Address-Based VLAN Spanning Switches
313
Table 91: Example of a MAC Address-Based VLAN Spanning Switches
314
VLAN Hierarchy
315
Steps to Creating a MAC Address-Based VLAN
316
Guidelines
317
Section VII: Routing
319
Chapter 29: Internet Protocol Version 4 Packet Routing
321
Supported Platforms
322
Table 92: Support for Ipv4 Packet Routing
322
Table 93: Management Interfaces for Ipv4 Packet Routing
322
Overview
324
Routing Interfaces
326
Vlan ID (VID)
327
Interface Numbers
327
IP Address and Subnet Mask
327
Interface Names
329
Static Routes
330
Routing Information Protocol (RIP)
332
Default Routes
334
Equal-Cost Multi-Path (ECMP) Routing
335
Routing Table
337
Route Selection Process
338
Address Resolution Protocol (ARP) Table
339
Internet Control Message Protocol (ICMP)
340
Table 94: ICMP Messages Implemented on the AT-9400 Switch
340
Routing Interfaces and Management Features
342
Accessing Network Servers
342
Enhanced Stacking
343
Remote Telnet, SSH, and Web Browser Management Sessions
343
Pinging a Remote Device
344
Accessing DHCP or BOOTP Servers
344
Local Interface
345
AT-9408LC/SP AT-9424T/GB, and AT-9424T/SP Switches
346
Local Interface
346
ARP Table
346
Default Gateway
347
Routing Command Example
348
Table 95: Ipv4 Routing Example
348
Creating the Vlans
349
Creating the Routing Interfaces
349
Adding a Static Route and Default Route
350
Adding RIP
351
Selecting the Local Interface
351
Non-Routing Command Example
352
Upgrading from AT-S63 Version 1.3.0 or Earlier
354
Chapter 30: BOOTP Relay Agent
355
Supported Platforms
356
Table 96: Support for the BOOTP Relay Agent
356
Table 97: Management Interfaces for the BOOTP Relay Agent
356
Overview
357
Guidelines
359
Chapter 31: Virtual Router Redundancy Protocol
361
Supported Platforms
362
Table 98: Support for the Virtual Router Redundancy Protocol
362
Table 99: Management Interfaces for the Virtual Router Redundancy Protocol
362
Overview
363
Master Switch
364
Backup Switches
365
Interface Monitoring
366
Port Monitoring
367
VRRP on the Switch
368
Section VIII: Port Security
371
Chapter 32: MAC Address-Based Port Security
373
Supported Platforms
374
Table 100: Support for MAC Address-Based Port Security
374
Table 101: Management Interfaces for MAC Address-Based Port Security
374
Overview
375
Automatic
375
Limited
375
Secured
376
Locked
376
Invalid Frames and Intrusion Actions
377
Guidelines
378
Chapter 33: 802.1X Port-Based Network Access Control
379
Supported Platforms
380
Table 102: Support for 802.1X Port-Based Network Access Control
380
Table 103: Management Interfaces for 802.1X Port-Based Network Access Control
380
Overview
381
Authentication Process
383
Port Roles
384
None Role
384
Authenticator Role
384
Supplicant Role
386
Figure 40: Example of the Supplicant Role
386
Authenticator Ports with Single and Multiple Supplicants
387
Single Operating Mode
387
Figure 41: Authenticator Port in Single Operating Mode with a Single Client
388
Figure 42: Single Operating Mode with Multiple Clients Using the Piggy-Back Feature - Example 1
389
Figure 43: Single Operating Mode with Multiple Clients Using the Piggy-Back Feature - Example 2
390
Multiple Operating Mode
391
Figure 44: Single Operating Mode with Multiple Clients Using the Piggy-Back Feature - Example 3
391
Figure 45: Authenticator Port in Multiple Operating Mode - Example 1
392
Figure 46: Authenticator Port in Multiple Operating Mode - Example 2
393
Supplicant and VLAN Associations
394
Single Operating Mode
395
Multiple Operating Mode
395
Supplicant VLAN Attributes on the RADIUS Server
395
