Home
User Manual - Alloy Computer Products
Contents
1. ONnnk ons s ll O r i oo o E BRS 1 I Efi a 3 op ah Sh oy a ah g E E g i D ao E pE jE SA o rr E omai E IOC Eji Y S ol N J jmi Ejmi 8 OO WC IO 8 24 Apply Reset Fig 26 EEE Configuration Physical port of the switch Used to enable or disable EEE for each port Queues set will activate transmission of data as soon as it is available If no queue is set then transmission of data will only occur once 3000 bytes are ready to be transmitted Queues 1 to 8 are mapped to QoS Queues 0 to 7 E g EEE Urgent Queue 1 uses QoS Queue 0 59 AMS User Manual 1 2 2 ACL The AMS Series switches access control list ACL is probably the most commonly used object in the IOS It is used for packet filtering but also for selecting types of traffic to be analyzed forwarded or influenced in some way The ACLs are divided into EtherTypes IPv4 ARP protocol MAC and VLAN parameters etc Here we will just go over the standard and extended access lists for TCP IP As you create ACEs for ingress classification you can assign a policy for each port the policy number range from 1 8 However each policy can be applied to any port This makes it very easy to determine what type of ACL policy you will be working with 1 2 2 1 Ports The section describes h
2. amp i Acto Logout OFF T7 CI MIN Auteretesh Retesn Case Global Counters Neighbour anties were lost changed 2011 01 01 00 00 09 3615821 sec ago Total Neighbours Entries Added o Total Neighbours Entries Deleted o Total Neighbours Entries Dropped Total Neighbours Entries Aged Out 0 LLOP Statistics Local Counters Local Port TxFrames RxFrames RxErrors Frames Discarded TLVs Discarded TLVs Unrecognized Age Outs J 1 1 a 0 o o 0 0 2 o 0 0 a p D o 3 a a o o o 0 0 4 4 0 0 o D 0 0 5 9 0 0 9 0 9 0 5 a 0 0 a o o o 7 6 o 0 0 0 0 3 o 0 0 0 0 0 0 j s o J 0 0 0 a d 10 a a o 0 0 0 a 0 0 r o 0 o 2 0 a 0 o o 0 a 8 0 0 a o 0 o 1 u 0 0 0 9 Qo 9 0 5 0 0 0 0 0 6 6 0 d 0 0 o 0 0 0 0 14 9 o 0 0 Li o t 3 a a a a o a o 2 0 o o a o p o 3e a a a a a a Fig 67 LLDP Port Statistics Shows the time when the last entry was last deleted or added It also shows the time elapsed since the last change was detected Shows the number of new entries added since switch reboot Shows the number of new entries deleted since switch reboot 154 Total Neighbours Entries Dropped Total Neighbours Entries Aged Out Local Port Tx Frames Rx Frames Rx Errors Frames Discarded TLV s Discarded TLV s Unrecognised Org Discarded Age Outs Auto Refresh Refresh AMS User Manual Shows the number of new entries dropped since switch reboot Shows the
3. ALLOY f oer hake AuoLogout off aE Y System am 5 System Information MVR Configuration information Configuration MVR Mode Disabled d CPU Load VLAN ID 100 gt Time gt Account er Port Configuration sysiog gt SNMP Porn Mode Type immediate Leave Y Configuration 2 z o z o 7 gt Port gt gt gt ACL 1 Ovsetied z Recerer Z Orsabled i gt Aggregation 2 Desetied Recewer v Disabled l Spanning tree F Disatied Recene Orsatted lt gt IGMP Snooping MLD Snooping 4 Oveatied z Recenvr lz Orsubled is 1 MVR amp Dvatied o Recerer e Ovsubled j Contguration Drato merr l Groups information Statistics 7 Oesatted e Disabled is gt LLOP 8 Ursatied e Ro 7 i Filtering Data Base Oxsatied le z gt VLAN r gt Voice VLAN 10 Desatied a Recom GARP 11 Orsatied gt gt GVRP gt Qos gt Thermal Protection gt sFlow Agent i2 Desatied T3 Desatied Recon JAE 1A l Cisaried Receiver Disabled Parameter Description MVR Mode VLAN ID Port Mode Type Immediate Leave Reset Button Apply Button Fig 59 MVR Configuration Used to enable or disable MVR globally on the switch Specify the VLAN ID used for Multicasting Physical port of the switch Enable MVR on a per port basis Specify the port type this can be either Receiver or
4. Fig 54 MLD VLAN Configuration Parameter Description VLAN ID The VLAN ID of each VLAN group 120 Snooping Enabled MLD Querier Compatibility RV QI QRI LLQI LMQI for MLD URI Reset Button Apply Button Refresh lt lt gt gt AMS User Manual Enable MLD Snooping for each individual VLAN group A maximum of 32 VLAN s can be enabled at any one time A router is used to send MLD query messages to MLD enabled hosts The MLD router can also be called the MLD Querier This option is used to enable the MLD Querier function on an individual VLAN Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of MLD operating on hosts and routers within a network The allowed selection is MLD Auto Forced MLDv1 and Forced MLDv2 Default compatibility value is MLD Auto Robustness Variable The Robustness Variable allows tuning for the expected packet loss on a network The allowed range is 1 to 255 Default robustness variable value is 2 Query Interval The Query Interval is the interval between General Queries sent by the Querier The allowed range is 1 to 31744 seconds Default query interval is 125 seconds Query Response Interval The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries The allowed range is 0 to 31744 in tenths of seconds Default query response interval is 100 in tenths of seconds
5. ete aa AMS JATESFP e C f D 19216811 ALLOY AMS 24T6SFP Auto Logout oFF gt EE SED gt system r Configuration Save as Backup Configuration gt Security Y Maintenance n Restart Device Are you sure to save the current setting as gt Firmware Backup Configuration Save Restore Factory Defaults Saw gt Diagnostics U a Fig 147 Save User Configuration Parameter Description Save Save Start Up Configuration 312 AMS User Manual 1 4 3 4 Restore User This section describes how to restore user s information back to the switch Any current configuration files will be restored via XML format Web Interface To Restore the User Configuration in the switch via the Web Interface 1 Click Maintenance Save Restore and Restore User 2 Press Save z Sas ANAS 24 TOSFP cr 192 168 1 1 ALLOY AMS 24T6SFP Auto Logout orr gt EE AGE wee _ Restore Backup Configuration gt Security s Y Maintenance Restart Device Are you sure to restore the Backup Configuration aai Se v Save Restore Factory Defauas Save Start fl Save User iW Save Restore User gt Exportiimport gt Diagnostics t 4 Fig 148 Restore User Configuration Parameter Description Save Save Start Up Configuration 313 AMS User Manual 1 4 4 Export Import This section describes how to export and import the Switch configuration Any
6. Set the mail Return Path as sender mail address 239 AMS User Manual Email Address 1 6 Enter up to 6 email address to receive the trap events Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 240 AMS User Manual 1 2 22 UPnP The AMS Series switches support UPnP UPnP is an acronym for Universal Plug and Play The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home data sharing communications and entertainment and in corporate environments for simplified installation of computer components Web Interface To configure the UPnP settings via the Web Interface 1 Click Configuration and UPnP 2 Select to enable or disable UPnP 3 Configure the required parameters 4 Click the Apply button to save your changes or the Reset button to revert to previous setti ngs s 7 AMS 28 TASFP x e Cft 192 168 1 1 ALLOY CHARA AA o eis a AMS 24T6SFP Auto Logout orr gt E Mg gt IP UPnP Configuration Sysiog g b SNMP Mode Disabod ix Configuration gt Port TL 4 gt ACL Advertising Duration 100 gt Aggregation gt Spanning Tree Apply Reset gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base i VLAN n gt Voice VLAN i gt GARP ri gt GVRP gt Qos gt sFlow Agent gt Loop Protection
7. 192 AMS User Manual DSCP Based Click to Enable DSCP Based QoS Ingress Port Classification Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 1 2 14 2 Port Policing This section provides an overview of QoS Ingress Port Policers for all switch ports The Port Policing is useful in constraining traffic flows and marking frames above specific rates Policing is primarily useful for data flows and voice or video flows because voice and video usually maintains a steady rate of traffic Web Interface To configure the QoS Port Policing settings via the Web Interface 1 Click Configuration QoS and Port Policing 2 Enable the ports that to wish to enable policing on 3 Enter the required rates and the units in kbps Mbps fps or kfps 4 Tick the check box to enable flow control on required ports 5 Click the Apply button to save your changes or the Reset button to revert to previous settings r gt ine a no AOAS 24 TOSFP ta es gt gt s _ be CG fe 19216811 AMS 24T6SFP Aulo Logout lorr gt EEE ME gt Time QoS Ingress Port Policers gt Account Lala Port Mode Rate Unit Flow Control gt Syslog la gt SNMP f Configuration J soo keps Port 2 00 kbps x gt ACL 3 0 kbps ie Aggregation n Spanning Tree 4 00 kbps f gt IGMP Snooping E 5 00 kops gt
8. A Bory Adenia State Port State i Last Source Last 107 QoS Class Port VLANIO j gt Ree Saner 1 Force Authorized Globally Disebled gt ARP Inspection 2 Force Authorized Globally Disabled i DHCP Snooping 3 Force Authonzed Giobally Disabled gt DHCP Relay 4 Force fuithonzed Globally Disabled Y NAS E Force Authorized Globally Disabled Configuration amp Force Authonzed Globally Disabled Switch Status A erento Port Status 9 Force Authonzed Globally Disabled gt AAA 1D Force Authonzed Globally Disabled iaae i naaa Sam Soma yr Management Foii ed ae 14 Force Authorized Globally Disabled HTTPS 15 Force Authonzed Globally Disabled Auth Method 16 Force Authorized Globally Disabled amp Maintenance 12 Force Authorized Globally Disabled s 48 Force Authorized Globally Disabled 19 Force Authorized Globally Disabled 22 Force Authorized Globally Disabled 21 Force Authorized Globally Disabled 22 Force Authorized Globally Disabled 23 Force Authonzed Globally Disabled 24 Foma Authonzed Giobally Disabled 2 Force Authonzed Globally Disabled 26 Force Authorized Globally Disabled L Fig 129 Network Access Server Status Parameter Description Port Physical port of the switch Click on the port number to view details for statistics Admin State The port s current administrative state Refer to NAS Admin State for a description of possible values Port State The current state of the port Refer to NAS Port State for
9. AMS User Manual AMS Series Model 10T2SFP 24T6SFP 48T4SFP 24T4S4SFP 48T4S4SFP 4T24S4SFP Interface Total Ports comprising 10x GbE 26x GbE 48x GbE 28x GbE 52x GbE 28x GbE UTP 10 100 1000Mbps 8 20 44 20 44 4 UTP 100M 1G SFP 2 4 4 4 4 4 SFP 100M 1G 2 20 SFP 1G 10G 4 4 4 General Jumbo Frames 9Kb on Gigabit Interfaces MAC Table 8K 32K 32K 32K 32K 32K Performance Switching Capacity 14 88 38 69 71 42 95 23 130 94 95 23 mpps mpps mpps mpps mpps mpps Forwarding Rate 20Gbps 52Gbps 96Gbps 128Gbps 136Gbps 128Gbps Layer 2 Switching Spanning Tree Spanning Tree Protocols supported STP RSTP MSTP LACP Trunking 5 12 24 14 groups 24 groups 14 groups groups groups groups 8 ports per 12 ports 12 ports 10 ports 8 ports 12 ports group per group per group per per per group group group VLAN 4K VLAN s Port based VLAN s 802 10 MAC Based VLAN s Management VLAN Private VLAN Voice VLAN Voice traffic is automatically assigned to a voice specific VLAN and treated with appropriate levels of QoS GVRP Supported DHCP Relay Relay of DHCP traffic to DHCP server in different VLAN 320 AMS User Manual Works with DHCP Option 82 IGMP Snooping V1 V2 and v3 Supports 1024 Multicast Groups IGMP Querier Supp
10. AMS User Manual 1 2 14 12 Storm Control Use the Storm Control Configuration page to set limits on broadcast multicast and unknown unicast traffic to control traffic storms which may occur when a network device is malfunctioning the network is not properly configured or application programs are not well designed or properly configured Traffic storms caused by any of these problems can severely degrade performance or bring your network to a complete halt You can protect your network from traffic storms by setting a threshold for broadcast multicast or unknown unicast traffic Any packets exceeding the specified threshold will then be dropped Note that the limit specified on this page applies to each port Web Interface To configure the Storm Control settings via the Web Interface 1 Click Configuration QoS and Storm Control 2 Enable storm control for unknown unicast broadcast or multicast traffic by marking the Status box next to the required frame type 3 Select the control rate for the selected traffic type 4 Click the Apply button to save your changes or the Reset button to revert to previous settings Se AMS 24T6SFP x gt a C A D 19226811 amp ALLOY AMS 24T6SFP Auvto Logout orr ERENT MZ gt Aggregation Spanning Tree Storm Control Configuration gt IGMP Snooping i gt MLD Snooping Frame Type Enable Rate pps i gt MVR Unicast 1 ls gt LLDP Multicast 1 zi gt Fi
11. C ALLOY AMS 24T68FP d 3 192 168 1 1 System Information Information Contiqueation CPU Load gt Time Account iP gt Syslog gt SNMP Y Configuration Port gt ACL Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping P MVR Y LLOP LLOP Configuration LLOP Neigndours LLOP MED Contiguratian LLOP MEO Neighbours EEE Port Statisties gt Filtering Data Base gt VLAN Voice VLAN gt GARP gt GVRP Parameter Description Tx Interval Tx Hold Tx Delay Tx Reint Auto Logout orr gt E AI LLDP Configuration LLDP Parameters Tx Interval 30 seconds Tx Hold 4 times TxDelay seconds TxRelnit 2 saconds Optional TLVs Port Mode CDP aware PortDescr SysName SysDescr SysCapa Mgmt Addr Pico i 1 Disabled x z a 7 z 2 Disabled J J 7 J 7 3 Disabled e g 7 ly 4 Disabled x 7 7 7 7 J 6 Disabled 4 X v J 6 Disabled m Fal 7 7 v 7 7 Disabled e g 7 z 3 B Disabled gt 7 y 7 7 7 F Disabled 7 7 7 J 0 Disabled 7 7 7 7 7 11 Disabled 4 7 g 7 7 12 Disabled gt 7 7 z 7 7 13 Disabled x 7 y 7 7 7 ae Fig 62 LLDP Configuration The switch will periodically transmit LLDP frames to its neighbours to ensure the discovery information is kept up to date The interval between each LLDP frame is determined by the Tx Interval value Valid values are restricted to 5 32768 secon
12. Maximum Frame Size Displays the switches maximum supported frame size 1 1 1 2 Configuration The Contact Information name and the location of switch and can all be configured here Web Interface To configure the contact information via the web interface 1 Click System System Information and Configuration 2 Enter the required Contact Device Name and Location details in the fields provided 3 Click Save to apply your changes poea ALLOY AMS 24T6SFP N emea Fig 3 System Information Configuration Parameter Description System Contact The system network administrator details will be entered here as well as a contact phone number The allowed string length is 0 to 255 characters System Name An administratively assigned name for the switch By convention this is the switches fully qualified domain name A domain name is a text string drawn from the alphabet A Za z digits 0 9 minus sign No space characters are permitted as part of a name The first character must be an alpha character And the first or last character must not be a minus sign The allowed string length is 0 to 255 16 AMS User Manual System Location The physical location of the switch e g telephone closet 3rd floor The allowed string length is 0 to 255 and the allowed content is the ASCII characters from 32 to 126 1 1 1 3 CPU Load This page displays the CPU load using an SVG graph The load is measured as averaged over the last 10
13. This section is used to view the port specific values relating to the VLAN information Web Interface To view the current Port Information via the Web Interface 1 Click Configuration VLAN and Port Status 2 If you want to view specific Port information based on a particular protocol used select the protocol from the drop down box near the top of the page Only Port Information relating to that protocol will be displayed 3 If you want to auto refresh the information you will need to check the Auto Refresh tick box 4 Click Refresh to manually refresh the information e C fo 519216813 a eal AMS 2478SFP Ato Logout orr STEN XIN ULQONAUIARER gt Port VLAN Port Status for Static user Static Autovetresh Refresh ACL r Aggregation Port PVID Port Type ingress Filtering Frame Type Tx Tag UVID Conflicts NAS gt Spanning Tree 1 1 T Umam Disabled a Untag this i te Sune gt IGMP Snooping 1 pee Disabled AD Horan 1 No Veica VLAN gt MLD Snooping 4 1 UnAware Disabled Al Untag this 1 No usTP i gt MVR 5 1 UnAware Disabied Al Untag Wis 1 No vou gt LLOP 5 1 UnAware Orsabied AN Untag thes 1 No Lomboed f To Unaware Disadied AD Untag his 1 No 1 rei reat 3 1 UnAware Dreads AI Untag Wis No 3 1 Unama Disatied All Untsa this 1 No VLAN Memiberstip 10 1 Un ware Disabled AN Untag tis 1 No 1 Pons 1 UnAware Disabled AN Untag this 1 No Swan Status 12 1 Uhan Disabled AN Untag thes 1 No Port Status oF 1 Unaware Ors
14. ALLOY AMS Series Gigabit Managed Switches AMS 10T2SFP AMS 26T6SFP AMS 48T4SFP AMS 24T4S4SP AMS 48T4S4SP AMS 4T24S4SP User Manual Version 1 0 1 Oct 2012 AMS User Manual About thisGuide_ sss i W eG Compliances and Safety Statements 7 Introduction 11 Overview 11 1 Operation of the Web based Management 12 1 1 System 14 1 1 1 System Information 14 1 1 1 1 Information 14 1 1 1 2 Configuration 16 1 1 1 3 CPU Load 17 1 1 2 Time 18 1 1 2 1 Manual 18 1 1 2 2 NTP 20 1 1 3 Account 21 1 1 3 1 Users 21 1 1 3 2 Privilege Level 23 1 1 4 IP 24 1 1 4 1 IPv4 24 1 1 4 2 IPv6 26 1 1 5 Syslog 28 1 1 5 1 Configuration 28 1 1 5 2 Log 29 1 1 5 3 Detailed Log 30 1 1 6 SNMP 31 1 1 6 1 System 31 1 1 6 2 Configuration 32 1 1 6 3 Communities 33 1 1 6 4 Users 35 1 1 6 5 Groups 38 1 1 6 6 Views 40 1 1 6 7 Access 42 1 1 6 8 Trap 44 1 2 Configuration 47 1 2 1 Port 47 1 2 1 1 Configuration 47 1 2 1 2 Port Description 50 1 2 1 3 Traffic Overview 51 AMS User Manual 1 2 1 4 Detailed Statistics 53 1 2 1 5 QoS Statistics 55 1 2 1 6 SFP Information 56 1 2 1 7 EEE 58 1 2 2 ACL 60 1 2 2 1 Ports 60 1 2 2 2 Rate Limiters 63 1 2 2 3 Access Control List 65 1 2 2 4 ACL Status 75 1 2 3 Aggregation 77 1 2 3 1 Static Trunk 77 1 2 3 2 LACP 80
15. Access Challenges Malformed Access Responses Bad Authenticato rs Unknown Types Packets Dropped Access Requests Access Retransmissi ons Pending Requests AMS User Manual server The number of RADIUS Access Reject radiusAuthClientExtAccessR i i packets valid or invalid received from the ejects server a The number of RADIUS Access Challenge radiusAuthClientExtAccessC 3 i p packets valid or invalid received from the hallenges server The number of malformed RADIUS Access Response packets received from the i server Malformed packets include packets radiusAuthClientExtMalfor with an invalid length Bad authenticators medAccessResponses or Message Authenticator attributes or unknown types are not included as malformed access responses The number of RADIUS Access Response radiusAuthClientExtBadAut packets containing invalid authenticators henticators or Message Authenticator attributes received from the server The number of RADIUS packets that were radiusAuthClientExtUnkno received with unknown types from the wnTypes server on the authentication port and dropped The number of RADIUS packets that were radiusAuthClientExtPackets received from the server on the Dropped authentication port and dropped for some other reason The number of RADIUS Access Request radiusAuthClientExtAccessR packets sent to the server This does not equests include retransmission
16. Used to save the settings configured on this page 226 AMS User Manual 1 2 16 2 Status This section displays the Loop Protection status of individual ports Web Interface To view the Loop Protection status via the Web Interface 1 Click Configuration Loop Protection and Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information a p AMAS 24 TOSFP xy e C A D 19216811 BREREE SREREE k h h a b TTT 5a pasa bias AMS 24T6SFP Auto Logout 10 min gt REIT MI iP gt aa Loop Protection Status Autorefesh El Rakaan SNMP Port Action Transmit Loops Status Loop Time of LastLoop Configuration 1 Shutdown Enabled 0 Dom gt f Por 2 Shutdown Enabled 0 Down M gt ACL 3 Shutdown Enabied 0 Down Aggregation 4 Shutdown Enabled 0 Down Spanning Tree 5 Shutdown Enabled 0 Down li gt IGMP Snooping G Shutdown Enabled 0 Down gt MLD Snooping 7 Shutdown Enabled 0 Up i gt MVR B Shutdown Enabled 0 Down gt 9 Shutdown Enabled 0 Down LLDP Filtering Data Base 1 Shaan Enabled D Doin gt VLAN 11 Shutdown Enabled 0 Down i ae vuan ff en 14 Shutdown Enabled 0 Bown 15 Shutdown Enabled 0 Down Pag 16 Shutdown Enabled O Down gt Shia AGIN 17 Shutdown Enabled 0 Down TV Loop Protection 18 Shutdown Enabled 0 Down Configuration 19 Shutdown Enabled 0 Down sae 20 Shutdown Enabl
17. 4 Guest Voice Signalling conditional for use in network topologies that require a different policy for the guest voice signalling than for the guest voice media This application type should not be advertised if all the same network policies apply as those advertised in the Guest Voice application policy 5 Softphone Voice for use by softphone applications on typical data centric devices such as PCs or laptops This class of endpoints frequently does not support multiple VLANs if at all and are typically configured to use an untagged VLAN or a single tagged data specific VLAN When a network policy is defined for use with an untagged VLAN see Tagged flag below then the L2 priority field is ignored and only the DSCP value has relevance 6 Video Conferencing for use by dedicated Video Conferencing equipment and other similar appliances supporting real time interactive video audio services 7 Streaming Video for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment Video applications relying on TCP with buffering would not be an intended use of this application type 145 Tag VLAN ID L2 Priority DSCP Add New Policy Port Policy ID Reset Button Apply Button AMS User Manual 8 Video Signalling conditional for use in network topologies that require a separate po
18. AMS User Manual 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information AMS 24T6SFP A 219216811 Ay AMS 24T6SFP T Y System Information information Configuration CPU Load gt Time gt Account rir Syslog gt SNMP Y Configuration gt Port gt ACL Y Aggregation Static Trunk vLace Conguraton System Status Port Status Port stansves Spanning Tree gt IGMP Snooping MLD Snooping gt MVR gt LLDP gt Filtering Data Base Parameter Description Port LACP Received LACP Transmitted Discarded Auto Refresh Physical port of the switch LACP Statistics LACP Discarded Received Transmitted Unknown Illegal FERETTI Fig 36 LACP Port Statistics esceeseceseoesoeeseesoeeseessoes escescesoesoeseoesoeesoesoes ecsceoscesese sees sesSseosescses eescesocesccescesc cesses sceoeces Auto Logout OFF EEE MEIGS Auto refresh Refresh Clear Shows how many LACP frames have been received on each port Shows how many LACP frames have been transmitted from each port Shows how many unknown or illegal frames have been discarded from each port Tick the box to enable the information to be automatically refreshed 85 AMS User Manual Refresh Used to manually refresh the information on the page 86 AMS User Manual 1
19. ARP Inspection DHCP Snooping Configuration Port Mode Configuration j Statistics gt DHCP Relay Pon Mode a gt NAS RE R gt AAA 1 Untrusted Por Security 2 untrusted gt Access Management SSH 2 Untnsted e HTTPS 4 Untrusted Auth Method z gt Maintenance 6 7 f j 12 Untrusted j 13 Untrustea f Fig 124 DHCP Snooping Configuration Parameter Description Snooping Mode Indicates the DHCP snooping mode operation Possible modes are Enabled Enable DHCP snooping mode operation When DHCP snooping mode operation is enabled the DHCP request messages will be forwarded 255 Port Mode Reset Button Apply Button AMS User Manual to trusted ports and only allow reply packets from trusted ports Disabled Disable DHCP snooping mode operation Physical port of the switch Indicates the DHCP snooping port mode Possible port modes are Trusted Configures the port as trusted source of the DHCP messages Untrusted Configures the port as untrusted source of the DHCP messages Used to reset unsaved changes to original configuration Used to save the settings configured on this page 256 1 3 3 2 Statistics This section is used to view the DHCP Snooping Statistics for the AMS switch Web Interface To view the DHCP Snooping Statistics of the switch via the Web Interface 1 Click Security DHCP Snooping and Statistics AMS User Manual 2 If y
20. MLO Snooping gt MVR 6 00 kaps gt LLOP 7 00 Kops gt Filtering Data Base 8 500 Ops Tel 3 P VLAN gt Voice VLAN 9 00 kbps i GARP 10 500 kbps GVRP ren i QoS 1 600 kbps gt Port Classification 12 sool kbps Port Polcing 3 sooi T kops Port Scheduler Port Shaping 4 500 bps jel Remarking 15 S00 i kops Port DSCP DSCP Based QoS y SOREL ere ia DSCP Translation 17 500 kbps l U 4 Fig 87 QoS Port Policing 193 AMS User Manual Parameter Description Port Physical port of the switch Mode Check the box next to the corresponding port to enable Ingress port policing Rate Set the Rate that you want to limit the ingress bandwidth to Default vale is 500 Unit Select the required speed type in units of kbps Mbps fps or kfps Flow Control Check the box to enable Flow Control on the selected port Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 1 2 14 3 Port Scheduler This section provides an overview of QoS Egress Port Schedulers for all switch ports Web Interface To configure the QoS Port Scheduler settings via the Web Interface 1 Click Configuration QoS and Port Scheduler Click on the required port to configure the scheduling options You will now be prompted with another screen here you can select to use Strict Priority or Weighted Configure your Egress
21. Multicast Listener Discovery MLD snooping constrains the flooding of IPv6 multicast traffic on VLANs on a switch When MLD snooping is enabled on a VLAN the AMS Series Switches examine MLD messages between hosts and multicast routers and learn which hosts are interested in receiving traffic for a multicast group Based on what it learns the switch then forwards multicast traffic only to those interfaces in the VLAN that are connected to interested receivers instead of flooding the traffic to all interfaces By default a switch floods Layer 2 multicast traffic on all interfaces on a switch except for the interface that is the source of the multicast traffic This behaviour can consume significant amounts of bandwidth You can enable MLD snooping to avoid this flooding When you enable MLD snooping the switch monitors MLD messages between receivers and multicast routers and uses the content of the messages to build an IPv6 multicast forwarding table a database of IPv6 multicast groups and the interfaces that are connected to members of the groups When the switch receives multicast traffic for a multicast group it uses the forwarding table to forward the traffic only to interfaces that are connected to receivers that belong to the multicast group The AMS Series switches support MLD v1 and v2 1 2 6 1 Basic Configuration This section is used to enable and configure MLD Snooping on the AMS Series switches Web Interface To configure the M
22. Username sd name Password S Remember my credentials Fig 1 The login page 13 AMS User Manual 1 1 System This chapter describes the basic configuration tasks required to configure the system information on the AMS Series switches The System Information page is the default page and will be the first page you see when you log into the switches web interface 1 1 1 System Information The System Information page shows you the following Model Name System Description Location Contact Device Name System Date System Uptime BIOS Version Firmware Version Hardware Mechanical Version Series Number Host IP Address Subnet Mask Gateway IP Address Host MAC Address Console Baudrate RAM Size Flash Size Bridge FDB Size Transmit Queue and Maximum Frame Size All relevant fields will be explained in more detail in the chapter 1 1 1 1 Information The switches system information is provided here Web Interface To view the System Information via the Web Interface 1 Click System System Information and Information The current configuration will be displayed this is read only and nothing can be configured here YF ec TI Peak c o mais ALLOY AMS 24T6SFP Fig 2 System Information 14 Parameter Description Model Name System Description Location Contact Device Name System Date System Uptime BIOS Version Firmware Version Hardware Mechanical Series Number Host IP Addr
23. gt Qos gt Thermal Protection u 4 Fig 29 Access Control List Rules f O 19216811 ALLOY AMS 24T6SFP Ne 5 el Y System Information ACE Configuration Information Configuration ee CPU Load Disabled gt Time EE gt Account Poi Poti S gt IP Pot 2 gt Syslog fron gt SNMP Poti Configuration Disabled gt Port I sabled vACL T led ports Dsstied Rate Limiters i Access Control List ACL Status Aggregation VLAN Parameters gt Spanning Tree es gt IGMP Snooping 8021Q Tagged Any z gt MLD Snooping VLAN ID Filter Any x gt MVR Priority An gt LLDP Tag anie KE y tpt Data Base Sal a gt Voice VLAN gt GARP gt GVRP gt Qos F thermal Provection Fig 30 Adding a new Access Control List Rule 66 Parameter Description Ingress Port Policy Bitmask Frame Type Action Rate Limiter Port Copy Mirror Logging Shutdown Counter AMS User Manual Indicates the ingress port of the ACE Possible values are Any The ACE will match any ingress port Policy The ACE will match ingress ports with a specific policy Policy must be created in the Ports Section before it will appear in the list Port The ACE will match a specific ingress port Indicates the Policy or Bitmask that the filter will matc
24. here you can select to use Strict Priority or Weighted 4 Configure your Egress bandwidth parameters based on Queue Settings or force the port to a desired speed If using Weighted a total percentage of a queue can also be set 5 Click the Apply button to save your changes or the Reset button to revert to previous settings pr j Se J D Atas 24 Teste x N C fe D 19216811 ir S AMS 24T6SFP Auvlo Logout orr gt REE A gt MVR LLOP gt Filtering Data Base gt VLAN Port Shapers Voice VLAN a a a2 4 8 a7 Por gt GARP 1 disabled disabled disabled disabled disabled disabled disabled disabled disabled 2 disabled disabled disabled disabled disabled disabled disabled disabled disabled l Keyor d disabled disabled disabled disabled disabled disabled disabled disabled disabled Taos 4 disabled disabled disabled disabled disabled disabled disabled disabled disabled Port Classification 5 disabled disabled disabled disabled disabled disabled disabled disabled disabled Port Policing E disabled disabled disabled desabled disabled disabled disabled desabled disablad ari Sneciien I disabled diabed disabled disabled disabled dwabled disabled desabled disabled poit afian disabled disablad disabled disabled disabled disabled disabled disabled disabled sep att Q disabled disabled disabled disabled disabled disabled disabled disabled disabled Port Tag Ramating 10 S0kbps 500kbps disabled disabled disabled disabled
25. i Port gt ACL i Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLDP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP gt Qos Y sFlow Agent Collector Sampler gt Loop Protection gt Single IP Easy Port Mirroring Trap Event Severity SMTP Configuration UPnP gt Security 2 Maintenance Parameter Description s Flow Ports s Flow Instance Sampler Type Sampling Rate Max Har Size Polling Interval Reset Button Apply Button Auto Refresh Refresh e Cff 192 168 1 1 Auto Logout orr gt ME SEI sFlow Sampler Configuration sFlow Port 1 sFlow Instance 1 Sampler Type None Sampling Rate Max Hdr Size 178 Polling Interval 0 Apay Reset Cancel Fig 108 s Flow Agent Sampler Port Settings Displays the ports that s Flow is configured Configured sFlow instance for the port number Sampler types available are None RX TX and All Default is None Configured sampling rates of the port Configured size of the header of the sampled frame Configured polling interval for the counter sampling Used to reset unsaved changes to original configuration Used to save the settings configured on this page Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 224 AMS User Manual 1 2 16 Loop Protection The AMS Series switches support a
26. 000 and others such as defined by TIA or Policies Delete NENA Network Policy Discovery enables the efficient discovery and diagnosis of mismatch issues with the VLAN configuration along with the associated Layer 2 and Layer 3 attributes which apply for a set of specific protocol applications on that port Improper network policy configurations are a very significant issue in VoIP environments that frequently result in voice quality degradation or loss of service Policies are only intended for use with applications that have specific real time network policy requirements such as interactive voice and or video services The network policy attributes advertised are 1 Layer 2 VLAN ID IEEE 802 1Q 2003 2 Layer 2 priority value IEEE 802 1D 2004 3 Layer 3 Diffserv code point DSCP value IETF RFC 2474 this network policy is potentially advertised and associated with multiple sets of application types supported on a given port The application types specifically addressed are 1 Voice 2 Guest Voice 3 Softphone Voice 4 Video Conferencing 5 Streaming Video 6 Control Signalling conditionally support a separate network policy for the media types above A large network may support multiple VoIP policies across the entire organization and different policies per application type LLDP MED allows multiple policies to be advertised per port each corresponding to a different application type Different ports o
27. 1 2 3 2 1 Configuration 80 1 2 3 2 2 System Status 82 1 2 3 2 3 Port Status 83 1 2 3 2 4 Port Statistics 85 1 2 4 Spanning Tree 87 1 2 4 1 Bridge Settings 89 1 2 4 2 MSTI Mapping 91 1 2 4 4 CIST Ports 94 1 2 4 5 MSTI Ports 96 1 2 4 6 Bridge Status 98 1 2 4 7 Port Status 100 1 2 4 8 Port Statistics 102 1 2 5 IGMP Snooping 104 1 2 5 1 Basic Configuration 105 1 2 5 2 VLAN Configuration 107 1 2 5 3 Port Group Filtering 109 1 2 5 4 Status 111 1 2 5 5 Groups Information 113 1 2 5 6 IPv4 SSM Information 115 1 2 6 MLD Snooping 117 1 2 6 1 Basic Configuration 117 1 2 6 2 VLAN Configuration 120 1 2 6 3 Port Group Filtering 122 1 2 6 4 Status 124 1 2 6 5 Groups Information 126 1 2 6 6 IPv6 SSM Information 128 1 2 7 MVR 130 1 2 7 1 Configuration 130 1 2 7 2 Groups Information 132 1 2 7 3 Statistics 133 1 2 8 LLDP 135 AMS User Manual 1 2 8 1 LLDP Configuration 135 1 2 8 2 LLDP Neighbours 138 1 2 8 3 LLDP MED Configuration 140 1 2 8 4 LLDP MED Neighbours 147 1 2 8 5 EEE 152 1 2 8 6 Port Statistics 154 1 2 9 Filtering Data Base 156 1 2 9 1 Configuration 156 1 2 9 2 Dynamic MAC Table 158 1 2 10 VLAN 159 1 2 10 1 VLAN Membership 159 1 2 10 2 Ports 161 1 2 10 3 Switch Status 164 1 2 10 4 Port Status 166 1 2 10 5 Private VLAN 168 1 2 10 5 1 Private VLAN Membership 168 1 2 10 5 2 Port Isolation 170 1 2 10 6 MAC based VLAN 171 1 2 10 6
28. 10 seconds Last Member Query Interval The Last Member Query Time is the time value represented by the Last Member Query Interval multiplied by the Last Member Query Count The allowed range is 0 to 31744 in tenths of seconds Default last member query interval is 10 in tenths of seconds 1 second Unsolicited Report Interval The Unsolicited Report Interval is the time between repetitions of a host s initial report of membership in a group The allowed range is 0 to 31744 seconds Default unsolicited report interval is 1 second Used to reset unsaved changes to original configuration Used to save the settings configured on this page Used to manually refresh the information on the page The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 121 AMS User Manual 1 2 6 3 Port Group Filtering With this feature you can filter multicast joins on a per port basis by configuring IP multicast profiles and associating them with individual switch ports An IGMP profile can contain one or more multicast groups and when applied to a port to deny access to that port on the configured multicast address If an IGMP profile denying access to a multicast group is applied to a switch port the IGMP join report requesting the stream of IP multicast traffic is dropped and the port is not allowed to receive IP multicast traffic from that group MLD filtering controls only MLD membership join
29. 2 4 Spanning Tree The Spanning Tree Protocol STP can be used to detect and disable network loops and to provide backup links between switches bridges or routers This allows the switch to interact with other bridging devices that is an STP compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup links which automatically take over when a primary link goes down STP uses a distributed algorithm to select a bridging device STP compliant switch bridge or router that serves as the root of the spanning tree network It selects a root port on each bridging device except for the root device which incurs the lowest path cost when forwarding a packet from that device to the root device Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device All ports connected to designated bridging devices are assigned as designated ports After determining the lowest cost spanning tree it enables all root ports and designated ports and disables all other ports Network packets are therefore only forwarded between root ports and designated ports eliminating any possible network loops Designated Root NA X Designated Ron ay 7N Designated Port or X Bridge OOOO X Bi E Once a stable network topology has been established all bridges listen for Hello
30. Agent Collector Settings The Receiver ID input field allows the user to input the receiver ID Currently one ID is supported as one collector is supported Here you can select to whether the Collector has an IPv4 or IPv6 Address Enter the IP Address of the s Flow Agent Collector The switch will send all s Flow information to the collector Enter the port that the collector uses to listen to s Flow requests Port Range is 1 655365 Default is 6343 This is the duration during which the collector receives samples once the duration has expired the sampler stops sending the samples Valid values are within the range of 0 2147483647 Default is O The maximum UDP datagram size to send out sFlow samples to the receiver The value accepted is within the range of 200 1500 bytes Default is 1400 bytes 222 AMS User Manual Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 1 2 15 2 Sampler This section is used to configure the s Flow sampling rate that is sent to the receiver An average of 1 out of N packets operations is randomly sampled This type of sampling does not provide a 100 accurate result but it does provide a result with quantifiable accuracy Web Interface To configure the s Flow Agent Sampling settings via the Web Interface 1 Click Configuration s Flow Agent and Sampler 2 Click the button to edit the s Flow sam
31. Any specific value of 0 63 BE CS1 CS7 EF or AF11 AF43 or Range Default Any IPv6 IPv6 frame type includes the same settings as those used for IPv4 except for the Source IP When configuring a specific IPv6source address enter the least significant 32 bits a b c d using the same type of mask as that used for an IPv4 address Sport Source TCP UDP port Any Specific Range 0 65535 Dport Destination TCP UDP port Any Specific Range 0 65535 Class Classified QoS Class If a frame matches the QCE it will be put in the queue corresponding to DPL DSCP Reset Button Apply Button the specified QoS class or placed in a queue based on basic classification rules Options 0 7 Default use basic classification Default setting 0 The drop precedence level will be set to the specified value or left unchanged Options 0 1 Default Default setting Default The DSCP value will be set to the specified value or left unchanged Options 0 63 BE CS1 CS7 Default not changed Default setting Default Used to reset unsaved changes to original configuration Used to save the settings configured on this page 216 AMS User Manual 1 2 14 11 QCL Status Displays the current QCL QoS Control List entries configured on the switch Web Interface To view the QCL via the Web Interface 1 Click Configuration QoS and QCL Status 2 If you want to auto refresh the information you will need to check t
32. Connguration VLAN Configuration Port Group Filtering Status Groups Information IPv4 SSM information gt MLD Snooping MVR gt LLDP Filtering Data Base gt VLAN gt Voice VLAN gt GARP GVRP Qos gt Thermal Protection gt sFlow Agent gt Loop Protection Single IP Easy Port Mirroring Trap Event Severity SMTP Configuration UPnP aml a neaimeansana Auto Logout orr AEN Maa IGMP SFM Information Auto retresh Reesh ise o gt Stan from VLAN 1 and Group 224 0 0 0 with 20 entries per page VLAN ID No mort eni or wnt Group Port Mode Source Address Type nes Parameter Description VLAN ID Group Port Mode Source Address Type Auto Refresh Refresh lt lt gt gt Fig 52 IPv4 SSM information The VLAN ID of the entry Multicast Group Address Physical port number of the switch Indicates the filtering mode maintained per VLAN ID port number Group Address basis It can be either Include or Exclude Source IP Address of the group current limit on the system for filtering is 128 IP addresses Indicates the type either Allow or Deny Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 116 AMS User Manual 1 2 6 MLD Snooping
33. Description Source MAC Address Destination MAC Address IP Address TCP UDP Port Number Group ID Spanning Tree gt IGMP Snooping gt MLD Snooping AMS User Manual ili lt Cf 192 168 1 1 amp ALLOY f Aulo Logout oF EE E ZN System Information Aggregation Mode Configuration a Hash Code Contributors i Configuration Sowre MAC Address 7 i SEPLAN Destination MAC Address gt Time IP Address 7 j Pom TCPIUDP Pot Number 17 iP gt Syslog Aggregation Group Configuration gt SNMP Configuration Port Manbars GroupID 1 2 3 4 5 6 7 8 10 19 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 f 1 gt Filtering Data Base 10 gt Thermal Protection Fig 32 Configuring a static trunk group The Source MAC address can be used to calculate the destination port for the frame Check to enable the use of the Source MAC address or uncheck to disable By default Source MAC Address is enabled The Destination MAC Address can be used to calculate the destination port for the frame Check to enable the use of the Destination MAC Address or uncheck to disable By default Destination MAC Address is disabled The IP address can be used to calculate the destination port for the frame Check to enable the use of the IP Address or uncheck to disable By default IP Address is enabled The TCP UDP port number can be used to calculate the destination port f
34. Displays the UVID Untagged VID A port UVID determines how the packet will be handled when leaving the switch Displays whether any VLAN based conflicts have occurred Conflicts can occur when Dynamic VLAN s are being used Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 167 AMS User Manual 1 2 10 5 Private VLAN A private VLAN allows the administrator to configure a VLAN which contains switch ports that are restricted such that they can only communicate with a given uplink port The restricted ports are called private ports Each private VLAN typically contains many private ports and a single uplink The uplink will typically be a port or link aggregation group connected to a router firewall server provider network or similar central resource The switch forwards all frames received on a private port out the uplink port regardless of VLAN ID or destination MAC address Frames received on an uplink port are forwarded in the normal way i e to the port hosting the destination MAC address or to all VLAN ports for unknown destinations or broadcast frames Traffic from individual ports are blocked from communicating with each other all ports can only communicate with the uplink port 1 2 10 5 1 Private VLAN Membership The Private VLAN membership configurations for the switch can be monitored and configured here Private VLAN s can be added or dele
35. Enable gt Stat i gt idan iP 7 a Shutdawn Port z Enable Easy Port 8 7 Shutdown Port Enable e i aacromng 9 __ Shuteown Pon Enable Trap Event Severity gt i SMTP Configuration 10 i Shutdown Port o Enable uPne Shutdown Port Enable j lt e Securine 12 7 Shutdown Port Enable gt Maintenance Z x 4 p J Fig 109 Loop Protection Configuration Parameter Description Enable Loop Protection Used to enable or disable Loop protection on the switch 225 Transmission Time Shutdown Time Port Enable Action Tx Mode Reset Button Apply Button AMS User Manual The interval between each loop protection PDU sent on each port Valid values are 1 to 10 seconds The period in seconds for which a port will be kept disabled in the event of a loop is detection and the port action is to shut down the port Valid values are 0 to 604800 seconds 7 days A value of zero will keep a port disabled until next device restart Physical port of the switch Used to enable or disable Loop Protection on each individual port Configures the action performed when a loop is detected on a port Valid values are Shutdown Port Shutdown Port and Log or Log Only Controls whether the port is actively generating loop protection PDU s or whether it is just passively looking for looped PDU s Used to reset unsaved changes to original configuration
36. Fig 20 Port Configuration Parameter Description Port Link Speed Current Speed Configured Flow Control Maximum Frame Size AMS User Manual The logical port number for the switch The current link state of the port is shown Green indicates link is active Red indicates the link is down Displays the current port link speed Here you can force the speed of a port Forcing the speed of a port is not recommended and should only be done if you are having linking issues when connecting to a particular device Speed options available are 10Gb FDX 10GbE Full Duplex AMS 24T4S4SFP and AMS 48T4S4SFP only 1Gb FDX 1GB Full Duplex 100Mbps FDX 100Mbps Full Duplex 100Mbps HDX 100Mbps Half Duplex 10Mbps FDX 10Mbps Full Duplex 10Mbps HDX 10Mbps Half Duplex Auto Auto Negotiation 10G X_AMS 10Gbps AMS 24T4S4SFP and 48T4S4SFP SFP ports only 100FX_AMS 100Mbps Paired UTP SFP Ports Only 1000 X_AMS 1000Mbps Paired UTP SFP Ports Only 100Mbps FDX 100Mbps Full Duplex SFP Ports Only 1Gbps FDX 1000Mbps Full Duplex SFP Ports Only SFP_Auto_AMSS Auto Negotiation Paired UTP SFP Ports Only When Auto Speed is selected on a port this section indicates the flow control capability that is advertised to the link partner When a fixed speed setting is selected that is what is used The Current Rx column indicates whether pause frames on the port are obeyed and the Current
37. Firmware Save Restore Y Exporvimport Export Config import Config gt Diagnostics Fig 150 Import Configuration File Parameter Description Choose File Press the Choose File Button to browse for the saved configuration file Upload Press upload to apply the configuration file to the switch 315 AMS User Manual 1 4 5 Diagnostics This section provides a set of basic system diagnosis It lets users know whether the system is healthy or needs to be fixed Users can also check network connectivity issues with the Ping command The basic system check includes ICMP Ping ICMPv6 and VeriPHY Cable Diagnostics 1 4 5 1 Ping This section is used to test network connectivity issues using the Ping command Web Interface To test network connectivity using the switch via the Web Interface 1 Click Maintenance Diagnostics and Ping 2 Enter the IP Address of the device you are trying to communicate with 3 Set the ping Data Length Ping Count and Ping Interval 4 Click the Start button to commence the test F lt a AMS 24 16S P cn 192 168 1 1 ALLOY AMS 24T6SFP Autotogow orr m I m System i gt Configuration 5 ICMP Ping E ee Restart Device Ping Length gt Firmware i i fount 5 Save Restore aida Export import Ping interval Diagnostics Ping Stat i Ping VenPHY Fig 151 Ping Command 316 AMS User Manual Parameter Description IP
38. ID The Rate Limiter ID from 1 through to 16 Rate Enter the required rate that you want to limit traffic flow to If you are using Kbps rates must be set in increments of 100 63 AMS User Manual Unit Select to limit traffic in units of either pps Packets Per Second or Kbps Kilo Bits Per Second Reset Button Used to reset unsaved changes to original configuration Apply Used to save the settings configured on this page 64 AMS User Manual 1 2 2 3 Access Control List The section describes how to configure Access Control List rules An Access Control List ACL is a sequential list of permit or deny conditions that apply to IP addresses MAC addresses or other more specific criteria This switch tests ingress packets against the conditions in an ACL one by one A packet will be accepted as soon as it matches a permit rule or dropped as soon as it matches a deny rule If no rules match the frame is accepted Other actions can also be invoked when a matching packet is found including rate limiting mirroring redirecting matching packets to another port or to the system log or shutting down a port This page shows the Access Control List ACL which is made up of the ACE s defined on this switch Each row describes the ACE that is defined The maximum number of ACE s is 256 on each switch Click on the lowest plus sign to add a new ACE to the list The reserved ACE s used for internal protocol cannot be edited or
39. IGMP Snooping Street Biackbum Leading street direction Trailing street suffix 3 pena Pidid Street suffix Road House no 4 585 House no suffix Landmark Additional location info Name Zip code Building Apartment Floor Room no Place type Postal community name P O Box Additions code Port Statistics Emergency Call Service gt Filtering Data Base gt VLAN Emergency Call Service 000 gt Voice VLAN gt GARP Policies s pad Delete PolicyID Application Type Tag VLANID L2Priorty DSCP gt Thermal Protection Solvus onio z gt Flow Anant Fig 64 LLDP MED Configuration Parameter Description Fast Start Repeat Count Rapid startup and Emergency Call Service Location Identification Discovery of endpoints is a critically important aspect of VoIP systems in general In addition it is best to advertise only those pieces of information which are specifically relevant to particular endpoint types for example only advertise the voice network policy to permitted voice capable devices both in order to conserve the limited LLDPU space and to reduce security and system integrity issues that can come with inappropriate knowledge of the network policy With this in mind LLDP MED defines an LLDP MED Fast Start interaction between the protocol and the application layers on top of the protocol in order to achieve these related properties Initially a Network Connectivity Device will only transmit LLDP TLVs in an LLDPDU Only after an LLDP MED En