Guest VLAN
396
RADIUS Accounting
397
General Steps
398
Guidelines
399
Section IX: Management Security
403
Chapter 34: Web Server
405
Supported Platforms
406
Table 104: Support for the Web Server
406
Table 105: Management Interfaces for the Web Server
406
Overview
407
Supported Protocols
407
Configuring the Web Server for HTTP
408
Configuring the Web Server for HTTPS
409
General Steps for a Self-Signed Certificate
409
General Steps for a Public or Private CA Certificate
409
Chapter 35: Encryption Keys
411
Supported Platforms
412
Table 106: Support for Encryption Keys
412
Table 107: Management Interfaces for Encryption Keys
412
Overview
413
Encryption Key Length
414
Encryption Key Guidelines
415
Technical Overview
416
Data Encryption
416
Data Authentication
418
Key Exchange Algorithms
419
Chapter 36: PKI Certificates and SSL
421
Supported Platforms
422
Table 108: Support for PKI Certificates and SSL
422
Table 109: Management Interfaces for PKI Certificates and SSL
422
Overview
423
Types of Certificates
423
Distinguished Names
425
SSL and Enhanced Stacking
427
Guidelines
428
Technical Overview
429
SSL Encryption
429
User Verification
430
Authentication
430
Public Key Infrastructure
431
Public Keys
431
Message Encryption
431
Digital Signatures
431
Certificates
432
Elements of a Public Key Infrastructure
433
Certificate Validation
434
Certificate Revocation Lists (Crls)
434
PKI Implementation
435
Chapter 37: Secure Shell (SSH)
437
Supported Platforms
438
Table 110: Support for the Secure Shell Protocol
438
Table 111: Management Interfaces for the Secure Shell Protocol
438
Overview
439
Support for SSH
440
SSH Server
441
SSH Clients
442
SSH and Enhanced Stacking
443
Figure 47 SSH Remote Management of a Slave Switch
443
SSH Configuration Guidelines
445
General Steps to Configuring SSH
446
Chapter 38: TACACS+ and RADIUS Protocols
447
Supported Platforms
448
Table 112: Support for the TACACS+ and RADIUS Protocols
448
Table 113: Management Interfaces for the TACACS+ and RADIUS Protocols
448
Overview
449
Guidelines
451
Chapter 39: Management Access Control List
455
Supported Platforms
456
Table 114: Support for the Management Access Control List
456
Table 115: Management Interfaces for the Management Access Control List
456
Overview
457
Parts of a Management ACE
458
IP Address
458
Mask
458
Application
458
Guidelines
459
Examples
460
Appendix A: AT-S63 Management Software Default Settings
463
Address Resolution Protocol Cache
465
Boot Configuration File
466
BOOTP Relay Agent
467
Class of Service
468
Denial of Service Defenses
469
802.1X Port-Based Network Access Control
470
Enhanced Stacking
472
Ethernet Protection Switching Ring (EPSR) Snooping
473
Event Logs
474
Gvrp
475
IGMP Snooping
476
Internet Protocol Version 4 Packet Routing
477
MAC Address-Based Port Security
478
MAC Address Table
479
Management Access Control List
480
Manager and Operator Account
481
Multicast Listener Discovery Snooping
482
Public Key Infrastructure
483
Port Settings
484
RJ-45 Serial Terminal Port
485
Router Redundancy Protocol Snooping
486
Server-Based Authentication (RADIUS and TACACS+)
487
Server-Based Authentication
487
RADIUS Client
487
TACACS+ Client
487
Simple Network Management Protocol
488
Simple Network Time Protocol
489
Spanning Tree Protocols (STP, RSTP, and MSTP)
490
Spanning Tree Switch Settings
490
Spanning Tree Protocol
490
Rapid Spanning Tree Protocol
490
Multiple Spanning Tree Protocol
491
Secure Shell Server
492
Secure Sockets Layer
493
System Name, Administrator, and Comments Settings
494
Telnet Server
495