40. IPv4 or IPv6 address or enter the FQDN of a valid NTP Server 20 AMS User Manual 1 1 3 Account The Accounts function is used by the administrator to create modify and delete users The administrator can modify any guest user s settings including the privilege level and the guest user password The guest user only has rights to modify their own password Only one administrator account can be configured and up to four Guest accounts can be created 1 1 3 1 Users This page provides an overview of the current users Currently the only way to login as another user on the web server is to close and reopen the browser Web Interface To configure the User settings via the Web Interface 1 Click System Account and Users 2 Click Add new User you will now be prompted with a new interface 3 Enter the required Username Password and Privilege level 4 Click Apply to save your settings Users Configuration UserName Privilege Level ama Aas non usos Fig 7 User Configuration Parameter Description Add New User Click the Add New User button to create a new user 21 AMS User Manual O peiiini 3 wm a Parameter Description User Name Password Password again Privilege Level Fig 8 Adding a New User The name identifying the user enter the username that you want to create Enter the required password The password length can be between 0 and 255 characters Re enter the password from t
41. If you need to modify the Privacy Protocol you will need to delete and re create the user The password used for both the DES Privacy Protocol The allowed password length is 8 to 32 characters 37 AMS User Manual 1 1 6 5 Groups This section is used to configure SNMPv3 groups Web Interface To configure SNMP Groups via the Web Interface 1 Click System SNMP and Groups 2 Click on Add New Group to configure a new Group Enter the required group details 3 Click Save to apply your changes or Tip sate foe rep ee 7 Prem dt E T cc Pe e nimes SNMPv3 Groups Configuration Delete Securty Model Security Name Group Name Asnu group Appi Fig 12 SNMPv3 Group Parameter Description Delete Select the tick box and click the apply button to delete a Group Add New Group Used to add a new group 38 AMS User Manual Delete Security Model Detote am id nen group Analy Trap Configuration eseu gt Mamtenance Parameter Description Delete Security Model Security Name Group Name E E TE O a SNMPv3 Groups Configuration Securny Name Group Name Fig 13 Add a new SNMPv3 Group Select the delete button next to the group you would like to delete Select the required security model that the group will belong to Options are v1 Reserved for SNMPv1 and will be available once a SNMPv1 community has been created in the communities section v2c Reserved for SNM
42. LLOP Firmware Upgrade info gt Filtering Data Base e n VLAN impot Expor info l gt voice VLAN Lace into e gt GARP raoa n b GVRP Link Status Waming izi QoS Login info lzi gt sFlow Agent Logout info m gt Loop Protection Single IP Loop Protect info Easy Port Mgmt IP Change Info r haicroning Module Change Notice Trap Event Severity i SMTP Configuration s info Lai f uPne Password Change info 7 f p Security Port Securty info gt Maintenance wees x L _ Fig 115 Trap Event Severity levels Parameter Description The name identifying the severity group supported lt 0 gt Emergency System is unusable lt 1 gt Alert Action must be taken immediately lt 2 gt Critical Critical conditions 237 Scroll to select a severity level for each group The following level types are Reset Button Apply Button AMS User Manual lt 3 gt Error Error conditions lt 4 gt Warning Warning conditions lt 5 gt Notice Normal but significant conditions lt 6 gt Information Information messages lt 7 gt Debug Debug level messages Used to reset unsaved changes to original configuration Used to save the settings configured on this page 238 AMS User Manual 1 2 21 SMTP Configuration The AMS Series switches support trap events that can alert the administrator if a particular event occurs This section is used to configure the mail server settings that wi
43. Loop protection mechanism Loop Protection can be used in environments that have devices that do not support the spanning tree protocol If the switch receives a packet containing its own MAC address the port will be locked 1 2 16 1 Configuration This section allows you to configure the Loop Protection settings for the switch Web Interface To configure the Loop Protection settings via the Web Interface 1 Click Configuration Loop Protection and Configuration Select the required Action to take when a loop is detected and select whether to enable or disable TX Mode Click the Apply button to save your changes or the Reset button to revert to previous settings gt ar a P F e lo ca AMS 28THSFP x _ _ _ an cme i A b a T e C f D 19216811 amp ee Auto Logout Orr T SN MI SNMP Configuration Port Global Configuration gt ACL Enable Loop Protection Disable gt Aggregation Transmission Time 5 seconds gt gt IOMP Snooping Shutdown Time v0 eal gt MLD Snooping gt MVR E gt LLDP Action Tx Mode Filtering Data Base gt E z kroas VLAN 1 7 Shutdown Port Enable gt GARP 2 2 Shutdawn Post Enable B gt GVRP 3 7 Shutcown Pot Enable gt Qos sFlow Agent 4 4 Shutdown Port Ic Enable zi Loop Protection t 5 7 Shutdown Port z Enable gt Configuration 6 F Shutdown Pot gt
44. Mode gt Syslog z gt SNMP X Gontiguration Queue Shaper Port Enable Rate Unit Excess ACL gt Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base P VLAN Voice VLAN gt GARP GVRP Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP DSCP Based QoS DSCP Translation Fig 89 Port Scheduling Strict Priority 195 AMS User Manual AbAS 24TGSFP cr AMS 24T6SFP gt Time Account rip gt Syslog gt SNMP Configuration gt Port gt ACL gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP GVRP Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP OSCP Based QoS DSCP Translation Parameter Description i FF a Deos gt ALLOY 192 168 1 1 Auto Loqaut OFF EE Hee aos Egress Port Scheduler and Shapers Port1 Scheduler Mode Weighted Por 1 iej Queue Scheduler Port Shaper Weight Percent Rate Queue Shaper Enable Rate Unit Excess ee Fig 90 Port Scheduling Weighted QoS Egress Port Schedulers Port Mode Weight QO 5 Physical port of the switch Displays the configured Mode type Strict
45. Non STP Forwseceng 16 Non STP Forwarding 17 Non STP Forwarding 18 Non STP Forwarding 19 Nan STP Forwarding 20 Non STP Forwarding 21 Non STP Forwarding 22 Non STP Forwarding 23 Non STP Forwarding 24 Non STP Forwarding 25 Non STP 26 Non STP Forwarding PY 2 f Parameter Description Port CIST Role CIST State Uptime Fig 45 Port Status Information Physical port of the switch The current STP port role of the CIST port The port role can be one of the following values Non STP AlternatePort Backup Port RootPort DesignatedPort Disabled The current STP port state of the CIST port The port state can be one of the following values Blocking Learning and Forwarding The time since the bridge port was last initialized 100 AMS User Manual Auto Refresh Tick the box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 101 AMS User Manual 1 2 4 8 Port Statistics This section is used to display the port statistics for of the configured STP CIST Ports Web Interface To view the Port Statistics via the Web Interface Click Configuration Spanning Tree and Port Statistics If you want to auto refresh the information you will need to check the Auto Refresh tick box Click Refresh to manually refresh the information bu ALLOY AMS 24T6SFP sO a System Information Information Cantiquration CPU Load gt
46. OFF Help gt System gt Configuration Authentication Method Configuration S Securtty Client Authentication Method Fallback IP Source Guard gt ARP Inspection sat Local gt DHCP Snooping telnet loca gt DHCP Relay arh lacal pas web loca gt AAA gt Port Security Apsly Reso fI gt Access Management SSH HTTPS Auth Metnod gt Maintenance i MI j Fig 141 Authentication Method Configuration Parameter Description Client The management client for which the configuration below applies Authentication Method Authentication Method can be set to one of the following values None authentication is disabled and login is not possible Local use the local user database on the switch for authentication Radius use a remote RADIUS server for authentication Tacacs use a remote TACACS server for authentication 303 Fallback Reset Button Apply Button AMS User Manual Enable fallback to local authentication by checking this box If none of the configured authentication servers are alive the local user database is used for authentication This is only possible if the Authentication Method is set to a value other than none or local Used to reset unsaved changes to original configuration Used to save the settings configured on this page 304 AMS User Manual 1 4 Maintenance This chapter describes all of the switch Maintenance configuration tasks to enhance the perf
47. PCP DEI Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP DSCP Based QoS DSCP Translation OSCP Classification QOS Control USt QCL Status Storm Contros P Thermal Protection sFlow Agent Loop Protection gt Single IP Easy Port Mirroring Trap Event Seventy SMI1P Configuration nono sla fo Tel 1 Tel j o lej ca L2 walna HHME aja magor g Jalaja s lfol alfolfaflo f fialfa fo f Jg yonne eeu NH eRe ws oo i 0 1 0 1 0 1 g 1 0 1 Li 1 0 1 o Fig 97 Port Tag Remarking Mapped Mode Parameter Description Port Physical port of the switch Mode Shows the tag remarking mode for this port Classified Use classified PCP DEI values Default Use default PCP DEI values Mapped Use mapped versions of QoS class and DP level Tag Remarking Mode Classified When set to Classified no configuration is necessary Tag Remarking Mode Default When set to Default the Administrator can manually set the PCP and DEI Values Tag Remarking Mode Mapped When set to Mapped the Administrator can map the PCP and DEI values based on the values of the QoS Class and DP Level Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 204 AMS User Manual 1 2 14 6 Port DSCP This section provides an overview of QoS Port DSCP settings f
48. Poa Tg Aaceotesh E Gia s Trot Connector Type SFP O c Configuration Fiber Type Rasenaat Pon Cestagon Tx Central Wavelength 850 Traffic Overnew Bit Rate 7000 Mbps Oetased Statisics Vendor OUI QoS Statsics Vendor Name ALLOY SFP Information Vendor PIN GBIC MLC EEE Vendor Revision 0000 gt AGL Vendor Serial Number CO09F 1100013 gt Aggregation 4 Date Code 060211 Spanning Tree Temperature none gt IGMP Snooping Veo none gt MLD Snooping Mont Bias none gt MVR Mon2 TX PWR none gt LLDP Mon3 RX PWR none gt Filtering Data Base P VLAN gt Voice VLAN GARP P GVRP gt Qos gt Thermal Protection P sFlow Agent gt Loop Protection Single IP i Fasv Ant n Fig 25 SFP information Parameter Description Connector Type Displays the connector type of the SFP module normally this would be UTP LC or SC Fibre Type Displays the fibre type multimode or single mode Tx Central Wavelength Displays the optical fibre wavelength normally 850nm 1310nm or 1550nm Baud Rate Displays the speed of the SFP module 100Mbps 1000Mbps 10Gb Vendor OUI OUI number of the vendors SFP Module 56 Vendor Name Vendor P N Vendor Revision Vendor Serial Number Date Code Temperature Vcc Mon1 Bias Mon2 TX PWR Mon3 RX PWR AMS User Manual Vendor s name of the SFP Module The part number of the Vendors SFP module The revision number of the Vendors SFP module The serial number of the SFP
49. Restricted Role Restricted TCN BPDU Guard Point to Point AMS User Manual entered The path cost is used when establishing the active topology of the network Lower path cost ports are chosen as forwarding ports in favour of higher path cost ports Valid values are in the range 1 to 200000000 Controls the port priority This can be used to control priority of ports having identical port cost The Admin Edge function allows ports to be configured as Edge or Non Edge ports When set to an Edge Port the transition to the forwarding state is faster than Non Edge ports A port should be set as an Edge port if there are no other Bridges attached to this port E g no STP enabled devices connected Controls whether the bridge should enable automatic edge detection on the bridge port If enabled the port cannot be selected as a Root Port for the CIST or any MSTI even if it has the best spanning tree priority vector Such a port will be selected as an Alternate Port after the Root Port has been selected If set it can cause lack of spanning tree connectivity It can be set by a network administrator to prevent bridges external to a core region of the network influencing the spanning tree active topology possibly because those bridges are not under the full control of the administrator This feature is also known as Root Guard If enabled the port will not propagate received topology change notifications and topology changes to ot
50. SSH TTPS Auth Method Maintenance Description 192 168 1 1 eS m a ee je c BREEER HEEF to ii oom Auto Logout or gt E Authentication Server Configuration Common Server Configuration Timeout 15 Dead Time 300 seconds seconds TACAC S Authorization and Accounting Configuration Authorization Fallback to Local Authorization Disabled j Accounting Drabied e E Disabled Ix RADIUS Authentication Server Configuration Enabled IP Address Hostname Port Secret 1 181 2 1812 3 1812 7 5 RADIUS Accounting Server Configuration Enabled IP Address Hostname Secret 1 2 Fig 131 AAA Configuration The Timeout which can be set to a number between 3 and 3600 seconds is the maximum time to wait for a reply from a server If the server does not reply within this timeframe we will consider it to be dead and continue with the next enabled server if any RADIUS servers are using the UDP protocol which is unreliable by design In order to cope with lost frames the timeout interval is divided into 3 subintervals of equal length If a reply is not received within the subinterval the request is transmitted again This algorithm causes the RADIUS server to be queried up to 3 times before it is considered to be dead The Dead Time which can be set to a number between 0 and 3600 seconds is the period during which the switch will not send new requests to a server that has failed to respond to a pre
51. Security This chapter describes the Security configuration options available in the AMS Series of switches Features such as IP Source Guard Port Security HTTPS DHCP Snooping DHCP Relay and many more can be configured from this section 1 3 1 IP Source Guard The AMS Series switches support IP Source Guard IP Source Guard can be used to help secure your switch from IP based spoofing attacks 1 3 1 1 Configuration This section is used to configure the IP Source Guard settings for the AMS switch Web Interface To configure the IP Source Guard settings of the switch via the Web Interface 1 Click Security IP Source Guard and Configuration 2 Select to enable or disable the IP Source Guard feature 3 Select to enable or disable this function on each individual port 4 Select the amount of Dynamic Clients allowed to be learnt by the port 5 Click the Apply button to save your changes or the Reset button to revert to previous settings con AMS 28 THSFP Cfi 192 168 1 1 a yrrrerr eeeerr L D AMS 24T6SFP Auto Logout OFF EED MZ System Contiguration T Secunty IP Source Guard i Configuration State Table Dynamic Table gt ARP Inspection IP Source Guard Configuration Mode Dutwa f Transiate dynamic to static 10 Disatied Unimaed gt DHCP Snooping Port Mode Configuration E DHCP Rela y Port Mode Max Dynamic Clients gt NAS SAA ifs BIE z
52. Signalling for use in network topologies that require a separate policy for the video signalling than for the video media Policy indicates that an Endpoint Device wants to explicitly advertise that the policy is required by the device Can be either Defined or Unknown Unknown The network policy for the specified application type is currently unknown Defined The network policy is defined TAG is indicative of whether the specified application type is using a tagged or an untagged VLAN Can be Tagged or Untagged Untagged The device is using an untagged frame format and as such does not include a tag header as defined by IEEE 802 1Q 2003 Tagged The device is using the IEEE 802 1Q tagged frame format VLAN ID is the VLAN identifier VID for the port as defined in IEEE 802 1Q 2003 A value of 1 through 4094 is used to define a valid VLAN ID A value of O Priority Tagged is used if the device is using priority tagged frames as defined by IEEE 802 1Q 2003 meaning that only the IEEE 802 1D priority level is significant and the default PVID of the ingress port is used instead Priority is the Layer 2 priority to be used for the specified application type One of the eight priority levels 0 through 7 DSCP is the DSCP value to be used to provide Diffserv node behaviour for the specified application type as defined in IETF RFC 2474 Contain one of 64 code point values 0 through 63 150 AMS User Manual Auto Refresh Tick the
53. The switch can send and receive LLDP frames The CDP operation is restricted to decoding incoming CDP frames The switch doesn t transmit CDP frames CDP frames are only decoded if LLDP on the port is enabled Only CDP TLVs that can be mapped to a corresponding field in the LLDP neighbours table are decoded All other TLVs are discarded Unrecognized CDP TLVs and discarded CDP frames are not shown in the LLDP statistics CDP TLVs are mapped onto LLDP neighbours table Both the CDP and LLDP support system capabilities but the CDP capabilities cover capabilities that are not part of the LLDP These capabilities are shown as others in the LLDP neighbours table If all ports have CDP awareness disabled the switch forwards CDP frames received from neighbour devices If at least one port has CDP awareness enabled all CDP frames are terminated by the switch Tick the box to enable CDP on each individual port Optional TLV When checked the port description is included in LLDP information transmitted Optional TLV When checked the system name is included in LLDP information transmitted Optional TLV When checked the system description is included in LLDP information transmitted Optional TLV When checked the system capability is included in LLDP information transmitted Optional TLV When checked the management address is included in LLDP information transmitted Used to reset unsaved changes to original configuration
54. This page allows for adding and deleting MAC based VLAN entries and assigning the entries to different ports This page shows only static entries Web Interface To configure MAC based VLAN settings via the Web Interface 1 Click Configuration VLAN MAC based VLAN s and Configuration 2 Specify the MAC Address and VLAN ID 3 Click the Apply button to save your changes or the Reset button to revert to previous settings 171 AMS User Manual AMS TGSEP Cf 19216811 amp AMS 24T6SFP Auto Logout OFF EE MEE re ronm z gt ACL MAC based VLAN Membership Configuration Retesh ise 22 gt Aggregation gt Spanning Tree Port Members gt IGMP Snooping Delete MAC Address VLAN ID 4 2 3 4 5 6 7 a 9 40 44 12 13 14 45 16 17 10 19 20 24 22 23 24 25 26 gt MLD Snooping Currently no entries present gt MVR LLDP dd pa siny Data Base Snl Basak VLAN Membership Ports Switch Status Port Status gt Private VLANs Y MAC based VLAN Configurason Status Protocol based VLAN gt Voice VLAN gt GARP GVRP gt Qos gt Thermal Protection gt sFiow Agent Loop Protection Single IP Fig 76 MAC based VLAN Configuration Parameter Description Delete To delete a MAC based VLAN entry check this box and press Apply The entry will be deleted on the selected switch MAC Address VLAN ID Port Members Add New Entry Reset Button Apply Button Indicates the MAC
55. Time gt Account IP gt Syslog gt SNMP gt Aggregation Spanning Tree Bridge Settings MSTI Mapping MSTI Priorities CIST Ports MSTI Ports Bridge Status Por Status Pon Statistks gt IGMP Snooping MLD Snooping MVR gt LLDP Filtering Data Base gt gt Voice VLAN r BY IY ans 20Tesre x a e C A O 19216811 z Auto Logout orr E MZ STP Statistics Autowehesh E Rehesh Clean Port Transmitted Received Discarded MSTP RSTP STP TCN MSTP RSTP STP TCN Unknown Illegal No ports erred Parameter Description Port MSTP RSTP STP Fig 46 Port Statistics Physical port of the switch The number of MSTP Configuration BPDU s received transmitted on the port The number of RSTP Configuration BPDU s received transmitted on the port The number of legacy STP Configuration BPDU s received transmitted on the port 102 TCN Discarded Unknown Discarded Illegal Auto Refresh Refresh AMS User Manual The number of legacy Topology Change Notification BPDU s received transmitted on the port The number of unknown Spanning Tree BPDU s received and discarded on the port The number of illegal Soanning Tree BPDU s received and discarded on the port Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 103 AMS User Manual 1 2 5 IGMP Snooping IGM
56. Tx Count Leave Tx Count C4 nn hon 10 12 13 4 15 16 17 16 19 20 21 22 23 24 2 eesceesoe esses eno eseoDSeSsSeeoCeS Scesesceseoeoseosesososcesooseoecoe Fig 85 GVRP Statistics Physical port of the switch Displays the number of Join GVRP requests sent from the port Displays the number of Leave GVRP requests sent from the port Used to manually refresh the information on the page Tick the box to enable the information to be automatically refreshed 190 AMS User Manual 1 2 14 QoS The AMS Series switches support four QoS queues per port with strict or weighted fair queuing scheduling It supports QoS Control Lists QCL for advance programmable QoS classification based on IEEE 802 1p Ethertype VID IPv4 IPv6 DSCP and UDP TCP ports and ranges High flexibility in the classification of incoming frames to a QoS class The QoS classification looks for information up to Layer 4 including IPv4 and IPv6 DSCP IPv4 TCP UDP port numbers and user priority of tagged frames This QoS classification mechanism is implemented in a QoS control list QCL The QoS class assigned to a frame is used throughout the device for providing queuing scheduling and congestion control guarantees priority to the frame according to what was configured for that specific QoS class The AMS Series switches support advanced memory control mechanisms providing excellent performance of all QoS classes under any traffic scenario includin
57. Tx column indicates whether pause frames on the port are transmitted The Rx and Tx settings are determined by the result of the last Auto Negotiation Check the configured column to use flow control This setting is related to the setting for Configured Link Speed Enter the maximum frame size allowed for each switch port Valid ranges are from 1518 to 9600 bytes Excessive Collision Mode Used to set the ports response to excessive collisions on the port Power Control Discard Discard frames after 16 collisions Default Restart Restart backoff algorithm after 16 collisions Used to configure the power savings features of each port Disabled All power saving mechanisms are disabled 48 AMS User Manual ActiPHY Link down power savings enabled Power saving occurs if no active link PerfectReach Link up power savings enabled Reduced power used by the port depending on the length of the cable Enabled Both Link up and Link Down power saving mechanisms enabled NOTE At the top of the column there is an The is a global setting and a way of changing the settings for every port simultaneously 49 AMS User Manual 1 2 1 2 Port Description Use this section to help identify what devices are connected to each port of your switch Each Port can have a description assigned to it Web Interface To add a description to the ports of the switch via the Web Interface 1 Click Configuration Port and D
58. Used to save the settings configured on this page 137 AMS User Manual 1 2 8 2 LLDP Neighbors This section is used to display the neighbors that have been discovered by the AMS Series switch Web Interface To view the LLDP neighbors via the Web Interface 1 Click Configuration LLDP and LLDP Neighbors If you want to auto refresh the information you will need to check the Auto Refresh tick box Click Refresh to manually refresh the information AMS 24TESFP x C f 19216811 ALLOY AMS 24T6SFP en Y System Information Information Configuration CPU Load gt Time Account rir gt Syslog gt SNMP Y Configuration gt Port gt ACL Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVI vLLOP LLOP Configuration LLOP Neighbours LLOP MED Configuration LLOP MED Neighbours FEE Port Statistics gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP Parameter Description Local Port Chassis ID Remote Port ID System Name Port Description Aito Logoat ofr gt E LLDP Neighbour Information Auto rafresh E Reftesh Local Chassis Remote System Port System System Management Port 1D Port iD Name Description Capabllides Description Address _ No LLDP neighbour information found es _ Fig 63 LLDP Neighbour Information The port on which the LLDP frame was received The Chassis ID is the ident
59. VLAN Memoership Pon isolation gt MAC based VLAN gt Protocol based VLAN gt Voice VLAN gt GARP GVRP gt Qos gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP Fig 74 Private VLAN Membership Parameter Description Delete To delete a Private VLAN entry tick the box and press the Apply button PVLAN ID Indicates the VLAN ID of the private VLAN Port Members Displays the port members that belong to a particular VLAN group If the check box it ticked it means that port belongs to that VLAN group Add New Private VLAN Click to add a new private VLAN An empty row is added to the table and the private VLAN can be configured as needed Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 169 AMS User Manual 1 2 10 5 2 Port Isolation Port Isolation allows the administrator to configure ports so they can only communicate with certain ports even though they are in the same VLAN group A typical scenario is where you need to block all ports from communicating with each other but allow all ports to communicate with a single uplink port This section is used to configure how each port will communicate with other ports within the same private VLAN Web Interface To configure the Port Isolation settings via the Web Interface 1 Click Configuration VLAN Private VLAN s and Port Isolatio
60. VLAN can only be mapped to one MSTI An unused MSTI should just be left empty Used to reset unsaved changes to original configuration Used to save the settings configured on this page Root bridge for KS Root bridge for MSTI 2 qie Physical connections Spanningtree of MSTI 1 containing vlans 2 7 9 43 Spanning tree of MSTI 2 containing vlans 16 18 24 40 Spanning tree of MSTI 3 containing vlans 23 39 50 112 Fig 39 Example MSTI Configuration 92 AMS User Manual 1 2 4 3 MSTI Priorities This section is used to manually change the priority of the STP bridge instances The CIST Common and Internal Spanning Tree is the default Bridge Instance when using MSTP and is always active Any VLAN that has not been assigned to a MIST is assigned to the CIST The lower the priority value the higher the priority the bridge has Web Interface To configure the MSTI Priorities for MSTP via the Web Interface 1 Click Configuration Spanning Tree and MSTI Priorities 2 Select the Bridge Priority for each of the Bridge Instances 3 Click the Apply button to save your changes or the Reset button to revert to previous settings T AMS aatesre e ch Y System CPU Load gt MVR gt LLOP Parameter Description MSTI Priority Reset Button Apply Button ALLOY AMS 24T6SFP System Information information Configuration Aggregation Spanning Tree Bridge Set
61. adds the same VLAN tag to untagged packets that are received through the same port Later on these packets can be forwarded in the same VLAN Port based VLAN s are easy to configure and applies to networks where the locations of terminal devices are relatively fixed As mobile office and wireless network access gain more popularity the ports that terminal devices use to access the networks are very often non fixed A device may access a network through Port A this time but through Port B the next time If Port A and Port B belong to different VLANs the device will be assigned to a different VLAN the next time it accesses the network As a result it will not be able to use the resources in the old VLAN On the other hand if Port A and Port B belong to the same VLAN after terminal devices access the network through Port B they will have access to the same resources as those accessing the network through Port A do which brings security issues To provide user access and ensure data security in the meantime the MAC based VLAN technology was developed MAC based VLAN s group VLAN members by MAC address With MAC based VLAN configured the device adds a VLAN tag to an untagged frame according to its source MAC address MAC based VLANs are mostly used in conjunction with security technologies such as 802 1X to provide secure flexible network access for terminal devices 1 2 10 6 1 Configuration The MAC based VLAN entries can be configured here
62. also is comprised of two different sub values 175 Group Name Add New Entry Reset Button Apply Button Refresh AMS User Manual a OUI OUI Organizationally Unique Identifier is value in format of xx xx xx where each pair xx in string is a hexadecimal value ranges from Ox00 Oxff b PID If the OUI is hexadecimal 000000 the protocol ID is the Ethernet type EtherType field value for the protocol running on top of SNAP if the OUI is an OUI for a particular organization the protocol ID is a value assigned by that organization to the protocol running on top of SNAP In other words if value of OUI field is 00 00 00 then value of PID will be etype 0x0600 Oxffff and if value of OUI is other than 00 00 00 then valid value of PID will be any value from 0x0000 to Oxffff A valid Group Name is a unique 16 character long string for every entry which consists of a combination of alphabets a z or A Z and integers 0 9 Click to add a new entry to the mapping table enter the required field based on the frame type you have selected Used to reset unsaved changes to original configuration Used to save the settings configured on this page Used to manually refresh the information on the page 176 AMS User Manual 1 2 10 7 2 Group to VLAN This section is used to map the groups configured in section 1 2 10 7 1 to a VLAN Group Web Interface To map the protocol group to a VLAN group via the Web Interface 1 Clic
63. and similar 148 LLDP MED Communication Endpoint Class III LLDP MED Capabilities Application Type AMS User Manual Discovery services defined in this class include media type specific network layer policy discovery The LLDP MED Communication Endpoint Class III definition is applicable to all endpoint products that act as end user communication appliances supporting IP media Capabilities include all of the capabilities defined for the previous Generic Endpoint Class I and Media Endpoint Class II classes and are extended to include aspects related to end user devices Example product categories expected to adhere to this class include but are not limited to end user communication appliances such as IP Phones PC based softphones or other communication appliances that directly support the end user Discovery services defined in this class include provision of location identifier including ECS E911 information embedded L2 switch support inventory management LLDP MED Capabilities describes the neighbourhood unit s LLDP MED capabilities The possible capabilities are LLDP MED capabilities Network Policy Location Identification Extended Power via MDI PSE Extended Power via MDI PD Inventory N OW BP WN Reserved Application Type indicating the primary function of the application s defined for this network policy advertised by an Endpoint or Network Connectivity Device The p
64. bandwidth parameters based on Queue Settings or force the port to a desired speed If using Weighted a total percentage of a queue can also be set Click the Apply button to save your changes or the Reset button to revert to previous settings 194 AMS User Manual D AMS MTGSFP gt Cf 19216811 ALLOY AMS 24T6SFP gt Time gt Account iP Weight Syslog Pon Mode Ob ai a2 a3 a gt SNMP Weighted 17 17 17 17 17 gt Port Stet Priotty z gt ACL Stoel Prony gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base P VLAN gt Voice VLAN gt GARP GVRP Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP OSCP Based QoS DSCP Translation QoS Egress Port Schedulers 8 Strict Priority Stnet Pronty Stict Priority Strict Priority Strict Priority Strict Priority Stnct Phonty Strict Priority Stnet Pronty Strict Priority Sinet Pronty Strict Priority Stnet Promy Stict Priority Stnet Pronty Strict Priority Strict Priority Strict Priority Strict Priority Suict Priority Strict Priority PERKA AT oie A REA lee roe TAE AA ee oe Oe a REBBEBEBEEREEE RE Steno meu l D AMS 20 1696 9 Cf O 19216811 ALLOY ANE ALTESET Auto Logout orr ET MI gt Time ps eh a QoS Egress Port Scheduler and Shapers Port 1 Port 1 mir _ Scheduler
65. box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 151 1 2 8 5 EEE This page provides an overview of EEE information exchanged by LLDP Web Interface AMS User Manual To view the LLDP EEE information that has been discovered from the switch via the Web Interface 1 2 Click Configuration LLDP and EEE If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information 192 168 1 1 AMS 24T6SFP System Y System Information gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR Y LLOI Port Statishes Filtering Data Base gt VLAN gt Voice VLAN gt GARP GVRP gt Qos gt Thermal Protection gt Flaw anant Parameter Description Local Port Tx Tw Rx Tw Fallback Receive Tw Emam Auto Logoul OFF LLDP Neighbors EEE Information Auto retresh Ratresh Local Port Tx Tw Rx Tw Fallback Receive Tw Echo Tx Tw EchoRx Tw Resolved TxTw ResolvedRx Tw EEE activated No LLDP EEE information found SS Fig 66 LLDP EEE Information The port on which the LLDP EEE information frames have been transmitted or received The link partner s maximum time that the transmit path can hold off sending data after reassertion of LPI The link partner s time that the receiv
66. cancel on going backend authentication server requests whenever it receives a new EAPOL Start frame from the supplicant And since the server hasn t yet failed because the X seconds haven t expired the same server will be contacted upon the next backend authentication server request from the switch This 267 AMS User Manual scenario will loop forever Therefore the server timeout should be smaller than the supplicant s EAPOL Start frame retransmission rate Single 802 1X In port based 802 1X authentication once a supplicant is successfully authenticated on a port the whole port is opened for network traffic This allows other clients connected to the port for instance through a hub to piggy back on the successfully authenticated client and get network access even though they really aren t authenticated To overcome this security breach use the Single 802 1X variant Single 802 1X is really not an IEEE standard but features many of the same characteristics as does port based 802 1X In Single 802 1X at most one supplicant can get authenticated on the port at a time Normal EAPOL frames are used in the communication between the supplicant and the switch If more than one supplicant is connected to a port the one that comes first when the port s link comes up will be the first one considered If that supplicant doesn t provide valid credentials within a certain amount of time another supplicant will get a chance Once a suppl
67. community name for the SNMP Set function Enable Disable Used to Enable or Disable the SNMP Set function 32 AMS User Manual 1 1 6 3 Communities This section is used to configure additional communities These communities can be used to secure the SNMP information by allowing only certain users and IP Addresses to be able to access a specific community The maximum number of communities that can be created is four Web Interface To configure communities via the Web Interface 1 Click System SNMP and Communities 2 Click add new community 3 Enter a valid community name a username Source IP Address and subnet mask 4 Click Save to apply your changes ST OT cc ALLOY AMS 24T6SFP go PLoscut nma F aaan SNMPv1 v2 Communities to Security Configuration Fig 16 SNMP Additional Community Configuration Parameter Description Delete Select the tick box and click the apply button to delete a community name Add New Community Used to add a new community 33 AMS User Manual ment e pena 7 man ii E ALLOY AMS 24T6SFP A go fiogu ein z panam Maranan SNMPv1 v2 Communities to Security Configuration Fig 17 SNMP Add New Community window Parameter Description Delete Select the delete button next to the community you would like to delete Community Enter a valid community name Valid length is from 1 to 32 The community string will be treated as a security name and map a SNMPc1 or SNMPv2c community string User
68. condensing Power Supply 100 240VAC 50 60Hz internal universal 100 240VAC 50 60Hz internal universal 48VDC dual power input Certification CE Mark FCC Part 15 CFR47 Class A C Tick 323
69. current configuration files will be exported as XML format 1 4 4 1 Export Configuration This section is used to Save Export the currently running configuration file of the switch Web Interface To Save the configuration file of the switch via the Web Interface 1 Click Maintenance Export Import and Export Configuration 2 Click Save to save the configuration file in XML format s a fea AMS 24T6SFP AutoLogout lorr E ENO MEM gt System gt Configuration Configuration Save Ld Se conkgution Restart Device Firmware gt Save Restore Export import Export Config Import Config gt Diagnostics Fig 149 Export Configuration File Parameter Description Save Press the save button to save the configuration file to your computer 314 AMS User Manual 1 4 4 2 Import Configuration This section is used to Import a saved configuration file into the switch Web Interface To Import a configuration file into the switch via the Web Interface 1 Click Maintenance Export Import and Import Configuration 2 Click Choose File to browse for the previously saved configuration file 3 Click upload to load the file into the switch gt a a ice Ss AMAS 24 1OSFP g cfr 192 168 1 1 AMS 24T6SFP LL Auto Lagaut orr r System Configuration Configuration Upload z Sonfiguration _ pi z menee Choose File No file chosen Upload Restart Device
70. disabled disabled 10 Mbps Port DSCP j1 disabled disabled disabled disabled disabled disabled disabled disabled disabled DSCP Based QoS T2 disabled disabled disabled disabled disabied disabled disabled disatled disabled DSCP Translation 13 dsablod disabled disabled disabled desabled disabled disabled devabled disabled DSCP Classification i disabled desabled disabled disabled daiabled disabled disabled Do cates pads tenn CA JG disabled disabled disabled disabled disabled disabled disabled Gisabled disabled i GCL Status z IT disabled disabled disabled disabled disabled disabled disabled disabled disabled Storm Control 18 disabled disabled disabled disabled disabled disabled disabled disabled disabled Thermal Protection J9 dwabled disabled disubled disabled devabled disabled disabled dsobled disabled gt sFlow Agent 20 disabled disabled disabled disabled disabled disabled disabled desabled disabled Loop Protection i disnbled disabled disabled disabled disabled disabled disabled disabled disabled 22 disabled disabled disabled disabled disabled disabled disabled disabled disabled Tapa P Zi disabled disabled disabled disabled ditabled disabled disabled disabled disabled Easy Port 24 disabled disabled disabled disabled disabled disabled disabled disabled disabled Mirroring 25 disabled disabled disabled disabled disabled disabled disabled disabled disabled Trap Event Seventy 26 disabled desabled disabled disabled deabled disabled disabled desabled disabled S
71. gt DEFER SDE gt system gt Contiguration Access Management Statistics Auto refresh Refresh Clear T Sapun a interface Received Packets Allowed Packets Discarded Packets IP Source Guard HTTP o 0 6 gt ARP Inspection HTTPS o J 0 gt DHCP Snooping SNMP 0 0 0 DHCP Relay TELNET p 0 o b NAS SSH 0 0 a gt AAA gt Port Security Access Management Connguration Statstxs SSH HTTPS Auth Method P Maintenance Fig 138 Access Management Statistics Parameter Description Interface The interface type through which the remote host can access the switch Received Packets Number of received packets from the interface when access management mode is enabled Allowed Packets Number of allowed packets from the interface when access management mode is enabled Discarded Packets Number of discarded packets from the interface when access management mode is enabled 298 AMS User Manual Auto Refresh Tick the box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 299 1 3 9 SSH The AMS Series switches supports SSH access to the management interface SSH is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication Web Interface AMS User Manual To enable disable SSH via the web interface 1 2 Click Security and SSH Select to enable or disable SSH 3 Click the Apply button t
72. gt Single IP Easy Port Mirroring Trap Event Severity SMTP Configuration UPnP Security gt Maintenance L A Fig 117 UPnP Configuration Parameter Description Mode Indicates the UPnP operation mode Possible modes are Enabled Enable UPnP mode operation Disabled Disable UPnP mode operation When the mode is enabled two ACEs are added automatically to trap UPNP 241 TTL Advertising Duration Reset Button Apply Button AMS User Manual related packets to CPU The ACEs are automatically removed when the mode is disabled The TTL value is used by UPnP to send SSDP advertisement messages Valid values are in the range 1 to 255 The duration carried in SSDP packets is used to inform a control point or control points how often it or they should receive an SSDP advertisement message from this switch If a control point does not receive any message within the duration it will think that the switch no longer exists Due to the unreliable nature of UDP in the standard it is recommended that such refreshing of advertisements to be done at less than one half of the advertising duration In the implementation the switch sends SSDP messages periodically at the interval one half of the advertising duration minus 30 seconds Valid values are in the range 100 to 86400 Used to reset unsaved changes to original configuration Used to save the settings configured on this page 242 AMS User Manual 1 3
73. gt VLAN gt Voice VLAN gt GARP gt GVRP Taos Port Classification Port Policing Port Scheduler Port Shaping QCL Status Fi oa QoS Control List Configuration QCE Port Frame Type SMAC DMAC VID PCP DEI 102 QoS Control List 212 Action Class DPL DSCP AMS User Manual gt Aggregation Hy Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLDP Filtering Data Base gt VLAN gt Voice VLAN gt GARP i gt GVRP YQosS Port Classification Port Policing Pon Scheduler Port Shaping i Port Tag Remarking Port OSCP OSCP Basec OSCE Tr ISCP Classification QoS Control List QCL Status QoS Parameter Description QCE Port Frame Type SMAC DMAC VID PCP DEI Action Sama AMS TOSFP ee lt 2 C f D 19216811 AMS 24T6SFP Auto Laqaut OFF tooour Hep r QCE Configuration Configuration Port Members Port 1 2 3 4 8 6 7 8 9 10 14 412 13 14 18 16 17 18 19 20 21 22 23 24 28 Pm ACL JUVE E RD AE E a E E uid omic Picea a Key Parameters Action Parameters Tag Class o l vid DPL Default PCP Any ie DSCP Detaut z DEI Any oI SMAC ye DMAC Type Any gt Frame Type Any Apply Reset Canco Fig 103 Adding a QoS Control List Entry Quality Control Entry Index Physical port of the switch Indicates the type of frame to look for in incoming frames Possible frame types are Any E
74. gt iP l Syslog CIST Normal Port Configuration gt SNMP Contiguration I Port eer Path Cost Priority Admin Edge gute mae TEN Guma oe gt Port h gt ACL 2 ial Ean EE 2 iz Aggregation 1 Auto x 126 Non Edge e x Auto e ia Lpa ee 2 Auto e 126 Non Eage v Auto m Badoe Settings L MSTI Mapping 3 Ano lel 128lz Non Edge z F Auto 5 po apa 4 Ano fel 128 z NonEdge r 7 Auto a MSTI Ports 6 Auta le 128 e MonEdqe e 7 Auta Bridge Status 6 Aido bs 128z Non Edge le 7 Auto le Port Status Port Statistics 7 Auto 126 _ Non Eage Auto IGMP Snooping 8 Auto 120 Non Edge J Auto MLD Snooping A gt MVR 9 Awto 128 Non Edge Auto LJ gt LLDP 10 Amo 128 x Non Edge e 7 Auto ix gt Filtering Data Base i 128 leh as laii 7 A ig B VLAN t Aa le 28 e Non Edye z ute B Voice VLAN 12 Auta e 128 gt NonEdge e z Aula z asta at 13 Ata le tale Non Fdna lel J Auta el u Fig 41 CIST Port Configuration Parameter Description Port Physical port of the switch STP Enabled Select to enable or disable STP on each port Path Cost Controls the path cost incurred by the port The Auto setting will set the path cost as appropriate by the physical link speed using the 802 1D recommended values Using a Specific setting a user defined value can be 94 Priority Admin Edge Auto Edge
75. ic 192 168 1 1 ALLOY AMS 24T6SFP Configuration CPU Load gt Time gt Account i IP gt Syslog gt sNMP at Configuration gt Porn gt ACL Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR LLOP gt Fittering Data Base gt VLAN gt Voice VLAN gt GARP Y GVRP Configuration Statistics P Qos Thermal Protection gt sFlow Agent Loop Protection gt Single IP Parameter Description GVRP Mode Port GVRP Mode GVRP rrole Refresh Auto Refresh Reset Button Apply Button una r PPRRRE PERRRH tiid nm Auto Logout orr gt EE A Global Configuration Autc refresh OS Rafteah GVRP Mode Usable Port Configuration Port GVRP Mode GVRP rrole E 1 Disabie sabie l 2 Disable x Disable x G 3 Disable gt 1 Disable e 4 Disable Disable Disable e 7 Csabi gt 6 Disable Disable 7 Disable 8 Disable Ovsable SMM BIE 11 _Disabie Oxsatle 12 Disable Disable L2 13 Disubin e Cesabte e Disable Disable 15 Disable e Gesable gt 16 Disable Otsable Fig 84 GVRP Configuration Used to enable or disable GVRP globally for the switch Physical port of the switch Here you can enable or disable GVRP for a particular port This parameter controls if the VLAN registration on the port is restricted or not Enable The Rest
76. image slot and activate this 3 The firmware version and date information may be empty for older firmware releases This does not constitute an error 309 AMS User Manual 1 4 3 Save Restore This section is used to backup restore and save the configuration in the switch 1 4 3 1 Factory Defaults This section is used to reset the switch back to its factory default settings Web Interface To Factory Default the switch via the Web Interface Click Maintenance Save Restore and Factory Defaults Select to set the IP Address back to Factory Default or leave it as previously configured Press Yes to set the switch to Factory Default Settings press No to cancel the request aa Ss nads 24 16S e Cc fi 192 168 1 1 ALLOY AMS 24T6SFP Auto Logout OFF Logout Help gt system Factory Defaults Restart Device Firmware Are you sure you want to reset the configuration to Factory Defaults Restore Default Configuration without changing current IP address Yes No Export import gt Diagnostics Fig 145 Factory Defaults Parameter Description Restore Default Configuration without changing current IP Address Check this box if you do not want to reset the IP Address to factory default Press Yes button to factory default the switch Press No to cancel the request 310 1 4 3 2 Save Start AMS User Manual This section describes how to save the Switch Start configura
77. is therefore not possible to mirror Tx frames on the mirror port Because of this mode for the selected mirror port is limited to Disabled or Rx only Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 236 1 2 20 Trap Event Severity AMS User Manual The AMS Series switches support trap events that can alert the administrator if a particular event occurs This section is used to customize the severity levels of the trap events Administrators can manually configure each event to have a Severity level of Emerg Alert Crit Error Warning Notice Info and Debug Web Interface To configure the Trap Event Severity levels via the Web Interface 1 Click Configuration and Trap Event Severity Group Name Severity Level Change the Severity Level of each of the Trap Events Click the Apply button to save your changes or the Reset button to revert to previous settings r Se AMS 24 THSEP Cfi 192 168 1 1 ALLOY gt BRESEE FEEREE ua Sema ibaa AMS 24T6SFP Auto Logout OFF E iP the Trap Event Severity Configuration i SNMP Group Name Severity Level Gonfiguration ACI mo ie cont jis z gt ACL ACL Log Debug gt Aggregation Abass Myra info gt Spanning Tree Auth Failed Waming gt IGMP Snooping gt MLD Snooping Cold Stan Waming gt MVR Contig tile Into l gt
78. is reduced drastically by the practice of webmasters taking addresses in large blocks the bulk of which remain unused There is a rather substantial movement to adopt a new version of the Internet Protocol IPv6 which would have 128 bits Internet Protocol addresses This number can be represented roughly by a three with thirty nine zeroes after it However IPv4 is still the protocol of choice for most of the Internet 1 1 4 1 IPv4 The AMS Series switches support both dynamically assigned and statically configured IP Addresses If you are running a DHCP server on your network the switch can obtain an IP Address from the DHCP if DHCP Client is enabled If not the switches IP settings must be configured manually Please change the IP Address of the switch to suit your networks requirements Web Interface To configure the IPv4 settings via the Web Interface 1 Click System IP and IPv4 2 Select DHCP Client if you wish to obtain an IP Address automatically from a DHCP Server Alternatively enter your required IP Settings for your network 3 Click Save to apply your changes or Reset to change values back to your previous settings 24 AMS User Manual Fig 10 IPv4 Address Configuration Parameter Description DHCP Client Enable the DHCP Client by checking the tick box When selected the switch will obtain an IP Address from your DHCP Server If the switch does not receive an IP Address the Default IP Address will be used Renew C
79. module uses the Port Security module to secure MAC addresses the Port Security module needs to check for activity on the MAC address in question at regular intervals and free resources if no activity is seen within a given period of time This parameter controls exactly this period and can be set to a number between 10 and 1000000 seconds If reauthentication is enabled and the port is in an 802 1X based mode this is not so critical since supplicants that are no longer attached to the port will get removed upon the next reauthentication which will fail But if reauthentication is not enabled the only way to free resources is by aging the entries For ports in MAC based Auth mode reauthentication doesn t cause direct communication between the switch and the client so this will not detect 264 AMS User Manual whether the client is still attached or not and the only way to free any resources is to age the entry Hold Time This setting applies to the following modes i e modes using the Port Security functionality to secure MAC addresses e Single 802 1X e Multi 802 1X e MAC Based Auth If a client is denied access either because the RADIUS server denies the client access or because the RADIUS server request times out according to the timeout specified on the Configuration Security gt AAA page the client is put on hold in the Unauthorized state The hold timer does not count during an on going authentication In MAC ba
80. options when using other stacking technology 1 2 17 1 Configuration This section describes how to configure the Single IP Management function Web Interface To configure the Single IP Management settings via the Web Interface 1 Click Configuration Single IP and Configuration 2 Set the required Mode for the switch and enter the Group Name 3 Click the Apply button to save your changes or the Reset button to revert to previous settings kmag S gt a lt ADS MA TESFP le C 19216811 ALLOY ili AMS 24T6SFP Auto Logout t0 min CEI MZ PI Single IP Configuration f gt Syslog g g B BURP Mode Disabled Configuration gt Port Group Name VirtuatStock gt ACL gt Aggregation Apply Reset gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR LLOP Fittering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP gt Qos gt sFlow Agent gt Loop Protection Single IP Configuration te verity SMTP Conniguraban UPnP Fig 111 Single IP Configuration 228 Parameter Description Mode Group Name Reset Button Apply Button AMS User Manual Is used to disable the SIP function or set the device as a Master or Slave Possible modes are Disable Disable operation of Single IP Management Master Enable Single IP Management and run as a Master Switch Running as the master switch the user will connect to the Master sw
81. reports and has no relationship to the function that directs the forwarding of IP multicast traffic Web Interface To configure the MLD Port Group Filtering entries via the Web Interface 1 Click Configuration MLD Snooping and Port Group Filtering 2 Click Add New Filtering Group 3 Specify the Multicast IP Address and click Apply to save the settings 4 Ifyou wish to delete an entry check the delete tick box and click Apply 5 Click the Apply button to save your changes or the Reset button to revert to previous settings a T D ams zaTesFP e f 5 19216811 ALLOY AMS 24T6SFP AutoLogowt ofr gt BEE A gt Account MLD Snooping Port Group Filtering Configuration gt Syslog gt SNMP Delete Port Filtering Groups Y Configuration Add new Fatering Group gt Port gt ACL Aggregation gt Spanning Tree gt IGMP Snooping Y MLD Snooping Basic Configuration VLAN Configuration Port Group Filtering Status Groups information IPv6 SSM Information gt MVR LLOP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP gt Qos gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP Easy Port Apply Rosan Fi g 55 Multicast Address Filtering 122 AMS User Manual Parameter Description Delete Check to delete the entry and click Apply save the changes and remove the selected entry Port Select the Port yo
82. the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information Parameter Description AMS 24T6SFP C A is2i68i1 amp AMS 24T6SFP Avto Logout orf y EE Contguranon CPU Load MAC Address Table Autosetosh O Fistash Ciam jez gt Time Account Start freon VLAN 1 wed MAC address 00 00 00 00 00 00 with 120 etnies per page Pr gt syslog Port Members gt SNMP Type VLAN MAC Address CPU 4 2 2 4 5 6 7 0 9 10 11 12 13 14 15 16 17 18 19 20 24 22 23 24 25 26 J Configuration Stance 1 03 00 8C 99 00 F2 _ Port Dynamic 1 OLNO RCOOCEZDL gt ACL Oynamc 1 OOS TB OGKEDC gt Aggregation Dynamic 1 O0B SE CS ATEA V w eredad Dynamic 1 OGBEAQOSOAT 3 Dynamic 1 000FEAST2E3 1 gt MVR Dynamic 1 0D 1A10 43 2540 z gt LLOP Dynamic 1 0H07D0C8 Y Filtering Data Base Dynamic t 00 1F D0 80 71 06 Yi Configuration Dynamic 1 OO FDODIFTST Dynamk MAC Tabie Dynamic 1 OO2085FB0CD gt VLAN Dynamic 1 OG 24 10 16 87 5F gt Voice VLAN gt GARP Dynsmic 7 00 24 10 10 98 02 e b GVRP Dynamic 3 WAID gt Qos Dynamic t 002810 1F 5 0C gt Thermal Protection Dynamic 1 2s41D 70 ABFD v gt sFlow Agent Dynamic 1 OUDS L sd i a Dynamic 1 OD 26 FPOLH I648 v Singi Erap S Dynamic 1 OO SOSBACOLEF L Mirroring Dynamic 1 O0 S0SEACONFS Trap Event Seventy SMTP Configuration UPnP s a a Fig 69 MAC Address Table Type Indicates
83. to specify the amount MAC Addresses allowed to be accessed by an individual port 1 3 7 1 Limit Control This section is used to configure the amount of MAC Addresses allowed to by the port and you can also specify the action taken once this configured threshold has been reached Web Interface To configure the Port Security limitations via the web interface 1 Click Security Port Security and Limit Control 2 Specify the appropriate system settings for your configuration 3 Enable per port settings based on your requirements 4 Click the Apply button to save your changes or the Reset button to revert to previous settings E pu mm mpe m PRESE o n _ e C fi D 19210811 AMS 24T6SFP Auto Logout OFF EE System x rae Configuration a Port Security Limit Control Configuration Refresh v Securty System Configuration IP Source Guard gt ARP Inspection Mode Disabled l gt DHCP Snooping Aging Enabled gt DHCP Relay 600 Sake Aging Period 0 seconds b AAA Port Configuration Port Security M Port Mode Limit Action State Re open Port Status gt Access Management SSH HTTPS Auth Method gt Maintenance Disabled R 4 nt Disabted Dmabied F Disabled Reo Dsabed 4 ne Disabled 4 None Disabled Disabled Disabled 10 Disabled 4 e Disabled Reope 11 Disabled 4 None Disabled Fig 134 Port Security Limit Co
84. voltage fluctuation and flicker in low voltage supply system according to EN 61000 3 3 2008 Immunity Product family standard according to EN 55024 2010 Electrostatic Discharge according to IEC 61000 4 2 2008 7 AMS User Manual Radio frequency electromagnetic field according to IEC 61000 4 3 2006 A1 2007 A2 2010 Electrical fast transient burst according to IEC 61000 4 4 2010 Surge immunity test according to IEC 61000 4 5 2005 Immunity to conducted disturbances Induced by radio frequency Fields IEC 61000 4 6 2008 Power frequency magnetic field immunity test according to IEC 61000 4 8 2009 Voltage dips short interruptions and voltage variations immunity test According to IEC 61000 4 11 2004 LVD EN60950 1 2006 A11 2009 A1 2010EMC Australian C Tick Compliance This equipment is compliant with the required Australian C Tick standards PLEASE READ THE FOLLOWING SAFETY INFORMATION CAREFULLY BEFORE INSTALLING THE SWITCH WARNING Installation and removal of the unit must be carried out by qualified personnel only e This guide is intended for use by network administrators who are responsible for setting up and installing network equipment consequently it assumes a basic working knowledge of LANs Local Area Networks e The unit must be connected to an earthed grounded outlet to comply with international safety standards e Do not connect unit to an A C outlet power supply without an earth ground c
85. whether the entry is a static or a dynamic entry VLAN The VLAN ID of the entry MAC Address The MAC Address of the entry Port Members The ports that are members of the entry Auto Refresh Refresh lt lt gt gt Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 158 AMS User Manual 1 2 10 VLAN The virtual LAN VLAN allows you to group physically separate users into the same broadcast domain The use of VLANs improves security segmentation and flexibility The use of VLANs also decreases the cost of arranging users because no extra cabling is required VLANs allow an administrator to define user groups logically rather than by their physical locations For example you can arrange user groups such as accounting engineering and finance rather than grouping everyone on the first floor everyone on the second floor and so on e VLANs define broadcast domains that can span multiple LAN segments e VLAN segmentation is not bound by the physical location of users e Each switch port can be assigned to only one VLAN e Ports not assigned to the same VLAN do not share broadcasts improving network performance e AVLAN can exist on one switch or on multiple switches e VLANs can connect across wide area networks WANs The figure
86. 0 e MLD Snooping 10 Auto 120 Te gt MYR gt LLOP Th Auto l 128 Filtering Data Base 12 Auto 128 gt VLAN To f Valine VLAN A 2 Ano e 178 z ee Fig 43 MSTI Port Configuration Parameter Description Port Physical port of the switch Path Cost Controls the path cost incurred by the port The Auto setting will set the path cost as appropriate by the physical link speed using the 802 1D recommended values Using a Specific setting a user defined value can be entered The path cost is used when establishing the active topology of the network Lower path cost ports are chosen as forwarding ports in favour of higher path cost ports Valid values are in the range 1 to 200000000 Priority Reset Button Apply Button Controls the port priority This can be used to control priority of ports having identical port cost Used to reset unsaved changes to original configuration Used to save the settings configured on this page 97 AMS User Manual 1 2 4 6 Bridge Status This section is used to display the status information for each of the configured STP Bridges Web Interface To view the Bridge Status via the Web Interface 1 Click Configuration Spanning Tree and Bridge Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information j i ALLOY AMS 24
87. 0 seconds z Aei MAC Table Learning gt ACL Port Members Aggregation Al2ial4lsiet7 a 9 4o s4 12 13 44 15 16 471 48 19 20 241 221 231 24 251 26 gt spanning Tree Mio Ce eee Pee hoe eee ee oe eee aS Spanning gt IGMP Snooping Disi gt MLD Snooping Soone gt MVR Static MAC Table Configuration gt LLOP Y Filtering Data Base Port Members Configuration Delete VLANID MAC Address 1 2 3 4 5 6 r 0 0 x0 11 r2 13 14 05 16 17 0 r9 20 21 z2 23 24 25 20 Dynamk MAC Tabie gt VLAN Add new sialic entry gt Voice VLAN one Apply Reset gt Thermal Protection gt sFiow Agent gt Loop Protection at Seventy SMTP Configuration UPnP Fig 68 MAC Filtering Configuration 156 Parameter Description Aging Configuration MAC Table learning Auto Disable Secure MAC Address Table Delete VLAN ID MAC Address Port Members Add new Static Entry Reset Button Apply Button AMS User Manual By default dynamic entries are removed from the MAC table after 300 seconds This removal is also called aging Configure aging time by entering a value here in seconds The allowed range is 10 to 1000000 seconds Disable the automatic aging of dynamic entries by checking Disable automatic aging If the learning mode for a given port is greyed out another module is in control of the mode so that it cannot be changed by the user An example of such a module is the M
88. 0ms 1sec and 10 seconds intervals The last 120 samples are graphed and the last numbers are displayed as text as well In order to display the SVG graph your browser must support the SVG format Consult the SVG Wiki for more information on browser support Specifically at the time of writing Microsoft Internet Explorer will need to have a plugin installed to support SVG Web Interface To view the CPU Load via the web interface 1 Click System System Information and CPU Load 2 The CPU Load will be displayed on the screen 3 If you wish to enable the Auto Refresh function tick the check box in the top right hand corner of the screen p pae e ES ALLOY AMS 24T6SFP CPU Load Atonio C E fe 100ms 0 Isec 10 10sec 10 all numbers running average Security gt Maintenance Fig 4 CPU Load Parameter Description Auto Refresh To enable Auto Refresh tick the check box in the top right hand corner of the screen 17 AMS User Manual 1 1 2 Time The page is used to configure the time setting on the switch Time can be set manually or via a NTP server By default NTP is used and is set to au pool ntp org 1 1 2 1 Manual The time for the switch can set manually or via a NTP Server When setting manually simply enter the date and time into the paces provided Web Interface To configure the time settings via the Web Interface 1 Click System Time and Manual 2 Select use
89. 1 Configuration 171 1 2 10 6 2 Status 173 1 2 10 7 Protocol based VLAN 174 1 2 10 7 1 Protocol to Group 174 1 2 10 7 2 Group to VLAN 177 1 2 11 Voice VLAN 179 1 2 11 1 Configuration 179 1 2 11 2 OUI 182 1 2 12 GARP 184 1 2 12 1 Configuration 184 1 2 12 2 Statistics 187 1 2 13 GVRP 188 1 2 13 1 Configuration 188 1 2 13 2 Statistics 190 1 2 14 QoS 191 1 2 14 1 Port Classification 191 1 2 14 2 Port Policing 193 1 2 14 3 Port Scheduler 194 1 2 14 4 Port Shaping 198 1 2 14 5 Port Tag Remarking 202 1 2 14 6 Port DSCP 205 1 2 14 7 DSCP based QoS 207 1 2 14 8 DSCP Translation 209 1 2 14 9 DSCP Classification 211 1 2 14 10 QoS Control List 212 1 2 14 11 QCL Status AMS User Manual 217 1 2 14 12 Storm Control 219 1 2 15 s Flow Agent 1 2 15 1 Collector 221 221 1 2 15 2 Sampler 223 1 2 16 Loop Protection 1 2 16 1 Configuration 225 225 1 2 16 2 Status 227 1 2 17 Single IP 1 2 17 1 Configuration 228 228 1 2 17 2 Information 230 1 2 18 Easy Port 1 2 19 Mirroring 1 2 20 Trap Event Severity 1 2 21 SMTP Configuration 1 2 22 UPnP 1 3 Security 1 3 1 IP Source Guard 1 3 1 1 Configuration 232 235 237 239 241 243 243 243 1 3 1 2 Static Table 245 1 3 1 3 Dynamic Table 247 1 3 2 ARP Inspection 1 3 2 1 Configuration 249 249 1 3 2 2 Static Table 251 1 3 2 3 Dynamic Table 1 3 3 DHCP Snooping 1 3 3 1 Configuration 255 25
90. 5 1 3 3 2 Statistics 257 1 3 4 DHCP Replay 1 3 4 1 Configuration 259 259 1 3 4 2 Statistics 261 1 3 5 NAS 1 3 5 1 Configuration 263 263 1 3 5 2 Switch Status 274 1 3 5 3 Port Status 276 1 3 6 AAA 1 3 6 1 Configuration 277 277 1 3 6 2 RADIUS Overview 281 AMS User Manual 1 3 6 3 RADIUS Details 283 1 3 7 Port Security 289 1 3 7 1 Limit Control 289 1 3 7 2 Switch Status 292 1 3 7 3 Port Status 294 1 3 8 Access Management 296 1 3 8 1 Configuration 296 1 3 8 2 Statistics 298 1 3 9 SSH 300 1 3 10 HTTPS 301 1 3 11 Auth Method 303 1 4 Maintenance 305 1 4 1 Restart Device 305 1 4 2 Firmware 306 1 4 2 1 Firmware Upgrade 306 1 4 2 2 Firmware Selection 308 1 4 3 Save Restore 310 1 4 3 1 Factory Defaults 310 1 4 3 2 Save Start 311 1 4 3 3 Save User 312 1 4 3 4 Restore User 313 1 4 4 Export Import 314 1 4 4 1 Export Configuration 314 1 4 4 2 Import Configuration 315 1 4 5 Diagnostics 316 1 4 5 1 Ping 316 1 4 5 2 Ping6 318 1 4 5 3 VeriPHY 319 2 Specifications 320 AMS User Manual About this Guide Purpose this guide gives specific information on how to operate and use the management functions of the switch Audience The guide is intended for use by network administrators who are responsible for operating and maintaining network equipment consequently it assumes a basic working knowledge of general switch funct
91. AC Based Authentication under 802 1X Learning is done automatically as soon as a frame with unknown SMAC is received MAC Addresses will not be learnt Only static MAC entries are learned all other frames are dropped NOTE added to the Static Mac Table before changing to secure learning Make sure that the link used for managing the switch is mode otherwise the management link is lost and can only be restored by using another non secure port or by connecting to the switch via the serial interface The static entries in the MAC table are shown in this table The static MAC table can contain 64 entries The MAC table is sorted first by VLAN ID and then by MAC address Check to delete the entry It will be deleted during the next save The VLAN ID of the entry The MAC address of the entry Checkmarks indicate which ports are members of the entry Check or uncheck as needed to modify the entry Click to add a new static MAC entry Used to reset unsaved changes to original configuration Used to save the settings configured on this page 157 AMS User Manual 1 2 9 2 Dynamic MAC Table Entries in the MAC Table are shown on this page The MAC Table contains up to 8192 entries and is sorted first by VLAN ID then by MAC address Web Interface To view the MAC Address that have been learnt by the switch via the Web Interface 1 Click Configuration Filtering Database and Dynamic MAC Table 2 If you want to auto refresh
92. AN ID CPU Load 400 u gt Time Account iP gt Syslog gt SNMP Vi Reports V2Reports V3Reports V2Leaves Receive Received Received Received a 0 o rPort gt ACL Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping vy MVR Configuration Groups information Statstks gt LLDP Filtering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP Qos gt Thermal Protection gt sFlow Agent Fig 61 MVR Statistics Parameter Description VLAN ID The VLAN ID of the entry V1 Reports Received The number of Received V1 Reports V2 Reports Received The number of Received V2 Reports 133 V3 Reports Received V2 Leaves Received Auto Refresh Refresh AMS User Manual The number of Received V3 Reports The number of Received V2 Leaves Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 134 AMS User Manual 1 2 8 LLDP LLDP enables Ethernet network devices such as switches and routers to transmit and or receive device related information to or from directly connected devices on the network and to store such information learned about other devices The data sent and received by LLDP is useful for many reasons The switch can discover neighbours other devices directly connected to it Devices can use LLDP to advertise some parts of their Layer 2 configuration to their neighbours enabling so
93. Address Indicates the VLAN ID A row of check boxes for each port is displayed for each MAC based VLAN entry To include a port in a MAC based VLAN check the box To remove or exclude the port from the MAC based VLAN make sure the box is unchecked By default no ports are members and all boxes are unchecked Click to add a new MAC based VLAN entry An empty row is added to the table and the MAC based VLAN entry can be configured as needed Any unicast MAC address can be configured for the MAC based VLAN entry No broadcast or multicast MAC addresses are allowed Legal values for a VLAN ID are 1 through 4095 The MAC based VLAN entry is enabled on the selected switch unit when you click on Apply A MAC based VLAN without any port members on any unit will be deleted when you click Apply Used to reset unsaved changes to original configuration Used to save the settings configured on this page 172 AMS User Manual 1 2 10 6 2 Status This section displays the current MAC based VLAN groups configured on the switch Web Interface To view the MAC based VLAN groups via the Web Interface 1 Click Configuration VLAN MAC based VLAN s and Status 2 Select to view Combined Static or NAS based MAC entries by using the drop down box near the top of the screen 3 If you want to auto refresh the information you will need to check the Auto Refresh tick box 4 Click Refresh to manually refresh the information AMAS 24 TO
94. Address The destination IP Address you want to ping it Ping Length The payload size of the ICMP packet Values range from 2 bytes to 1452 bytes Ping Count The count of the ICMP packet Values range from 1 time to 60 times Ping Interval The interval of the ICMP packet Values range from 0 second to 30 seconds 317 1 4 5 2 Ping6 This section is used to test network connectivity issues using the Ping IPv6 command Web Interface AMS User Manual To test IPv6 network connectivity using the switch via the Web Interface 1 Click Maintenance Diagnostics and Ping 2 Enter the IP Address of the device you are trying to communicate with 3 Set the ping Data Length Ping Count and Ping Interval 4 Click the Start button to commence the test AMS TO5FP xy P TZ e f D 19216811 AMS 24T6SFP Auto Logout OFF gt Ea oo mae a ICMPv6 Ping IP Address 0 0 0 0 0 0 0 0 Restart Device Ping Length 56 A peen ing pome Export import Ping Interval Diagnostics Ping Sian een i l I Fig 152 Ping IPv6 Command Parameter Description IP Address The destination IP Address you want to ping it Ping Length The payload size of the ICMP packet Values range from 2 bytes to 1452 bytes Ping Count The count of the ICMP packet Values range from 1 time to 60 times Ping Interval The interval of the ICMP packet Values range from 0 second to 30 seconds 318 AMS User Manual 1 4 5 3 VeriPHY T
95. BPDUs Bridge Protocol Data Units transmitted from the Root Bridge If a bridge does not get a Hello BPDU after a predefined interval Maximum Age the bridge assumes that the link to the Root Bridge is down This bridge will then initiate negotiations with other bridges to reconfigure the network to reestablish a valid network topology STP can run in one of three modes STP RSTP or MSTP A device running RSTP is compatible with other devices running STP a device running MSTP is compatible with other devices running RSTP or STP By default on a device in MSTP mode each port automatically detects the mode of the device connected to it MSTP RSTP or STP and responds in the appropriate mode by sending messages BPDUs in the corresponding format Ports on a device in RSTP mode can automatically detect and respond to connected devices in RSTP and STP mode Particular ports can also be forced to only operate in a particular mode spanning tree force version command STP The Spanning Tree Protocol STP is the original protocol defined by IEEE standard 802 1D 1988 It creates a single spanning tree over a network 87 AMS User Manual STP mode may be useful for supporting applications and protocols whose frames may arrive out of sequence or duplicated for example NetBeui RSTP Rapid Spanning Tree Protocol RSTP also creates a single spanning tree over a network Compared with STP RSTP provides for more rapid convergence to an act
96. Control gt Thermal Protection gt sFlow Agent Loop Protection gt Single IP Easy Port Mirroring Trap Event Seventy SMTP Configuration mono QoS Egress Port Tag Remarking Port 1 Tag Remarking Mode Classi ad Apply Reset Cancel auto Logout oFF gt EEE AEE Pont e J D AMS 20169P e C 19216811 ALLOY AMS 24T6SFP gt MVR gt LLOP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port OSCP DSCP Based QoS OSCP Translation OSCP Classification QOS Control USt QCL Status Stom Contrai gt Thermal Protection sFlow Agent Loop Protection gt Single IP Easy Port Mirroring Trap Event Seventy SMIP Contiquratian enw QoS Egress Port Tag Remarking Port1 Tag Remarking Mode PCPIDEI Configuration DefauitPCP 0 Defaut DEI 0 z Apply Reset Cancot 96 Port Tag Remarking Default Mode 203 Auto Logout FF E ES EIN Pont e AMS User Manual i gt s So AMS IGSFP cr 192 168 1 1 o E ALLoy AMS 24T6SFP Auto Logout lorr gt CEE MEE gt MVR y gt LLOP QoS Egress Port Tag Remarking Port 1 Pon 1 x gt Filtering Data Base gt VLAN Tag Remarking Mode Mapped gt Voice VLAN GARP Q0S class DP level to PCP DEI Mapping gt GVRP QoS class DPlevel
97. DHCP Snooping DHCP Relay gt NAS gt AAA Port Security Switth Status Port Status gt Access Management SSH HTTPS Auth Method gt Maintenance Fig 136 Port Security Port Status 294 Parameter Description AMS User Manual MAC Address and VLAN ID The MAC address and VLAN ID that is seen on this port If no MAC State Time of Addition Age Hola Auto Refresh Refresh addresses are learnt a single row stating No MAC addresses attached is displayed Indicates whether the corresponding MAC address is blocked or forwarding In the blocked state it will not be allowed to transmit or receive traffic Shows the date and time when this MAC address was first seen on the port If at least one user module has decided to block this MAC address it will stay in the blocked state until the hold time measured in seconds expires If all user modules have decided to allow this MAC address to forward and aging is enabled the Port Security module will periodically check that this MAC address still forwards traffic If the age period measured in seconds expires and no frames have been seen the MAC address will be removed from the MAC table Otherwise a new age period will begin If aging is disabled or a user module has decided to hold the MAC address indefinitely a dash will be shown Tick the box to enable the information to be automatically refreshed Used to manually refresh the informat
98. Description Mode Enable or Disable the Global ARP Inspection Port Physical port of the switch 249 Mode Reset Button Apply Button AMS User Manual Select to enable or disable the ARP Inspection function on the select port The global ARP Inspection Mode must also be enabled when enabling each individual port Used to reset unsaved changes to original configuration Used to save the settings configured on this page 250 AMS User Manual 1 3 2 2 Static Table This section is used to enter Static ARP entries into the AMS switch Web Interface To enter Static ARP entries into the Static Table via the Web Interface 1 Click Security ARP Inspection and Static Table 2 Click on Add New Entry 3 Specify the Port VLAN ID IP Address and MAC Address 4 Click the Apply button to save your changes or the Reset button to revert to previous settings AMS 24 TESFP x p CA 519216811 o P AMS 24T6SFP Auto Logout orr E SE system gt Configuration ee Static ARP Inspection Table pect a nau Delete Port VLANID MAC Address IP Address 1 v age Inspection Add nev ww entry f E sacs S Apply Reset i Oynamic Table gt DHCP Snooping gt DHCP Relay NAS gt AAA gt Port Security gt Access Management HTTPS L a Fig 122 Static Table Configuration Parameter Description Delete Check the tick box next to the required entry and press the Apply button Port Physical por
99. E RAEN Daa sesa sesa Auto Logout Orr gt ERENT Ms QoS Ingress Port Classification Port QoSclass DPlevel PCP DEI TagClass DSCP Based ofl ole i e o slic i MME PIPER mod slol cs Papa Ce E l olmaniz 3lol oel sl lol el o ollsllol el l ol lsilo ol olloll Fig 86 QoS Port Classification Physical port of the switch Controls the default QoS class i e the QoS class for frames not classified in any other way There is a one to one mapping between QoS class queue and priority A QoS class of 0 zero has the lowest priority Every incoming frame is classified to a Drop Precedence Level DP level which is used throughout the device for providing congestion control guarantees to the frame according to what was configured for that specific DP level This setting controls the default DP level i e the DP level for frames not classified in any other way Controls the default PCP for untagged frames PCP is an acronym for Priority Code Point It is a 3 bit field storing the priority level for the 802 1Q frame Controls the default DEI for untagged frames DEI is an acronym for Drop Eligible Indicator It is a 1 bit field in the VLAN tag Shows the classification mode for tagged frames on this port Disabled Use default QoS class and DP level for tagged frames Enabled Use mapped versions of PCP and DEI for tagged frames Click on the mode in order to configure the mode and or mapping
100. FF EEE CI Pron gt ACL Protocol to Group Mapping Table Rofests gt Aggregation i Spanning Tree Delete Frame Type Value Group Name gt IGMP Snooping No Graup entry found gt MLD Snooping gt MVR LLOP Filtering Data Base Y VLAN VLAN Membership Ports Add mew entry Apply Reset Switch Status Port Status gt Private VLANs J f gt MAC based VLAN Protocol based VLAN Protocol to Group aeai gt GARP GVRP crm gt Loop Protection Single IP Fig 78 Protocol based VLAN s Parameter Description Delete To delete a Protocol based VLAN entry check this box and press Apply The entry will be deleted on the selected switch Frame Type Select the frame type for the group valid values are Ethernet LLC and SNAP Gi NOTE Once you change the Frame type field the valid value of the following text field will vary depending on the new frame type you have selected Value Valid values that can be entered in this text field depends on the option selected from the preceding Frame Type selection menu Below is the criteria for three different Frame Types Ethernet Values in the text field when Ethernet is selected as a Frame Type is called etype Valid values for etype ranges from 0x0600 Oxffff LLC Valid value in this case is comprised of two different sub values a DSAP 1 byte long string 0x00 Oxff b SSAP 1 byte long string Ox00 Oxff SNAP Valid value in this case
101. IP Addresses into the Static Table via the Web Interface 1 Click Security IP Source Guard and Static Table 2 Click on Add New Entry 3 Specify the Port VLAN ID IP Address and MAC Address 4 Click the Apply button to save your changes or the Reset button to revert to previous settings AMS 24 TASFP x 4 t C A D 19216811 ALLOY c PFPPPRPPEPPR o inm AMS 24T6SFP Auto Logout orr ERE BEE system Configuration Static IP Source Guard Table Tacu _ Delete Port VLANID IP Address MAC address VIP Source Guard ro On lete r Configuration Statie Table Dynamic Table Add new entry gt ARP Inspection gt DHCP Snooping DHCP Relay NAS gt AAA gt Port Security gt Access Management SSH HTTPS i Auth Method Apply Reset Maintenance if u a Fig 119 Static Table Configuration Parameter Description Delete Check the tick box next to the required entry and press the Apply button Port Physical port of the switch VLAN ID The VLAN ID of the static entry IP Address The IP Address of the static entry MAC Address The MAC Address of the static entry 245 AMS User Manual Add New Entry Click to add a new static entry Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 246 AMS User Manual 1 3 1 3 Dynamic Table This section is used to view the dynamic IP
102. LAN groups relating to that protocol will be displayed 3 If you want to auto refresh the information you will need to check the Auto Refresh tick box 4 Click Refresh to manually refresh the information cf 192 168 1 1 AMS 24T6SFP T Gonnguranon a gt Por VLAN Membership Status gt ACL Aggregation Steet from WLAN ties per page lex gt Spanning Tree gt IGMP Snooping ep aes 1 wth 20 ent gt MLD Snooping a 41 2 3 4 5 6 7 08 9 10 3 14 95 16 17 18 soles 24 22 23 24 25 26 EMYR e S f LLOP Fiitering Data Base gt Protocol based VLAN Voice VLAN gt GARP gt GVRP gt Qos gt Thermal Protection gt sFlow Agent gt Loop Protection Single IP gt MAC based VLAN ij SMTP Configuration UPnP gt Security s e Fig 72 VLAN Status Parameter Description VLAN ID Indicates the VLAN ID of the particular entry Port Members Displays the port members that belong to a particular VLAN group If the check box it ticked it means that port belongs to that VLAN group Auto Refresh Tick the box to enable the information to be automatically refreshed 164 AMS User Manual Refresh Used to manually refresh the information on the page lt lt gt gt The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 165 AMS User Manual 1 2 10 4 Port Status
103. LD Snooping parameters via the Web Interface 1 Click Configuration MLD Snooping and Basic Configuration 2 Select to enable or disable MLD Snooping on the switch 3 Configure ports to be Router Ports Fast Leave Ports and select whether you would like to enable throttling 4 Click the Apply button to save your changes or the Reset button to revert to previous settings 117 AMS User Manual r u e EN j AMS 24 TOSFP x 4 CA DIa amp RNA VESF Auto Logout jorr SIN MII Account a a riF MLD Snooping Configuration r Syslog Global Configuration gt SNMP Sn Enable Agonpauravon aia PAO Flodding Enabled T gt ACL MLD SSM Range fie 196 Aggregation Proxy Enabled I P Spanning m Port Related Configuration bbc aioe tape Port RouterPort FastLeave Throttling Basic Configuration as m VLAN Configuration Pon Group Fitenng 1 unlined ini Status 2 unlirrated r Groups information F 3 unlimited IPv6 SSM Information 7 AAS gt MVR gt LLDP 5 unlimited 5 gt Filtering Data Base 6 unlirrated VLAN T unlimited j gt Voice VLAN 8 unlisted el gt GARP GVRP 3 unlimited i gt QoS 10 unlisted f Thermal Protection 11 unlimited e i sFlow Agent 12 unlimited ber f gt Loop Protection gt Single IP 13 unlimited ja f Easy Por 4 unlimited i N Fig 53 MLD Snooping Configuration Parameter Description Snooping Enabl
104. LDP Contiguration gt Thermal Protection gt aFlow Anant i Fig 65 LLDP MED Neighbours Parameter Description Port The port on which the LLDP frames have been received Device Type LLDP MED Devices are comprised of two primary Device Types Network Connectivity Devices and Endpoint Devices LLDP MED Network Connectivity Device Definition LLDP MED Network Connectivity Devices as defined in TIA 1057 provide access to the IEEE 802 based LAN infrastructure for LLDP MED Endpoint 147 LLDP MED Endpoint Device Definition LLDP MED Generic Endpoint Class l LLDP MED Media Endpoint Class II AMS User Manual Devices An LLDP MED Network Connectivity Device is a LAN access device based on any of the following technologies 1 LAN Switch Router 2 IEEE 802 1 Bridge 3 IEEE 802 3 Repeater included for historical reasons 4 IEEE 802 11 Wireless Access Point 5 Any device that supports the IEEE 802 1AB and MED extensions defined by TIA 1057 and can relay IEEE 802 frames via any method LLDP MED Endpoint Devices as defined in TIA 1057 are located at the IEEE 802 LAN network edge and participate in IP communication service using the LLDP MED framework Within the LLDP MED Endpoint Device category the LLDP MED scheme is broken into further Endpoint Device Classes as defined in the following Each LLDP MED Endpoint Device Class is defined to build upon the capabilities defined for the previous End
105. Layer 2 network and reduce the amount of bandwidth consumed by this multicast traffic In a standard Layer 2 network a multicast stream received on one VLAN is never distributed to interfaces outside that VLAN If hosts in multiple VLANs request the same multicast stream a separate copy of that multicast stream is distributed to the requesting VLANs MVR introduces the concept of a multicast source VLAN MVLAN which is created by MVR and becomes the only VLAN over which IPTV multicast traffic flows throughout the Layer 2 network The Alloy AMS Series Switches that are enabled for MVR selectively forward IPTV multicast traffic from interfaces on the MVLAN source interfaces to hosts that are connected to interfaces that are not part of the MVLAN These interfaces are known as MVR receiver ports The MVR receiver ports can receive traffic from a port on the MVLAN but cannot send traffic onto the MVLAN and they remain in their own VLANs for bandwidth and security reasons 1 2 7 1 Configuration This section is used to enable and configure MVR on the AMS Series switches Web Interface To configure the MVR parameters via the Web Interface 1 Click Configuration MVR and Configuration 2 Select to enable or disable MVR 3 Configure settings for each individual port 4 Click the Apply button to save your changes or the Reset button to revert to previous settings 130 AMS 24T6SFP e cn j AMS User Manual 192 168 1 1
106. Local Settings 3 Enter the time and date into the Local Time field 4 Enter the Time Zone Offset 5 If you would like to enable Daylight Savings un tick the box and enter the required Time Offset and the dates for when Daylights Savings begins and ends 6 Click Save to apply your changes N oeo K E a ei C Omen z ALLOY AMS 2476SFP Time Configuration Clock Source Local Time Fig 5 Manual Time Settings 18 Parameter Description Clock Source Local Time Time Zone Offset Daylight Savings Time Set Offset Daylight Savings Type From To AMS User Manual Select what clock source the switch will use for its time configuration Use Local Settings allows you to manually set the time or use NTP Server to allow the switch to sync it s time with an external NTP time server Displays the current time when using NTP Server or is used to set the time when using Local Settings Provide the time zone offset relative to UTC GMT The offset is given in minutes east of GMT The valid range is from 720 to 720 minutes E g 10 will be 600 minutes Daylight saving is adopted in some countries If set it will adjust the time by adding or removing time in unit of hours according to the starting date and the ending date For example if you set the day light saving to be 1 hour When the time passes over the starting time the system time will be increased by one hour When the time passes ov
107. MS 24T6SFP gt Cfi 5 19216811 Eeneeajeseceal ALLOY DEEE a i n AMS 24T6SFP Auto Logout ore gt DEERE EGE gt Account a gt P MLD Snooping Groups Information Auto cetesh E Rakesh Cisa 25 gt Syslog gt SNMP Start from VLAN 1 and group addmss NOO wath 20 entrons per page gt nis Port Members gt ACL VLANID Groups 1 2 3 4 5 6 7 8 9 10 41 12 13 14 15 16 17 10 19 20 21 22 23 24 25 26 No more entnes Aggregation gt Spanning Tree gt IGMP Snooping MLD Snooping Basic Configuration VLAN Configuration Port Group Filtenng Status Groups Information IPV SSM information gt MVR gt LLOP gt Filtering Data Base gt VLAN Voice VLAN gt GARP gt GVRP gt Qos gt Thermal Protection gt sFlow Agent gt Loop Protection Teny Port Fig 57 MLD group information Parameter Description VLAN ID The VLAN ID of the entry Groups MLD group address Port Members Physical Ports on the switch that belong to the MLD Multicast Group Auto Refresh Tick the box to enable the information to be automatically refreshed 126 AMS User Manual Refresh Used to manually refresh the information on the page lt lt gt gt The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 127 AMS User Manual 1 2 6 6 IPv6 SSM Information Source Specific Multicast SSM is a datagram delivery model that best supports one to man
108. MS User Manual Rx and Tx ACK The number of ACK option 53 with value 5 packets received and transmitted Rx and Tx NAK The number of NAK option 53 with value 6 packets received and transmitted Rx and Tx Release The number of release option 53 with value 7 packets received and transmitted Rx and Tx Inform The number of inform option 53 with value 8 packets received and transmitted Rx and Tx Lease Query The number of lease query option 53 with value 10 packets received and transmitted Rx and Tx Lease Unassigned The number of lease unassigned option 53 with value 11 packets received and transmitted Rx and Tx Lease Unknown The number of lease unknown option 53 with value 12 packets received and transmitted Rx and Tx Lease Active The number of lease active option 53 with value 13 packets received and transmitted Auto Refresh Tick the box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 258 1 3 4 DHCP Replay AMS User Manual The AMS Series switches supports the DHCP Relay function DHCP Relays are used to forward DHCP requests to other DHCP Server on the same or on another subnet This section is used to configure the DHCP Relay parameters 1 3 4 1 Configuration This section is used to configure the DHCP Relay settings for the AMS switch Web Interface To configure the DHCP Relay settings of the switch via the Web Int
109. MTP Configuration Ono ig Fig 91 Port Shaping 198 AMS User Manual D AMS 201656P 5 C fe 5 19216811 ALLOY AMS 24T6SFP Time ee i QoS Egress Port Scheduler and Shapers Port 1 om _ Scheduler Mode gt Syslog gt SNMP _ Gontiguration gt Port ACL Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base P VLAN gt Voice VLAN gt GARP GVRP QoS Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP OSCP Based QoS DSCP Translation l D AMS 24165FP fe 19216811 ALLOY AMS 24T6SFP gt Time QoS Egress Port Scheduler and Shapers Port 1 gt Account oe _ Scheduler Mode gt Syslog P gt SNMP X Gontiguration gt Port ACL Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base gt VLAN Voice VLAN gt GARP GVRP Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP DSCP Based QoS DSCP Translation Fig 93 Port Shaping Weighted Parameter Description QoS Egress Port Shapers Port Physical port of the switch 199 auto Logout oF 7 TE GE Port e J Auto Logout oFF 7 TEE ME Por 1 e Mode Weight QO 5 AMS User Manual Displays the configured Mode type Strict P
110. Name The group name in which a privilege level can be assigned to Privilege Levels The privilege levels can be set from 1 through to 15 Level 15 is the highest level and will give you read write access to the entire system Each group can have a privilege level assigned For a user to have access to that the group their privilege level must be equal or greater than the group value By default every group is set to level 10 except the maintenance group which is set to 15 When creating users guest users would be set to privilege level 5 standard users to 10 and administrators to 15 Guests will then have read only access to the system standard users can do everything except maintenance tasks and the administrator will have full control of the switch 23 AMS User Manual 1 1 4 IP IP is an acronym for Internet Protocol It is a protocol used for communicating data across an internet network IP is a best effort system which means that no packet of information sent over is assured to reach its destination in the same condition it was sent Each device connected to a Local Area Network LAN or Wide Area Network WAN is given an Internet Protocol address and this IP address is used to identify the device uniquely among all other devices connected to the extended network The current version of the Internet protocol is IPv4 which has 32 bits Internet Protocol addresses allowing for in excess of four billion unique addresses This number
111. OFF STEN BEEE gt System r Configuration RADIUS Authentication Statistics Server 1 ri Auto refresh EI Retesh Clear T Sapun a Receive Packets Transmit Packets gt IP Source Guard Acoma Accepts 0 Access Requests 0 gt ARP Inspection Access Rejects 0 Access Retransmissions 0 W gt DHCP Snooping Access Challenges 0 Pending Requests 0 gt DHCP Relay Matformed Access Responses 0 Timeouts 0 gt NAS Dad Authenticators 0 YAAA Unknown Types 0 Configurat Packets Dropped 0 fl Configuration Other Info RADIUS Overview IP Address 00001812 RADIUS Oejails State Disabled H gt Port Security Round Trip Time Oms gt Access Management PEE 3SH RADIUS Accounting Statistics for Server 1 MTTPS Receive Packets Transmit Packets Auth Method Responses 0 Requests 0 gt Maintenance Mallormed Responses 0 Retansmissions 0 Bad Authenticalors Pending Requests 0 Unknown Types 0 Timeouts 0 Packets Dropped Lil Other Info IP Address 0 0 0 01813 State Disabled Round Trip Time Oms i i Fig 133 RADIUS Detailed Statistics Parameter Description RADIUS Authentication Statistics Packet Counters RADIUS authentication server packet counter There are seven receive and four transmit counters Direction Name RFC4668 Name Description Access radiusAuthClientExtAccess The number of RADIUS Access Accept Accepts Accepts packets valid or invalid received from the 283 Rx Rx Rx Rx Rx Rx Tx Tx Tx Access Rejects
112. P VLAN normal participant z gt MVR B 200 600 10000 GVRP l VLAN normat participant e PaRa y 200 600 10000 GVRP Le VLAN normal participent gt Filtering Data Base VLAN ah 200 600 10000 GVRP VLAN normal participant Voice VLAN 44 300 600 10000 GVRP VLAN nomal participant 7 prar 12 200 600 10000 Or VLAN ad sonnel perecipett al f Statistics 13 200 600 10000 GVRP VLAN normal panticipant gt GVRP 14700 600 10000 GVRP VLAN normal panticipant gt Qos Rian Eii 15 20 400 10000 GVRP gt VLAN f normat participant xi sFlow Agent ie 200 600 10000 GVRP Le VLAN normal participant Le gt Loop Protection 17 200 600 10000 GVRP VLAN normal participant e gt Single IP y A kel Easy Pon 18 20 s00 10000 GVRP e VLAN normat participant f Mirroring 19 200 600 10000 GVRP VLAN Ly normal participant Trap Event Severity 2 200 600 10000 GVRP VLAN e normabparticipant SMTP Configuration UPnP E 21 200 600 10000 Gyre e VLAN normal participant Le e _ Parameter Description Port Timer Values Application Attribute Type GARP Applicant Fig 82 GARP Configuration Physical port of the switch To set the GARP Join Timer Leave Timer and Leave All Timer the units are set in micro seconds Join Timer The de
113. P Snooping is a way for Layer 2 switches to reduce the amount of multicast traffic on a LAN Without IGMP Snooping Layer 2 switches handle IP multicast traffic in the same manner as broadcast traffic and forward multicast frames received on one port to all other ports in the same VLAN IGMP Snooping allows switches to monitor network traffic and determine hosts to receive multicast traffic by looking into IGMP packets to learn which attached hosts need to receive which multicast groups This allows the switch to forward multicast traffic only out the appropriate ports If it sees multiple reports sent for one group it will forward only one of them Joining a multicast group Membership report When a host wants to receive a stream referred to as joining a group it sends out an IGMP packet containing the address of the group it wants to join This packet is called an IGMP Membership report often referred to as a join packet This packet is forwarded through the LAN to the local IGMP querier which is typically a router Once the querier has received an IGMP join message it knows to forward the multicast stream to the host If it is not already receiving the stream it must tell the devices between itself and the multicast source which may be some hops away from the querier that it wishes to receive the stream This might involve a process of using Layer 3 multicast protocols to signal across a WAN or it might be as simple as receivin
114. Port Security 1 sanies Untmnec zl gt Access Management 2 Desabled Unima Pan sabi iz inlimned i HTTPS 3 Desabied e Unkmtod izl Auth Method 4 Disabled x Unlimited b2 r Maintenance 5 Disabled e Unimaad E Disabled Untmites T Osabled e Unimted B Drsabind e United zl 9 Disabled x Unkmted 7 f f 11 Ovabled ie 12 Disabled Uniimned Fig 118 IP Source Guard Configuration 243 Parameter Description Mode Port Mode Max Dynamic Clients Reset Button Apply Button AMS User Manual Enable the Global IP Source Guard or disable the Global IP Source Guard All configured ACEs will be lost when the mode is enabled Physical port of the switch Select to enable or disable the IP Source Guard function on the select port The global IP Source Guard Mode must also be enabled when enabling each individual port Specify the maximum number of dynamic clients that can be learnt on any given port This value can be 0 1 2 or unlimited If the port mode is enabled and the value of max dynamic client is equal to 0 only IP Packets that have been entered into the static table will be forwarded Used to reset unsaved changes to original configuration Used to save the settings configured on this page 244 AMS User Manual 1 3 1 2 Static Table This section is used to enter Static IP addresses into the AMS switch Web Interface To enter Static
115. Priority or Weighted Shows the current weight for this queue and corresponding port QoS Egress Port Scheduler and Shapers Strict Priority Scheduler Mode Queue Shaper Enable Queue Shaper Rate Queue Shaper Unit Queue Shaper Excess Port Shaper Enable Select the required Scheduler Mode for the port Strict Priority or Weighted Tick the box next to the appropriate queue to enable the Queue Shaper Enter the required bandwidth rate maximum values are based on the speed on the port If running at 1Gb 1000000 Kbps or 1000Mbps Default value is 500 Select whether the shaping rate is measured in kbps or Mbps Default is kbps Enable this if the queue is allowed to use excess bandwidth available on the switch Tick the box to enable Port shaping on the selected port 196 AMS User Manual Port Shaper Rate Enter the required bandwidth rate maximum values are based on the speed on the port If running at 1Gb 1000000 Kbps or 1000Mbps Default value is 500 Port Shaper Unit Select whether the shaping rate is measured in kbps or Mbps Default is kbps Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page QoS Egress Port Scheduler and Shapers Weighted Scheduler Mode Select the required Scheduler Mode for the port Strict Priority or Weighted Queue Shaper Enable Tick the box next to the appropriate queue to enable the Queue
116. Pv2c and will be available once a SNMPv2c community has been created in the communities section USM Reserved for User based Security and will be available once a user has been created in the Users section The security name can be selected from any of the SNMP communities that you have created under the communities section Enter a group name to identify the group you are creating Allowed length of 1 to 32 characters 39 AMS User Manual 1 1 6 6 Views This section is used to configure SNMPv3 views Web Interface To configure SNMP Views via the Web Interface 1 Click System SNMP and Views 2 Click on Add New View to configure a new View Enter the required view details 3 Click Save to apply your changes ee or p Matec apt TT Porn te seers ringer Sermn TER ttre Pref Rete T Ed row es Somse Sanh TE wee save nee a C oee z ate a Fig 14 SNMPv3 View Parameter Description Delete Select the tick box and click the apply button to delete a View Add New View Used to add a new view 40 AMS User Manual i amam Fig 15 Add a new SNMPv3 View Parameter Description Delete Select the delete button next to the view you would like to delete View Name Enter a view name to identify the view you are creating Allowed length of 1 to 32 characters View Type Select the view type from the options below Included Used to allow a particular OID subtree to be displayed in the view Excluded Used to
117. S x c cn 192 168 1 1 TE amp E AMS 24T6SFP Auto Logout OFF EEEN SIE Pron A gt ree MAC based VLAN Membership Configuration for User Static Static Autovefresh Refresh k EGS trsi Port Members IGMP Snooping MAC Address VLANID 1 2 3 4 5 6 7 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 gt MLO Snooping No data exists for the user gt MVR gt LLOP Filtering Data Base Y VLAN VLAN Membership Ports Swrich Status Port Status Private VLANS Y MAC based VLAN Configuration Status gt Protocol based VLAN gt Voice VLAN P GARP GVRP gt Qos gt Thermal Protection gt sFlow Agent Loop Protection gt Single IP E Fig 77 MAC based VLAN Status Parameter Description MAC Address Indicates the MAC Address VLAN ID Indicates the VLAN ID Port Members Port members of the Mac based VLAN entry Auto Refresh Tick the box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 173 AMS User Manual 1 2 10 7 Protocol based VLAN This section describes Protocol based VLAN the AMS Series support Protocols including Ethernet LLC and SNAP LLC The Logical Link Control LLC data communication protocol layer is the upper sub layer of the Data Link Layer which is itself layer 2 just above the Physical Layer in the seven layer OSI reference model It provides multiplexing mechanisms that m