Virtual Router Redundancy Protocol
496
Vlans
497
Web Server
498
Appendix B: Snmpv3 Configuration Examples
499
Snmpv3 Configuration Examples
500
Snmpv3 Manager Configuration
500
Snmpv3 Operator Configuration
501
Snmpv3 Worksheet
502
Appendix C: Features and Standards
505
10/100/1000Base-T Twisted Pair Ports
506
Denial of Service Defenses
506
Ethernet Protection Switching Ring Snooping
506
Fiber Optic Ports (AT-9408LC/SP Switch)
507
File System
507
DHCP and BOOTP Clients
507
Internet Protocol Multicasting
507
Internet Protocol Version 4 Routing
507
MAC Address Table
508
Management Access and Security
508
Management Access Methods
509
Management Interfaces
509
Management Mibs
509
Port Security
510
Port Trunking and Mirroring
510
Spanning Tree Protocols
510
System Monitoring
510
Traffic Control
511
Virtual Lans
511
Virtual Router Redundancy Protocol
512
Appendix D: MIB Objects
513
Access Control Lists
514
Table 116: Access Control Lists (Atistackswitch MIB)
514
Class of Service
515
Table 117: Cos Scheduling (Atistackswitch MIB)
515
Table 118: Cos Priority to Egress Queue Mappings (Atistackswitch MIB)
515
Table 119: Cos Packet Weights of Egress Queues (Atistackswitch MIB)
515
Table 120: Cos Port Settings (Atistackswitch MIB)
515
Date, Time, and SNTP Client
516
Table 121: Date, Time, and SNTP Client (Atistackswitch MIB)
516
Denial of Service Defenses
517
Table 122: LAN Address and Subnet Mask (Atistackswitch MIB)
517
Table 123: Denial of Service Defenses (Atistackswitch MIB)
517
Enhanced Stacking
518
Table 124: Switch Mode and Discovery (Atistackinfo MIB)
518
Table 125: Switches of an Enhanced Stack (Atistackinfo MIB)
518
Gvrp
519
Table 126: GVFP Switch Configuration (Atistackswitch MIB)
519
Table 127: GVRP Port Configuration (Atistackswitch MIB)
519
Table 128: GVRP Counters (Atistackswitch MIB)
519
MAC Address Table
521
Table 129: MAC Address Table (Atistackswitch MIB)
521
Table 130: Static MAC Address Table (Atistackswitch MIB)
521
Management Access Control List
522
Table 131: Management Access Control List Status (Atistackswitch MIB)
522
Table 132: Management Access Control List Entries (Atistackswitch MIB)
522
Miscellaneous
523
Table 133: System Reset (Atistackswitch MIB)
523
Table 134: Local Interface (Atistackswitch MIB)
523
Table 135: Saving the Configuration and Returning to Default Settings (Atistackswitch MIB)
523
Port Mirroring
524
Table 136: Port Mirroring (Atistackswitch MIB)
524
Quality of Service
525
Table 137: Flow Groups (Atistackswitch MIB)
525
Table 138: Traffic Classes (Atistackswitch MIB)
525
Table 139: Policies (Atistackswitch MIB)
526
Port Configuration and Status
527
Table 140: Port Configuration and Status (Atistackswitch MIB)
527
Spanning Tree
528
Table 141: Spanning Tree (Atistackswitch MIB)
528
Static Port Trunk
529
Table 142: Static Port Trunks (Atistackswitch MIB)
529
Vlans
530
Table 143: VLAN Table (Atistackswitch MIB)
530
Table 144: VLAN Table (Atistackswitch MIB)
530
Table 145: VLAN Mode and Uplink Port (Atistackswitch MIB)
530
Table 146: PVID Table (Atistackswitch MIB)
531
Index
533
Other manuals for Allied Telesis AT-S63
Cli User's Guide
464 pages
5
Based on 1 rating
Ask a question
Give review
Questions and Answers:
Need help?
Do you have a question about the Allied Telesis AT-S63 and is the answer not in the manual?
Ask a question
Allied Telesis AT-S63 Specifications
General
Brand
Allied Telesis
Model
AT-S63
Category
Software
Language
English
Related product manuals
Allied Telesis AT-x900-12XT/S
1294 pages
Allied Telesis AT-9400
668 pages
Allied Telesis AT-8000S
403 pages