118. SYN value for this rule Any any value is allowed 0 TCP frames where the SYN field is set must not match this entry 1 TCP frames where the SYN field is set must match this entry Default Any Specifies the TCP Reset the connection RST value for this rule Any any value is allowed 0 TCP frames where the RST field is set must not match this entry 1 TCP frames where the RST field is set must match this entry Default Any Specifies the TCP Push Function PSH value for this rule Any any value is allowed 0 TCP frames where the PSH field is set must not match this entry 1 TCP frames where the PSH field is set must match this entry Default Any Specifies the TCP Acknowledgment field significant ACK value for this rule Any any value is allowed 0 TCP frames where the ACK field is set must not match this entry 1 TCP frames where the ACK field is set must match this entry Default Any Specifies the TCP Urgent Pointer field significant URG value for this rule Any any value is allowed 0 TCP frames where the URG field is set must not match this entry 1 TCP frames where the URG field is set must match this entry Default Any Specifies the time to Live settings for this rule Any any value is allowed Non zero IPv4 frames with a TTL field greater than zero must match this entry Zero IPv4 frames with a TTL field greater than zero must not match this entry Default Any 72 IP Fra
119. Shaper Queue Shaper Rate Enter the required bandwidth rate maximum values are based on the speed on the port If running at 1Gb 1000000 Kbps or 1000Mbps Default value is 500 Queue Shaper Unit Select whether the shaping rate is measured in kbps or Mbps Default is kbps Queue Shaper Excess Enable this if the queue is allowed to use excess bandwidth available on the switch Queue Scheduler Weight Controls the weight of the queue This is a percentage of total bandwidth available valid values 1 to 100 Default is 17 Queue Scheduler Percent Shows the weight in percent for this queue Port Shaper Enable Tick the box to enable Port shaping on the selected port Port Shaper Rate Enter the required bandwidth rate maximum values are based on the speed on the port If running at 1Gb 1000000 Kbps or 1000Mbps Default value is 500 Port Shaper Unit Select whether the shaping rate is measured in kbps or Mbps Default is kbps Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 197 AMS User Manual 1 2 14 4 Port Shaping This section provides an overview of QoS Egress Port shaping for all switch ports Web Interface To configure the QoS Port Shaping settings via the Web Interface 1 Click Configuration QoS and Port Shaping 2 Click on the required port to configure the shaping options 3 You will now be prompted with another screen
120. Source When set to source the port should be connected to a device that is sending the multicast stream If set to receiver the port will be connected to a device that is wanting to receive the multicast stream Enable Multicast s fast leave parameter on the port Used to reset unsaved changes to original configuration Used to save the settings configured on this page 131 AMS User Manual 1 2 7 2 Groups Information This section displays the learnt MVR groups The MVR Group Table is sorted first by VLAN ID and then by group They will use the last entry of the currently displayed table as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over Web Interface To view the MVR Group Information via the Web Interface 1 Click Configuration MVR and Groups Information 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information _ T D AMS 24T6sFP e C 192 168 1 1 krs ALLOY AMS 24T6SFP Auto Logout oFF gt EEE MGI System Y System Intormation MVR Groups Information Autor tesh E Rakesh Cisa o gt Information Configuration Start from VLAN 1 add grup addins 2724000 with 20 amines par page CPU Load Port Members mee VLAN ID Groups 1 2 3 4 5 6 7 0 9 10 41 12 13 14 15 16 17 10 49 20 21 22 23 24 25 26 gt Account No mor
121. Source Guard entries Web Interface To view the Dynamic IP Addresses via the Web Interface 1 Click Security IP Source Guard and Dynamic Table 2 To filter the entries you can select the Start from Port VLAN ID and or IP Address 3 If you want to auto refresh the information you will need to check the Auto Refresh tick box 4 Click Refresh to manually refresh the information gt ANAS 24 TOSFP _ E C f 19216811 ALLOY EES EEE tn AMS 24T6SFP Auto Logout lorr gt ESET MCI a Dynamic IP Source Guard Table Auto reftesh E Refresh Cisa baa Security IP Source Guard Start from Pont VLAN 1 and IP address 000 0 with 20 entnes per page l pains shea Port VLANID IP Address MAC Address Static Table No move entnes 1 Dynamic Table gt ARP Inspection gt DHCP Snooping I gt DHCP Relay PNAS gt AAA Port Security i gt Access Management SSH HTTPS Auth Method _ Maintenance Fig 120 Dynamic Table Parameter Description Port Physical port of the switch VLAN ID VLAN ID of the IP traffic that s permitted IP Address IP Address of the dynamic entry Mac Address MAC Address of the dynamic entry Auto Refresh Refresh Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 247 AMS User Manual lt lt gt gt The arrow keys are used to navigate between the pages displaying the cu
122. System Information STP Bridge Configuration Information Configuration CPU Load Protocol Version MSTP gt Time Bridge Priority 32768 l i Forward Delay 15 gt Syslog Max Age 20 Maximum Hop Count 20 Transmit Hold Count 6 gt Port gt ACL gt Aggregation Y Spanning Tree Bridge Settings MSTI Mapping MSTI Priorities CIST Ports MSTI Ports Bridge Status Port Status Port Statistics gt IGMP Snooping gt MLD Snooping gt MVR gt LLDP gt Filtering Data Base gt VLAN gt Voice VLAN Advanced Settings Edge Port BPDU Filtering Edge Port BPDU Guard Port Error Recovery Port Error Recovery Timeout OG Apply Reset Parameter Description Protocol Version Bridge Priority Fig 37 STP Bridge Settings Select the appropriate STP protocol STP RTP or MSTP Default value is MSTP Controls the bridge priority The Lower the numeric value the higher the priority The bridge priority plus the MSTI instance number concatenated with the 6 byte MAC address of the switch forms a Bridge Identifier For 89 Forward Delay Max Age Maximum Hop Count Transmit Hold Count Edge Port BPDU Filtering Edge Port BPDU Guard Port Error Recovery Port Error Recovery Timeout Reset Button Apply Button AMS User Manual MSTP operation this is the priority of the CIST Otherwise this is the priority of the STP RSTP Brid
123. T6SFP System v System Information Information Cantiquration CPU Load gt Time gt Account iP gt Syslog gt SNMP X Configuration gt Port gt ACL gt Aggregation Spanning Tree Bridge Settings MSTI Mapping MSTI Priorities CIST Ports MSTI Ports Bridge Status Pon status Port Statistics gt IGMP Snooping MLD Snooping MVR gt LLOP Filtering Data Base gt VLAN gt Voice VLAN Parameter Description MSTI Bridge ID Root ID Root Port Root Cost rm Ekek Femme crete mene prey et a e C A 6 192 16811 2 amp Auto Logout lorr mE rye ft STP Bridges Aute relrest Rehesh logy Topology Maz Briggs 0 ID Port Cost Flag Change Last CIST 80 00 00 00 80 00 00 F2 80 00 00 00 8C 00 00 F2 z O Steady 4 Fig 44 Bridge Status Information The Bridge Instance This is also a link to the STP Detailed Bridge Status The Bridge ID of this Bridge instance The Bridge ID of the currently elected root bridge The switch port currently assigned the root port role Root Path Cost For the Root Bridge it will be zero For all other Bridges it is the sum of the Port Path Costs on the least cost path to the Root Bridge 98 AMS User Manual Topology Flag The current state of the Topology Change Flag of this Bridge instance Topology Change Last The time since the last Topology Change occurred Auto Refresh Tick the box to enable the information
124. User Manual Enable IGMP Snooping for each individual VLAN group A maximum of 32 VLAN s can be enabled at any one time A router is used to send IGMP query messages to IGMP enabled hosts The IGMP router can also be called the IGMP Querier This option is used to enable the IGMP Querier function on an individual VLAN Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP operating on hosts and routers within a network The allowed selection is IGMP Auto Forced IGMPv1 Forced IGMPv2 and Forced IGMPv3 Default compatibility value is IGMP Auto Robustness Variable The Robustness Variable allows tuning for the expected packet loss on a network The allowed range is 1 to 255 Default robustness variable value is 2 Query Interval The Query Interval is the interval between General Queries sent by the Querier The allowed range is 1 to 31744 seconds Default query interval is 125 seconds Query Response Interval The Max Response Time used to calculate the Max Resp Code inserted into the periodic General Queries The allowed range is 0 to 31744 in tenths of seconds Default query response interval is 100 in tenths of seconds 10 seconds Last Member Query Interval The Last Member Query Time is the time value represented by the Last Member Query Interval multiplied by the Last Member Query Count The allowed range is 0 to 31744 in tenths of seconds Default last member query inter
125. VLAN a 0 0 LJ 0 9 0 0 0 0 0 J 0 0 0 0 9 Voice VLAN s pO E TO D AG A ak D FO O 0 HLS D 0 gt GARP 2 T Tg mh He 0 0 00 0 o TES 0 o0 Qo 0 a 0 J 0 0 L 0 o 0 0 0 0 0 0 S ovnr 2 Oct O8 NO WE TH oC OF E EN CS eK OK Mei re a gt Qos 2 T EO TO a A ea A a o Oye ees ew 0 gt Thermal Protection 2 o 0 0 0 o o0 mn Oe o o0 o o o o0 0 0 sFiow Agent a Dy PO ED LG FO Ot he HB EN PO EET EOE SO ER EA SIE DE EA EN ee eh EEr Fig 24 QoS Statistics Parameter Description Port Click on the port number to view the detailed statistics QO Q7 RX TX The number of transmitted and received packets for QO to Q7 per port Auto Refresh To enable auto refreshing of the statistics on the screen tick this tick box Refresh Used to manually refresh the statistics Clear Used to clear the current statistical data 55 AMS User Manual 1 2 1 6 SFP Information This section displays the detailed information regarding the SFP module s installed in the switch Web Interface To view the detailed SFP Information via the Web Interface 1 Click Configuration Port and SFP Information 2 Select the port you want to view 3 If you would like the page to auto refresh the SFP Information check the Auto Refresh tick box at the top of the page or alternatively hit the refresh button to refresh the page manually AMS 24TESFP e c 192 16811 m AMS 24T6SFP ec Logout Hop Tconnguron SFP information for Port 21
126. a specific queue done with QOS and then mark the queue as an urgent queue When an urgent queue gets data to be transmitted the circuits will be powered up at once and the latency will be reduced to the wakeup time only Web Interface To configure the EEE Power Saving options via the Web Interface 1 Click Configuration Port and EEE 2 To enable the EEE function for a port tick the box next to the corresponding port 3 Select the desired EEE Urgent Queue values for each port 4 Click the Apply button to save your changes or the Reset button to revert to previous settings 58 O AMS 24T6SFP 0 192 168 1 1 ALLOY AMS 24T6SFP _ gt System Y Configuration Y Port Configuration Port Description Traffic Overview Detailed Statistics QoS Statistics SFP Information EEE gt ACL gt Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLDP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP gt Qos Thermal Protection gt sFlow Agent Loop Protection gt Single IP Easy Port Mirroring Trap Event Severity SMTP Configuration UPnP gt Security gt Maintenance Port EEE Enabled EEE Urgent Queues Parameter Description AMS User Manual Auto Logout OFF Help EEE Configuration EEE Ui EEE Enabled Toe Je OO 1 m Oo al o E anA
127. a description of the individual states 274 Last Source Last ID QoS Class Port VLAN ID Auto Refresh Refresh AMS User Manual The source MAC address carried in the most recently received EAPOL frame for EAPOL based authentication and the most recently received frame from a new client for MAC based authentication The user name supplicant identity carried in the most recently received Response Identity EAPOL frame for EAPOL based authentication and the source MAC address from the most recently received frame from a new client for MAC based authentication QoS Class assigned to the port by the RADIUS server if enabled The VLAN ID that NAS has put the port in The field is blank if the Port VLAN ID is not overridden by NAS Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 275 AMS User Manual 1 3 5 3 Port Status This section is used to view the Port Status of the NAS function on the AMS switch Web Interface To view the Port related NAS information via the Web Interface 1 Click Security NAS and Port Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information a s a AMS JATESF e C fi D 19216811 ALLOY AMS 24T6SFP Virerervereerepe Tt Auto Logout OFF TEPER BCE system Configuration Se
128. able Disable Mirroring 16 Disable Disable lw Trap Event Seventy 7 Disable gt Disable e SMIP Configuration wna 18 Disable gt Disable z rono E a Fig 98 Port DSCP Settings Parameter Description Port Physical port of the switch Ingress Translate To enable ingress translation of the DSCP value enable this feature Classify Classification values available for the port are as follows Disable No Ingress DSCP Classification DSCP 0 Classify if incoming or translated if enabled DSCP is 0 Selected Classify only selected DSCP values for which classification is 205 Egress Rewrite Reset Button Apply Button AMS User Manual enabled as specified in DSCP Translation window for the specific DSCP All Classify all DSCP values DSCP Values can be rewritten based on the below parameters Disable No Egress rewrite Enable Rewrite enable without remapping the DSCP value Remap DP Unaware Frame with DSCP from analyser is remapped and remarked with the remapped DSCP value The mapped DSCP value is always taken from the DSCP Translation table Remap DP Aware Frame with DSCP from analyser is remapped and remarked with the remapped DSCP value Depending on the frame s DP level the remapped DSCP value is either taken from the DSCP Translation table or the Egress Remap DPO or DP1 field Used to reset unsaved changes to original configuration Used to save the settings configured on th
129. abled x Disabled x Enabled 0 4 Disabled Disabled 4 m Disabled x Disabled J EE tE CERN E EE Et EEE IEEE IEEE IEEE IEEE o IESS on lik oN ere aa wn i wn 30 Permit Disabled 4 Disabled 4 o 4 Enabled 4 m 40 Permit Disabled x Disabled Disabled 4 Disabled Enabled 0 mi gt 5 0 Permit Disabled 4 4 Disabled x Disabled Disabled x Enabled x 0 Disabled i gt 6 0 Permit x Disabled r Disabled x Disabled Enabled x 0 4 4 m gt 70 Permit Disabled x Disabled Disabled 4 Disabled 4 Enabled v 0 0D Uf v v US S o of o o off aaa aaa 4 ono ON aE Fig 27 Port ACL Configuration Physical port of the switch Select the Policy to apply to this port The allowed vales are 1 through 8 The default value is 1 Select whether forwarding is permitted Permit or denied Deny The default value is Permit Select which rate limiter to apply on this port The allowed values are Disabled or the values 1 through 16 The default value is Disabled Select which port frames are copied on The allowed values are Disabled or a specific port number The default value is Disabled Specify the mirror operation of this port The allowed values are Ena
130. age Port Members Delete VLANID VLAN Name 4 2 3 4 5 7 oj 10 44 42 13 44 15 16 17 10 19 20 21 22 23 24 25 26 1 datnan GZ EZI ZI EZI EZEZ EZEZ ZEZ EZ EZ EZ EZ ZI ZEZ ZI ZZZ ADJ New VLAN Apply Reset Parameter Description Delete VLAN ID VLAN Name Port Members Adding a New VLAN Reset Button Apply Button Fig 70 VLAN Membership To delete a VLAN entry tick the check box next to the corresponding VLAN entry After you press the Apply the entry will be deleted The VLAN ID of the entry Enter a descriptive name for the VLAN VLAN Names can contain alphanumeric characters A row of check boxes for each port is displayed for each VLAN ID To include a port in a VLAN check the box To remove or exclude the port from the VLAN make sure the box is unchecked By default no ports are members and all boxes are unchecked Click to add a new VLAN ID An empty row is added to the table and the VLAN can be configured as needed Legal values for a VLAN ID are 1 through 4095 Used to reset unsaved changes to original configuration Used to save the settings configured on this page 160 1 2 10 2 Ports This section is used to configure Port specific parameters for your VLAN s Here we can configure a AMS User Manual port as a Tagged Trunk or Untagged Access port or as a Hybrid port allowing both tagged and untagged frames Web Interface To configure the Port
131. aintenance Firmware and Firmware Upgrade 2 Click browse to select your firmware files and click upload to apply the new firmware Choose File No file chosen Upload Restart Device Y Firmware Firmware Upgrade Firmware Selection gt Save Restore ANMAS 24 TOSFP x cfr 192 168 1 1 C laeacueseacae 2 ALLOY La a PE FE E z O S AMS 24T6SFP System e een Firmware Update Security m eer Aito Logout oF EEEN MEIN i gt Exportiimport i gt Diagnostics jl ji Fig 143 Firmware Upgrade Parameter Description Browse Click the Browse button to select the firmware file to upload Upload Click the Upload button to upload the firmware into the switch 306 AMS User Manual WARNING While the firmware is being updated Web access appears to be defunct The front LED flashes Green Off with a frequency of 10 Hz while the firmware update is in progress Do not restart or power off the device at this time or the switch may fail to function afterwards 307 AMS User Manual 1 4 2 2 Firmware Selection This section is used to switch between the latest uploaded firmware image and the previously uploaded firmware image This page displays both firmware file details including the version number Web Interface To select the required firmware to be used in the switch via the Web Interface 1 Click Maintenance Firmware and Firmware Selection 2 Click on the Activate Alte
132. ake it possible for several network protocols IP IPX Decnet and Appletalk to coexist within a multipoint network and to be transported over the same network media and can also provide flow control and automatic repeat request ARQ error management mechanisms SNAP The Subnetwork Access Protocol SNAP is a mechanism for multiplexing on networks using IEEE 802 2 LLC more protocols than can be distinguished by the 8 bit 802 2 Service Access Point SAP fields SNAP supports identifying protocols by Ethernet type field values it also supports vendor private protocol identifier spaces It is used with IEEE 802 3 IEEE 802 4 IEEE 802 5 IEEE 802 11 and other IEEE 802 physical network layers as well as with non IEEE 802 physical network layers such as FDDI that use 802 2 LLC 1 2 10 7 1 Protocol to Group This page allows you to add new Protocols to Group Name unique for each Group mapping entries as well as allow you to see and delete already mapped entries for the selected switch Web Interface To configure protocol to group mapping settings via the Web Interface 1 Click Configuration VLAN Protocol based VLAN s and Protocol to Group 2 Click Add New Entry and specify the Frame Type Ethertype Value and give the group a name 3 Click the Apply button to save your changes or the Reset button to revert to previous settings 174 AMS User Manual AMAS 241G3FP Cr 192 168 1 1 y amp f AMS 24T6SFP Auto Logout O
133. al ports ditto setting determine whether RADIUS 265 Guest VLAN Enabled Guest VLAN ID Max Reauth Count AMS User Manual assigned VLAN is enabled on that port When unchecked RADIUS server assigned VLAN is disabled on all ports A Guest VLAN is a special VLAN typically with limited network access on which 802 1X unaware clients are placed after a network administrator defined timeout The switch follows a set of rules for entering and leaving the Guest VLAN as listed below The Guest VLAN Enabled checkbox provides a quick way to globally enable disable Guest VLAN functionality When checked the individual ports ditto setting determines whether the port can be moved into Guest VLAN When unchecked the ability to move to the Guest VLAN is disabled on all ports This is the value that a port s Port VLAN ID is set to if a port is moved into the Guest VLAN It is only changeable if the Guest VLAN option is globally enabled Valid values are in the range 1 4095 The number of times the switch transmits an EAPOL Request Identity frame without response before considering entering the Guest VLAN is adjusted with this setting The value can only be changed if the Guest VLAN option is globally enabled Valid values are in the range 1 255 Allow Guest VLAN if EAPOL Seen The switch remembers if an EAPOL frame has been received on the Port Configuration Port Admin State port for the life time of the po
134. an EAPOL based or MAC based mode Clicking these buttons will not cause settings changed on the page to take effect Reauthenticate Schedules a reauthentication whenever the quiet period of the port runs out EAPOL based authentication For MAC based authentication reauthentication will be attempted immediately The button only has effect for successfully authenticated clients on the port and will not cause the clients to get temporarily unauthorized Reinitialize Forces a reinitialization of the clients on the port and thereby a reauthentication immediately The clients will transfer to the unauthorized state while the reauthentication is in progress Used to manually refresh the information on the page 272 AMS User Manual Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 273 AMS User Manual 1 3 5 2 Switch Status This section is used to view the NAS Status Information on the AMS switch Web Interface To view the NAS information via the Web Interface 1 Click Security NAS and Switch Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information r l AMS TGSEP xy A i a h za cr 192 168 1 1 AMS 24T6SFP Auto Logout orr gt EEE MIE Network Access Server Switch Status Autorefiosn M Retesh
135. appropriate IGMP parameters for the specific VLAN group 3 Repeat for all VLAN groups configured on the switch Use the arrow keys to move between pages The Refresh button can be used to refresh the page for the latest information 4 Click the Apply button to save your changes or the Reset button to revert to previous settings i Sore 7 AMs 24T6sFP x _ _ i lt C f DO 192 168 1 1 amp Uue r N a AMS 24T68FP Auto Logout orr gt E Ma 7 il v System Information 1 IGMP Snooping VLAN Configuration Rakesh Aes Information Contiquraton Start from VLAN 1 with 20 entries per page verre VLAN Snooping fev z al ORI 0 4 LLAI 0 4 gt Time ID Enabled Querier Competing I Ie sec pos at Account i Si z S iP gt Syslog gt SNMP Configuration ia gt Port gt ACL gt Aggregation Spanning Tree IGMP Snooping Basic Cantigquratian VLAN Configuration Port Group Filtering Status Groups information IPv4 SSM Information gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base gt VLAN Voice VLAN gt GARP gt GVRP URI sec Apply Reset O i ee Fig 48 IGMP VLAN Configuration Parameter Description VLAN ID The VLAN ID of each VLAN group 107 Snooping Enabled IGMP Querier Compatibility RV QI QRI LLQI LMQI for IGMP URI Reset Button Apply Button Refresh lt lt gt gt AMS
136. ased to a maximum of 99 The VLAN with the lowest VID will be displayed at the top of the table To browse to additional pages use the arrow keys at the top of the page Web Interface To configure the MLD VLAN Configuration parameters via the Web Interface 1 Click Configuration MLD Snooping and VLAN Configuration Select the appropriate MLD parameters for the specific VLAN group Repeat for all VLAN groups configured on the switch Use the arrow keys to move between pages The Refresh button can be used to refresh the page for the latest information Click the Apply button to save your changes or the Reset button to revert to previous settings Haa lt yy ans 2476SFP e C f 5 19216811 Lp uw kGeeeceeeeas So ALLOY CEREA HE a ii an AMS 24T6SFP Auto Logout OFF EEE EGE gt Account a gt P MLD Snooping VLAN Configuration Rekesh Liss gt Syslog gt SNMP Start fom VLAN 1 wih 20 enines per page T gt Port VLANID Snooping Enabled MLD Querier Compatibility RV Qi sec QRI 0 1sec LLQI 0 1 sec URI sec gt ACL 1 2 Aggregation gt Spanning Tree Apply Reset gt IGMP Snooping MLD Snooping Basic Configuration VLAN Configuration Port Group Filtering Status Groups Information IPv6 SSM Information MVR gt LLDP gt Filtering Data Base gt VLAN Voice VLAN gt GARP gt GVRP gt Qos Thermal Protection gt sFlow Agent gt Loop Protection single IP Easy Port gt
137. ateway 192 168 1 254 Username admin Password To access the web management of an AMS Series switch enter the default IP Address in web browser and hit enter E g http 192 168 1 1 Once you have entered the IP Address into the web browser you will be prompted to enter a Username and Password in order to access the web management interface Enter the default values as shown in the table above The AMS Series switches support a simple user management function allowing only one administrator to configure the system at the same time If there are two or more users using the administrator s identity it will allow only the first user who logs in to configure the system The rest of the users even with administrator s identity can only monitor the system For those who do not have administrator access they will only be able to monitor the system Only a maximum of three users are able to login simultaneously NOTE The AMS Series switches support management interface on both IPv4 and IPv6 IP Addresses To optimize the display we recommend you use Microsoft IE 6 0 and above Netscape V7 1 and above or FireFox V1 00 and above and a screen resolution of 1024x768 12 AMS User Manual The server 192 168 1 1 at AMS 24T6SFP requires a username and password Warning This server is requesting that your username and password be sent in an insecure manner basic authentication without a secure connection
138. atied AN Untag thes 1 Ne u 1 Un ware Disabled Al Untag this 1 No Stance 151 Unaware Ditata A Uais t No 6 1 Unaware Disatied Al Unitary is 1 No gt Protocohbared VLAN m T Unaware Disabled AN Untag_ thes 1 Ma gt Voice VLAN 6 1 Unaware Ditabied All Untag this 1 No gt GARP 19 1 Unaware Disabled AN Unta this 1 No gt GVRP n 1 UnAware Disabled AL Untag thie 1 Ne gt Gos 21 1 Undware Disabled All Untag this 1 No gt Ree Eroso eaa A Eon Sinse Drsabied Al Uae 1 ha gt spiew Agent a 1 Undware Disabled All Untag this 1 Ma Loop Protection a 1 Unaware Disada AD Untag this 1 No gt Single IP 26 1 Unaware Disatied Al Untag this 1 Ho Easy Pon Mirroring Trap Event Seventy SMTP Configuration UPnP gt Security ab Maintenance i a Fig 73 Port Information Parameter Description Port Physical port of the switch PVID Shows the VLAN identifier for that port The allowed values are 1 through The default value is 1 166 Port Type Ingress Filtering Frame Type Tx Tag UVID Conflicts Auto Refresh Refresh AMS User Manual Displays the currently configured port type values are unaware C Port S Port and S Custom Port For a full explanation of these parameters see section 1 2 10 2 Displays whether the port has ingress filtering enabled or disabled Displays what type of packets can be received by the port Tagged Un Tagged or All Displays whether outgoing packets are tagged or untagged
139. based on the cable length Reduces the power consumption for shorter cables Discovery LLDP IEEE802 1AB Link Layer Detection Protocol with LLDP MED extensions Carrier Ethernet Protocols and Features AMS 4T24S4SFP Only 322 AMS User Manual IEEE 802 3ah Ethernet OAM Simple link fault management LFM for Ethernet as defined in IEEE 802 3ah MAC Layer OAM IEEE 802 1ag Ethernet CFM IEEE 802 1ag Ethernet CFM function that provides connectivity fault management Syn E and IEEE1588v2 Both IEEE 1588v2 and ITU T Sync E Ethernet synchronization protocols and can emulate link OAM and service OAM protocols by request ITU T Y 1731 Both IEEE 1588v2 and ITU T Sync E Ethernet synchronization protocols and can emulate link OAM and service OAM protocols ITU T G 8032 ITU T service OAM standard Y 1731 divides a network into maintenance domains in the form of hierarchy levels to be released in v1 20 firmware MEF E tree MEF E tree service over MPLS including E LINE E LAN and E TREE EP TREE EVP TREE Available on release of v1 20 firmware Environmental Specifications Dimensions WxHxD 280 x 44x 442 x 44 442 x 44 x 385 442 x 44 mm 166 x 300 x 300 Case Desktop 1RU rackmount mounting kit included all metal case Weight 1 382Kg 3 84Kg 5Kg 3 84Kg Temperature 0 to 40 operating 20 to 70 storage Humidity 10 to 90 relative non
140. bled Frames received on the port are mirrored 61 Logging Shutdown State Counter Refresh Button Clear Button Reset Button Apply AMS User Manual Disabled Frames received on the port are not mirrored The default value is Disabled Specify the logging operation of this port The allowed values are Enabled Frames received on the port are stored in the System Log Disabled Frames received on the port are not logged The default value is Disabled Please note that the System Log memory size and logging rate is limited Specify the port shut down operation of this port The allowed values are Enabled If a frame is received on the port the port will be disabled Disabled Port shut down is disabled The default value is Disabled Used to enable or disable the selected port The allowed values are Enabled Enables the port and allows packets to be sent and received Disabled Disables the port The default value is Enabled Displays the amount of frames that match this ACE Used to refresh the values displayed in the counter section Used to clear the counters Used to reset unsaved changes to original configuration Used to save the settings configured on this page 62 AMS User Manual 1 2 2 2 Rate Limiters The section describes how to configure the ACL Rate Limiting Parameters Up to 16 different rate limits can be set and applied to individual ports Rate Limits can be set in either
141. block a particular OID subtree from being displayed If you exclude an OID from a view you can allow other OID s to view by adding include views OID Subtree The OID defining the root of the subtree The allowed OID length is from 1 to 128 Wildcards can also be used in the OID subtree 41 AMS User Manual 1 1 6 7 Access This section is used to configure SNMPv3 access lists Web Interface To configure SNMP Access lists via the Web Interface 1 Click System SNMP and Access 2 Click Add new Access 3 Specify the SNMP Access parameters 4 Click Save to apply your changes p oo Se ee a ee e ec 192 168 1 1 z AMS 24T6SFP ne fiocoot risio j p asas intormation SNMPv3 Accesses Configuration fanl Delete GroupName Security Model Security Level Read View Name Write View Name Fig 16 SNMPv3 Access Parameter Description Delete Select the tick box and click the apply button to delete an Access rule Add New Access Used to add a new Access rule 42 E N E A S TAR teaser Fen E O cc fe 2168 ec ALLOY AMS 24T6SFP Ae Parameter Description Delete Group Name Security Model Security Level Read View Name AMS User Manual SNMPV3 Accesses Configuration Delete Group Name Security Model Security Level Read ViewName Write View Name D Aay my Le hoatn noPmw a Fane Nore Fig 17 Add a new SNMPv3 Access Rule Select the delete button next to the Access Rule you would
142. breviated by that letter see Abbr has enabled port security Shows the current state of the port It can take one of four values Disabled No user modules are currently using the Port Security service Ready The Port Security service is in use by at least one user module and is awaiting frames from unknown MAC addresses to arrive Limit Reached The Port Security service is enabled by at least the Limit Control user module and that module has indicated that the limit is reached and no more MAC addresses should be taken in Shutdown The Port Security service is enabled by at least the Limit Control user module and that module has indicated that the limit is exceeded No MAC addresses can be learned on the port until it is administratively re opened on the Limit Control configuration Web page The two columns indicate the number of currently learned MAC addresses forwarding as well as blocked and the maximum number of MAC addresses that can be learned on the port respectively If no user modules are enabled on the port the Current column will show a dash If the Limit Control user module is not enabled on the port the Limit column will show a dash Indicates the number of currently learned MAC addresses forwarding as well as blocked on the port If no user modules are enabled on the port a dash will be shown Tick the box to enable the information to be automatically refreshed Used to manually refresh the i
143. cation databases and in the case of Voice over Internet Protocol VoIP Enhanced 911 services Extended and automated power management of Power over Ethernet PoE end points Inventory management allowing network administrators to track their network devices and determine their characteristics manufacturer software and hardware versions and serial or asset number This page allows you to configure the LLDP MED This function applies to VoIP devices which support LLDP MED Web Interface To configure the LLDP MED parameters via the Web Interface 1 Click Configuration LLDP and LLDP MED Configuration 2 Modify the fast repeat setting if required 3 Fillin the required fields for the location parameters 4 Add anew LLDP MED policy and configured additional settings 5 Assign Policy for required ports 6 Click the Apply button to save your changes or the Reset button to revert to previous settings 140 AMS User Manual AMS 24T6SFP v system gt Y System information LLDPMED Configuration wi satin Fast Start Repeat Count Configuration CPU Load Fast startrepeatcount 4 gt Time gt Account Coordinates Location J Pr gt Sysiog Latitude mom Longitude East Altitude o Meters Lo P oa gt SNMP degrees degrees Datum d Connguraton Civic Address Location gt Port gt ACL Country code 61 State Victoria County gt Aggregation einen st City Nothing ra City district Block Neighbourhood gt
144. ck the number to add the trap information Up to 6 traps can be configured 3 If you have any Trap entries that you would like to delete click on the delete button next to the Trap that you would like to delete 4 Click the Save button to apply changes imei e Raa SS Bee cio sass AMS 24T6SFP ALN F cooo neo f z ar formation Trap Hosts Configuration ie een Fig 18 SNMP Traps Parameter Description Delete Click the delete button to delete an existing Trap No This identifies the Trap number click on the Trap number to create a new SNMP Trap Up to 6 Traps can be created 44 AMS User Manual aay e a a E ALLOY AMS 24T6SFP ieou Hein J Fig 19 Add a new SNMP Trap Parameter Description Trap Version Select the required Trap Version SNMP v1 v2c or v3 trap Server IP Enter the IP Address of the server that will receive the SNMP Traps UDP Port Enter the UDP port used for sending the SNMP Traps default is 162 Community Security Enter the Community Security name this value can be 1 to 32 characters in length Security Level Select the type of information you want sent in the SNMP Trap Options are Emergency Alert Critical Error Warning Notice Info and Debug Security Level Set the required security level Possible security options NoAuth NoPriv No Authentication and No Privacy Auth NoPriv Authentication and No Privacy Auth Priv Authentication and Privacy Authentication Pr
145. cluding good and bad packets Types of traffic displayed are Tx Packets Tx Octets Tx Unicast Tx Multicast Tx Broadcast and Tx Pause packets The total number of received packets categorised based on the size in Bytes of the packets received Sizes displayed are Rx 64 Bytes Rx 65 127 Bytes Rx 128 255 Bytes Rx 256 511 Bytes Rx 512 1023 Bytes Rx 1024 1526 Bytes and Rx 1527 Bytes The total number of transmitted packets categorised based on the size in Bytes of the packets transmitted Sizes displayed are TX 64 Bytes TX 65 127 Bytes Tx 128 255 Bytes Tx 256 511 Bytes Tx 512 1023 Bytes Tx 1024 1526 Bytes and Tx 1527 Bytes Receive Queue Counters The total number of packets received by the port based upon the QoS Queues Queues displayed are from RX QO through to RX Q7 Transmit Queue Counters The total number of packets transmitted by the port based upon the QoS Receive Error Counters Queues Queues displayed are from Tx QO through to Tx Q7 The total number of errors received by the port Error types displayed are Rx Drops Rx CRC Alignment Rx Undersize Rx Oversize Rx Fragments and Rx Jabber Rx Filtered Transmit Error Counters The total number of errors transmitted by the port Error types displayed are Tx Drops and Tx Late Excessive Collisions 54 AMS User Manual 1 2 1 5 QoS Statistics This section displays the QoS Queuing details for each of the ports By clicking on an individual port detailed statist
146. curity NAS Statistics Port1 Por 1 Auto vetresh Refresh r Port State IP Source Guard gt ARP Inspection Admin State Force Authorized gt DHCP Snooping Port State Gi dafy Devabled gt DHCP Relay Y NAS Configuration Switch Status Port Status gt AAA gt Port Security gt Access Management SSH HTTPS Auth Method gt Maintenance j Fig 130 Network Access Server Port Status Parameter Description Admin State The port s current administrative state Refer to NAS Admin State for a description of possible values Port State The current state of the port Refer to NAS Port State for a description of the Port Auto Refresh Refresh individual states Select the required port from the drop down box at the top of the screen Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 276 AMS User Manual 1 3 6 AAA The AMS Series switches supports AAA Authentication Authorization Accounting to provide access control to your network The AAA server can be a TACACS or RADIUS server to create and manage objects that contain settings for using AAA servers 1 3 6 1 Configuration This section is used to configure the AAA settings for the AMS switch Web Interface To configure a Common Configuration of AAA in the web interface 1 Click Security AAA and Configuration 2 Set Timeout Default is 15 seconds 3 Set Dead Time Default i
147. d switched on the RADIUS assigned VLAN ID If re authentication fails or the RADIUS Access Accept packet no longer carries a VLAN ID or it s invalid or the supplicant is otherwise no longer present on the port the port s VLAN ID is immediately reverted to the original VLAN ID which may be changed by the administrator in the meanwhile without affecting the RADIUS assigned This option is only available for single client modes i e 270 Guest VLAN Enabled AMS User Manual e Port based 802 1X e Single 802 1X For trouble shooting VLAN assignments use the Monitor gt VLANs gt VLAN Membership and VLAN Port pages These pages show which modules have temporarily overridden the current Port VLAN configuration RADIUS attributes used in identifying a VLAN ID RFC2868 and RFC3580 form the basis for the attributes used in identifying a VLAN ID in an Access Accept packet The following criteria are used e The Tunnel Medium Type Tunnel Type and Tunnel Private Group ID attributes must all be present at least once in the Access Accept packet e The switch looks for the first set of these attributes that have the same Tag value and fulfil the following requirements if Tag 0 is used the Tunnel Private Group ID does not need to include a Tag Value of Tunnel Medium Type must be set to IEEE 802 ordinal 6 Value of Tunnel Type must be set to VLAN ordinal 13 Value of Tunnel Private Group ID must be a string of ASCII c
148. d 86400 seconds 24 hours Used to reset unsaved changes to original configuration Used to save the settings configured on this page 90 AMS User Manual 1 2 4 2 MSTI Mapping This section is used to map VLAN s to MSTI s when using the MSTP protocol MSTP enables the grouping and mapping of VLANs to different spanning tree instances So an MST Instance MSTI is a particular set of VLANs that are all using the same spanning tree In a network where all VLANs span all links of the network judicious choice of bridge priorities for different MSTis can result in different switches becoming root bridges for different MSTIs That will result in the different MSTIs choosing different active topologies on the network Multiple VLAN s can be mapped to a single MSTI when entering multiple VLAN ID s they need to be separated using a comma An unused MSTI should be left blank do not enter VLAN ID s into unused MSTI s Web Interface To configure the MSTI Mapping s for MSTP via the Web Interface 1 Click Configuration Spanning Tree and MSTI Mapping 2 Give the configuration a name 3 Enter the required VLAN s into the configured MSTI s 4 Click the Apply button to save your changes or the Reset button to revert to previous settings A AMS 24T6SFP e ff 192 168 1 1 w amp y AMS 24T6SFP Auto Logout OFF T LIN MIM System MSTI Configuration System Information orina Add VLAN
149. d Rx Tw for this link Note NOT the link partner the resolved value that is the actual rx wakeup time used for this link based on EEE information exchanged via LLDP Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 153 AMS User Manual 1 2 8 6 Port Statistics This section displays two types of counters Global counters are counters that refer to the whole switch while local counters refer to per port counters for the currently selected switch Web Interface To view the LLDP Port Statistics from the switch via the Web Interface 1 Click Configuration LLDP and Port Statistics 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information AMS 2UTESFP cfr ALLOY AMS 24T6SFP 192 168 1 1 System vY System Information gt Time gt Account iP Syslog gt SNMP Configuration gt Port PACE gt Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR vLLOP LLOP Configuration LLDP Neighbours LLOP MEO Negnbours EEE Port Stanishes gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP GVRP P Qos gt Thermal Protection gt aFlow Anant Parameter Description Neighbour entries were last changed Total Neighbours Entries Added Total Neighbours Entries Deleted
150. d for your network 3 Click the Apply button to save your changes or the Reset button to revert to previous settings AMS 24T6SFP e 192 168 1 1 ALLOY AMS 24T6SFP Auto Logowt oF i Logout Help gt System an Y Configuration Retesh veon Speed Flow Control Power Commgursed CurrentRx Current Tx Configured Frame Size Control Por Description Trafic Overview mis 3600 Otscard e Disstied Discard Disabled Detailed Statistics QoS Statistics SFP information EEE Pr ACL Aggregation Spanning Tree gt IGMP Snooping MLD Snooping Discard gt Disabled Discard Disabled Discard e Disabled Discard Disabled Discard e Disabied Discard Disatied gu ompn one u Na s gt Filtering Data Base Discard e Orsabled P VLAN gt Voice VLAN P GARP GVRP Qos gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP Easy Pon Mirroring Trap Event Severty SMTP Configuration UPnP Discard e Drsubled Discard e Desabied Discard Disabled Discard e Disabled JEJE Discard e Disabled Discard e Disabled Discard Disabled Mee wb Discard e Disabled 1 J Discard e Oveabled Orscard Orsabled ii Orscerd Ovsabled Discard e Dusabied HHHH HHHH E Discard e Disabled Discard e Disabled PPPLTPLP PPP PPTL Pree ae Miscari lel Mixabled
151. d to a 3Gb 1 2 3 1 Static Trunk This section is used to configure the static trunk settings Here you will determine the method used to create the static trunk and also create your aggregation groups Ports using Static Trunk as their trunk method can choose their unique Static Group ID to form a logic trunked port The benefit of using the Static Trunk method is that a port can immediately become a member of a trunk group without any handshaking with its peer port This is also a disadvantage because the peer ports of your static trunk group may not know that they should be aggregated together to form a logical trunked port Using Static Trunk on both ends of a link is strongly recommended Both devices must be configured to use the same speed and duplex settings Web Interface To configure the Static Trunk settings via the Web Interface 1 Click Configuration Aggregation and Static Trunk 2 Select the type of method used to initiate the trunk 3 Create the trunk group using the radio buttons in the table Each Group ID is an individual trunk group add the required ports into the desired trunk group 4 Click the Apply button to save your changes or the Reset button to revert to previous settings 77 AMS 24TGSFP AMS 24T6SFP Y System gt Port gt ACL Aggregation Static Trunk LACP gt MVR gt LLOP VLAN gt Voice VLAN gt GARP gt GVRP gt Qos sFlow Agent Parameter
152. ded Shutdown If Limit 1 MAC addresses is seen on the port shut down the port This implies that all secured MAC addresses will be removed from the port and no new address will be learned Even if the link is physically disconnected and reconnected on the port by disconnecting the cable the port will remain shut down There are three ways to re open the port 1 Reboot the switch 2 Disable and re enable Limit Control on the port or the switch 3 Click the Reopen button Trap amp Shutdown If Limit 1 MAC addresses is seen on the port both the Trap and the Shutdown actions described above will be taken This column shows the current state of the port as seen from the Limit Control s point of view The state takes one of four values Disabled Limit Control is either globally disabled or disabled on the port Ready The limit is not yet reached This can be shown for all actions Limit Reached Indicates that the limit is reached on this port This state can only be shown if Action is set to None or Trap Shutdown Indicates that the port is shut down by the Limit Control module This state can only be shown if Action is set to Shutdown or Trap amp Shutdown If a port is shut down by this module you may reopen it by clicking this button which will only be enabled if this is the case For other methods refer to Shut down in the Action section NOTE That clicking the reopen button causes the page to be refresh
153. defined by IEEE 802 1p to match for this rule Options Any Specific 0 7 Default Any Used to reset unsaved changes to original configuration Used to save the settings configured on this page Used to disregard any changes made 74 AMS User Manual 1 2 2 4 ACL Status The section displays the current ACL rules configured on the switch Web Interface To view the ACL Rate rules via the Web Interface 1 Click Configuration ACL and ACL Status 2 If you would like the page to auto refresh the ACL Information check the Auto Refresh tick box at the top of the page or alternatively hit the refresh button to refresh the page manually gt lS SSS ES EES LSS rary AMS 24T6SFP C gt _ _ _ a e C f D 19216811 amp ALLOY ina y EREEEE See aa eee mtaa AMS 24T6SFP Auto Logout orr gt E MEI Y system System Intarmation ACL Status Combined Auto refresh Refresh OMOR User ngress Frame Type Action Rae Pon o Miror cpu SPU Counter Conflict ETER n N ARP Deny Disabled Disabled Disabled Yes No 18900 No Account vI Ai ARVORE DHCP Owy Disobid Barabied Desabled Yos No 0 No hl eee Reseed Al ETypa Perma Digabled Di abl d Disabled N No o No gt SNMP AN EType Permt Disabled Disabled Disabled No No 0 No Configuration Por ACL Ports i Rate Limiters Access Control List ACL Status gt Aggregation Spanning Tree N gt IGMP Snooping gt MLD Snooping i
154. deleted the order sequence cannot be changed and the priority for these entries is the highest Web Interface To configure the ACL Rules via the Web Interface 1 Click Configuration ACL and Access Control List 2 Click the icon to add a new ACL or use the other ACL modification buttons to edit or remove an existing ACL entry 3 Click the Apply button to save your changes or the Reset button to revert to previous settings When editing an entry on the ACE Configuration page note that the Items displayed depend on various selections such as Frame Type and IP Protocol Type Specify the relevant criteria to be matched for this rule and set the actions to take when a rule is matched such as Rate Limiter Port Redirection Logging and Shutdown 65 AMS User Manual C fi 19216811 ALLOY AMS 24T6SFP Auto Logout OFF x EEMS EM LISSON e ee ee N Y System Information Access Control List Configuration Auto refresh El Refresh Clear Remove All Information Ingress Policy Frame Action Rate Port Configuration Port Bitmask Type Limiter Redirect Mirror Counter CPU Load gt Time Account PIP gt Syslog gt SNMP Y Configuration gt Port VACL Ports Rate Limiters Access Control List ACL Status gt Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLDP t gt Filtering Data Base gt VLAN Voice VLAN gt GARP gt GVRP
155. device close to a place which is damp or wet Do not spill any fluid on this device Please follow the instructions in the user manual quick install guide carefully to connect the device to your PC or other electronic product Any invalid connection may cause a power or fire risk Do not place this device on an unstable surface or support Ay CAUTION Circuit devices are sensitive to static electricity which can damage their delicate electronics Dry weather conditions or walking across a carpeted floor may cause you to acquire a static electrical charge To protect your device always e Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device e Pick up the device by holding it on the left and right edges only e If you are connecting a device mounted outdoors to this switch please ensure you have installed an additional lightning arrestor between this device and the outdoor equipment AMS User Manual Outdoor IP Camera RJ 45 Cable Networks Outdoor Fig Additional arrester installed between outdoor device and this switch NOTE The switch is indoor device if it will be used in outdoor environment or connects with some outdoor device then it must use a lightning arrester to protect the switch WARNING e Self demolition of Product is strictly prohibited Damage caused by self demolition will result in voiding the switches warranty e Do not place prod
156. dpoint Device is detected will an LLDP MED capable Network Connectivity Device start to advertise LLDP MED TLVs in outgoing LLDPDUs on the associated port The LLDP MED application will temporarily speed up the transmission of the LLDPDU to start within a second when a new LLDP MED neighbour has been detected in order to share LLDP MED information as fast as possible to new neighbours Because there is a risk of an LLDP frame being lost during transmission between neighbours it is recommended to repeat the fast start transmission multiple times to increase the possibility of the neighbours receiving the LLDP frame With Fast start repeat count it is possible to specify the number of times the fast start transmission will be repeated The recommended value is 4 times 141 AMS User Manual given that 4 LLDP frames with a 1 second interval will be transmitted when an LLDP frame with new information is received It should be noted that LLDP MED and the LLDP MED Fast Start mechanism is only intended to run on links between LLDP MED Network Connectivity Devices and Endpoint Devices and as such does not apply to links between LAN infrastructure elements including Network Connectivity Devices or other types of links Latitude Latitude SHOULD be normalized to within 0 90 degrees with a maximum of 4 digits It is possible to specify the direction to either North of the equator or South of the equator Longitude Longitude SHOULD be normalized t
157. ds Each LLDP frame contains information about how long the information in the LLDP frame shall be considered valid The LLDP information valid period is set to Tx Hold multiplied by Tx Interval seconds Valid values are restricted to 2 10 times When configuration changes are made to a device a new LLDP frame is transmitted to update its information The time between the frames being sent will always be at least the value of Tx Delay Tx Delay cannot be larger than a of the Tx Interval value Valid values are restricted to 1 8192 seconds When a port is disabled LLDP is disabled or the switch is rebooted an LLDP shutdown frame is transmitted to the neighbouring units signalling that the LLDP information isn t valid anymore Tx Reinit controls the amount of seconds between the shutdown frame and a new LLDP initialization Valid values are restricted to 1 10 seconds 136 Port Mode CDP Aware Port Descr Sys Name Sys Descr Sys Capa Mgmt Addr Reset Button Apply Button AMS User Manual Physical port of the switch Used to select the LLDP mode for each port RX Only The switch will not transmit LLDP frames from this port but is able to receive LLDP frames from other devices TX Only Any received LLDP frames will be dropped but the switch is able to send LLDP frames Disabled The switch will drop incoming LLDP frames and will not transmit LLDP information Enabled
158. e gt GVRP gt Parameter Description Port LACP Enabled Key Role Reset Button Apply Button AMS User Manual Physical port of the switch Used to enable or disable LACP on the desired port To enable LACP on an individual port check the tick box The Key is used to determine a specific trunk aggregation group The key can be generated automatically by the switch or you can enter a key manually If entering manually valid values are 1 through to 65535 For multiple ports to belong to the same group the key must be the same on each port The role determines who the port s handle LACP traffic If set to Active the port will initiate the LACP group by sending LACP packets to the connecting device each second When set to Passive the port will wait to receive LACP packets from the connecting device Used to reset unsaved changes to original configuration Used to save the settings configured on this page 81 AMS User Manual 1 2 3 2 2 System Status This section displays the current status of the LACP groups Web Interface To view the LACP status via the Web Interface 1 Click Configuration Aggregation LACP and System Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information AMS 24TESFP Fe A 1 19216811 AMS 24T6SFP Auto Logout orr gt GRIER Ma j d oe Lace Sy
159. e Destination MAC address contained in the frame The switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to based upon the Destination MAC address in the frame This table contains both static and dynamic entries The static entries are configured by the network administrator if the administrator wants to do a fixed mapping between the Destination MAC address and switch ports The frames also contain a Source MAC address SMAC address which shows the MAC address of the equipment sending the frame The SMAC address is used by the switch to automatically update the MAC table with these dynamic MAC addresses Dynamic entries are removed from the MAC table if no frame with the corresponding SMAC address has been seen after a configurable age time 1 2 9 1 Configuration This section is used to configure MAC Address settings on the AMS Series switches Web Interface To configure the MAC filtering parameters via the Web Interface 1 Click Configuration Filtering Database and Configuration 2 Specify the Disable Automatic Aging and Aging Time 3 Change the way individual ports can learn MAC Address information 4 Configure static MAC Address entries if required c a EREE BEELEE ha AMS 2476SFP Avto Logout OFF m EEE OE i Connguranon 7 7 CPU Load MAC Address Table Configuration Time gt Account Aging Configuration i Disable Automatic Aging siog m P SNMP Aging Time 30
160. e entnes rir gt Sysiog gt SNMP vY Configuration Pot OO ACL gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping YMVR Configuration Groups Information Statistics gt LLOP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP Mey gt Thermal Protection gt sFlow Agent r Fig 60 MVR group information Parameter Description VLAN ID The VLAN ID of the entry Groups MVR group address Port Members Physical Ports on the switch that belong to the MLD Multicast Group Auto Refresh Tick the box to enable the information to be automatically refreshed 132 AMS User Manual Refresh Used to manually refresh the information on the page lt lt gt gt The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 1 2 7 3 Statistics This section is used to view the statistics of all configured MVR parameters on the AMS Series switches Web Interface To view the MVR Statistics via the Web Interface 1 Click Configuration MVR and Statistics 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information 2 s _ a j AMS 24T6SFP x e C A 1 19216811 amp ALLOY AMS 24T6SFP d Auto Logout orr gt Ee Za v System A v system Information z MVR Statistics Auto ehesh Retesh Clear Information Contiguration VL
161. ecific 1 4095 Range Default Any Priority Code Point User Priority Options a specific value of O 1 2 3 4 5 6 7 a range of 0 1 2 3 4 5 6 7 0 3 4 7 or Any Default Any Drop Eligible Indicator Options 0 1 or Any Default Any The OUI field of the source MAC address Enter the first three octets bytes of the MAC address or Any The type of destination MAC address Options Any BC Broadcast MC Multicast UC Unicast 214 Frame Type AMS User Manual The supported Frame Types are listed below Any Allow all types of frames Ethernet This option can only be used to filter Ethernet Il formatted packets Options Any Specific 600 ffff hex Default ffff Note that 800 IPv4 and 86DD IPv6 are excluded A detailed listing of Ethernet protocol types can be found in RFC1060 A few of the more common types include 0800 IP O806 ARP 8137 IPX LLC Link Logical Control includes the following settings SSAP Address Source Service Access Point address Options Any Specific Ox00 Oxff Default Oxff DSAP Address Destination Service Access Point address Options Any Specific Ox00 Oxff Default Oxff Control Control field may contain command response or sequence information depending on whether the LLC frame type is Unnumbered Supervisory or Information Options Any Specific Ox00 Oxff Default Oxff SNAP SubNetwork Access Protocol can be di
162. ect the Role of the ports using the drop down box provided 4 Specific parameters can be changed based on your requirements 5 Click the Apply button to save your changes or the Reset button to revert to previous settings AbAS 24 TGSEP f cr 192 168 1 1 ALLOY AMS 24T6SFP Auto Logout oF gt SERENA iP gt Syslog SNMP Port Members Y Configuration 12 3 4 8 6 7 86 9 10 44 42 413 44 15 16 17 18 19 20 21 22 23 24 25 gt Port gt ACL gt Aggregation Role iP Phone gt Spanning Tree IGMP Snooping Access VLAN 1 gt MLD Snooping VLAN Mode Hybrid e MVR LLOP Volee VLAN 1000 Filtering Data Base Traffic Class T High gt VLAN Port Security Enable x gt Voice VLAN 7 T cane F Port Security Action Trap zi f gt GVRP Port Security Limit 1 gt Qos Spanning Tree Admin Edge Cradle t sow Agent Spanning Tree BPDU Guard Enable Loop Protection Single IP Apply Reset Configuration Information Easy Port Mirroring Trap Event Seventy SMTP Contiguration UPnP E a Fig 113 Easy Port Configuration Parameter Description Port Members A row of check boxes for each port is displayed To include a port in an Easy Port check the box as x Remove or exclude the port from the VLAN make 232 Role Access VLAN VLAN Mode Voice VLAN Traffic Class Port Security Port Security Action Port Security limit AMS Use
163. ed Enable MLD Snooping on the switch Unregister IPMCv6 Flooding Enabled Enable unregistered IPMCv6 flooding enabled MLD SSM Range SSM Source Specific Multicast range allows SSM aware hosts and routers that run the SSM service model to use groups in the configured address range Format lt IP Address v6 gt lt subnet Mask gt Proxy Enabled Enable MLD Proxy This feature can be used to avoid forwarding unnecessary join and leave message to the MLD router Port Physical port of the switch Router Port Specify which ports are connected to a Layer 3 multicast device of MLD Querier If an aggregation member port is selected as a router port the whole aggregation group will act as a router port Fast Leave Enable Fast Leave on the port Fast Leave allows the switch to remove an interface from the MLD table if there are no members listening on that multicast group Normally the group would not be removed until the expiration timer has exceeded 118 AMS User Manual Throttling Throttling is used to limit the amount of IPv6 multicast groups a switch port can belong to Valid values are unlimited or 1 through to 10 Default is unlimited 119 AMS User Manual 1 2 6 2 VLAN Configuration This section is used to configure specific MLD Settings for each of the configured VLAN groups MLD Snooping can be enabled or disabled for every individual VLAN group 20 VLAN groups will be displayed on the screen by default this can be incre
164. ed so non committed changes will be lost Used to manually refresh the information on the page Used to reset unsaved changes to original configuration Used to save the settings configured on this page 291 AMS User Manual 1 3 7 2 Switch Status This section shows the Port Security status Port Security is a module with no direct configuration Configuration comes indirectly from other modules the user modules When a user module has enabled port security on a port the port is set up for software based learning In this mode frames from unknown MAC addresses are passed on to the port security module which in turn asks all user modules whether to allow this new MAC address to forward or block it For a MAC address to be set in the forwarding state all enabled user modules must unanimously agree on allowing the MAC address to forward If only one chooses to block it it will be blocked until that user module decides otherwise The status page is divided into two sections one with a legend of user modules and one with the actual port status Web Interface To view the Port Security Switch Status via the web interface 1 Click Security Port Security and Switch Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information 2 Se AMAS 24 103k P x C fe 19216811 ohh SS EEE ALLOY AA AMS 2416SFP A
165. ed 0 Down gt Single IP 21 Shutdown Enabled 0 Down Easy Port 22 Shutdown Enabled 0 Down Mirronng 23 Shutdown Enabled D Down Trap Event Severity 24 Shutdown Enabled 0 Bown SMTP Configuration 25 Shutdown Enabled O Down uPne 26 Shildon Enabled D Bown L Fig 110 Loop Protection Status Parameter Description Port Physical port of the switch Action The currently configured port action Transmit The currently configured port transmit mode Loops The number of loops detected on this port Status The current loop protection status of the port Time of Last Loop Auto Refresh Refresh The time of the last loop event detected Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 227 AMS User Manual 1 2 17 Single IP The AMS Series switches support Single IP Management Single IP Management SIM is a simple and useful method to optimize network utilities and management it is designed to manage a group of switches as a single entity called a SIM group Implementing the SIM feature will have the following advantages for users e Simplify management of small workgroups or wiring closets while scaling networks to handle increased bandwidth demand e Reduce the number of IP addresses needed on the network e Virtual stacking structure Eliminate any specialized cables for stacking and remove the distance barriers that typically limit topology
166. edirect Disa led DHCP Snooping gt gt DHCP Relay Apply Reset gt NAS gt AAA gt Port Security Access Management SSH HTTPS Auth Method gt Maintenance _ n a Fig 140 HTTPS Configuration Parameter Description Mode Indicates the HTTPS mode operation Possible modes are Enabled Enable HTTPS mode operation Disabled Disable HTTPS mode operation Automatic Redirect Indicates the HTTPS redirect mode operation Automatically redirect web browser to HTTPS when HTTPS mode is enabled Possible modes are 301 Reset Button Apply Button AMS User Manual Enabled Enable HTTPS redirect mode operation Disabled Disable HTTPS redirect mode operation Used to reset unsaved changes to original configuration Used to save the settings configured on this page 302 AMS User Manual 1 3 11 Auth Method The AMS Series switches support different ways of authenticating a user when logging into the management of the switch Authentication can be done locally via TACACS or via RADIUS Web Interface To configure the Authentication Method via the web interface 1 Click Security and Auth Method 2 Select the Authentication method for console telent ssh and web access 3 Select to enable Fallback 4 Click the Apply button to save your changes or the Reset button to revert to previous settings AMS 24 TOSFR a 9 ined e fi D 19216811 AME DATESFE Auto Logout
167. edirect operation of the ACE Frames matching the ACE are redirected to the port number The allowed values are Disabled or a specific port number When Disabled is displayed the port redirect operation is disabled Specify the mirror operation of this port The allowed values are Enabled Frames received on the port are mirrored Disabled Frames received on the port are not mirrored The default value is Disabled Forward packet that matched the specific ACE to CPU Forward first packet that matched the specific ACE to CPU The counter indicates the number of times the ACE was hit by a frame Indicates the hardware status of the specific ACE The specific ACE is not applied to the hardware due to hardware limitations Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 76 AMS User Manual 1 2 3 Aggregation The AMS Series switches support two types of link aggregation Static Trunk and LACP Static Trunk is a non protocol based aggregation method where the connections are determined via source and destination MAC Addresses LACP is an IEEE standardized protocol used to aggregate ports Because it is an IEEE standard LACP trunking or aggregation can be used across multi vendor equipment By Aggregating ports between two devices this allows the bandwidth to be increased For example if we aggregate 3 Gigabit Ports the link between the two devices is increase
168. er Manual based on DSCP and class of service 802 1p CoS Classification Port based 802 1p VLAN priority based IPv4 IPv6 precedence type of service ToS DSCP based Differentiated Services DiffServ classification and re marking ACLs trusted QoS Rate Limiting Ingress policer egress shaping and rate control per VLAN per port and flow based IPv6 applications Web SSL Telnet SSH Ping Simple Network Time Protocol SNTP Trivial File Transfer Protocol TFTP SNMP RADIUS Syslog Management Web GUI interface HTTP HTTPS Dual Image Dual image provides independent primary and secondary OS files for backup while upgrading SNMP SNMP v1 2c and 3 RMON RMON Remote Monitoring groups 1 2 3 9 IPv4 and IPv6 Dual protocol stack supported Firmware Upgrade Web browser upgrade HTTP HTTPS and TFTP Upgrade through console port also supported Port mirroring Up to 8 source ports can be mirrored to single destination port s Flow Monitoring for high speed switched networks supported UPnP Universal Plug and Play supported Green Ethernet Link detection Compliant with IEEE802 3az Energy Efficient Ethernet Automatically turns off power on Gigabit Ethernet RJ 45 port when detecting link down or client idle Active mode is resumed without loss of any packets when the switch detects link up Cable length detection Adjusts the signal strength
169. er and the latest round trip time RFC4670 Name Description IP address and UDP port for the accounting server in question Shows the state of the server It takes one of the following values Disabled The selected server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept accounting attempts Dead X seconds left Accounting attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the 287 AMS User Manual dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled The time interval measured in milliseconds between the most recent Response and the Request that matched it from the RADIUS Round ayer radiusAccClientExtRoundTripTime accounting server The granularity of this rip Time R measurement is 100 ms A value of 0 ms indicates that there hasn t been round trip communication with the server yet Auto Refresh Tick the box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 288 AMS User Manual 1 3 7 Port Security The AMS Series switches supports a Port Security function allowing the administrator
170. er the ending time the system time will be decreased by one hour If the Time Set Offset value is set to 0 no changes to the time will be made nor will you have to set a start and end date If you do add a valid value then you will need to configure your start and end dates for daylights savings in your particular area Enter the Daylight Savings time offset for your region The offset is given in minutes east of standard GMT The valid range is 1 to 1440 minutes Default is 60 minutes Here you can select whether you want to set your daylight saving By Dates or by Recurring If you set By Dates this will need to be changed each year if you select Recurring then this will only need to be setup once Used to configure the Daylight Savings start date and time Format is YYYY MM DD HH MM Used to configure the Daylight Savings end date and time Format is YYYY MM DD HH MM 19 AMS User Manual 1 1 2 2 NTP NTP Network Time Protocol is a protocol used to sync devices on the network with a time server Web Interface To configure the NTP Settings via the Web Interface 1 Click System Time and NTP 2 Enter the required Server addresses in to the fields provided Up to 5 NTP servers can be configured 3 Click Save to apply your changes nm hen ST 19216811 Aso Legout NTP Configuration Fig 6 NTP Time Settings Parameter Description Server 1 to 5 Enter a valid NTP Server
171. er would like the transmitter to hold off to allow time for the receiver to wake from sleep The link partner s fallback receive Tw A receiving link partner may inform the transmitter of an alternate desired Tw_sys_tx Since a receiving link partner is likely to have discrete levels for 152 Echo Tx Tw Echo Rx Tw Resolved Tx Tw Resolved Rx Tw Auto Refresh Refresh AMS User Manual savings this provides the transmitter with additional information that it may use for a more efficient allocation Systems that do not implement this option default the value to be the same as that of the Receive Tw_sys_tx The link partner s Echo Tx Tw value The respective echo values shall be defined as the local link partner s reflection echo of the remote link partners respective values When a local link partner receives its echoed values from the remote link partner it can determine whether or not the remote link partner has received registered and processed its most recent values For example if the local link partner receives echoed parameters that do not match the values in its local MIB then the local link partner infers that the remote link partners request was based on stale information The link partner s Echo Rx Tw value The resolved Tx Tw for this link Note NOT the link partner the resolved value that is the actual tx wakeup time used for this link based on EEE information exchanged via LLDP The resolve
172. erface 1 Click Security DHCP Relay and Configuration 2 Select to enable or disable the DHCP Relay function 3 Enter the IP Address of the Relay Server IP Address 4 Select to enable or disable the Relay Information Mode setting 5 Select the appropriate Relay Information Policy 6 Click the Apply button to save your changes or the Reset button to revert to previous settings aa AMS 1655 0O ele AMS 20165 z d T s E Cc fr 192 168 1 1 Py _ ALLOY ae Auto Logout iore gt EEND MDI System e Configuration DHCP Relay Configuration Y Security x a es gt IP Source Guard Relay Mode Disabled gt ARP Inspection Relay Server 0 0 0 0 gt OHCP Snooping Relay Information Mode Disabled idee d Relay Information Polley Replace Configuration Statistics Ri gt NAS Apply eset gt AAA gt Port Security gt Access Management SSH j HTTPS Auth Method gt Maintenance f f Fig 126 DHCP Relay Configuration 259 Parameter Description Relay Mode Relay Server AMS User Manual Indicates the DHCP relay mode operation Possible modes are Enabled Enable DHCP relay mode When the DHCP relay is enabled the agent forwards and transfers DHCP messages between the clients and the server when they are not in the same subnet domain Disabled Disable the DHCP relay Indicates the DHCP relay server IP address A DHCP relay agent is used to forward and t
173. escription 2 Enter the description for the required ports 3 Click Apply to save changes or Reset to return to previous values AMS 24T6SFP e M 19216811 ALLOY AMS 24T6SFP gt System i Y Configuration Port Description Port Configuration eats Port Description Traffic Overnew Detained Statistics QoS Statisies SFP Information EEE gt ACL gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLO Snooping gt MVR gt LLOP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP GVRP gt Qos gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single iP Easy Port Mirroring Trap Event Severity SMTP Configuration UPnP ee E MEIONANCO cs Fig 21 Port Descriptions Parameter Description Port The logical port number for the switch Description Enter a description of each of the ports Descriptions cannot include amp i 50 AMS User Manual 1 2 1 3 Traffic Overview Use this section to view basic traffic statistics for each of the switch ports Web Interface To view the port statistics via the Web Interface 1 Click Configuration Port and Traffic Overview 2 Click on an individual port number to show the detailed statistics for that port 3 If you would like the page to auto refresh the port statistics check the Auto Refresh tick box at the top of the page or alternatively hit the refresh button to refresh the page
174. eset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 211 1 2 14 10 QoS Control List Use the QoS Control List Configuration page to configure Quality of Service policies for handling ingress packets based on Ethernet type VLAN ID TCP UDP port DSCP ToS or VLAN priority tag AMS User Manual Once a QCE is mapped to a port traffic matching the first entry in the QoS Control List is assigned to the QoS class drop precedence level and DSCP value defined by that entry Traffic not matching any of the QCEs are classified to the default QoS Class for the port Web Interface To configure the QoS Control List settings via the Web Interface 1 Click Configuration QoS and QoS Control List Click the Button to add a new QCE or use the other QCE modification buttons to specify the editing action i e edit delete or moving the relative position of entry in the list When editing an entry on the QCE Configuration page specify the relevant criteria to be matched and the response to a match Click the Apply button to save your changes or the Reset button to revert to previous settings ADAS 24TGSEP x cr 192 168 1 1 ALLOY AMS 24T6SFP gt Syslog gt SNMP 7 Configuration Port gt ACL gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP Filtering Data Base
175. ess Subnet Mask Default Gateway Host MAC Address Console Baudrate RAM Size Flash Size Bridge FDB size Transmit Queue AMS User Manual The model name of this device A brief description of this device A user defined value describing the location of the switch A user defined value normally the system network administrator details will be entered here A user defined value give the switch a descriptive name for easy identification Shows the system time and date of the switch These details can be configured in the Time section Format is YYYY MM DD HH MM SS The time accumulated since the switch was powered on Format is Day Hour Minute Second The current BIOS version running in the switch The current firmware version running in the switch The current hardware and mechanical version numbers The figure before the hyphen is the hardware version the figure after the hyphen is the mechanical version The chipset serial number Please note this is not the serial number of the actual switch The IP Address of the switch The subnet mask of the switch The default gateway of the switch The MAC Address of the management interface of the switch The currently configured Baudrate of the switch The size of the RAM in the switch The size of the flash memory in the switch Displays the current Bridge FDB size Displays the switches transmit hardware priority queue information 15 AMS User Manual
176. ew RADIUS Overview IP Address Status I RADIUS Detais 3 000 01813 Disabled Port Security 2 00001813 Desabled gt Access Management 00001813 Oisabled i SSH 4 00001813 Disabled nak 5 09 00 4013 Disabled HTTPS Auth Method Maintenance i p e Fig 132 RADIUS Overview Parameter Description RADIUS Authentication Servers Status Overview IP Address State The RADIUS server number Click to navigate to detailed statistics for this server The IP address and UDP port number in lt IP Address gt lt UDP Port gt notation of this server The current state of the server This field takes one of the following values Disabled The server is disabled 281 AMS User Manual Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept access attempts Dead X seconds left Access attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled RADIUS Accounting Servers Status Overview IP Address State Auto Refresh Refresh The RADIUS server number Click to navigate to detailed statistics for this server T
177. fault the field is set to All This field determines what happens to the frames that leave and are received by the configured ports There are three options Hybrid Access and Trunk Hybrid The Hybrid port type will allow both untagged and tagged packets to be sent received by the port Use this port type when connecting to VLAN unaware or VLAN aware devices Access The Access port type will only allow untagged packets to be sent received from the port Use this port type when connecting to VLAN unaware devices Trunk The Trunk port type will only allow tagged packets to be sent received from the port Use this port type when connecting to VLAN aware devices Configure the VLAN identifier for the port The allowed values are 1 through 4095 The default value is 1 NOTE The port must be a member of the same VLAN as the Port VLAN ID Used to reset unsaved changes to original configuration Used to save the settings configured on this page 163 AMS User Manual 1 2 10 3 Switch Status This section is used to view the currently configured VLAN groups VLAN groups which have been learnt from other protocols such as GVRP can also be viewed here Web Interface To view the current VLAN groups via the Web Interface 1 Click Configuration VLAN and Switch Status 2 If you want to view specific VLAN groups based on a particular protocol select the protocol from the drop down box near the top of the page Only V
178. fault value for the Join Timer is 200ms Leave Timer The default value for the Leave Timer is 600ms Valid values are 600 to 1000ms Leave All Timer The default value for the Leave All Timer is 10000ms The only supported application currently is GVRP The only supported Attribute Type currently is VLAN This configuration is used to configure the Applicant state machine behaviour for GARP on a particular port normal participant In this mode the Applicant state machine will operate normally in GARP protocol exchanges non participant In this mode the Applicant state machine will not participate in the protocol operation 185 AMS User Manual Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 186 1 2 12 2 Statistics AMS User Manual This page allows you to view the GARP Statistics for all switch ports Web Interface To view the GARP Statistics via the Web Interface 1 2 Click Configuration GARP and Statistics If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information N y AMAS 24 1OSFP x cf ALLOY AMS 24T6SFP 192 168 1 1 Configuration CPU Load gt Time gt Account iP Syslog P SNMP Y Configuration Port gt ACL gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD S
179. figured on this page 210 AMS User Manual 1 2 14 9 DSCP Classification This section is used to map DSCP values to a QoS class and drop precedence level Web Interface To configure the DSCP Classification settings via the Web Interface 1 Click Configuration QoS and DSCP Classification 2 Map the DSCP values to a corresponding QoS class and drop precedence level 3 Click the Apply button to save your changes or the Reset button to revert to previous settings ae AMS 2416SFP lt e Cf 192 168 1 1 amp AMS 24T6SFP Auto Logout orr gt EIEN MZ Syslog J ia DSCP Classification Y Configuration QoS Class OPL DSCP gt Por gt B gt ACL gt Aggregation 0 o 0 BE zj Spanning Tree o 1 0 BE z gt IGMP Snooping t 0 0 BF zj i gt MLD Snooping i 1 con e gt MVR co LLOP 2 9 OE e gt Filtering Data Base 2 1 oise e gt VLAN 3 0 oB gt Voice VLAN 3 1 0 BE GARP OVAR 4 0 Oe vaos 4 i owt r Poet Classificahon 5 0 OBE Port Poucing 5 3 D BE le Pon Scheduler Pon Shaping S E o CE al Poet Tag Remarking amp 1 O BE Port DSCP 0 owe l DSCP Based 005 4 Oe el OSCP Translation n OSCP Classification Apaly Reset QoS Control List QCL Status E A Fig 101 DSCP Classification Parameter Description QoS Class DPL Shows the mapping options for QoS class values and DP drop precedence levels DSCP DSCP value Range is 0 63 R
180. forwarded on the switch There are no EAPOL frames involved in this authentication and therefore MAC based Authentication has nothing to do with the 802 1X standard The advantage of MAC based authentication over port based 802 1X is that several clients can be connected to the same port e g through a 3rd party switch or a hub and still require individual authentication and that the clients don t need special supplicant software to authenticate The advantage of MAC based authentication over 802 1X based authentication is that the clients don t need special supplicant software to authenticate The disadvantage is that MAC addresses can be spoofed by malicious users equipment whose MAC address is a valid RADIUS user can be used by anyone Also only the MD5 Challenge method is supported The maximum number of clients that can be attached to a port can be limited using the Port Security Limit Control functionality 269 AMS User Manual RADIUS Assigned QoS Enabled When RADIUS Assigned QoS is both globally enabled and enabled checked on a given port the switch reacts to QoS Class information carried in the RADIUS Access Accept packet transmitted by the RADIUS server when a supplicant is successfully authenticated If present and valid traffic received on the supplicant s port will be classified to the given QoS Class If re authentication fails or the RADIUS Access Accept packet no longer carries a QoS Class or it s invalid or the supp
181. g a stream from a locally connected multicast server Staying in the multicast group Query message The Query message is used by a querier to determine whether hosts are still interested in an IGMP group At certain time intervals the default is 125 seconds the querier sends an IGMP query message onto the local LAN The destination address of the query message is a special all multicast groups address The purpose of this query is to ask Are there any hosts on the LAN that wish to remain members of multicast groups After receiving an IGMP query any host that wants to remain in a multicast group must send a new join packet for that group If a host is a member of more than one group then it sends a join message for each group it wants to remain a member of The querier looks at the responses it receives to its query and compares these to the list of multicast streams that it is currently registered to forward If there are any items in that list for which it has not received query responses it will stop forwarding those streams Additionally if it is receiving those streams through a Layer 3 network it will send a Layer 3 routing protocol message upstream asking to no longer receive that stream Leaving the multicast group Leave message How a host leaves a group depends on the IGMP version that it is using Under IGMP version 1 when a host has finished with a data stream the local querier continues to send the stream to the
182. g jumbo frames A super priority queue with dedicated memory and strict highest priority in the arbitration The ingress super priority queue allows traffic recognized as CPU traffic to be received and queued for transmission to the CPU even when all the QoS class queues are congested 1 2 14 1 Port Classification This section allows you to configure the basic QoS Ingress Classification settings for all switch ports Web Interface To configure the QoS Port Classification settings via the Web Interface 1 Click Configuration QoS and Port Classification 2 Select the appropriate QoS class settings for each switch port 3 Click the Apply button to save your changes or the Reset button to revert to previous settings 191 AMS User Manual lt A Droes AMS 2316SFP Cfi ALLOY AMS 24T6SFP 192 168 1 1 Spanning Tree IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP Y Qos Port Ciassticatbon Port Policing Port Scheduler Port Shaping Poet Tag Remarking Port DSCP DSCP Based QoS OSCP Translation DSCP Classification QoS Control List QCL Status Storm Control Thermal Protection gt sFlow Agent Loop Protection Single IP Easy Port Parameter Description Port QoS Class DP Level PCP DEI Tag Class w w a am M Mm aM ool B ee ee oe Ss amp y PRPEE
183. g solution e sFlow provides a network wide view of usage and active routes It is a scalable technique for measuring network traffic collecting storing and analyzing traffic data This enables tens of thousands of interfaces to be monitored from a single location e sFlow is scalable enabling it to monitor links of speeds up to 10Gb s and beyond without impacting the performance of core internet routers and switches and without adding significant network load e sFlow is alow cost solution It has been implemented on a wide range of devices from simple L2 workgroup switches to high end core routers without requiring additional memory and CPU e sFlow is an industry standard with a growing number of vendors delivering products with sFlow support sFlow is a multi vendor sampling technology embedded within switches and routers It provides the ability to continuously monitor application level traffic flows at wire speed on all interfaces simultaneously The sFlow Agent is a software process that runs as part of the network management software within a device It combines interface counters and flow samples into sFlow datagrams that are sent across the network to an sFlow Collector Packet sampling is typically performed by the switching routing ASICs providing wire speed performance The state of the forwarding routing table entries associated with each sampled packet is also recorded The sFlow Agent does very little processing It si
184. ge Default is 32768 The delay used by STP Bridges to transit Root and Designated Ports to Forwarding state used in STP compatible mode Valid values are in the range 4 to 30 seconds Default is 15 seconds The maximum age of the information transmitted by the Bridge when it is the Root Bridge Valid values are in the range of 6 to 40 seconds and MaxAge must be lt FwdDelay 1 2 Default is 20 This defines the initial value of remaining Hops for MSTI information generated at the boundary of an MSTI region It defines how many bridges a root bridge can distribute its BPDU information to Valid values are in the range 6 to 40 hops The number of BPDU s a bridge port can send per second When exceeded transmission of the next BPDU will be delayed Valid values are in the range 1 to 10 BPDU s per second Controls whether a port explicitly configured as Edge will transmit and receive BPDUs Controls whether a port explicitly configured as Edge will disable itself upon reception of a BPDU The port will enter the error disabled state and will be removed from the active topology Controls whether a port in the error disabled state will automatically be enabled after a certain time If recovery is not enabled ports have to be disabled and re enabled for normal STP operation The condition is also cleared by a system reboot The time to pass before a port in the error disabled state can be enabled Valid values are between 30 an
185. gment IP Option SIP Filter DIP Filter AMS User Manual Specifies the fragment offset settings for this rule This involves the settings for the More Fragments MF bit and the Fragment Offset FRAG OFFSET field for an IPv4 frame Any any value is allowed Yes IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must match this entry No IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must not match this entry Default Any Specifies the options flag setting for this rule Any any value is allowed Yes IPv4 frames where the options flag is set must match this entry No IPv4 frames where the options flag is set must not match this entry Default Any Specifies the source IP filter for this rule Any no source IP filter is specified Host specifies the source IP address in the SIP Address field Network specifies the source IP address and source IP mask in the SIP Address and SIP Mask fields Default Any Specifies the destination IP filter for this rule Any no destination IP filter is specified Host specifies the destination IP address in the DIP Address field Network specifies the destination IP address and destination IP mask in the DIP Address and DIP Mask fields Default Any Response to take when a rule is matched Action Rate Limiter Port Copy Mirror Permits or denies a frame based on whether it matches an ACL ru
186. gt MVR gt LLOP gt Filtering Data Base gt VLAN gt Voice VLAN P GARP Raa U 4 Fig 31 Viewing the Access Control List Rules Parameter Description User Indicates the ACL user Ingress Port Indicates the ingress port of the ACE Possible values are All The ACE will match all ingress port Port The ACE will match a specific ingress port Frame Type Indicates the frame type of the ACE Possible values are Any The ACE will match any frame type EType The ACE will match Ethernet Type frames Note that an Ethernet Type based ACE will not get matched by IP and ARP frames ARP The ACE will match ARP RARP frames 75 Action Rate Limiter Port Redirect Mirror CPU CPU Once Counter Conflict Auto Refresh Refresh AMS User Manual IPv4 The ACE will match all IPv4 frames IPv4 ICMP The ACE will match IPv4 frames with ICMP protocol IPv4 UDP The ACE will match IPv4 frames with UDP protocol IPv4 TCP The ACE will match IPv4 frames with TCP protocol IPv4 Other The ACE will match IPv4 frames which are not ICMP UDP TCP IPv6 The ACE will match all IPv6 standard frames Indicates the forwarding action of the ACE Permit Frames matching the ACE may be forwarded and learned Deny Frames matching the ACE are dropped Indicates the rate limiter number of the ACE The allowed range is 1 to 16 When Disabled is displayed the rate limiter operation is disabled Indicates the port r
187. gt ACL IGMP Snooping Groups Information Auto refresn D Refresh Lissi gt Aggregation Spanning Tree Start from VLAN 1 Y IGMP Snooping Basit Configuration Port Members VLAN Configuration VLANID Groups 1 2 3 4 5 6 7 2 9 10 44 12 13 14 15 16 17 10 19 20 21 22 23 24 25 26 Port Group Filtering No mare entnes Status Groups information IPv4 SSM information gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base gt VLAN gt Voice VLAN GARP gt GVRP E gt QoS d Thermal Protection gt sFlow Agent gt Loop Protection Single IP Easy Port Mirroring Trap Event Severity SMTP Configuration UPnP gt gt and group addinss 224 0 D 0 wth 20 orines par page Fig 51 IGMP group information Parameter Description VLAN ID The VLAN ID of the entry Groups IGMP group address Port Members Physical Ports on the switch that belong to the IGMP Multicast Group Auto Refresh Tick the box to enable the information to be automatically refreshed 113 AMS User Manual Refresh Used to manually refresh the information on the page lt lt gt gt The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 114 AMS User Manual 1 2 5 6 IPv4 SSM Information Source Specific Multicast SSM is a datagram delivery model that best supports one to many applications also known as broadcast applications SSM is a core network technolo
188. gt GVRP gt aos gt sFlow Agent gt Loop Protection Parameter Description Index Model Name MAC Address Auto Refresh Refresh Auto Logout 10 min ME A Single IP Information Auto refesh Z Rafresh Index Model Name MAC Address 1 APSAGTISASTP 00 00 6c 03 97 8e Fig 112 Single IP Information The ID of the active Slave Switch The parameter lets you know how many slave devices are connected to the SIP group Displays the model name of the slave switch Displays the MAC Address of the slave switch Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 230 AMS User Manual NOTE When you click the index link you will be redirected to the web interface of the slave device 231 AMS User Manual 1 2 18 Easy Port The AMS Series switches support a feature called Easy Port which provides a convenient way to save and share common configurations You can use it to enable features and settings based on the location of a switch in the network and for mass configuration deployments across the network Predefined ports settings can be applied to particular ports for installations of IP Phones Wireless Access Points and IP Cameras Web Interface To configure the Easy Port settings via the Web Interface 1 Click Configuration and Easy Port 2 Use the check boxes to enable the Easy Port function on the required ports 3 Sel
189. guration CPU Load gt Time gt Account iP gt Syslog gt SNMP Configuration gt Port gt ACL Aggregation Statie Trunk LACP Configuration System Status Pon Status Port Statistics Spanning Tree IGMP Snooping gt MLD Snooping System Information e C f D 19216811 amp LY Auto Logout orr gt m LACP Status Autorofesh M Relost Partner Partner Port LACP Key AggriD System ID Port No E No te gt MVR gt LLDP 2 No Filtering Data Base 73 No gt VLAN 24 No Voice VLAN 25 No GARP 2 No CVRP Parameter Description ige3 gt Fon stats Port Physical port of the switch LACP If LACP is enabled on the port Yes will be shown if LACP is disabled then No will be displayed Key The key assigned to this port Only ports with the same key can be aggregated together Aggr ID The Aggregation ID assigned to this group Partner System ID Partner Port The partners system ID MAC Address The port number of the partner device 83 AMS User Manual Auto Refresh Tick the box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 84 1 2 3 2 4 Port Statistics This section displays the current port statistics relating to the LACP information Web Interface To view the Port statistics via the Web Interface 1 Click Configuration Aggregation LACP and Port Statistics
190. gy of IP multicast targeted for audio and video broadcast application environments For the SSM delivery mode an IP multicast receiver host must use IGMP Version 3 IGMPv3 to subscribe to channel S G By subscribing to this channel the receiver host is indicating that it wants to receive IP multicast traffic sent by source host S to group G The network will deliver IP multicast packets from source host S to group G to all hosts in the network that have subscribed to the channel S G SSM does not require group address allocation within the network only within each source host Different applications running on the same source host must use different SSM groups Different applications running on different source hosts can arbitrarily reuse SSM group addresses without causing any excess traffic on the network Addresses in the range 232 0 0 0 8 232 0 0 0 to 232 255 255 255 are reserved for SSM by IANA The AMS also allows you to configure SSM for arbitrary IP multicast addresses also Web Interface To view the IPv4 SSM Information via the Web Interface 1 Click Configuration IGMP Snooping and IPv4 SSM Information 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information 115 AMS User Manual J CL AMS 29T6SFP e f 5 192 168 11 ALLOY AMS 24T6SFP gt ACL gt Aggregation gt Spanning Tree Y IGMP Snooping Basic
191. h Indicates the frame type of the ACE Possible values are Any The ACE will match any frame type Ethernet Type The ACE will match Ethernet Type frames Note that an Ethernet Type based ACE will not get matched by IP and ARP frames ARP The ACE will match ARP RARP frames IPv4 The ACE will match all IPv4 frames Indicates the forwarding action of the ACE Permit Frames matching the ACE may be forwarded and learned Deny Frames matching the ACE are dropped Indicates the rate limiter number of the ACE The allowed range is 1 to 16 When Disabled is displayed the rate limiter operation is disabled Indicates the port copy operation of the ACE Frames matching the ACE are copied to the port number The allowed values are Disabled or a specific port number When Disabled is displayed the port copy operation is disabled Specify the mirror operation of this port The allowed values are Enabled Frames received on the port are mirrored Disabled Frames received on the port are not mirrored The default value is Disabled Indicates the logging operation of the ACE Possible values are Enabled Frames matching the ACE are stored in the System Log Disabled Frames matching the ACE are not logged Please note that the System Log memory size and logging rate is limited Indicates the port shut down operation of the ACE Possible values are Enabled If a frame matches the ACE the ingress port will be disabled Disabled Por
192. h To enable auto refreshing of the statistics on the screen tick this tick box Used to manually refresh the statistics Used to clear the current statistical data 52 AMS User Manual 1 2 1 4 Detailed Statistics This sections displays in depth details of the traffic being transmitted and received by the switch If you are having problems on your network this page can be useful for diagnosing packet errors being received or transmitted by the switch Web Interface To view the detailed port statistics via the Web Interface 1 Click Configuration Port and Detailed Statistics 2 Select the Port you would like to view from the drop down box near the top of the page 3 If you would like the page to auto refresh the port statistics check the Auto Refresh tick box at the top of the page or alternatively hit the refresh button to refresh the page manually 4 Toclear the current statistics use the Clear button at the top of the page AMS 24TESEP Cc 192 168 1 1 a AMS 24T6SFP E5 none Logout Help n a Detailed Port Statistics Port 1 Pont E Adoeeesh E Rah Bw They Receive Total Transmit Total Conaguraton Rx Packets 5013802 Tx Packets 569923 i Port Description Rx Octets 667343438 Tx Octets 320473500 Traffic Overview Rx Unicost 810810 Tx Unicast 569908 Detailed Statistics Rx Multicast 1507891 Tx Multicast 10 QoS Statistics Rx Droodcast 2095101 Tx Brondcan 5 i re een Receive Size Counters Transmit Si
193. h the corresponding PVID This port can also be used for Tagged Ports If the frame received has a TPID of 0x88A8 Standard 802 1ad Q in Q Frame it will be forwarded If the frame received has a TPID of 0x8100 Standard 802 1q valid Ethernet Frame it will be discarded When the frame leaves the switch the TPID will be set to Ox88A8 S Custom Port This port type can be used when the configured port is an untagged port All received packets will be tagged with the corresponding PVID This port can also be used for Tagged Ports If the frame received has a TPID of 0x88A8 Standard 802 1ad Q in Q Frame it will be forwarded If the frame received has a TPID of 0x8100 Standard 802 1q valid Ethernet Frame it will be discarded When the frame leaves the switch the TPID will be set to The Ethertype specified in the Ethertype for Custom S Ports field Enable ingress filtering on a port by checking the box This parameter affects VLAN ingress processing If ingress filtering is enabled and the ingress port is 162 Frame Type Egress Rule PVID Reset Button Apply Button AMS User Manual not a member of the classified VLAN of the frame the frame is discarded By default ingress filtering is disabled Determines whether the port accepts all frames or only tagged untagged frames This parameter affects VLAN ingress processing If the port only accepts tagged frames untagged frames received on the port are discarded By de
194. hars in the range 0 9 which is interpreted as a decimal string representing the VLAN ID Leading O s are discarded The final value must be in the range 1 4095 When Guest VLAN is both globally enabled and enabled checked for a given port the switch considers moving the port into the Guest VLAN according to the rules outlined below This option is only available for EAPOL based modes i e e Port based 802 1X e Single 802 1X e Multi 802 1X For trouble shooting VLAN assignments use the Monitor gt VLANs gt VLAN Membership and VLAN Port pages These pages show which modules have temporarily overridden the current Port VLAN configuration Guest VLAN Operation When a Guest VLAN enabled port s link comes up the switch starts transmitting EAPOL Request Identity frames If the number of transmissions of such frames exceeds Max Reauth Count and no EAPOL frames have been received in the meanwhile the switch considers entering the Guest VLAN The interval between transmission of EAPOL Request Identity frames is configured with EAPOL Timeout If Allow Guest VLAN if EAPOL Seen is enabled the port will now be placed in the Guest VLAN If disabled the switch will first check its history to see if an EAPOL frame has previously been received on the port this history is cleared if the port link goes down 271 Port State Restart Refresh AMS User Manual or the port s Admin State is changed and if not the port wil
195. he Auto Refresh tick box 3 Click Refresh to manually refresh the information ADAS 24 TGSEP cfr ALLOY AMS 24T6SFP gt Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLDP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP GVRP Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Port DSCP OSCP Based Qos OSCP Translation lassincation s Control Thermal Protection sFlow Agent gt Loop Protection gt Single IP Eseu Dart Parameter Description User QCE Frame Type Port Action Conflict Auto Refresh 192 168 1 1 Auto Logout orF gt GEE A QoS Control List Status Combined Auto refresh Resolve Conflict Refresh User QCE Frame Type Port Conflict No entries Action Class DPL OSCP Fig 105 QoS Control List Status Displays the QCL user type Displays the QCE Index number Displays the frame type configured for that entry Displays the list of ports that the QCE applies to Displays the Action values configured for the QCE entry Displays any conflict that have occurred with the QCE entry Tick the box to enable the information to be automatically refreshed 217 AMS User Manual Refresh Used to manually refresh the information on the page Resolve Conflict Click to resolve any current QCE conflicts that have occurred 218
196. he IP address and UDP port number in lt IP Address gt lt UDP Port gt notation of this server The current state of the server This field takes one of the following values Disabled The server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready to accept access attempts Dead X seconds left Access attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 282 AMS User Manual 1 3 6 3 RADIUS Details This section shows you detailed information of the RADIUS Accounting and Authentication Statistics Web Interface To view the RADIUS Detailed Information in the web interface 1 Click Security AAA and RADIUS Details 2 Specify the Server you wish to view statistics for 3 If you want to auto refresh the information you will need to check the Auto Refresh tick box 4 Click Refresh to manually refresh the information _ s0 m a AMS MTOSFR fi D 19210811 z AMS 24T6SFP Auo Logout
197. he password field Used to assign the privilege level of the user being created The allowed privilege range is from 1 through to 15 Level 15 is the highest level and will give you read write access to the entire system Each group can have a privilege level assigned For a user to have access to that the group their privilege level must be equal or greater than the group value By default every group is set to level 10 except the maintenance group which is set to 15 When creating users guest users would be set to privilege level 5 standard users to 10 and administrators to 15 Guests will then have read only access to the system standard users can do everything except maintenance tasks and the administrator will have full control of the switch 22 AMS User Manual 1 1 3 2 Privilege Level This page provides the administrator a way to give users access to the management interface of the switch Privilege levels can be set for a variety of different switch functions Each function is assigned to a group and a privilege level from 1 through to 15 can be assigned to each group Web Interface To configure the Privilege Level settings via the Web Interface 1 Click System Account and Privilege Level 2 Specify the privilege level for each of the groups 3 Click Apply to save your changes Privilege Level Configuration Group Name Privilege Levels secare ic Fig 9 Setting the Privilege Levels Parameter Description Group
198. her ports If set it can cause temporary loss of connectivity after changes in a spanning tree s active topology as a result of persistently incorrect learned station location information It is set by a network administrator to prevent bridges external to a core region of the network causing address flushing in that region possibly because those bridges are not under the full control of the administrator or the physical link state of the attached LANs transits frequently If enabled causes the port to disable itself upon receiving valid BPDU s Contrary to the similar bridge setting the port Edge status does not affect this setting A port entering error disabled state due to this setting is subject to the bridge Port Error Recovery setting as well Controls whether the port connects to a point to point LAN rather than to a shared medium This can be automatically determined or forced either true or false Transition to the forwarding state is faster for point to point LANs than for shared media 95 AMS User Manual Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 1 2 4 5 MSTI Ports This section is used to configure MSTI Port parameters An MSTI Port is a virtual port and each MSTI has its own virtual port The MSTI must be configured before the individual port configuration options can be applied This section is much the same as the CIST Port se
199. his section is used for running the VeriPHY Cable Diagnostics Press to run the diagnostics This will take approximately 5 seconds If all ports are selected this can take approximately 15 seconds When completed the page refreshes automatically and you can view the cable diagnostics results in the cable status table Note that VeriPHY is only accurate for cables of length 7 140 meters 10 and 100 Mbps ports will be linked down while running VeriPHY Therefore running VeriPHY on a 10 or 100 Mbps management port will cause the switch to stop responding until VeriPHY is complete Web Interface To perform a VeriPHY Cable Diagnostic test via the Web Interface 1 Specify the port in which you wish to perform a test 2 Click Start to perform the test r AMS MIGSEP C f 192 168 1 1 ALLOY AMS 24T6SFP Auto Logout orr gt EEE ME gt System gt srmn a _ VeriPHY Cable Diagnostics Ally gt Seci uF eee 7 ot l Restart Device i gt Firmware gt Save Restore i gt Exporvimport Diagnostics Ping Cable Status PairA LengthA PairB LengthB PairC LengthC PairD LengthD Pings gt VenPRY Sue hee wees i i i i t L 2 Fig 153 VeriPHY Cable Diagnostic Test Parameter Description Port The physical port of the switch Cable Status Port Port number Pair The status of the cable pair Length The length in meters of the cable pair 319 2 Specifications
200. his section is used to configure the parameters of the Syslog server the switch will use to offload its system messages Web Interface To configure the Syslog settings via the Web Interface 1 Click System Syslog and Configuration 2 Enter the Syslog parameters into the spaces provides and select the logging level 3 Click Apply to save your changes ae Ve netetenimete Steere ee ALLOY AMS 24T6SFP Auto Logout coo Fig 12 Syslog Configuration Parameter Description Server Mode Select enable from the dropdown box to enable the Syslog function Server Address 1 Enter the IP Address of the Syslog Server Server Address 2 Enter the IP Address of a second Syslog Server if required 28 AMS User Manual Syslog Level Indicates what messages will be sent to the Syslog server 1 1 5 2 Log This section display s the system logging locally on the switch Web Interface To view the System Logs via the Web Interface 1 Click System Syslog and Logs Sense e pha Tene E ALLOY AMS 24T6SFP fas cogot f Hels f Fig 13 System Logs Parameter Description Auto refresh Select the Auto refresh check box to enable the auto refresh function This enables the screen to refresh automatically Level Select the level of logging to be displayed on the screen Options are All Emergency Alert Critical Error Warning Notice Info and Debug ID Click on the ID to view additional information on the event Time Displays the
201. host until it sends out the next query message and receives no reply back from the host IGMP version 2 introduced the Leave message This allows a host to explicitly inform its querier that it wants to leave a particular multicast group When the querier receives the Leave message it sends out a 104 AMS User Manual group specific query asking whether any hosts still want to remain members of that specific group If no hosts respond with join messages for that group then the querier knows that there are no hosts on its LAN that are still members of that group This means that for that specific group it can ask to be pruned from the multicast tree IGMP version 3 removed the Leave message Instead a host leaves a group by sending a join message with no source specified The AMS Series supports IGMP Snooping V1 V2 and V3 and supports up to 1024 multicast groups both IGMP Querier and IGMP Proxy are also supported 1 2 5 1 Basic Configuration This section is used to enable and configure IGMP Snooping on the AMS Series switches Web Interface To configure the IGMP Snooping parameters via the Web Interface 1 Click Configuration IGMP Snooping and Basic Configuration 2 Select to enable or disable IGMP Snooping on the switch 3 Configure ports to be Router Ports Fast Leave Ports and select whether you would like to enable throttling 4 Click the Apply button to save your changes or the Reset button to revert to previous setti
202. ia the Web Interface 1 Click System SNMP and System 2 Select to enable or disable the SNMP function by selecting the relevant radio button 3 Enter a valid engine ID This is used for SNMPv3 and should not need to be changed 4 Click the Apply button to save your changes Tip Matern te Pescara tes vars TAG began TE a Logout Hein Fig 14 SNMP Settings Parameter Description SNMP State Used to enable or disable the SNMP Agent in the switch Engine ID SNMPv3 Engine ID Syntax 0 9 a f A F Minimum 5 Octet Maximum 32 Octet 31 AMS User Manual 1 1 6 2 Configuration This section is used to configure the GET and SET community names In this section you can also enable or disable the SET community By doing this the NMS server will not be able to write configuration parameters to the switch Web Interface To configure the GET and SET communities names via the Web Interface 1 Click System SNMP and Configuration 2 Enter the GET and SET community names 3 Select whether you want to enable or disable the SET function via the drop down box 4 Click the Apply button to save your changes ye A fe se cime AMS 24T6SFP Auto Logout cover Hero system gt System information SINP Contigeration gene Get Community xo Set Community ome Fig 15 SNMP Community Configuration Parameter Description Get Community Set the community name for the SNMP Get function Set Community Set the
203. ic can be shown Web Interface To view the detailed QoS statistics via the Web Interface 1 Click Configuration Port and QoS Statistics 2 Click on an individual port number to show the detailed statistics for that port 3 If you would like the page to auto refresh the QoS statistics check the Auto Refresh tick box at the top of the page or alternatively hit the refresh button to refresh the page manually 4 To clear the current statistics use the Clear button at the top of the page SE Queuing Counters Atorottosh FI Rakesh isat YPort Configuration GR resi Cae Fee ioe eer Fee Che an oe E ee a Port Descripbon 4 szo o o o o 00 0 0 0 0 22519 Traffic Overview 2 0 0 o 0 0 o 0 e o 0 0 o 0 0 9 o Detaled Statisics i 0 0 0 0 0 c 0 0 J 0 J 0 0 QoS Statstes 4 0 0 0 0 0 0 0 0 9 0 J 0 9 0 0 9 SFP Information 5 D TE TS CT 8 FO So A SO G MOOD Sw SO 0 EEE 6 0 0 0 0 0 0 0 o 0 0 0 Q 0 9 Q i 2 0 J LJ 6 0 0 0 J 0 0 J J o 0 vA 3 OME Le 0 SU KS 0 SF Ho EO HS ho Oe Me mee 0 i gt Aggregation 2 0 0 o 0 o J 0 o o 0 J 0 J 0 6 0 Spanning Tree n TIT DTO OG Ss ne A MR HO EN MO og Cie 1G IB J gt IGMP Snooping 1 eto be Po e T a Pee a A 0 1 Act es nag TF Sang Sm SO B10 FPA EEN SM OSE Stal SN Oy Ge Oe ts el ES gt MVR u 0 0 J 0 0 0 0 0 0 0 0 0 0 0 J J gt LLDP pA 0 J 0 0 0 0 6 J 0 o 6 0 gt Filtering Data Base 6 0 0 0 L 0 c 0 0 0 0 0 gt
204. icant is successfully authenticated only that supplicant will be allowed access This is the most secure of all the supported modes In this mode the Port Security module is used to secure a supplicant s MAC address once successfully authenticated Multi 802 1X In port based 802 1X authentication once a supplicant is successfully authenticated on a port the whole port is opened for network traffic This allows other clients connected to the port for instance through a hub to piggy back on the successfully authenticated client and get network access even though they really aren t authenticated To overcome this security breach use the Multi 802 1X variant Multi 802 1X is really not an IEEE standard but features many of the same characteristics as does port based 802 1X Multi 802 1X is like Single 802 1X not an IEEE standard but a variant that features many of the same characteristics In Multi 802 1X one or more supplicants can get authenticated on the same port at the same time Each supplicant is authenticated individually and secured in the MAC table using the Port Security module In Multi 802 1X it is not possible to use the multicast BPDU MAC address as 268 AMS User Manual destination MAC address for EAPOL frames sent from the switch towards the supplicant since that would cause all supplicants attached to the port to reply to requests sent from the switch Instead the switch uses the supplicant s MAC address which i
205. ick Add New Filtering Group 3 Specify the Multicast IP Address and click Apply to save the settings 4 Ifyou wish to delete an entry check the delete tick box and click Apply 5 Click the Apply button to save your changes or the Reset button to revert to previous settings lt fi D 19216811 es me arrir ALLOY ear 3 EEEPES TEREFE 2 tetp come ANS 24T6SFP AutoLogout OFF gt TEE GEE Y System Y System Intormation IGMP Snooping Port Group Filtering Configuration information Configuration ANAE Retr warhe States CPU Load Add new Fatenng Group gt Time a gt Account Apply Reset 4 iP ss gt Syslog gt SNMP Configuration gt Aggregation gt Spanning Tree IGMP Snooping Basic Configuration VLAN Configuration Port Group Filtering Status Groups information IPv4 SSM Information gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base gt VLAN Voice VLAN gt GARP GVRP i See ae Fi g 49 Multicast Address Filtering 109 AMS User Manual Parameter Description Delete Check to delete the entry and click Apply save the changes and remove the selected entry Port Select the Port you would like to enable filtering for the configured Multicast address Filtering Groups Enter the IP Address of the Multicast group to be filtered Valid values are 224 x y z to 239 x y z Reset Button Used to reset unsaved changes to original config
206. ick the box next to the appropriate queue to enable the Queue Shaper Enter the required bandwidth rate maximum values are based on the speed on the port If running at 1Gb 1000000 Kbps or 1000Mbps Default value is 500 Select whether the shaping rate is measured in kbps or Mbps Default is kbps Enable this if the queue is allowed to use excess bandwidth available on the switch 200 AMS User Manual Queue Scheduler Weight Controls the weight of the queue This is a percentage of total bandwidth available valid values 1 to 100 Default is 17 Queue Scheduler Percent Shows the weight in percent for this queue Port Shaper Enable Tick the box to enable Port shaping on the selected port Port Shaper Rate Enter the required bandwidth rate maximum values are based on the speed on the port If running at 1Gb 1000000 Kbps or 1000Mbps Default value is 500 Port Shaper Unit Select whether the shaping rate is measured in kbps or Mbps Default is kbps Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 201 AMS User Manual 1 2 14 5 Port Tag Remarking This section provides an overview of QoS Egress Port Tag Remarking all switch ports Web Interface To configure the QoS Port Tag Remarking settings via the Web Interface 1 Click Configuration QoS and Port Tag Remarking 2 Click on the port you want to configure 3 Select the requi
207. ies is 16 Modifying the OUI table will restart auto detection of OUI process Web Interface To configure the Voice VLAN OUI settings via the Web Interface 1 Click Configuration Voice VLAN and OUI 2 Click Add New Entry to add additional OUI information 3 Specify the OUI and Description 4 Click the Apply button to save your changes or the Reset button to revert to previous settings p SAns auresee x oe e C f D 19216811 x7 ALLOY BRERES BREE ta ii om AMS 24T6SFP Auto Logout ofr gt DEER CIE gt Time Account Voice VLAN OUI Table iP gt Syslog gt SNMP Configuration 00 04 13 Snom IP Phone gt Port 00 15 65 Yealink P Phone gt ACL 00 00 54 Stemens IP Phont i Aggregation 00 08 75 Serv IP Phones Spanning Tree 00 Oboa Zultys IP Phones gt IGMP Snooping at a gt MLD Snooping Add new entry MVR gt LLDP Apply Reset Filtering Data Base gt VLAN Voice VLAN Configuration Out gt GARP GVRP gt Qos gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP Easy Port Mirroring Trap Event Severity Delete Telephony OUI Description 00 08 54 Asyira IP Phones SMTP Configuration UPnP gt Security P Maintenance Fig 81 OUI Configuration Parameter Description Delete Check to delete the entry It will be deleted during the next save Telephony OUI A telephony OUI address is a globally unique identifier assigned to a ve
208. ification of the neighbours LLDP frames The Remote Port ID is the identification of the neighbour port System Name is the name advertised by the neighbour unit Port Description is the port description advertised by the neighbour unit 138 System Capabilities System Description Management Address Auto Refresh Refresh AMS User Manual System Capabilities describes the neighbour unit s capabilities The possible capabilities are Other Repeater Bridge WLAN Access Point Router Telephone DOCSIS cable device Station only or Reserved When a capability is enabled the capability is followed by If the capability is disabled the capability is followed by System Description is the port description advertised by the neighbour unit Management Address is the neighbour unit s address that is used for higher layer entities to assist discovery by the network management This could for instance hold the neighbour s IP address Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 139 AMS User Manual 1 2 8 3 LLDP MED Configuration Media Endpoint Discovery is an enhancement of LLDP known as LLDP MED that provides the following facilities Auto discovery of LAN policies such as VLAN Layer 2 Priority and Differentiated services Diffserv settings enabling plug and play networking Device location discovery to allow creation of lo
209. ion on the page 295 AMS User Manual 1 3 8 Access Management The AMS Series switches supports a number of methods for configuring the switch This section is used to allow deny specific IP Addresses from accessing HTTP HTTPS SNMP or Telnet SSH access 1 3 8 1 Configuration This section is used to configure the Access Management function of the AMS Series switch Web Interface To configure the Access Management settings via the web interface 1 Click Security Access Management and Configuration 2 Click Add New Entry 3 Specify the start and end IP Address and select the type of access allowed 4 Click the Apply button to save your changes or the Reset button to revert to previous settings M L pcan ANAS 24 TOSFP cfr 192 168 1 1 ALLOY AMS 24T6SFP Auto Logout orr gt BEER GEES gt System Configuration _ Access Management Configuration Security gt IP Source Guard Mode Disabled x gt ARP Inspection gt DHCP Snooping gt DHCP Relay Delete StartiP Address End IP Address HTTP HTTPS SNMP TELNET SSH gt NAS R gt AAA Add new entry gt Port 5 ort Security foots Basa Access Management Configuration Statistics SSH HTTPS Auth Method Maintenance Fig 137 Access Management Configuration Parameter Description Mode Indicates the access management mode operation Possible modes are Enabled Enable access management mode operation Disabled Disab
210. ions the Internet Protocol IP and Simple Network Management Protocol SNMP Warranty The AMS series comes with a standard 3 year warranty For full Alloy warranty terms and conditions please follow the link below http www alloy com au Warrant Conventions The following conventions are used throughout this guide to show information Gi NOTE Emphasizes important information or calls your attention to related features or instructions A WARNING Alerts you to a potential hazard that could cause personal injury CAUTION Alerts you to a potential hazard that could cause loss of data or damage the system or equipment AMS User Manual Compliances and Safety Statements Federal Communications Commission FCC Statement This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encou
211. is ACE The IEEE 802 3 describes the value of Length Type Field specifications to be greater than or equal to 1536 decimal equal to 0600 hexadecimal ARP Only ARP frames can match this ACE Notice the ARP frames won t match the ACE with Ethernet type IPv4 Only IPv4 frames can match this ACE Notice the IPv4 frames won t match the ACE with Ethernet type Filter Criteria based on Selected Frame Type Ethernet Mac Parameters SMAC Filter The type of source MAC address Options Any Specific Default Any 68 DMAC Filter AMS User Manual The type of destination MAC address Options Any MC multicast BC broadcast UC unicast Specific Default Any Ethernet EtherType Filter Parameters EtherType Filter ARP Mac Parameters SMAC Filter DMAC Filter ARP ARP Parameters SMAC Filter ARP RARP Request Reply Sender IP Filter This option can only be used to filter Ethernet Il formatted packets Options Any Specific 600 ffff hex Default Any a detailed listing of Ethernet protocol types can be found in RFC1060 A few of the more common types include 0800 IP O806 ARP 8137 IPX The type of source MAC address Options Any Specific Default Any The type of destination MAC address Options Any MC multicast BC broadcast UC unicast Specific Default Any The type of source MAC address Options Any Specific Default Any Specifies the type of ARP packet A
212. is page 206 AMS User Manual 1 2 14 7 DSCP based QoS This section is used to configure DSCP based QoS settings for all switch ports Web Interface To configure the DSCP based QoS settings via the Web Interface 1 Click Configuration QoS and DSCP based QoS 2 Specify whether the DSCP value is trusted and set the corresponding QoS value and DP level used for ingress processing 3 Click the Apply button to save your changes or the Reset button to revert to previous settings eet AIMS 28 TASFP x Feo s n cf 192 168 1 1 amp AMS 24T6SFP Auto Logout 10 min T EEN SI ats DSCP Based Qos ingress Classification gt 7 Configuration DSCP Trust QoS Class DPL Por TEN oe Real gt ACL i gt Aggregation 0 BE 0 Oly gt Spanning Tree gt IGMP Snooping 1 oiz oiz gt MLD Snooping 2 D l ols j gt MVR gt LLOP 3 oz ue gt Filtering Data Base 4 ol oie VLAN Voice VLAN 5 iD hs olz GARP 6 ga Oly gt GVRP aos 7 olej Die Poet Classificahon acest ry ie o a Port Poticing Port Scheduler 9 Ola le Pat Tag ESNI wariy an on Port DSCP 11 olz oy DSCP Based GoS i OSCP Translaton ZARY Ole vs DSCP Classification 3 ole Ole QoS Control List QCL Status Bee ofz E J Fig 99 DSCP based QoS Parameter Description DSCP DSCP value in ingress packets Range is 0 63 Trust Controls whether a specific DSCP value is trusted Only frames with trusted DSCP va
213. itches IP Address and can then control the Slave switches in the same SIP group Slave Enable Single IP Management and run as a Slave Switch The user will connect to the management of this switch via the Master Switches IP Address The specific group name of the Single IP Management Group All switches that belong to this group will be controlled by the Master Switch of the group Used to reset unsaved changes to original configuration Used to save the settings configured on this page 229 AMS User Manual 1 2 17 2 Information This section displays the slave devices and allows the administrator access to these switches Web Interface To view and configure the slave switches of the Single IP Management group via the Web Interface 1 Click Configuration Single IP and Information 2 Click on the index number of the relevant switch you would like to connect to 3 If you want to auto refresh the information you will need to check the Auto Refresh tick box 4 Click Refresh to manually refresh the information APS 4B TASASEP C A D 192 168 505 ALLOY APS 48T4S4SFP Y system System Information Information Contiquration CPU Load Time Account iP Syslog SNMP Y Configuration gt Port gt ACL gt Aggregation Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt POE gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP
214. ive spanning tree topology RSTP is defined in IEEE standard 802 1D 2004 MSTP The Multiple Spanning Tree Protocol MSTP addresses the limitations in the previous spanning tree protocols STP and RSTP within networks that use multiple VLANs with topologies that employ alternative physical links It supports multiple spanning tree instances on any given link within a network and supports large networks by grouping bridges into regions that appear as a single bridge to other devices MSTP is defined in IEEE standard 802 1Q 2005 The protocol builds on and remains compatible with the previous IEEE standards defining STP and RSTP 88 AMS User Manual 1 2 4 1 Bridge Settings This section is used to configure the spanning tree bridge settings allowing full configuration of all spanning tree parameters Here you can select what Spanning Tree Protocol you would like the switch to use STP RSTP or MSTP Web Interface To configure the Bridge Settings for STP via the Web Interface 1 Click Configuration Spanning Tree and Bridge Settings 2 Select the required STP protocol and configure the appropriate basic and advanced STP parameters 3 Click the Save button to save your changes or the Reset button to revert to previous settings r gt SNMP Configuration at EEn x J C AMS 24T6SFP x un e fi 19216811 ALLOY Lh ee A F nt a AMS 24T6SFP Auto Logout OFF x Y System q Y
215. k Configuration VLAN Protocol based VLAN s and Group to VLAN 2 Specify the Group Name and enter a valid VLAN ID 3 Select the required ports for the group by ticking the check box corresponding to the port number 4 Click the Apply button to save your changes or the Reset button to revert to previous settings AMS 24163FP C f 19226811 gt amp ALLOY AMS 24T6SFP Auto Logout OFF ZI MEI Pron ACL Group Name to VLAN mapping Table Awo ehesh E Refesh gt Aggregation Spanning Tree Port Members IGMP Snooping Delete Group Name VLAN ID 1J2 3 4 5 6 7 2 o 10 1 12 12 14 15 16 17 19 19 20 23 22 23 2s 25 26 gt MLD Snooping No Group entries MVR LLOP Filtering Data Base VLAN VLAN Membership Ports Swich Status Port Status Private VLANs gt MAC based VLAN Y Prot ed VLAN Add new entry Aoply Reset P GARP gt GVRP gt Qos gt Thermal Protection gt sFlow Agent Loop Protection gt Single IP E Fig 79 Group to VLAN Mapping Parameter Description Delete To delete a Group Name to VLAN entry check this box and press Apply The entry will be deleted on the selected switch Group Name A valid Group Name is a string of up to 16 characters which consists of a combination of alphabets a z or A Z and integers 0 9 no special characters are allowed When entering a Group Name the Group Name must first exist in the Protocol to Grou
216. l be placed in the Guest VLAN Otherwise it will not move to the Guest VLAN but continue transmitting EAPOL Request Identity frames at the rate given by EAPOL Timeout Once in the Guest VLAN the port is considered authenticated and all attached clients on the port are allowed access on this VLAN The switch will not transmit an EAPOL Success frame when entering the Guest VLAN While in the Guest VLAN the switch monitors the link for EAPOL frames and if one such frame is received the switch immediately takes the port out of the Guest VLAN and starts authenticating the supplicant according to the port mode If an EAPOL frame is received the port will never be able to go back into the Guest VLAN if the Allow Guest VLAN if EAPOL Seen is disabled The current state of the port It can undertake one of the following values Globally Disabled NAS is globally disabled Link Down NAS is globally enabled but there is no link on the port Authorized The port is in Force Authorized or a single supplicant mode and the supplicant is authorized Unauthorized The port is in Force Unauthorized or a single supplicant mode and the supplicant is not successfully authorized by the RADIUS server X Auth Y Unauth The port is in a multi supplicant mode Currently X clients are authorized and Y are unauthorized Two buttons are available for each row The buttons are only enabled when authentication is globally enabled and the port s Admin State is in
217. ld settings Any any value is allowed 0 RARP frames where THA is not equal to the DMAC address 1 RARP frames where THA is equal to the DMAC address Default Any Specifies whether frames can be matched according to their ARP RARP hardware address length HLN and protocol address length PLN settings Any any value is allowed 0 ARP RARP frames where the HLN is equal to Ethernet 0x06 and the PLN is equal to IPv4 0x04 must not match this entry 1 ARP RARP frames where the HLN is equal to Ethernet 0x06 and the PLN is equal to IPv4 0x04 must match this entry Default Any Specifies whether frames can be matched according to their ARP RARP hardware address space HRD settings Any any value is allowed 0 ARP RARP frames where the HRD is equal to Ethernet 1 must not match this entry 1 ARP RARP frames where the HRD is equal to Ethernet 1 must match this entry Default Any Specifies whether frames can be matched according to their ARP RARP protocol address space PRO settings Any any value is allowed 0 ARP RARP frames where the PRO is equal to IP 0x800 must not match this entry 70 AMS User Manual 1 ARP RARP frames where the PRO is equal to IP 0x800 must match this entry Default Any IPv4 MAC Parameters DMAC Filter The type of destination MAC address Options Any MC multicast BC broadcast UC unicast Specific Default Any IPv4 IP Parameters IP Protocol Fi
218. le Default Permit Specifies a rate limiter to apply to the port Range 1 16 Default Disabled Defines a port to which matching frames are copied Range 1 10 Default Disabled Mirrors matching frames from this port Default Disabled ACL based port mirroring set by this parameter and port mirroring set on the general Mirror Configuration page are implemented independently To 73 Logging Shutdown Counter VLAN Parameters 802 1Q Tagged VLAN ID Filter Tag Priority Reset Button Apply Cancel AMS User Manual use ACL based mirroring enable the Mirror parameter on the ACE Configuration page Then open the Mirror Configuration page set the Port to mirror on field to the required destination port and leave the Mode field Disabled Enables logging of matching frames to the system log Default Disabled Open the System Log Information menu to view any entries stored in the system log for this entry Related entries will be displayed under the Info or All logging levels Shuts down a port when a matching frame is seen Default Disabled Shows the number of frames which have matched any of the rules defined for this ACL Specifies whether or not frames should be 802 1Q tagged Options Any Disabled Enabled Default Any Specifies the VLAN to filter for this rule Options Any Specific 1 4095 Default Any Specifies the User Priority value found in the VLAN tag 3 bits as
219. le access management mode operation 296 Delete Start IP Address End IP Address HTTP HTTPS SNMP TELNET SSH Reset Button Apply Button AMS User Manual Check to delete the entry It will be deleted during the next save Indicates the start IP address for the access management entry Indicates the end IP address for the access management entry Indicates that the host can access the switch from HTTP HTTPS interface if the host IP address matches the IP address range provided in the entry Indicates that the host can access the switch from SNMP interface if the host IP address matches the IP address range provided in the entry Indicates that the host can access the switch from TELNET SSH interface if the host IP address matches the IP address range provided in the entry Used to reset unsaved changes to original configuration Used to save the settings configured on this page 297 AMS User Manual 1 3 8 2 Statistics This section is used to view the statistics of the Access Management function of the AMS Series switch Web Interface To view the Access Management statistics via the web interface 1 Click Security Access Management and Statistics 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information AMIS JATESFP x am a e CAD 19216811 i j E AMS 24T6SFP Auto Logout oFF
220. licant is otherwise no longer present on the port the port s QoS Class is immediately reverted to the original QoS Class which may be changed by the administrator in the meanwhile without affecting the RADIUS assigned This option is only available for single client modes i e e Port based 802 1X e Single 802 1X RADIUS attributes used in identifying a QoS Class Refer to the written documentation for a description of the RADIUS attributes needed in order to successfully identify a QoS Class The User Priority Table attribute defined in RFC4675 forms the basis for identifying the QoS Class in an Access Accept packet Only the first occurrence of the attribute in the packet will be considered and to be valid it must follow this rule All 8 octets in the attribute s value must be identical and consist of ASCII characters in the range 0 3 which translates into the desired QoS Class in the range 0 3 RADIUS Assigned VLAN Enabled When RADIUS Assigned VLAN is both globally enabled and enabled checked for a given port the switch reacts to VLAN ID information carried in the RADIUS Access Accept packet transmitted by the RADIUS server when a supplicant is successfully authenticated If present and valid the port s Port VLAN ID will be changed to this VLAN ID the port will be set to be a member of that VLAN ID and the port will be forced into VLAN unaware mode Once assigned all traffic arriving on the port will be classified an
221. lick the Renew button to renew the DHCP lease from the DHCP Server IP Address Enter the required static IP Address in dotted decimal notation IP Mask Enter the required Subnet Mask in dotted decimal notation IP Router Enter the required Default Gateway in dotted decimal notation VLAN ID Provide the VLAN ID of the management interface Valid range is from 1 to 4095 DNS Proxy When DNS proxy is enabled the switch will relay DNS requests to the currently configured DNS server and reply as a DNS resolver to the client devices on the network 25 AMS User Manual 1 1 4 2 IPv6 The AMS Series switches support both dynamically assigned and statically configured IP Addresses If you are running a DHCP server on your network the switch can obtain an IP Address from the DHCP if DHCP Client is enabled If not the switches IP settings must be configured manually Please change the IP Address of the switch to suit your networks requirements Web Interface To configure the IPv6 settings via the Web Interface 1 Click System IP and IPv6 2 Select Auto Configuration if you wish to obtain an IP Address automatically from a DHCP Server Alternatively enter your required IP Settings for your network 3 Click Save to apply your changes or Reset to change values back to your previous settings F EL AEE Tp dues Protects Grup ee 7 ERR E O e ce 92 1681 F Oo you want Googie rrome to save your password Save password Never for ths
222. licy for the video signalling than for the video media This application type should not be advertised if all the same network policies apply as those advertised in the Video Conferencing application policy Tag indicating whether the specified application type is using a tagged or an untagged VLAN Untagged indicates that the device is using an untagged frame format and as such does not include a tag header as defined by IEEE 802 1Q 2003 In this case both the VLAN ID and the Layer 2 priority fields are ignored and only the DSCP value has relevance Tagged indicates that the device is using the IEEE 802 1Q tagged frame format and that both the VLAN ID and the Layer 2 priority values are being used as well as the DSCP value The tagged format includes an additional field known as the tag header The tagged frame format also includes priority tagged frames as defined by IEEE 802 1Q 2003 VLAN identifier VID for the port as defined in IEEE 802 1Q 2003 L2 Priority is the Layer 2 priority to be used for the specified application type L2 Priority may specify one of eight priority levels 0 through 7 as defined by IEEE 802 1D 2004 A value of 0 represents use of the default priority as defined in IEEE 802 1D 2004 DSCP value to be used to provide Diffserv node behaviour for the specified application type as defined in IETF RFC 2474 DSCP may contain one of 64 code point values 0 through 63 A value of O represents use of the defa
223. like to delete Select the Group name from the drop down box Please ensure you have created a group from the Group section See section 1 1 6 5 Select the required security model that the group will belong to Options are v1 Reserved for SNMPv1 and will be available once a SNMPv1 community has been created in the communities section v2c Reserved for SNMPv2c and will be available once a SNMPv2c community has been created in the communities section USM Reserved for User based Security and will be available once a user has been created in the Users section Indicates the security model set for the user Possible security options NoAuth NoPriv No Authentication and No Privacy Auth NoPriv Authentication and No Privacy Auth Priv Authentication and Privacy once the security level for a user has been set it cannot be changed If you need to modify the security level you will need to delete and re create the user The name of the MIB view defining the MIB objects for which this request may request the current values The allowed string length is 1 to 32 43 AMS User Manual Write View Name The name of the MIB view defining the MIB objects for which this request may potentially set new values The allowed string length is 1 to 32 1 1 6 8 Trap This section is used to create SNMP traps Web Interface To configure SNMP Traps via the Web Interface 1 Click System SNMP and Trap 2 Select an SNMP Trap number and cli
224. ll be used to send the emails Email Addresses can also be configured here these will be the addresses the events will be sent to Web Interface To configure the SMTP Configuration settings via the Web Interface 1 Click Configuration and SMTP Configuration 2 Enter the appropriate parameters as required 3 Click the Apply button to save your changes or the Reset button to revert to previous settings a AMS 28 TOSFP x e Cff 192 168 1 1 AMS 24T6SFP Auto Logout orr III Ma iP SMTP Configuration Sysiog g ke Mail S rv r i gt Port User Name l gt ACL Password I l gt Aggregation Severity Level Info M gt Spanning Tree gt IGMP Snooping Sender i gt MLD Snooping Return Path PMR Email Address 1 gt LLOP gt Filtering Data Base Email Address 2 gt VLAN Email Address 3 gt Voice VLAN Email Address 4 gt GARP GVRP Emall Address 5 gt Qos Email Address 6 gt sFlow Agent gt Loop Protection Apaly _Roset gt Single IP Easy Port Mirroring Trap Event Severity SMTP Configuration UPnP Security gt Maintenance Parameter Description Mail Server Username Password Sender Return Path Fig 116 SMTP Configuration Specify the IP Address of the mail server used to send relay the emails Specify the username for the mail server If required Specify the password for the mail server If required Enter an email address for which the emails will be sent from
225. llow the switch to automatically assign a key to the configured group Web Interface To configure the LACP settings via the Web Interface 1 Click Configuration Aggregation LACP and Configuration 2 Tick the LACP Enabled check box next to the port s you want to enable 3 Select to either assign a Key automatically or manually assign a key If you are manually assigning a key enter the key into the space provided 4 Select the Role that you wish the port to play either Active or Passive Fig 33 Configuring a LACP trunk group oa 80 AMS 24T6SFP e A D 19216811 S AMS 24T6SFP Auto Logout OFF EENI MIZE Y System 5 System Information LACP Port Configuration apna Porn CP Ei Key Role Configuration gt CPU Load a aw je gt Time 1 Ano Tel Active x gt Account 1 gt IP 2 Auto lx Actne iy Syslog 3 Amo v Active gt l Faiennaa 4 Aulo cime lel P Contiguration aa m s Port 5 Ano lel Active gt ACL 6 Amo e Active Lel Aggregation Static Trunk 7 Awo rete xf Y LACP a Auto e cine le Configuration pay oy 9 Ano Actne iej B 10 Amo lel Active x Pon Stabstics a Spanning Tree n Auto e ctre Le gt IGMP Snooping 12 Auto e Active gt MLD Snooping 4 P MVR 13 Auto z Active gt LLOP 14 Amo e Active gt Filtering Data Base 15 fat nce tS VLAN z gt Voice VLAN 16 Ano Active gt GARP 7 Ano Actn
226. lter The type of destination MAC address Options Any MC multicast BC broadcast UC unicast Specific Default Any The following additional fields are displayed when these protocol filters are selected ICMP Parameters ICMP Type Filter Specifies the type of ICMP packet to filter for this rule Options Any Specific 0 255 Default Any ICMP Code Filter Specifies the ICMP code of an ICMP packet to filter for this rule Options Any Specific 0 255 Default Any UDP Parameters Source Port Filter Specifies the UDP source filter for this rule Options Any Specific 0 65535 Range 0 65535 Default Any Dest Port Filter Specifies the UDP destination filter for this rule Options Any Specific 0 65535 Range 0 65535 Default Any TCP Parameters Source Port Filter Specifies the TCP source filter for this rule Options Any Specific 0 65535 Range 0 65535 Default Any Dest Port Filter Specifies the TCP destination filter for this rule Options Any Specific 0 65535 Range 0 65535 Default Any 71 TCP FIN TCP SYN TCP RST TCP PSH TCP ACK TCP URG IP TTL AMS User Manual Specifies the TCP No more data from sender FIN value for this rule Any any value is allowed 0 TCP frames where the FIN field is set must not match this entry 1 TCP frames where the FIN field is set must match this entry Default Any Specifies the TCP Synchronize sequence numbers
227. ltering Data Base Broadcast 3 Tel f gt VLAN 53 gt Voice VLAN H gt GARP erties uaaa f P GVRP LI 7 Qos I Port Classification Port Policing j Port Scheduler i Port Shaping E Pon Tag Remarking Pon DSCP DSCP Based QoS DSCP Transiation DSCP Classification Control List f tus i Storm Control gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP seu Dat j 5 a Fig 106 Storm Control 219 Parameter Description Frame Type Status Rate pps Reset Button Apply Button AMS User Manual Specifies broadcast multicast or unknown unicast traffic Enables or Disables Storm Control The threshold above which packets are dropped This limit can be set by specifying a value in pps or by selecting one of the options in Kpps i e marked with the suffix K Options n pps where n 1 2 4 8 16 32 64 128 256 512 or 1 2 4 8 16 32 64 128 256 512 1024 Kpps Default 2 pps Due to an ASIC limitation the enforced rate limits are slightly less than the listed options For example 1 Kpps translates into an enforced threshold of 1002 1 pps Used to reset unsaved changes to original configuration Used to save the settings configured on this page 220 AMS User Manual 1 2 15 s Flow Agent The AMS Series switches support s Flow network monitoring sFlow is a sampling technology that meets the key requirements for a network traffic monitorin
228. lues are mapped to a specific QoS class and drop level DPL Frames with untrusted DSCP values are treated as non IP frames QoS Class QoS value to which the corresponding DSCP value is classified for ingress processing Range 0 7 Default value is 0 207 DPL Reset Button Apply Button AMS User Manual Drop Precedence Level to which the corresponding DSCP value is classified for ingress processing Range 0 1 where 1 is the higher drop priority Default value is 0 Used to reset unsaved changes to original configuration Used to save the settings configured on this page 208 AMS User Manual 1 2 14 8 DSCP Translation This section is used to configure DSCP translation for ingress traffic or DSCP re mapping for egress traffic Web Interface To configure the DSCP Translation settings via the Web Interface 1 Click Configuration QoS and DSCP Translation Set the required ingress translation and egress re mapping parameters Click the Apply button to save your changes or the Reset button to revert to previous settings i Ea AMS ALTESFP x Yoo o C f D 19216811 amp ALLOY AMS 24T6SFP Syslog gt SNMP Configuration Port gt ACL gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP Filtering Data Base VLAN gt Voice VLAN GARP GVRP vaos Pot Classificahon Port Policing Pon Scheduler Port Shaping Poa Tag Re
229. manually 4 Toclear the current statistics use the Clear button at the top of the page AMS 24TOSFP 19216811 W E rer i ee ee r AMS 24T6SFP Auto Logout oF Te Logout Help gt System Configuration Port Statistics Overview Auto refresh Refresh Cisa v Port nner Port Received Transmitted Received Transmitted Port Descapnon 569404 656563813 320146515 Tratte Overview Detaled Statistics Qos Stanstes SFP Information EEE gt ACL Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base ss P Qos gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP Frey Par IFE HEESE TEEF eececsoscescseesssesossseesoessces ecosoceescescosecocsocesesoac0ss Seeeossoseocoseoscssssesseasesssaes ecoscoeceoeseosscosoeseoooosses ecosceccoescescscosscoscosseesS RRERRRRE EE RRR E nonin bi a a daa Fig 22 Port Statistics Parameter Description Port Click on the port number to view the detailed statistics Packets The number of transmitted and received packets per port Bytes The number of transmitted and received Bytes per port Errors The number of transmitted and received errors per port Drops The number of frames discarded due to ingress or egress congestion 51 Filtered Auto Refresh Refresh Clear AMS User Manual The number of filtered frames received by the switc
230. marking Port DSCP OSCP Rased 005 OSCP Translation OSCP Classification QoS Control List QCL Status Parameter Description DSCP Ingress Translate Ingress Classify Auto Logout orr gt EIEN My DSCP Translation pscp Ingress Egress Translate Classify RemapOPO Remap DPi o izd ra bell a lt gt Lyi E Be pee el O BE e oe T 1 1 1 kl gt f 2 2 gt 2 T z 3 3 el 3 3 4 4 z 4 zs 5 5 l 5 Us 6 6 6 Ps gt t rial E acsi ecs cst gt acsi Te 4 9 z 9 elo Ge WAF 10 AF 11 10 AF 11 10 AF 11 1 11 l 11 11 E I2IAFI2 12 AF 12 12 AF12 12 AF12 x 13 13 13 is 13 4A AF 13 14 AF 13 9 14 AF13 14 AF13 e 15 15 gt 15 5 wesa 16 csz e 16 C82 x 16 C82 i 7 7 l 17 7 gt Fig 100 DSCP Translation DSCP value Range is 0 63 Enables ingress translation of DSCP values based on the specified classification method Enable Classification at ingress side as defined in the QoS Port DSCP Configuration table 209 Egress Remap DPO Egress Remap DP1 Reset Button Apply Button AMS User Manual Re maps DPO field to selected DSCP value DPO indicates a drop precedence with a low priority Re maps DP1 field to selected DSCP value DP1 indicates a drop precedence with a high priority Used to reset unsaved changes to original configuration Used to save the settings con
231. me kinds of misconfiguration to be more easily detected and corrected LLDP is a link level one hop protocol LLDP information can only be sent to and received from devices that are directly connected to each other or connected via a hub or repeater Advertised information is not forwarded on to other devices on the network The information transmitted in LLDP advertisements flows in one direction only from one device to its neighbours and the communication ends there Transmitted advertisements do not solicit responses and received advertisements do not solicit acknowledgement LLDP operates over physical ports Layer 2 only For example it can be configured on switch ports that belong to static or dynamic aggregated links channel groups but not on the aggregated links themselves and on switch ports that belong to VLANs but not on the VLANs themselves 1 2 8 1 LLDP Configuration This section is used to enable and configure LLDP on the AMS Series switches Web Interface To configure the LLDP parameters via the Web Interface 1 Click Configuration LLDP and LLDP Configuration 2 Modify any LLDP timing parameters if needed 3 Disable enable two way communication Tx only or Rx only on a per port basis 4 Specify the information to include in the TLV field of advertised messages 5 Click the Apply button to save your changes or the Reset button to revert to previous settings 135 AMS User Manual fj AMS 24T6SFP
232. module Date the SFP module was manufactured Shows the current temperature of the SFP module Shows the current DC voltage being used by the SFP module Shows the Bias current of the SFP module in mA Shows the transmit power of the SFP module Shows the receive sensitivity of the SFP module 57 AMS User Manual 1 2 1 7 EEE EEE is a power saving option that reduces the power usage when there is very low traffic utilization or no traffic EEE works by powering down circuits when there is no traffic When a port has data to be transmitted all circuits are powered up The time it takes to power up the circuits is called the wakeup time The default wakeup time is 17 us for 1Gbit links and 30 us for other link speeds EEE devices must agree upon the value of the wakeup time in order to make sure that both the receiving and transmitting devices have all circuits powered up when traffic is transmitted Each device can exchange information about the devices individual wakeup time using the LLDP protocol For maximizing the power saving the circuit isn t started as soon as data is ready for a port but is instead queued until 3000 bytes of data is ready to be transmitted To eliminate large delay s in cases where the data is less than 3000 bytes data will always be transmitted after 48 us giving a maximum latency of 48 us the wakeup time If desired it is possible to minimize the latency for specific frames by mapping the frames to
233. mply packages data into sFlow Datagrams that are immediately sent on the network Immediate forwarding of data minimizes memory and CPU requirements associated with the sFlow Agent 1 2 15 1 Collector This section allows you to configure the s Flow Agent Collector settings for the switch Web Interface To configure the s Flow Agent Collector settings via the Web Interface 1 Click Configuration s Flow Agent and Collector 2 Configure the appropriate s Flow Agent Collector settings 221 AMS User Manual 3 Click the Apply button to save your changes or the Reset button to revert to previous settings 7 TES OO COCOCOC O rr AMS TGSEP bd _ a lt _ C f 19216811 ALLOY AMS 24T6SFP Auto Logaut 10 min gt EEE A gt snmp meee sFlow Recelver Configuration Port gt ACL gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP GVRP gt Qos sFlow Agent Collector Sampler Loop Protection Single IP I Easy Port Toring Trap Event Severity SMTP Contiguration UPnP Parameter Description Receiver ID IP Type IP Address Port Time Out Datagram Size Configured Current Receiver id 1 1 IP Type PV Le Pa IP Address 00 00 0 0 0 0 Port 6343 6343 Time Out 0 0 Datagram Size 1400 1400 Apply Reset Fig 107 s Flow
234. n 2 Tick the box next to the corresponding port to enable port isolation 3 Click the Apply button to save your changes or the Reset button to revert to previous settings AMS 1GSFP e cr 19216812 ALLOY BREEEER BEERS i es AMS 24T6SFP Auto Logout orr gt EEE IE gt ron gt ACL Port Isolation Configuration gt Aggregation gt Spanning Tree Port Number gt IGMP Snooping LaL2i3i4isisi7 8jojsojss s2 13 44 15 18 17 18 19120 21 22 23124 25128 gt MLD Snooping P MVR LLDP Aoda Rasa j Filtering Data Base Y VLAN VLAN Membership Ports Switch Status Port Status Y Private VLANS r Private VLAN Membership f Port isolation gt MAC based VLAN Protocol based VLAN gt Voice VLAN gt GARP GVRP gt Qos f gt Thermal Protection gt sFlow Agent i gt Loop Protection Single IP i i E a Fig 75 Port Isolation Parameter Description Port Members A check box is provided for each port of a private VLAN When checked port isolation is enabled on that port When unchecked port isolation is disabled on that port By default port isolation is disabled on all ports Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 170 AMS User Manual 1 2 10 6 MAC based VLAN One of the most common ways of grouping VLAN members is by port hence the name port based VLAN Typically the device
235. n send voice traffic with Layer 3 IP precedence and Layer 2 class of service CoS values Because the sound quality of an IP phone call can deteriorate if the data is unevenly sent the switch supports quality of service QoS based on IEEE 802 1p CoS QoS uses classification and scheduling to send network traffic from the switch in a predictable manner The Voice VLAN QoS functionality is only applicable to IP Phones that support tagging of traffic with IP Precedence or CoS QoS values Most IP Phones will support this feature and must be configured to do so correctly Web Interface To configure the Voice VLAN settings via the Web Interface 1 Click Configuration Voice VLAN and Configuration 2 Enable the Voice VLAN from the drop box labelled Mode 3 Specify the appropriate VLAN ID Aging Time and Traffic Class 4 Configure the individual port settings as required 5 Click the Apply button to save your changes or the Reset button to revert to previous settings 179 AMS User Manual eso SS y AMAS 241G3FP x n gt C fe 5 19216811 Q AMS 24T6SFP Auto Logout OFF T EA gt Time P x Account Voice VLAN Configuration gt IP a gt Syslog Mode Disabled xl gt SNMP VLAN ID 1000 Sganliouestion Aging Time 86 00 seconds ath Traffic Class 7 High gt Aggregation Spanning Tree gt IGMP Snooping Port Configuration gt MLD Snooping gt MVR Port Mode Security Discovery Protocol gt LLDP Yo
236. n the same Network Connectivity Device may advertise different sets of policies based on the authenticated user identity or port configuration It should be noted that LLDP MED is not intended to run on links other than between Network Connectivity Devices and Endpoints and therefore does not need to advertise the multitude of network policies that frequently run on an aggregated link interior to the LAN Click the delete button next to a policy to remove that policy 144 Policy ID Application Type AMS User Manual ID for the policy This is auto generated and shall be used when selecting the policies that shall be mapped to the specific ports Intended use of the application types 1 Voice for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications 2 Voice Signalling conditional for use in network topologies that require a different policy for the voice signalling than for the voice media This application type should not be advertised if all the same network policies apply as those advertised in the Voice application policy 3 Guest Voice support a separate limited feature set voice service for guest users and visitors with their own IP Telephony handsets and other similar appliances supporting interactive voice services
237. nable the TACACS Authentication Server by checking this box The IP address or hostname of the TACACS Authentication Server IP address is expressed in dotted decimal notation The TCP port to use on the TACACS Authentication Server If the port is set to 0 zero the default port 49 is used on the TACACS Authentication Server The secret up to 29 characters long shared between the TACACS Authentication Server and the switch Used to reset unsaved changes to original configuration Used to save the settings configured on this page 280 AMS User Manual 1 3 6 2 RADIUS Overview This section is used show you an overview of the status of the RADIUS Authentication and Accounting servers Web Interface To view the RADIUS Server overview in the web interface 1 Click Security AAA and RADIUS Overview 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information lt puy D ean AMAS 24 TGSFP ane C f D 19216811 AMS 24T6SFP Auto Logout or gt GEER ME System Configuration _ RADIUS Authentication Server Status Overview Auto ref Retash ea mama IP Address Status be source Guard J 0 0 0 0 1812 Disabled gt ARP Inspection 2 000 01812 Disabled gt DHCP Snooping 3 000 01812 Drsabted gt DHCP Relay 4 00001812 Desabted gt NAS 5 00004812 Disabled E pa NE RADIUS Accounting Server Status Overvi
238. name The Username string is used to permit access to the SNMP agent The length of the Username can be from 1 to 32 characters Source IP Indicates what IP Addresses are able to communicate with the SNMP agent The subnet mask can be used to allow access to entire subnets or individual IP Addresses Source Mask Enter the required subnet mask based on the source IP Address 34 AMS User Manual 1 1 6 4 Users SNMPv3 brings some important and much needed authentication and encryption options to the SNMP protocol This section is used to configure SNMPv3 users Web Interface To configure SNMP Users via the Web Interface 1 Click System SNMP and Users 2 Click on Add New User to configure a new user Enter the required user details 3 Click Save to apply your changes ee ip Sateen Ge tr 7 Reset ute res TIE epee EE cc e 192 168 11 ALLOY AMs 24T6SFP Min tegat EZ SNMPV3 Users Configuration gt System on Delete Uer Security Authentication Authentication Privacy Privacy e Name Levei Protocol Password Protocol Password es 7 Aan naa vse Trap gt Conniguration Fig 18 SNMPv3 Users Parameter Description Delete Select the tick box and click the apply button to delete a User Add New User Used to add a new user 35 AMS User Manual EEEN ENTES Ara A EM en E ee e e EE ALLOY AMS 24T6SFP togout hon i SNMPv3 Users Configuration Fig 19 adding a new SNMPv3 User Parameter Descri
239. ndor by IEEE It must be 6 characters long and the input format is xx xx xx x is a hexadecimal digit 182 Description Add New Entry Reset Button Apply Button AMS User Manual The description of OUI address Normally it describes which vendor telephony device it belongs to The allowed string length is 0 to 32 Click to add a new entry to the Voice VLAN OUI table An empty row is added to the table please enter the Telephony OUI and Description Used to reset unsaved changes to original configuration Used to save the settings configured on this page 183 AMS User Manual 1 2 12 GARP The Generic Attribute Registration Protocol GARP provides a generic framework whereby devices in a bridged LAN e g end stations and switches can register and de register attribute values such as VLAN Identifiers with each other In doing so the attributes are propagated to devices in the bridged LAN and these devices form a reachability tree that is a subset of an active topology GARP defines the architecture rules of operation state machines and variables for the registration and de registration of attribute values A GARP participation in a switch or an end station consists of a GARP application component and a GARP Information Declaration GID component associated with each port or the switch The propagation of information between GARP participants for the same application in a bridge is carried out by the GARP Inf
240. nfiguration Enabled IP Address Hostname Port Secret The RADIUS Authentication Server number for which the configuration below applies Enable the RADIUS Authentication Server by checking this box The IP address or hostname of the RADIUS Authentication Server IP address is expressed in dotted decimal notation The UDP port to use on the RADIUS Authentication Server If the port is set to 0 zero the default port 1812 is used on the RADIUS Authentication Server The secret up to 29 characters long shared between the RADIUS Authentication Server and the switch RADIUS Accounting Server Configuration Enabled The RADIUS Accounting Server number for which the configuration below applies Enable the RADIUS Accounting Server by checking this box 279 IP Address Hostname Port Secret AMS User Manual The IP address or hostname of the RADIUS Accounting Server IP address is expressed in dotted decimal notation The UDP port to use on the RADIUS Accounting Server If the port is set to 0 zero the default port 1813 is used on the RADIUS Accounting Server The secret up to 29 characters long shared between the RADIUS Accounting Server and the switch TACACS Authentication Server Configuration Enabled IP Address Hostname Port Secret Reset Button Apply Button The TACACS Authentication Server number for which the configuration below applies E
241. nformation on the page 293 AMS User Manual 1 3 7 3 Port Status This section shows the MAC addresses secured by the Port Security module Port Security is a module with no direct configuration Configuration comes indirectly from other modules the user modules When a user module has enabled port security on a port the port is set up for software based learning In this mode frames from unknown MAC addresses are passed on to the port security module which in turn asks all user modules whether to allow this new MAC address to forward or block it For a MAC address to be set in the forwarding state all enabled user modules must unanimously agree on allowing the MAC address to forward If only one chooses to block it it will be blocked until that user module decides otherwise Web Interface To view the Port Security Switch Status via the web interface 1 Click Security Port Security and Port Status 2 Select the port from the drop down box you would like to view the status of 3 If you want to auto refresh the information you will need to check the Auto Refresh tick box 4 Click Refresh to manually refresh the information p a AMS 20T6SFP e C fA D 19210811 TIE Auto Logout OFF m DEFER BEDE system gt Configuration Port Security Port Status Port1 Por 1 Auto retresh Refresh i MAC Address VLANID State Time of Addition Age Hold gt IP Source Guard No MAC addreeeus allacterd gt ARP inspection gt
242. ngs f a AMS 24T6SFP CA 1 19216811 a r s AMS 24T6SFP Auto Logout orr CSRS MIM T System 3 8 System Information IGMP Snooping Configuration Information Global Configuration Gontiquration s cpu Losd Snooping Enabled Bay J Unregistered IPMCv4 Flooding Enabled 17 b Account IGMP SSM Range 232 0 0 0 1a iP Proxy Enabled gt Syslog ane Port Related Configuration Configuration a Port RouterPort FastLeave Throttling gt Port o les gt ACL i r Aggregation unlimited Sa Spanning Tree 2 unlirmted ax f IGMP Snooping 3 unlimited Basic Configuration 4 unlinked eal VLAN Configuration limited Pon Group Filtering ea DEN Status 5 linet od jaz Groups information 7 unlimited IPv4 SSM Information 8 ied eal MLD Snooping 9 5 gt MVR unlimite z f LLOP 0 unliented gt Filtering Data Base unlimited v gt VLAN 12 unlimited e gt Voice VLAN 13 7 al gt GARP Unlirrites gt GVRP 4 unlimited E a Fig 47 IGMP Snooping Configuration 105 Parameter Description Snooping Enabled Unregister IPMCv4 Flooding Enabled IGMP SSM Range Proxy Enabled Port Router Port Fast Leave Throttling AMS User Manual Enable IGMP Snooping on the switch Enable unregistered IPMCv4 flooding enabled SSM Source Specific Multicast range allows SSM aware hosts and routers that run the SSM service model to use group
243. nooping gt MVR gt LLOP Filtering Data Base gt VLAN gt Voice VLAN Y GARP Contigurabon Statistics gt GVRP P Qos gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP Parameter Description Port Peer MAC Failed Count Refresh Auto Refresh Auto Logout orf gt EE A j E i aig GARP Port Statistics Port PeerMAC Failed Count Auto tefresh Refresh AEB tit SEG as Fig 83 GARP Statistics Physical port of the switch The MAC Address of the connecting switch from which the GARP frame has been received The number of GARP frames that have been dropped Used to manually refresh the information on the page Tick the box to enable the information to be automatically refreshed 187 AMS User Manual 1 2 13 GVRP The GARP VLAN Registration Protocol GVRP allows network devices to share VLAN information and to use the information to modify existing VLANs or create new VLANs automatically This makes it easier to manage VLANs that span more than one switch Without GVRP you have to manually configure your switches to ensure that the various parts of the VLANs can communicate with each other across the different switches With GVRP which is an application of the Generic Attribute Registration Protocol GARP this is done for you automatically Here are the guidelines for GVRP e GVRP is supported with STP or RSTP or without spanning tree e B
244. nto the network allowing them access to these shared resources 1 3 5 1 Configuration This section is used to configure the NAS settings for the AMS switch Web Interface AMS User Manual To configure the NAS settings of the switch via the Web Interface 1 2 Click Security NAS and Configuration Enable and configure the system wide parameters for the NAS server 3 Configure the required settings for each of the ports that will utilize the NAS function 4 Click the Apply button to save your changes or the Reset button to revert to previous Rinboalbe settings J 5 Y we hl ADAS 24 TOSFP C fe 19216811 AMS 24T6SFP Auto Logout or gt GERRI ME System 5 Configuration Network Access Server Configuration Refresh Y Security System Configuration gt IP Source Guard gt ARP Inspection Mode Disabled gt DHCP Snooping Reauthentication Enabled a P rite Relay Reauthentication Period seconds Configuration EAPOL Timeout 30 _ Switch Status Aging Period 300 seconds i Status Hold Time 0 seconds E Port Security RADIUS Assigned QoS Enabled f gt Access Management US Assigned SSH Guest VLAN Enabled HTTPS Guest VLAN ID Auth Method Max Reauth Count 2 gt Maintenance Allow Guest VLAN if EAPOL Seen Port Configuration RADIUS RADIUS Guest Port Admin State Assigned Assigned VLAN Port State Restart QoSEnabled VLANEnabled Enabled 1 Fence Autnonzed x scar 2 Force Au
245. ntrol Parameter Description Mode Indicates if Limit Control is globally enabled or disabled on the switch If globally disabled other modules may still use the underlying functionality but limit checks and corresponding actions are disabled 289 Aging Enabled Aging Period Port Configuration Port Mode Limit Action AMS User Manual If checked secured MAC addresses are subject to aging as discussed under Aging Period If Aging Enabled is checked then the aging period is controlled with this input If other modules are using the underlying port security for securing MAC addresses they may have other requirements to the aging period The underlying port security will use the shorter requested aging period of all modules that use the functionality The Aging Period can be set to a number between 10 and 10 000 000 seconds To understand why aging may be desired consider the following scenario Suppose an end host is connected to a 3rd party switch or hub which in turn is connected to a port on this switch on which Limit Control is enabled The end host will be allowed to forward if the limit is not exceeded Now suppose that the end host logs off or powers down If it wasn t for aging the end host would still take up resources on this switch and will be allowed to forward To overcome this situation enable aging With aging enabled a timer is started once the end host gets secured When the timer expires the
246. ntry Code State County City City District Block Street AMS User Manual The two letter ISO 3166 country code in capital ASCII letters Example DK DE or US National subdivisions state canton region province prefecture County parish gun Japan district City township shi Japan Example Melbourne City division borough city district ward chou Japan Neighbourhood block Street name Leading Street Direction Leading street direction Example N Trailing Street suffix Street Suffix House No House no suffix Landmark Trailing street suffix Example SW Street suffix Example Ave House number Example 585 House number suffix Example A Landmark or vanity address Example Monash University Additional Location Info Additional location info Example South Wing Name Zip Code Building Apartment Floor Room no Place Type Name residence and or office occupant Example John Smith Postal zip code Example 3168 Building structure Example Low Library Unit Apartment suite Example 4 Floor number Room number Example 56 Place Type Example Technical Area Postal Community Name Postal community name Example Leonia P O Box Additional Code Post office box P O BOX Example PO Box 16 Additional code Example 1320300003 143 AMS User Manual Emergency Call Service Emergency Call Service e g
247. number of RADIUS packets radiusAcctClientExtBadAuthe Ronan containing invalid authenticators nticators received from the server The number of RADIUS packets of radiusAccClientExtUnknownT unknown types that were received ypes from the server on the accounting port The number of RADIUS packets that radiusAccClientExtPacketsDro were received from the server on the pped accounting port and dropped for some other reason The number of RADIUS packets sent radiusAccClientExtRequests to the server This does not include retransmissions radiusAccClientExtRetransmis The number of RADIUS packets 286 Tx Tx Other Info Name IP Address State AMS User Manual sions retransmitted to the RADIUS accounting server The number of RADIUS packets destined for the server that have not A x yet timed out or received a response Pending radiusAccClientExtPendingRe _ a This variable is incremented when a Requests quests P Request is sent and decremented due to receipt of a Response timeout or retransmission The number of accounting timeouts to the server After a timeout the client may retry to the same server send to a different server or give up Timeouts radiusAccClientExtTimeouts A retry to the same server is counted as a retransmit as well as a timeout A send to a different server is counted as a Request as well as a timeout This section contains information about the state of the serv
248. number of entries deleted due to Time To Live expiring The Port on which LLDP frames are received or transmitted The number of LLDP frames transmitted on the port The number of LLDP frames received on the port The number of received LLDP frames containing some kind of error If an LLDP frame is received on a port and the switch s internal table has run full the LLDP frame is counted and discarded This situation is known as Too Many Neighbours in the LLDP standard LLDP frames require a new entry in the table when the Chassis ID or Remote Port ID is not already contained within the table Entries are removed from the table when a given port s link is down an LLDP shutdown frame is received or when the entry ages out Each LLDP frame can contain multiple pieces of information known as TLVs TLV is short for Type Length Value If a TLV is malformed it is counted and discarded The number of well formed TLVs but with an unknown type value The number of organizationally received TLVs Each LLDP frame contains information about how long time the LLDP information is valid age out time If no new LLDP frame is received within the age out time the LLDP information is removed and the Age Out counter is incremented Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 155 AMS User Manual 1 2 9 Filtering Data Base Switching of frames is based upon th
249. ny no ARP RARP opcode flag is specified ARP frame must have ARP RARP opcode set to ARP RARP frame must have ARP RARP opcode set to RARP Other frame has unknown ARP RARP opcode flag Default Any Specifies whether the packet is an ARP request reply or either type Any no ARP RARP opcode flag is specified Request frame must have ARP Request or RARP Request opcode flag set Reply frame must have ARP Reply or RARP Reply opcode flag Default Any Specifies the sender s IP address Any no sender IP filter is specified Host specifies the sender IP address in the SIP Address field Network specifies the sender IP address and sender IP mask in the SIP Address and SIP Mask fields Default Any 69 Target IP Filter ARP SMAC Match RARP DMAC Match IP Ethernet Length Ethernet AMS User Manual Specifies the destination IP address Any no target IP filter is specified Host specifies the target IP address in the Target IP Address field Network specifies the target IP address and target IP mask in the Target IP Address and Target IP Mask fields Default Any Specifies whether frames can be matched according to their sender hardware address SHA field settings Any any value is allowed 0 ARP frames where SHA is not equal to the SMAC address 1 ARP frames where SHA is equal to the SMAC address Default Any Specifies whether frames can be matched according to their target hardware address THA fie
250. o save your changes or the Reset button to revert to previous settings AMS 24 T65FP E aa Cfi 192 168 1 1 AMS 24T6SFP Auto Logout OFF gt DEFER BEE gt System gt Configuration SSH Configuration ae ete Mod T Enrabia gt Arinae i a DHCP Relay gt NAS gt AAA gt Port Security ee Management Fig 139 SSH Configuration Parameter Description Mode Indicates the SSH mode operation Possible modes are Enabled Enable SSH mode operation Disabled Disable SSH mode operation Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 300 AMS User Manual 1 3 10 HTTPS The AMS Series switches supports HTTPS access to the management interface HTTPS is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication via the browser Web Interface To enable disable HTTPS via the web interface 1 Click Security and HTTPS 2 Select to enable or disable HTTPS 3 Select to enable Automatic Redirect of HTTP to HTTPS 4 Click the Apply button to save your changes or the Reset button to revert to previous settings P gt a AMS 2116SFP e Cfi 192 168 1 1 ALLOY SENNY Auto Logout OFF gt E MCE System gt Configuration HTTPS Configuration Security gt IP Source Guard mode Enabled x gt ARP Inspection Automatic R
251. o transfer DHCP messages between the clients and the server when they are not in the same subnet domain Relay Information Mode Indicates the DHCP relay information mode option operation Possible modes are Enabled Enable DHCP relay information mode When DHCP relay information mode is enabled the agent inserts specific information option 82 into a DHCP message when forwarding to a DHCP server and removes it from a DHCP message when transferring to a DHCP client It only works when DHCP relay operation mode is enabled Disabled Disable DHCP relay information mode Relay Information Policy Indicates the DHCP relay information option policy When DHCP relay Reset Button Apply Button information mode operation is enabled if an agent receives a DHCP message that already contains relay agent information it will enforce the policy And it only works under DHCP if relay information operation mode is enabled Possible policies are Replace Replace the original relay information when a DHCP message that already contains it is received Keep Keep the original relay information when a DHCP message that already contains it is received Drop Drop the package when a DHCP message that already contains relay information is received Used to reset unsaved changes to original configuration Used to save the settings configured on this page 260 AMS User Manual 1 3 4 2 Statistics This section is used to view the DHCP Relay Sta
252. o within 0 180 degrees with a maximum of 4 digits It is possible to specify the direction to either East of the prime meridian or West of the prime meridian Altitude Altitude SHOULD be normalized to within 32767 to 32767 with a maximum of 4 digits It is possible to select between two altitude types floors or meters Meters Representing meters of Altitude defined by the vertical datum specified Floors Representing altitude in a form more relevant in buildings which have different floor to floor dimensions An altitude 0 0 is meaningful even outside a building and represents ground level at the given latitude and longitude Inside a building 0 0 represents the floor level associated with ground level at the main entrance Map Datum The Map Datum is used for the coordinates given in these options WGS84 Geographical 3D World Geodesic System 1984 CRS Code 4327 and Prime Meridian Name Greenwich NAD83 NAVD88 North American Datum 1983 CRS Code 4269 Prime Meridian Name Greenwich the associated vertical datum is the North American Vertical Datum of 1988 NAVD88 This datum pair is to be used when referencing locations on land not near tidal water which would use Datum NAD83 MLLW NAD83 MLLW North American Datum 1983 CRS Code 4269 Prime Meridian Name Greenwich the associated vertical datum is Mean Lower Low Water MLLW This datum pair is to be used when referencing locations on water sea ocean 142 Cou
253. oi Ie e B gt Filtering Data Base 4 Disatied gt Disabled l OUI g gt VLAN i Y Voice VLAN 2 eee Desstlod our J Cannguration 3 Disabled lx Disabled OUI B ou d Disatied Disatied OUI gt GARP 5 aE GVRP Desabled Le Desabled Qui kl gt Gos 6 Disabted L Drsabted L OU zj gt Thermal Protection 7 Disatied gt Disabled gt OUI z sFlow Agent r as Loop Protection O Disabled Disabled ef OUI m gt Single IP 9 Desabled e Disabled Le oui l mn Wit 10 Disabled Disabled le OU Iz Mirroring _ Trap Event Seventy 11 Disatled Disabled OUI SMTP Configuration 12 Dsabled Osabied le OUI e eim 13 Disabled Disabled OU le p Security i _ gt Maintenance 14 Oisatled Disabled e OUI d a Fig 80 Voice VLAN Configuration Parameter Description Mode VLAN ID Aging Time Traffic Class Port Mode Select to enable or disable the Voice VLAN function Please Note MSTP must be disabled when using Voice VLAN to avoid conflicting ingress filtering information Specify a unique VLAN ID for the voice VLAN This VLAN ID cannot be the same as any other VLAN ID configured on the switch The allowed range is 1 to 4095 Indicates the Voice VLAN secure learning aging time The allowed range is 10 to 10000000 seconds It is used when security mode or auto detect mode is enabled In other case
254. on The current version of the IGMP Querier Host Version The current version of the host Querier Status Shows the Querier status of either Active or Idle Queries Transmitted The number of transmitted queries 111 Queries Received V1 Reports Received V2 Reports Received V3 Reports Received V2 Leaves Received Auto Refresh Refresh AMS User Manual The number of received queries The number of Received V1 Reports The number of Received V2 Reports The number of Received V3 Reports The number of Received V2 Leaves Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 112 AMS User Manual 1 2 5 5 Groups Information This section displays the learnt IGMP groups The IGMP Group Table is sorted first by VLAN ID and then by group They will use the last entry of the currently displayed table as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over Web Interface To view the IGMP Group Information via the Web Interface 1 Click Configuration IGMP Snooping and Groups Information 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information K AMS 24TESFP e f 5 192 16811 ALLOY AMS 24T6SFP Auto Logat or gt E GCI
255. onnection e The appliance coupler the connector to the unit and not the wall plug must have a configuration for mating with an EN 60320 IEC 320 appliance inlet e The socket outlet must be near to the unit and easily accessible You can only remove power from the unit by disconnecting the power cord from the outlet e This unit operates under SELV Safety Extra Low Voltage conditions according to IEC 60950 The conditions are only maintained if the equipment to which it is connected also operates under SELV conditions AMS User Manual SAFETY PRECAUTIONS Read the following information carefully before operating the device Please follow the following precaution items to protect the device from risks and damage caused by fire and electric power Use the power adapter that is included with the device package Pay attention to the power load of the outlet or prolonged lines An overburdened power outlet or damaged cords and plugs may cause electric shock or fire Check the power cords regularly if you find any damage replace it at once Proper space for heat dissipation is necessary to avoid any damage caused by device overheating The ventilation holes on the device are designed for heat dissipation to ensure that the device works normally Do not cover these ventilation holes Do not put this device close to a place where a heat source exits or high temperature occurs Avoid placing the device in direct sunshine Do not put this
256. or the frame Check to enable the use of the TCP UDP Port Number or uncheck to disable By default TCP UDP Port Number is enabled Indicates the group ID for the trunk group Up to 13 trunk groups can be created Each port can only belong to one trunk group The Group ID normal is used when no trunk groups are to be used 78 Port Members Reset Button Apply Button AMS User Manual Each switch port is listed for each group ID Select a radio button to include a port in a trunk group or select normal to remove the port from a trunk group By default no ports belong to any trunk group Only full duplex ports can join a trunk group and ports must be the same speed in each group Used to reset unsaved changes to original configuration Used to save the settings configured on this page 79 1 2 3 2 LACP AMS User Manual Ports using Link Aggregation Control Protocol according to IEEE 802 3ad specification as their trunking method can choose their unique LACP Group ID to form a logical trunked port The benefit of using LACP is that a port makes an agreement with its peer port before it becomes a ready member of a trunk group also called aggregator LACP is safer than other trunking methods such as static trunking 1 2 3 2 1 Configuration This section is used to add ports to a LACP based trunk aggregation group Here you can also assign a specific key for each trunking group you are creating or a
257. or all switch ports Web Interface To configure the QoS Port DSCP settings via the Web Interface Click Configuration QoS and Port DSCP Check the tick box next to each corresponding port to enable the DSCP feature Specify the Ingress Classify parameter and whether the Egress packets will be rewritten Click the Apply button to save your changes or the Reset button to revert to previous settings fi a m m Ie AMMS 24 103k P cr 192 168 1 1 y AMS 24T6SFP Auto Logout oFF gt E A gt MVR s LLOP QoS Port DSCP Configuration gt Filtering Data Base gt VLAN Port Ingress Egress gt Voice VLAN Translate Classify Rewrite gt GARP lt gt l e gt GVRP 1 Oisanie Orsanie F Qos lt is Disab Port Classification Disable izd Port Policing 3 Disable i Disable l Port Scheduler 4 Disable e Gesable l E Port Shaping 5 Disable Disable Port Tag Remarking Di ne Port DSC 6 Disable m Ossie DSCP Based QoS a Disable Apipi Osadi izj DSCP Translation 8 Disable Disable 7 OSCP Classification 9 Disabie e Osade gt QoS Control Ust OCL Si 10 Disable Disable l QCL Status Storm Gontrot 11 Disable x Otsable zj gt Thermal Protection 12 Disable e Disable gt sFlow Agent 13 Disable w Disable l gt Loop rnetagnen u Disable e Osable lt gt Single IP Easy Port 15 Dis
258. ormance of the switch including Restart Device Firmware upgrade Save Restore Import Export and Diagnostics 1 4 1 Restart Device This section explains how to restart the device Web Interface To restart the switch via the Web Interface 1 Click Maintenance and Restart Device 2 Click Yes to restart the device _ a AMAS 24 TOSFP x manens Eao o e cr 192 168 1 1 AMS 24T6SFP Auto Logout orr gt EEEN AE ae Restart Device gt Security _ Y Maintenance amare gt Firmware Save Restore gt Exporvimport Yes ie gt Diagnostics i L a Fig 142 Restart Device Parameter Description Restart Device You can restart the switch on this page After restart the switch will boot normally Yes Click Yes to restart the device No Click to undo any restart action 305 1 4 2 Firmware AMS User Manual This section is used to upgrade the firmware in the AMS Series switches Firmware updates are provided periodically to provide bug fixes and features enhancements The AMS Series switches support Dual Firmware Images allowing the administrator to upload two firmware images into the switch This allows you to easily roll back to a previous version if you have issues with a new firmware that you have loaded 1 4 2 1 Firmware Upgrade This section is used to upgrade the firmware in the AMS switch Web Interface To upgrade the firmware in the switch via the Web Interface 1 Click M
259. ormation Propagation GIP component Protocol exchanges take place between GARP participants by means of LLC Type 1 services using the group MAC address and PDU format defined for the GARP application concerned 1 2 12 1 Configuration This page allows you to configure the basic GARP Configuration settings for all switch ports Web Interface To configure the GARP settings via the Web Interface 1 Click Configuration GARP and Configuration 2 Specify the GARP configuration parameters for the individual ports 3 Click the Apply button to save your changes or the Reset button to revert to previous settings 184 AMS User Manual s gom ng ee pa ee sa a AMS 24 TOSFP x cf 192 168 1 1 amp z AMS 24T6SFP Auto Logout Ore gt EEE MIEN Configuration i CPU Load GARP Port Configuration Autorfiesh M Retesh gt Time Timer Values f env Port Join Ti e Ti Li All Timer Application Attribute Type GARP Applicant gt sysiog 1 200 600 10000 GVRP VLAN normal participant SNMP 2 20 600 10000 GvRP e VLAN normat participant ai mee anan 3 20 600 10000 GVRP VLAN normal participant Le lad cem gt ACL 4 200 600 10000 GVRP VLAN normal participant gt Aggregation 5 200 600 10000 GVRP VLAN l normal parkerpant z Spanning Tree 6 200 600 10000 CVRP x VLAN e normal participant Lv gt IGMP Snooping p MLD Snooping 7 xo 600 10000 GVR
260. ort Physical port of the switch VLAN ID VLAN ID of the IP traffic that s permitted IP Address IP Address of the dynamic entry Mac Address MAC Address of the dynamic entry Auto Refresh Tick the box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 253 AMS User Manual lt lt gt gt The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 254 AMS User Manual 1 3 3 DHCP Snooping The AMS Series switches supports DHCP Snooping The section describes how to configure the DHCP Snooping parameters of the switch DHCP Snooping can prevent attackers from adding their own DHCP servers on the network 1 3 3 1 Configuration This section is used to configure the DHCP Snooping settings for the AMS switch Web Interface To configure the DHCP Snooping settings of the switch via the Web Interface 1 Click Security DHCP Snooping and Configuration 2 Select to enable or disable DHCP Snooping on the switch 3 Select either trusted or untrusted for each port 4 Click the Apply button to save your changes or the Reset button to revert to previous settings lt n AMS 24 TOSFR x rT gt e C fi D 19216811 ALLOY AMS 2476SFP Auto Logout oFF TEPER MEE gt System n gt Configuration DHCP Snooping Configuration Y Security IP Source Guard Pere EOSS Dictbied in gt
261. orted IGMP Proxy Supported MLD Snooping v1 and v2 Security SSH v1 and v2 are supported SSL Supported IEEE 802 1x IEEE802 1x RADIUS authentication authorisation and accounting MD5 hash guest VLAN single multiple host mode and single multiple sessions Supports IGMP RADIUS based 802 1x Dynamic VLAN assignment Layer 2 isolation PVE Private VLAN Edge aka protected ports for L2 isolation between clients in the same VLAN Supports multiple uplinks Port Security Locks MAC Addresses to ports and limits the number of learned MAC addresses IP Source Guard Supports illegal IP address from accessing to specific port in the switch RADIUS TACACS Supports RADIUS and TACACS authentication Switch as a client Storm control Broadcast multicast or unicast storm on a port ACLs Supports up to 256 entries Drop or rate limitation based on source and destination MAC VLAN ID or IP address protocol port differentiated services code point DSCP IP precedence TCP UDP source and destination ports 802 1p priority Ethernet type Internet Control Message Protocol ICMP packets IGMP packets TCP flag Port Security Locks MAC Addresses to ports and limits the number of learned MAC addresses Quality of Service H W Priority Queue Supports 8 hardware priority queues Scheduling Strict priority and weighted round robin WRR Queue assignment 321 AMS Us
262. ossible application types are shown below 1 Voice for use by dedicated IP Telephony handsets and other similar appliances supporting interactive voice services These devices are typically deployed on a separate VLAN for ease of deployment and enhanced security by isolation from data applications 2 Voice Signalling for use in network topologies that require a different policy for the voice signalling than for the voice media 3 Guest Voice to support a separate limited feature set voice service for guest users and visitors with their own IP Telephony handsets and other similar appliances supporting interactive voice services 149 Policy TAG VLAN ID Priority DSCP AMS User Manual 4 Guest Voice Signalling for use in network topologies that require a different policy for the guest voice signalling than for the guest voice media 5 Softphone Voice for use by softphone applications on typical data centric devices such as PCs or laptops 6 Video Conferencing for use by dedicated Video Conferencing equipment and other similar appliances supporting real time interactive video audio services 7 Streaming Video for use by broadcast or multicast based video content distribution and other similar applications supporting streaming video services that require specific network policy treatment Video applications relying on TCP with buffering would not be an intended use of this application type 8 Video
263. ote ID The number of packets received with the Remote ID option missing 261 Receive Bad Circuit ID Receive Bad Remote ID Client Statistics Transmit to Client Transmit Error Receive from Client Receive Agent Option Replace Agent Option Keep Agent Option Drop Agent Option Auto Refresh Refresh AMS User Manual The number of packets whose Circuit ID option did not match known circuit ID The number of packets whose Remote ID option did not match known Remote ID The number of relayed packets from server to client The number of packets that resulted in error while being sent to servers The number of received packets from server The number of received packets with relay agent information option The number of packets which were replaced with relay agent information option The number of packets whose relay agent information was retained The number of packets that were dropped which were received with relay agent information Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 262 1 3 5 NAS The AMS Series switches supports a NAS Network Access Server function which allows users connection to a variety of resources including the internet Particular settings can be applied to this user based on authentication to a RADIUS Server Functions such as 802 1x and Mac based Authentication can be used to authenticate users o
264. oth ports that constitute a network link between the switch and the other device must be running GVRP e You cannot modify or delete dynamic GVRP VLANs e You cannot remove dynamic GVRP ports from static or dynamic VLANs e Tobe detected by GVRP a VLAN must have at least one active node or have at least one port with a valid link to an end node GVRP cannot detect a VLAN that does not have any active nodes or valid port links e Resetting the switch erases all dynamic GVRP VLANs and dynamic GVRP port assignments The dynamic assignments are relearned by the switch as PDUs arrive on the ports from other switches e GVRP has three timers join timer leave timer and leave all timer The values for these timers must be identically configured on all switches running GVRP Timers with different values on different switches can result in GVRP compatibility problems e You can convert dynamic GVRP VLANs and dynamic GVRP port assignments to static VLANs and static port assignments 1 2 13 1 Configuration This page allows you to configure the basic GVRP Configuration settings for all switch ports Web Interface To configure the GVRP settings via the Web Interface 1 Click Configuration GVRP and Configuration 2 Specify the GVRP Configuration parameters for the required ports 188 AMS User Manual 3 Click the Apply button to save your changes or the Reset button to revert to previous settings r d AMS 2 n TGSFI
265. otocol Indicates the Authentication protocol used for the Trap Options are MDS Select to use the MD5 Authentication Protocol SHA Select to use the SHA Authentication Protocol Authentication Password The password used for both the MD5 and SHA Authentication Protocols The MD5 protocol allows a password length of 8 to 32 characters and the SHA protocol allows a password length of 8 to 40 characters Privacy Protocol Indicates the Privacy protocol used for the user Options are DES Select to use the DES encryption method 45 AMS User Manual Privacy Password The password used for both the DES Privacy Protocol The allowed password length is 8 to 32 characters 46 AMS User Manual 1 2 Configuration This chapter describes the network configuration options available in the AMS Series of switches All Layer 2 features such as VLAN s Port Trunking IGMP ACL s and QoS can be configured in this section 1 2 1 Port The Port section is used to configure specific port parameters and view statistics related to individual ports 1 2 1 1 Configuration Use this section to configure parameters for each of the ports You can force the speed of a port set the maximum frame size set frame collision parameters and also configure the power saving options for each of the ports Web Interface To configure the ports of the switch via the Web Interface 1 Click Configuration Port and Configuration 2 Configure the parameters neede
266. ou want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information ee i ii caa AMAS 24 GSE A S p kn mma 5 C 19216811 z AMS 24T6SFP Auto Logout or gt EEE AGI System Configuration DHCP Snooping Port Statistics Port 1 Port gt Autoretesh M Refest Gloae et mamn Receive Packets Transmit Packets bar Jarca Guara Rx Discover 0 Tx Discover Q gt ARP inspection Rx Offer 0 Tx Offer o OHCP Snooping Rx Request 0 Tx Request 0 Configuration Rx Decline O Tx Decline 0 Statistics x en ean Rx Release 0 Tx Release 0 ENAS Rx Inform 0 Tx Inform a gt AAA Rx Lease Query 0 Tx Lease Query 0 gt Port Security Rx Lease Unassigned O Ix Lease Unassigned o gt Access Management Rx Lease Unknown 0 Tx Lease Unknown a ssn Rx Lease Active D Tx Lease Active 0 HTTPS j Auth Method gt Maintenance L 5 Fig 125 DHCP Snooping Statistics Parameter Description Rx and Tx Discover Rx and Tx Offer Rx and Tx Request Rx and Tx Decline The number of discover option 53 with value 1 packets received and transmitted The number of offer option 53 with value 2 packets received and transmitted The number of request option 53 with value 3 packets received and transmitted The number of decline option 53 with value 4 packets received and transmitted 257 A
267. ow to configure the ACL parameters ACE of each switch port These parameters will affect frames received on a port unless the frame matches a specific ACE rule Web Interface To configure the ACL Ports Configuration via the Web Interface 1 Click Configuration ACL and Ports 2 Configure the required ACL settings for each of the ports 3 Click the Apply button to save your changes or the Reset button to revert to previous settings 60 F D ams 24T6sFP e 0 192 168 1 1 ALLOY AMS 24T6SFP gt System Rate Limiters Access Control List ACL Status gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLDP gt Filtering Data Base gt VLAN gt Voice VLAN gt GARP gt GVRP gt Qos gt Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP Easy Port Mirroring Trap Event Severity SMTP Configuration UPnP Parameter Description Port Policy ID Action Rate Limiter ID Port Redirect Mirror AMS User Manual ae Auto Logout o ACL Ports Configuration Refresh Clear Rate Port Limiter ID Redirect Port Poy Action Mirror Logging Shutdown State Counter gt Wie be gt whic Aho ello Im lz 4 m gt 10 Permit Disabled Disabled Disabled Enabled 4327469 4 Disabled 4 iil gt 20 Permit Dis
268. p section 177 VLAN ID Port Members Add New Entry Reset Button Apply Button Refresh Auto Refresh AMS User Manual Indicates the ID to which the Group Name will be mapped A valid VLAN ID ranges from 1 4095 A row of check boxes for each port is displayed for each Group Name to VLAN ID mapping To include a port in a mapping check the box To remove or exclude the port from the mapping make sure the box is unchecked By default no ports are members and all boxes are unchecked Click to add a new entry to the mapping table An empty row is added to the table the Group Name VLAN ID and port members can be configured as needed Used to reset unsaved changes to original configuration Used to save the settings configured on this page Used to manually refresh the information on the page Tick the box to enable the information to be automatically refreshed 178 AMS User Manual 1 2 11 Voice VLAN The Voice VLAN function is used for networks where both data and voice traffic are running on the same network By using a dedicated VLAN for voice traffic it allows the administrator to prioritize this traffic to ensure voice quality is kept to an optimum level 1 2 11 1 Configuration This section is used to configure the Voice VLAN settings on the AMS Series switches The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone When the switch is connected to an IP Phone the phone ca
269. pling parameters 3 Select whether the samples will taken from RX TX or all packets 4 Click the Apply button to save your changes or the Reset button to revert to previous settings f EES LS M ee ANAS 24 165EP x gt a w eee C os fe 19216811 t s AMS 24T6SFP gt SNMP Mro sFlow Sampler Configuration Port Flow Sampling Counter Sampling ACL sFlow Ports sFlow Instance Sampler Type Sampling Rate MaxHdr Size Polling interval gt Aggregation 1 1 None 0 128 0 gt Spanning Tree 2 4 None 0 128 o gt IGMP Snooping 3 1 None o 123 0 gt MLD Snooping i i None 0 128 0 gt MVR 5 1 None 128 0 LLOP 1 None 0 128 0 Filtering Data Base 7 1 None o 123 o gt VLAN 3 1 Nene 0 128 0 gt Voice VLAN 3 1 None 0 128 0 gt GARP 10 1 None 0 128 0 gt GVRP 1 None 0 128 0 gt Qos 12 1 None 0 128 0 Y sFiow Agent 7 13 1 None 0 120 0 Collector u 1 None 0 120 0 Sampler 15 1 None 0 128 0 Loop Protection 1 1 None 0 128 0 Single IP 7 1 None 0 128 0 Easy Port 18 1 None 0 128 o Mirroring 19 1 None 0 128 0 Trap Event Severity 20 1 None o 128 o SMTP Contiguration ra 1 None 0 128 0 UPnP 2 1 None 0 126 0 Security 23 1 None 0 128 0 gt Maintenance I 1 None 0 128 0 u Fig 108 s Flow Agent Sampler Settings 223 AMS User Manual AMS 22 T65FF ALLOY AMS 24T6SFP SNMP Y Configuration
270. point Device Class For example will any LLDP MED Endpoint Device claiming compliance as a Media Endpoint Class II also support all aspects of TIA 1057 applicable to Generic Endpoints Class I and any LLDP MED Endpoint Device claiming compliance as a Communication Device Class III will also support all aspects of TIA 1057 applicable to both Media Endpoints Class Il and Generic Endpoints Class 1 The LLDP MED Generic Endpoint Class definition is applicable to all endpoint products that require the base LLDP discovery services defined in TIA 1057 however do not support IP media or act as an end user communication appliance Such devices may include but are not limited to IP Communication Controllers other communication related servers or any device requiring basic services as defined in TIA 1057 Discovery services defined in this class include LAN configuration device location network policy power management and inventory management The LLDP MED Media Endpoint Class II definition is applicable to all endpoint products that have IP media capabilities however may or may not be associated with a particular end user Capabilities include all of the capabilities defined for the previous Generic Endpoint Class Class and are extended to include aspects related to media streaming Example product categories expected to adhere to this class include but are not limited to Voice Media Gateways Conference Bridges Media Servers
271. pplicant and the switch are special 802 1X frames known as EAPOL EAP over LANs frames EAPOL frames encapsulate EAP PDUs RFC3748 Frames sent between the switch and the RADIUS server are RADIUS packets RADIUS packets also encapsulate EAP PDUs together with other attributes like the switch s IP address name and the supplicant s port number on the switch EAP is very flexible in that it allows for different authentication methods like MD5 Challenge PEAP and TLS The important thing is that the authenticator the switch doesn t need to know which authentication method the supplicant and the authentication server are using or how many information exchange frames are needed for a particular method The switch simply encapsulates the EAP part of the frame into the relevant type EAPOL or RADIUS and forwards it When authentication is complete the RADIUS server sends a special packet containing a success or failure indication Besides forwarding this decision to the supplicant the switch uses it to open up or block traffic on the switch port connected to the supplicant NOTE Suppose two backend servers are enabled and that the server timeout is configured to X seconds using the AAA configuration page and suppose that the first server in the list is currently down but not considered dead Now if the supplicant retransmits EAPOL Start frames at a rate faster than X seconds then it will never get authenticated because the switch will
272. pps Packets Per Second or Kbps Kilo Bits Per Second Only 1 rate limit can be applied to each port Web Interface To configure the ACL Rate Limiters via the Web Interface 1 Click Configuration ACL and Rate Limiters 2 Configure up to 16 Rate Limiters using either pps or Kbps 3 Click the Apply button to save your changes or the Reset button to revert to previous settings J AMS 24T6SFP e 5 19216811 za ALLOY AMS 24T6SFP Auto Logout OFF VSystem s RT Y System Information ACL Rate Limiter Configuration npimaton Rate LimiteriID Rate Unit Configuration CPU Load gt Time Account gt IP gt Syslog gt SNMP 1 _ Y Configuration 1 gt Port YACL i Ports 1 Rate Limiters 4 pps Access Control List ACL Status Ui pps Aggregation 10 1 pps 1 1 1 1 1 1 lt gt e 24000 kbps x 8000 kbps v pps pps v 4 pps m pps_ w pps 1 z 3 4 5 6 T 8 9 gt Spanning Tree gt IGMP Snooping gt MLD Snooping 12 gt MVR 13 gt LLDP A gt Filtering Data Base gt VLAN 15 Voice VLAN 16 gt GARP gt GVRP Apply Reset gt Qos gt Thermal Protection pps pps pps pps 4 pps pps la a Fig 28 Rate Limiter Configuration Parameter Description Rate Limiter
273. pt access attempts Dead X seconds left Access attempts were made to this server but it did not reply within the configured timeout The server has temporarily been disabled but will get re enabled when the dead time expires The number of seconds left before this occurs is displayed in parentheses This state is only reachable when more than one server is enabled The time interval measured in milliseconds between the most recent Access Reply Access Challenge and the 285 RADIUS Accounting Statistics Packet Counters Direction Rx Rx Rx Rx Rx Tx Tx AMS User Manual Access Request that matched it from the RADIUS authentication server The granularity of this measurement is 100 ms A value of O ms indicates that there hasn t been round trip communication with the server yet RADIUS authentication server packet counter There are five receive and four transmit counters Name Responses Malformed Responses Bad Authenticators Unknown Types Packets Dropped Requests Retransmissions RFC4670 Name Description The number of RADIUS packets valid radiusAccClientExtResponses 7 or invalid received from the server The number of malformed RADIUS packets received from the server R 3 Malformed packets include packets radiusAccClientExtMalformed j with an invalid length Bad Responses authenticators or unknown types are not included as malformed access responses The
274. ption Delete Select the delete button next to the community you would like to delete Username Enter a username to identify the user Allowed length is 1 to 32 characters Security Level Indicates the security model set for the user Possible security options NoAuth NoPriv No Authentication and No Privacy Auth NoPriv Authentication and No Privacy Auth Priv Authentication and Privacy once the security level for a user has been set it cannot be changed If you need to modify the security level you will need to delete and re create the user Authentication Protocol Indicates the Authentication protocol used for the user Options are None No Authentication Protocol MD5 Select to use the MD5 Authentication Protocol SHA Select to use the SHA Authentication Protocol Once the Authentication Protocol has been set for a user it cannot be changed If you need to modify the Authentication Protocol you will need to delete and re create the user Authentication Password The password used for both the MD5 and SHA Authentication Protocols The MD5 protocol allows a password length of 8 to 32 characters and the SHA protocol allows a password length of 8 to 40 characters Privacy Protocol Indicates the Privacy protocol used for the user Options are None No privacy protocol used 36 Privacy Password AMS User Manual DES Select to use the DES encryption method once the Privacy Protocol has been set for a user it cannot be changed
275. r Manual sure the box is unchecked By default no ports are members The port role is based on the type of devices to be connected to the switch ports Scroll to select the type of device that will connect to the port Options are IP Phone IP CAM and WIFI AP Used to set the Access VLAN ID Allowed range is 1 to 4095 Scroll to select the Port Egress Rule The allowed values are Hybrid Trunk or Access This parameter affects VLAN egress processing If Trunk is selected a VLAN tag with the classified VLAN ID is inserted in frames transmitted on the port This mode is normally used for ports connected to VLAN aware device If Hybrid the default value is selected if the classified VLAN ID of a frame transmitted on the port is different from the Port VLAN ID a VLAN tag with the classified VLAN ID is inserted in the frame If Access is selected untag all frames transmitted on the port Indicates the Voice VLAN ID It should be a unique VLAN ID in the system and cannot equal any other configured port PVID A conflict will occur if the VLAN ID is the same as the management VID MVR VID PVID etc The allowed range is 1 to 4095 Scroll to select the traffic class for the data stream priority The available values from 0 Low to 7 High If you want voice to have a high priority then you can set the value to 7 Scroll to enable or disable the Port Security function on the Port If you turn on the function then you need to set Port Securi
276. raged to try to correct the interference by one or more of the following measures e Reorient or relocate the receiving antenna e Increase the separation between the equipment and receiver e Connect the equipment into an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment European Community CE Electromagnetic Compatibility Directive This information technology equipment complies with the requirements of the Council Directive 89 336 EEC on the Approximation of the laws of the Member States relating to Electromagnetic Compatibility and 73 23 EEC for electrical equipment used within certain voltage limits and the Amendment Directive 93 68 EEC For the evaluation of the compliance with these Directives the following standards were applied RFI Emission Limit according to EN 55022 2010 AS NZS CISPR 22 2009 Class A Limit for harmonic current emission according to EN 61000 3 2 2006 A1 2009 A2 2009 Limitation of
277. red Mode Classified Default or Mapped 4 Click the Apply button to save your changes or the Reset button to revert to previous settings F mee e ee e ee ee eS AMS 201655P x lt lt C f 19216811 AE E f AMS 24T6SFP Aulo Logout orr gt EEE Me gt MVR ry LLOP QoS Egress Port Tag Remarking gt Filtering Data Base gt VLAN Port Mode I gt Voice VLAN at f gt GARP 3 Classihod gt GVRP Ciassifi di Qos amp Classified Port Classification amp Classified Port Policing 3 oe Por Scheduler 9 ekoi l Port Shaping 10 Cassio Port Tag Remarking di Classified Port OSCP 42 Classified DSCP Based QoS 1 Classified DSCP Translation 44 Classified DSCP Classification DETG l ah 16 Classifind QoS Control ust 12 Clansitivd QCL Status 48 Classified Storm Controi k 19 Classified gt Thermal Protection 20 Classified gt sFlow Agent Loop Protection 23 Classified gt Single IP 24 Classifid Easy Port 2 Classified Mirroring 2G Classified Trap Event Seventy SMTP Configuration nono Ee a Fig 94 Port Tag Remarking 202 AMS User Manual J D amsa a C 19216811 ALLOY AMS 24T6SFP gt MVR gt LLOP gt Filtering Data Base P VLAN gt Voice VLAN gt GARP gt GVRP Qos Port Classification Port Policing Port Scheduler Port Shaping Port Tag Remarking Pont DSCP DSCF Based CoS OSCP Translation OSCP Ctassificution QoS Control ust QCL Status Stom
278. ricted VLAN Registration is active for the port row selected Disable The Restricted VLAN Registration is de active for the port row selected Used to manually refresh the information on the page Tick the box to enable the information to be automatically refreshed Used to reset unsaved changes to original configuration Used to save the settings configured on this page 189 1 2 13 2 Statistics AMS User Manual This page allows you to view the GVRP Statistics for all switch ports Web Interface To view the GVRP Statistics via the Web Interface 1 Click Configuration GVRP and Statistics 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information C f 19216811 ALLOY AMS 24T6SFP Configuration CPU Load gt Time gt Account iP gt Syslog P SNMP Y Configuration Port gt ACL gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping gt MVR gt LLOP Filtering Data Base gt VLAN gt Voice VLAN gt GARP Y GVRP Configuration Statistics P QoS Thermal Protection gt sFlow Agent gt Loop Protection gt Single IP Parameter Description Port Join Tx Count Leave Tx Count Refresh Auto Refresh m oe A eS SS J AMS WTGSEP x a r E HE iiie Avo Logod or EEmra GVRP Port Statistics Auto efresh Retesh Clear Port Join
279. riority or Weighted Shows the current weight for this queue and corresponding port QoS Egress Port Scheduler and Shapers Strict Priority Scheduler Mode Queue Shaper Enable Queue Shaper Rate Queue Shaper Unit Queue Shaper Excess Port Shaper Enable Port Shaper Rate Port Shaper Unit Reset Button Apply Button Select the required Scheduler Mode for the port Strict Priority or Weighted Tick the box next to the appropriate queue to enable the Queue Shaper Enter the required bandwidth rate maximum values are based on the speed on the port If running at 1Gb 1000000 Kbps or 1000Mbps Default value is 500 Select whether the shaping rate is measured in kbps or Mbps Default is kbps Enable this if the queue is allowed to use excess bandwidth available on the switch Tick the box to enable Port shaping on the selected port Enter the required bandwidth rate maximum values are based on the speed on the port If running at 1Gb 1000000 Kbps or 1000Mbps Default value is 500 Select whether the shaping rate is measured in kbps or Mbps Default is kbps Used to reset unsaved changes to original configuration Used to save the settings configured on this page QoS Egress Port Scheduler and Shapers Weighted Scheduler Mode Queue Shaper Enable Queue Shaper Rate Queue Shaper Unit Queue Shaper Excess Select the required Scheduler Mode for the port Strict Priority or Weighted T
280. rnate Image button to switch to the old firmware version Sas _ AMAS JATGSFP x em e f D 19216811 ALLOY SISTE Auto Logout OFF REPENS MEM system 4 gt Configuration Software Image Selection Security Active Image aY MAIN NANCO po image managed Restart Device Version AMS 24T6SFP standalone v 00 Y Firmware Date 201301 23117 07 25 08 00 Firreware Upgrace Firmware Selection Alternate Image gt Save Restore Image managed bk Version AMS 2475SFP slandslone v1 54 gt Exportimnport Date 20124146116 27 58408 00 gt Diagnostics Actuate Altemate Image Cancel Y Fig 144 Firmware Selection Parameter Description Image The flash index name of the firmware image The name of primary preferred image is managed the alternate image is named managed bk Version The version of the firmware image Date The date of the firmware image Activate Alternate Image Click this button to switch to the Alternate firmware version Cancel Cancel the firmware selection process 308 AMS User Manual NOTE 1 Incase the active firmware image is the alternate image only the Active Image table is shown In this case the Activate Alternate Image button is also disabled 2 If the alternate image is active due to a corruption of the primary image or by manual intervention uploading a new firmware image to the device will automatically use the primary
281. rrent VLAN s configured on the switch 248 1 3 2 ARP Inspection AMS User Manual The AMS Series switches supports ARP Inspection This allows the switch to intercept and examine all ARP request and response packets in a subnet and discard those packets with invalid IP to MAC address bindings 1 3 2 1 Configuration This section is used to configure the ARP Inspection settings for the AMS switch Web Interface To configure the ARP Inspection settings of the switch via the Web Interface 1 Click Security ARP Inspection and Configuration 2 Select to enable or disable the ARP Inspection feature 3 Select to enable or disable this function on each individual port 4 Click the Apply button to save your changes or the Reset button to revert to previous settings ret AMMS 24 TOSFP es cr 192 168 1 1 ALLOY AMS 24T6SFP Auto Logout OFF EE MCE a ARP Inspection Configuration 7 i a i M n gt IP Source Guard Modar fj Osobied x Renae Finan ma aw Static Table Dynamic Table gt DHCP Snooping Port Mode Configuration gt DHCP Relay Port Mode PNAS b AAA ke Ld Port Security 1 Disabled p hovers Management 2 Dieabied Le pee 3 Disabled Auth Method 4 Disabled v gt Maintynance 5 Disabled S 6 Disabied T Disabled x 8 Disabled Disatted e W Disabled x 11 Disabled 42 Disabled t 4 Fig 121 ARP Inspection Configuration Parameter
282. rt Once the switch considers whether to enter the Guest VLAN it will first check if this option is enabled or disabled If disabled unchecked default the switch will only enter the Guest VLAN if an EAPOL frame has not been received on the port for the life time of the port If enabled checked the switch will consider entering the Guest VLAN even if an EAPOL frame has been received on the port for the life time of the port The value can only be changed if the Guest VLAN option is globally enabled The table has one row for each port on the selected switch and a number of columns which are Physical port of the switch If NAS is globally enabled this selection controls the port s authentication mode The following modes are available Force Authorized In this mode the switch will send one EAPOL Success 266 AMS User Manual frame when the port link comes up and any client on the port will be allowed network access without authentication Force Unauthorized In this mode the switch will send one EAPOL Failure frame when the port link comes up and any client on the port will be disallowed network access Port based 802 1X In the 802 1X world the user is called the supplicant the switch is the authenticator and the RADIUS server is the authentication server The authenticator acts as the man in the middle forwarding requests and responses between the supplicant and the authentication server Frames sent between the su
283. rttomirrorte Pori gt 7 Configuration Pao Port Mode ACL 5 gt Aggregation z i gt Spanning Tree 1 Disabled ed gt IGMP Snooping 2 Disabled MLD Snooping 3 Disabled MVR gt 4 Disabled v Lop Filtering Data Base BN Disabled jx gt VLAN 6 Disabled gt Voice VLAN T Drabind gt P gt times amp Oisabled ji Qos 5 Disabled z P sFlow Agent 10 Oratted e gt Loop Protection i T Disabied r Single IP ae 12 Disabled le Easy Port Mirroring 13 Disabled i Trap Event Severity 14 Disabled r SMTP Configuration 15 Disatted e 2 i Pnp k ia 16 Disabled gt Maintenance _ 5 17 Disabind Fig 114 Port Mirroring 235 AMS User Manual Parameter Description Port to Mirror on Port to mirror also known as the mirror port Frames from ports that have either source rx or destination tx mirroring enabled are mirrored on this port Disabled disables mirroring Port Physical port of the switch Mode Used to select the Mirror Mode Rx only Frames received on this port are mirrored on the mirror port Frames transmitted are not mirrored Tx only Frames transmitted on this port are mirrored on the mirror port Frames received are not mirrored Disabled Neither frames transmitted nor frames received are mirrored Enabled Frames received and frames transmitted are mirrored on the mirror port NOTE For a given port a frame is only transmitted once It
284. s The number of RADIUS Access Request packets retransmitted to the RADIUS authentication server radiusAuthClientExtAccessR etransmissions radiusAuthClientExtPendin The number of RADIUS Access Request gRequests packets destined for the server that have not yet timed out or received a response 284 Tx Other Info Name IP Address State Round Trip Time AMS User Manual This variable is incremented when an Access Request is sent and decremented due to receipt of an Access Accept Access Reject Access Challenge timeout or retransmission The number of authentication timeouts to the server After a timeout the client may retry to the same server send to a radiusAuthClientExtTimeou different server or give up A retry to the Timeouts ts same server is counted as a retransmit as well as a timeout A send to a different server is counted as a Request as well as a timeout This section contains information about the state of the server and the latest round trip time RFC4668 Name radiusAuthClientExtRoundT ripTime Description IP address and UDP port for the authentication server in question Shows the state of the server It takes one of the following values Disabled The selected server is disabled Not Ready The server is enabled but IP communication is not yet up and running Ready The server is enabled IP communication is up and running and the RADIUS module is ready to acce
285. s it will be based on hardware aging time The actual aging time will be situated between the age_time 2 age_time interval Indicates the Voice VLAN traffic class All traffic on the Voice VLAN will apply this class Physical port of the switch Select the appropriate mode for the selected port Options are Disabled Does not belong to the Voice VLAN 180 Security Discovery Protocol Reset Button Apply Button AMS User Manual Auto Will auto detect whether an IP Phone is connected to the port and will automatically join the Voice VLAN Forced Will force the port to be part of the Voice VLAN Used to enable or disable the Voice VLAN port security mode When the function is enabled all non IP Phone MAC addresses in the Voice VLAN will be blocked for 10 seconds Indicates the Voice VLAN port discovery protocol It will only work when auto detect mode is enabled We should enable LLDP feature before configuring discovery protocol to LLDP or Both Changing the discovery protocol to OUI or LLDP will restart auto detect process Possible discovery protocols are OUI Detect telephony device by OUI address LLDP Detect telephony device by LLDP Both Both OUI and LLDP Used to reset unsaved changes to original configuration Used to save the settings configured on this page 181 AMS User Manual 1 2 11 2 OUI This section is used to configure the Voice VLAN OUI table The maximum number of entr
286. s 300 seconds To configure a TACACS Authorization and Accounting Configuration of AAA in the web interface 1 Click Security AAA and Configuration 2 Select Enabled in the Authorization 3 Select Enabled in the Failback to Local Authorization 4 Select Enabled in the Account To configure a RADIUS Authentication Server Configuration of AAA in the web interface 1 Check Enabled 2 Specify IP address or Hostname for Radius Server 3 Specify Authentication Port for Radius Server Default is 1812 4 Specify the Secret with Radius Server To configure a RADIUS Accounting Server Configuration of AAA in the web interface 1 Check Enabled 2 Specify IP address or Hostname for Radius Server 3 Specify Authentication Port for Radius Server Default is 1813 4 Specify the Secret with Radius Server To configure a TACACS Authentication Server Configuration of AAA in the web interface 277 AMS User Manual Check Enabled Specify IP address or Hostname for TACACS Server Specify Authentication Port for TACACS Server Default is 49 Specify the Secret with TACACS Server e gt gt Parameter Timeout Dead Time AMS 165FP Cc ft ALLOY AMS 24T6SFP System Configuration Secu gt IP Source Guard gt ARP Inspection gt DHCP Snooping gt DHCP Relay gt NAS YAAA Configuration RADIUS Overview RADIUS Detass gt Port Security gt Access Management
287. s in the configured address range Format lt IP Address gt lt subnet Mask gt Enable IGMP Proxy This feature can be used to avoid forwarding unnecessary join and leave message to the IGMP router Physical port of the switch Specify which ports are connected to a Layer 3 multicast device of IGMP Querier If an aggregation member port is selected as a router port the whole aggregation group will act as a router port Enable Fast Leave on the port Fast Leave allows the switch to remove an interface from the IGMP table if there are no members listening on that multicast group Normally the group would not be removed until the expiration timer has exceeded Throttling is used to limit the amount of multicast groups a switch port can belong to Valid values are unlimited or 1 through to 10 Default is unlimited 106 AMS User Manual 1 2 5 2 VLAN Configuration This section is used to configure specific IGMP Settings for each of the configured VLAN groups IGMP Snooping can be enable or disabled for every individual VLAN group 20 VLAN groups will be displayed on the screen by default this can be increased to a maximum of 99 The VLAN with the lowest VID will be displayed at the top of the table To browse to additional pages use the arrow keys at the top of the page Web Interface To configure the IGMP VLAN Configuration parameters via the Web Interface 1 Click Configuration IGMP Snooping and VLAN Configuration 2 Select the
288. s obtained from the first EAPOL Start or EAPOL Response Identity frame sent by the supplicant An exception to this is when no supplicants are attached In this case the switch sends EAPOL Request Identity frames using the BPDU multicast MAC address as destination to wake up any supplicants that might be on the port The maximum number of supplicants that can be attached to a port can be limited using the Port Security Limit Control functionality MAC based Auth Unlike port based 802 1X MAC based authentication is not a standard but merely a best practices method adopted by the industry In MAC based authentication users are called clients and the switch acts as the supplicant on behalf of clients The initial frame any kind of frame sent by a client is snooped by the switch which in turn uses the client s MAC address as both username and password in the subsequent EAP exchange with the RADIUS server The 6 byte MAC address is converted to a string on the following form xx xx xx xx xx xx that is a dash is used as separator between the lower cased hexadecimal digits The switch only supports the MD5 Challenge authentication method so the RADIUS server must be configured accordingly When authentication is complete the RADIUS server sends a success or failure indication which in turn causes the switch to open up or block traffic for that particular client using the Port Security module Only then will frames from the client be
289. s separated by spaces or comma Configuration CPU Load Unmapped VLANs are mapped to the CIST The default bridge instance Time Configuration Identification Account gt IP Configuration Name 00 00 8c 8d 00 cb gt Syslog Configuration Revision 0 gt SNMP U Coniguratian gt Port 5 gt ACL MSTI VLANs Mapped gt Aggregation MST Spanning Tree Bridge Settings MSTI Mapping Mane MSTI Priorities CIST Ports sta MSTI Ports Bridge Status MST Port Status fi Port Statistics MSTIS gt IGMP Snooping MLD Snooping MSTI6 gt MVR gt LLDP MaI gt Filtering Data Base gt VLAN gt Voice VLAN F Apply Reset GARP Fig 38 MSTI Mappings 91 Parameter Description Configuration Name Configuration Revision MSTI VLAN s Mapped Reset Button Apply Button AMS User Manual The name identifying the VLAN to MSTI mapping Bridges must share the name and revision as well as the VLAN to MSTI mapping configuration in order to share spanning trees for MSTI s Intra region The name must be no more than 32 characters The revision of the MSTI configuration This must be an integer between 0 and 65535 The bridge instance The CIST is not available for explicit mapping of VLAN s as it will receive the VLANs that have not been manually mapped to an MSTI The list of VLANs mapped to the MSTI The VLANs must be separated with comma and or space A
290. s that do not use the standard 0x8100 Ethertype field value on 802 1Q tagged or 802 1p tagged frames Physical port of the switch 161 Port Type Ingress Filtering AMS User Manual There are several port types that can be selected depending on the role of the port The port type available are Unaware Customer C Port Service S Port and S Custom Port Unaware This port type can be used when the configured port is an untagged port All received packets will be tagged with the corresponding PVID This port type can also be used when using Q in Q VLAN s as this port type will allow a Tagged Port to re Tagged for Q in Q as long as the TPID is 0x8100 Standard 802 1q valid Ethernet Frame If the frame received has a TPID of Ox88A8 Standard 802 1ad Q in Q Frame it will be discarded When the frame leaves the switch the TPID will be set to 0x8100 C Port This port type can be used when the configured port is an untagged port All received packets will be tagged with the corresponding PVID This port can also be used for Tagged Ports If the frame received has a TPID of 0x8100 Standard 802 1q valid Ethernet Frame it will be forwarded If the frame received has a TPID of 0x88A8 Standard 802 1ad Q in Q Frame it will be discarded When the frame leaves the switch the TPID will be set to 0x8100 S Port This port type can be used when the configured port is an untagged port All received packets will be tagged wit
291. sed Auth mode the switch will ignore new frames coming from the client during the hold time The Hold Time can be set to a number between 10 and 1000000 seconds RADIUS Assigned QoS Enabled RADIUS assigned QoS provides a means to centrally control the traffic class to which traffic coming from a successfully authenticated supplicant is assigned on the switch The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature see RADIUS Assigned QoS Enabled below for a detailed description The RADIUS Assigned QoS Enabled checkbox provides a quick way to globally enable disable RADIUS server assigned QoS Class functionality When checked the individual ports ditto setting determine whether RADIUS assigned QoS Class is enabled on that port When unchecked RADIUS server assigned QoS Class is disabled on all ports RADIUS Assigned VLAN Enabled RADIUS assigned VLAN provides a means to centrally control the VLAN on which a successfully authenticated supplicant is placed on the switch Incoming traffic will be classified to and switched on the RADIUS assigned VLAN The RADIUS server must be configured to transmit special RADIUS attributes to take advantage of this feature see RADIUS Assigned VLAN Enabled below for a detailed description The RADIUS Assigned VLAN Enabled checkbox provides a quick way to globally enable disable RADIUS server assigned VLAN functionality When checked the individu
292. settings via the Web Interface Click Configuration VLAN and Ports 2 Configure the parameters required for all ports 3 Click the Apply button to save your changes or the Reset button to revert to previous Parameter Description settings AMS 24T6SFP Gonnguration gt Pon ACL Aggregation P Spanning Tree gt IGMP Snooping P MLD Snooping gt MAG based VLAN gt Protocol based VLAN gt Voice VLAN gt GARP gt GVRP gt Qos gt Thermal Protection gt sFlow Agent Loop Protection Single IP Adto Logout OFF T EE MN Ethertype for Custom S ports Ox 334s VLAN Port Configuration Port Port Type Ingress Filtering Frame Type Egress Rule PvID 7S gt hile H 1 Unaware Al Hybrid Lef 2 Unaware 5 All typo ef All a Hybrid bw ar i All z Hybrid e All zj Hybrid Laf t All xl Hybrid Le All gt Hybrid el All Hybnd lef All l Hybnd Te Ail l Hybnd 12 Unaware gt All gt Hybrid be 12 Unaware gt All a Mypnd Te Hydra Tz j Mybnd Hybrid bef j Hybnd bs Hybrid e tl At ts yon a Se Fig 71 VLAN Port Configuration Ethertype for Custom S Ports This field specifies the ether type used for Custom S ports This is a Port global setting for all the Custom S ports Custom Ethertype enables the user to change the Ethertype value on a port to any value to support network device
293. shows a VLAN design VLANs are defined by user functions rather than locations Each VLAN on a switch behaves as if it were a separate physical bridge The switch forwards packets including unicasts multicasts and broadcasts only to ports assigned to the same VLAN from which it originated This reduces on network traffic VLANs require a trunk to span multiple switches Each trunk can carry traffic for multiple VLANs 1 2 10 1 VLAN Membership This section is used to configure VLAN settings on the AMS Series switches Here you can create VLAN s and assign ports into specific VLAN groups The maximum n umber of VLAN groups that can be created is 4096 Web Interface To configure the VLAN settings via the Web Interface 1 Click Configuration VLAN and VLAN Membership 2 Click Add New VLAN to add additional VLAN groups 3 Give the VLAN group a name and assign a VLAN ID 2 4096 for the group 4 Click the Apply button to save your changes or the Reset button to revert to previous settings 159 gt Aggregation gt Spanning Tree gt IGMP Snooping gt MLD Snooping MYR gt LLOP gt Filtering Data Base VLA VLAN Membersrop Swich Status Port Status gt Thermal Protection gt sFlow Agent Loop Protection gt Single IP 192 168 1 1 AMS User Manual amp Auto Logout OFF gt EEE IE VLAN Membership Configuration Rates Gi Stan rom VLAN 1 with 20 emies pst p
294. ste AMS 24T6SFP iia cogon f nioo 5 mn Information IPV6 Configuration rye Contes Curen su Sats z dodani seenanee Fig 11 IPv6 Address Configuration Parameter Description Auto Configuration Enable the Auto Configuration by checking the tick box When selected the switch will obtain an IP Address from your DHCP Server If the switch does not receive an IP Address the Default IP Address will be used Address Enter the required static IPv6 address An IPv6 address is a 128 bit record represented as eight fields of up to four hexadecimal digits with a colon separating each field For example fe80 215 c5ff fe03 4dc7 The symbol is a special syntax that can be used as a shorthand way of representing multiple 16 bit groups of contiguous zeros but it can only appear once It can also represent a legally valid IPv4 address For example 192 1 2 34 26 AMS User Manual Prefix Enter the IPv6 Prefix of this switch The allowed range is 1 to 128 Gateway Enter the required IPv6 Gateway Address 27 AMS User Manual 1 1 5 Syslog The AMS Series Switches support offloading system messages to a Syslog Server A Syslog is a standard for logging program messages It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them It is supported by a wide variety of devices and receivers across multiple platforms 1 1 5 1 Configuration T
295. stem Status Autoretesh Retest Information Partner Partner Last Local Configuration Aggr ID System ID Key hangad Rods Cion No ports enabled or no existing partners gt Time gt Account gt IP gt Syslog gt SNMP Configuration z gt Port gt ACL Aggregation Statie Trunk LACP Configuration System Statue Port Stas Port Statistics gt Spanning Tree IGMP Snooping gt MLD Snooping gt MVR K poe Data Base gt VLAN roe gt GVRP Parameter Description Fig 34 LACP Status Aggr ID The Aggregation ID associated with this aggregation instance Partner System ID The system ID MAC address of the aggregation partner Partner Key The Key that the partner has assigned to this aggregation ID Last Changed The time since the aggregation changed Local Ports Display which ports belong to the Aggregation Group Auto Refresh Tick the box to enable the information to be automatically refreshed Refresh Used to manually refresh the information on the page 82 1 2 3 2 3 Port Status This section displays the Web Interface AMS User Manual current port status of the LACP groups To view the Port status via the Web Interface 1 Click Configuration Aggregation LACP and Port Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information A AMS 20T6SFP AMS 24T6SFP M Information Conti
296. stinguished by an OUI and a Protocol ID Options for PID Any Specific 0x00 0xffff Default Any If the OUI is hexadecimal 000000 the protocol ID is the Ethernet type EtherType field value for the protocol running on top of SNAP If the OUI is that of a particular organization the protocol ID is a value assigned by that organization to the protocol running on top of SNAP In other words if value of the OUI field is 00 00 00 then value of the PID will be etherType 0x0600 Oxffff and if value of the OUI is other than 00 00 00 then valid value of the PID will be any value from Ox0000 to Oxffff IPv4 Pv4 frame type includes the following settings Protocol IP protocol number Options Any UDP TCP or Other 0 255 Source IP Source IP address Options Any Specific To configure a specific source IP address enter both the address and mask format The address and mask must be in the format x y z w where x y Z and where decimal numbers between 0 and 255 When the mask is converted to a 32 bit binary string and read from left to right all bits following the first zero must also be zero IP Fragment Indicates whether or not fragmented packets are accepted Options Any Yes No Default Any Datagrams may be fragmented to ensure they can pass through a network device which uses a maximum transfer unit smaller than the original packet s size 215 AMS User Manual DSCP Diffserv Code Point value Options
297. switch starts looking for frames from the end host and if such frames are not seen within the next Aging Period the end host is assumed to be disconnected and the corresponding resources are freed on the switch Physical port of the switch Controls whether Limit Control is enabled on this port Both this and the Global Mode must be set to Enabled for Limit Control to be in effect Notice that other modules may still use the underlying port security features without enabling Limit Control on a given port The maximum number of MAC addresses that can be secured on this port This number cannot exceed 1024 If the limit is exceeded the corresponding action is taken The switch is born with a total number of MAC addresses from which all ports draw whenever a new MAC address is seen on a Port Security enabled port Since all ports draw from the same pool it may happen that a configured maximum cannot be granted if the remaining ports have already used all available MAC addresses If Limit is reached the switch can take one of the following actions None Do not allow more than Limit MAC addresses on the port but take no further action 290 State Re Open Button Refresh Reset Button Apply Button AMS User Manual Trap If Limit 1 MAC addresses is seen on the port send an SNMP trap If Aging is disabled only one SNMP trap will be sent but with Aging enabled new SNMP traps will be sent every time the limit is excee
298. t of the switch VLAN ID The VLAN ID of the static entry IP Address The IP Address of the static entry MAC Address The MAC Address of the static entry 251 AMS User Manual Add New Entry Click to add a new static entry Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 252 AMS User Manual 1 3 2 3 Dynamic Table This section is used to view the dynamic ARP Inspection entries Web Interface To view the Dynamic ARP entries via the Web Interface 1 Click Security ARP Inspection and Dynamic Table 2 To filter the entries you can select the Start from Port VLAN ID and or IP Address 3 If you want to auto refresh the information you will need to check the Auto Refresh tick box 4 Click Refresh to manually refresh the information EE AMS JATESFP C fi D 19216811 AMS 24T6SFP Auto Logout OFF EEE MEM gt System p es gt Configuration Dynamic ARP Inspection Table Autosetresh Refresh lt aaor Gann Start from Port 1 E VLAN 1 MAC address 00 00 00 00 00 00 and IP address 0 0 0 0 with 20 entries per Y ARP Inspection page Configuration Port VLANID MAC Address IP Address Stati Table pepe Dynamic Table gt DHCP Snooping gt DHCP Relay gt NAS gt AAA Port Security gt Access Management SSH HTTPS Auth Method gt Maintenance Fig 123 Dynamic Table Parameter Description P
299. t or 10Gigabit mini GBICs modules e Dual speed SFP slots for Fast Ethernet or Gigabit mini GBIC modules e Layer 2 Plus features provide enhanced manageability security QoS and Performance e Easy to use Web Based Management e Comprehensive VLAN GVRP DHCP Relay IGMP and MLD Snooping functions e Advanced QoS features including hardware Priority Queues SR and WRR Scheduling all major Classification regimes Rate limiting and IPv6 Applications e Pv6 and s Flow support e IEEE 802 3az Energy Efficient Ethernet standard e Robust security features including SSH SSL HTTPS 802 1x Layer 2 Isolation IP Source Guard RADIUS TACACS and ACLs e Carrier Grade Ethernet IEEE 802 3ah OAM 802 1ag Ethernet CFM ITU T Y 1731 Performance Monitoring ITU T G 8032 future release and IEEE 588v2 PTP support AMS 4T24S4SFP 11 AMS User Manual 1 Operation of the Web based Management This chapter instructs you on how to configure and manage the AMS Series switches through the web user interface With this facility you can easily access and monitor the switch through any of the Ethernet ports and view the status of the switch including MIBs status each port activity Spanning tree status port aggregation status multicast traffic VLAN and priority status even illegal access record and so on The default values of the AMS Series switches are listed in the table below IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Default G
300. t shut down is disabled for the ACE The counter indicates the number of times the ACE was hit by a frame Modification Buttons You can modify each ACE Access Control Entry in the table using the 67 Refresh Button Clear Button Remove All AMS User Manual following buttons Inserts a new ACE before the current row Edits the ACE row Moves the ACE up the list moves the ACE down the list Deletes the ACE the lowest plus sign adds a new entry at the bottom of the ACE listings Used to refresh the values displayed in the ACL section Used to clear the selected ALC entry Used to remove all entries from the ACL list Ingress Port Policy Filter and Frame Type Ingress Port Policy Filter Frame Type Indicates the ingress port of the ACE Possible values are All The ACE will match all ingress ports Port The ACE will match a specific ingress port Specify the policy number filter for this ACE Any No policy filter is specified Policy filter status is don t care Specific If you want to filter a specific policy with this ACE choose this value Two fields for entering a policy value and bitmask will appear enter the specific policy ID and bitmask Policy must be created in the Ports Section before it will appear in the list Indicates the frame type of the ACE Possible values are Any The ACE will match any frame type Ethernet type Only Ethernet Type frames can match th
301. ted and port members of each Private VLAN can be added or removed here Private VLAN s are based on the source port mask and there are no connections to VLAN s This means that VLAN ID s and Private VLAN ID s can be identical A port must be a member of both a VLAN and a Private VLAN to be able to forward packets By default all ports are VLAN unaware and members of VLAN 1 and Private VLAN 1 A VLAN unaware port can only be a member of one VLAN but it can be a member of multiple Private VLAN s Web Interface To configure the Private VLAN Membership settings via the Web Interface 1 Click Configuration VLAN Private VLAN s and Private VLAN Membership 2 To add anew Private VLAN click Add New Private VLAN 3 Specify the Private VLAN ID and Port Members 4 Click the Apply button to save your changes or the Reset button to revert to previous settings 168 AMS User Manual AMAS 24165FP re C f 19216811 Ga T ror E 3 ALLOY vizecexeieuwewekr ii m AMS 24T6SFP AutoLogout ofr gt E Pron g gt ACL Private VLAN Membership Configuration gt Aggregation Spanning Tree Port Members gt IGMP Snooping Delete PVLANID 1 2 3 4 5 6 7 8 9 10 44 42 13 44 15 16 17 18 19 20 24 22 23 24 25 26 gt MLD Snooping IVORY VMM MVM Oe YVeew MVR LLOP Ada Hew Private VLAN gt Filtering Data Base I ce 7 VLAN Apply Reset VLAN Membership Ports Switch Status Port Status Private VLANs Private
302. th 120 entries par page Y Configuration VLANID Group Port Mode Source Address Type No more antoes gt Port gt ACL gt Aggregation gt Spanning Tree gt IGMP Snooping MLD Snooping Basic Configuration VLAN Configuration Por Group Fitering Status Groups information IPv SSM Information gt MVR gt LLDP Filtering Data Base VLAN gt Voice VLAN gt GARP GVRP gt Qos Thermal Protection gt sFlow Agent gt Loop Protection Single IP Easy Port j Fig 58 IPv6 SSM information 128 Parameter Description VLAN ID Group Port Mode Source Address Type Auto Refresh Refresh lt lt gt gt AMS User Manual The VLAN ID of the entry Multicast Group Address Physical port number of the switch Indicates the filtering mode maintained per VLAN ID port number Group Address basis It can be either Include or Exclude Source IP Address of the group current limit on the system for filtering is 128 IP addresses Indicates the type either Allow or Deny Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 129 AMS User Manual 1 2 7 MVR Multicast VLAN registration MVR allows you to efficiently distribute IPTV multicast streams across an Ethernet ring based
303. thernet LLC SNAP IPv4 and IPv6 The OUI field of the source MAC address i e the first three octets bytes of the MAC address The type of destination MAC address Possible values are Any Broadcast Multicast and Unicast VLAN ID Valid Range 1 4095 PCP is an acronym for Priority Code Point It is a 3 bit field storing the priority level for the 802 1Q frame DEI is an acronym for Drop Eligible Indicator It is a 1 bit field in the VLAN tag Indicates the classification action taken on ingress frames if the configured parameters are matched in the frame s content If a frame matches the QCE the following actions will be taken Class Classified QoS Class If a frame matches the QCE it will be put in the 213 AMS User Manual queue corresponding to the specified QoS class DPL The drop precedence level will be set to the specified value DSCP The DSCP value will be set the specified value Inserts a new QCE before the current row Edits the QCE Moves the QCE up the list Moves the QCE down the list Deletes the QCE 9 0 The lowest plus sign adds a new entry at the bottom of the QCE listings QCE Configuration Tag VID PCP DEI SMAC DMAC Fig 104 Functions of QCE Control Buttons Port Members The ports assigned to this entry VLAN tag type Options Any Tag Untag Default Any VLAN identifier Options Any Sp
304. this setting A port entering error disabled state due to this setting is subject to the bridge Port Error Recovery setting as well Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 234 AMS User Manual 1 2 19 Mirroring The AMS Series switches support traffic mirroring to capture and analyze real time traffic You can mirror traffic from any source port to a target port for real time analysis You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner Mirror Configuration is to monitor the traffic of the network For example we assume that Port A and Port B are Monitoring Port and Monitored Port respectively thus the traffic received by Port B will be copied to Port A for monitoring Web Interface To configure the Port Mirroring settings via the Web Interface I Click Configuration and Mirroring Select the port that you wish to mirror on This port will be used to collect the data Select the ports and mode that you wish to monitor All traffic from this port will be sent to the port selected above Click the Apply button to save your changes or the Reset button to revert to previous settings ol AbAS 241G5FP i cr 192 168 1 1 ALLOY AMS 24T6SFP Auto Logout oF gt EERE A iP gt Nene Mirror Configuration tai Po
305. thorized earl Fig 128 Network Access Server Configuration 263 Parameter Description Mode AMS User Manual Indicates if NAS is globally enabled or disabled on the switch If globally disabled all ports are allowed forwarding of frames Reauthentication Enabled If checked successfully authenticated supplicants clients are reauthenticated after the interval specified by the Reauthentication Period Reauthentication for 802 1X enabled ports can be used to detect if a new device is plugged into a switch port or if a supplicant is no longer attached For MAC based ports reauthentication is only useful if the RADIUS server configuration has changed It does not involve communication between the switch and the client and therefore doesn t imply that a client is still present on a port see Aging Period below Reauthentication Period Determines the period in seconds after which a connected client must be EAPOL Timeout Aging Period reauthenticated This is only active if the Reauthentication Enabled checkbox is checked Valid values are in the range 1 to 3600 seconds Determines the time for retransmission of Request Identity EAPOL frames Valid values are in the range 1 to 255 seconds This has no effect for MAC based ports This setting applies to the following modes i e modes using the Port Security functionality to secure MAC addresses e Single 802 1X e Multi 802 1X e MAC Based Auth When the NAS
306. time the event was logged by the system Message Displays detailed message of the event that has occurred Refresh Used to manually refresh the page Clear Used to clear the log Page Arrows Used to navigate between pages 29 AMS User Manual 1 1 5 3 Detailed Log This section is used to display events ID s in more detail Web Interface To view the Detailed System Logs via the Web Interface 1 Click System Syslog and Detailed Logs 2 Enter the Event ID into the ID filed to display the event in more detail e ae pea ee lt e ALLOY jase etawe Said eta Fig 13 Detailed System logs Parameter Description ID Enter the Event ID of the log event you want to view in detail Message Displays the detailed message of the log event Refresh Used to manually refresh the page Page Arrows Used to navigate between pages 30 AMS User Manual 1 1 6 SNMP The AMS Series Switches support SNMP and can be managed by any Network Management System NMS SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and traverses the Object Identity OID of the management Information Base MIB described in the form of SMI syntax A SNMP agent is running on the switch and if enabled will respond to the requests issued by a SNMP manager 1 1 6 1 System This section is used to enable or disable the SNMP Agent in the switch Web Interface To enable or disable SNMP v
307. tings MSTI Ports Bridge Status Port Status Port Statisties gt IGMP Snooping MLO Snooping Filtering Data Base 192 168 1 1 Auto Logout OFF ME MEIN gt gt A ka Fig 40 MSTI Priority Configuration The bridge instance The CIST is the default instance which is always active Select the Bridge priority from the drop down box next to each MIST Used to reset unsaved changes to original configuration Used to save the settings configured on this page 93 AMS User Manual 1 2 4 4 CIST Ports This section is used to configure individual STP Parameters for each port Here you can enable and disable STP on individual ports configure the ports as AdminEdge ports give certain ports higher priority than others and much more Web Interface To configure the CIST Port Parameters via the Web Interface 1 Click Configuration Spanning Tree and CIST Ports 2 Select and configure the appropriate settings 3 Click the Apply button to save your changes or the Reset button to revert to previous settings fi _ d lt C fi 1 192 168 1 1 rtl z ALLOY Bees ok iE ae a AMS GATOANF Auto Logout OFF z EEE MES z z System Information information Sian sTe Restricted BPDU Poi CPU Load Auto d int to uate Port enabled Eat Sort Priority AdminEdge Edge Role TCN Guard point Account Auto 120 Non Edge r Forced True
308. tion Any current configuration files will be saved as XML format This must be performed after configuration of the switch If the Start configuration is not saved after the switch has been powered off it will revert back to previous settings Web Interface To Save the Startup Configuration in the switch via the Web Interface 1 Click Maintenance Save Restore and Save Start 2 Press Save AMS 21T65FP e C f D 19210811 ALLOY AMS 24T6SFP gt System gt Configuration gt Security 7 Maintenance Restart Device Firmware Save Restore Factory Defaults Save Start Restore User Exportiimport gt Diagnostics ae EREE Auto Logout OFF ME BEDE Save as Start Configuration Are you sure to save the current setting as Start Configuration ___ a Parameter Description Save Fig 146 Save Start Up Configuration Save Start Up Configuration NOTE This must be performed after configuration of the switch If the Start configuration is not saved after the switch has been powered off it will revert back to previous settings 311 AMS User Manual 1 4 3 3 Save User This section describes how to save the Switch User configuration Any current configuration files will be saved as XML format Web Interface To Save the User Configuration in the switch via the Web Interface 1 Click Maintenance Save Restore and Save User 2 Press Save a
309. tistics for the AMS switch Web Interface To view the DHCP Relay Statistics via the Web Interface 1 Click Security DHCP Relay and Statistics 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information gt Sas ANAS 24 165k x hm C f 19216811 ALLOY E AMS 24T6SFP Auto Logout or gt BEER _ DHCP Relay Statistics Aviovateah TO Eine isl Y Security Server Statistics gt IP Source Guard gt Goce sneeging Tanne lasing Missing Musing Bado Receive Bad 7 DHCP Relay Server Server Agent Option Circuit ID Remote ID Circuit ID Configuration 0 o a g o 9 o o Statistics Client Statistics ee Transmit Transmit Receive Receive Replace Keep Drop gt Port Security to Client Error from Client AgentOption AgentOption Agent Option Agent Option gt Access Management i s i t n e l SSH HTTPS Auth Method gt Maintenance f L e 4 Fig 127 DHCP Relay Statistics Parameter Description Transmit to Server The number of packets that are relayed from client to server Transmit Error The number of packets that resulted in errors while being sent to clients Receive from Server The number of packets received from server Receive Missing Agent Option The number of packets received without agent information options Receive Missing Circuit ID The number of packets received with the Circuit ID option missing Receive Missing Rem
310. to be automatically refreshed Refresh Used to manually refresh the information on the page 99 AMS User Manual 1 2 4 7 Port Status This section is used to display the status information for each of the configured STP CIST Ports Web Interface To view the STP CIST Port Status via the Web Interface Click Configuration Spanning Tree and Port Status If you want to auto refresh the information you will need to check the Auto Refresh tick box Click Refresh to manually refresh the information 7 ALLOY AMS 24T6SFP v System Information Information Coantiguration CPU Load gt Time gt Account iP gt Syslog gt SNMP Configuration Port ACL gt Aggregation Spanning Tree Bridge Settings MSTI Mapping MSTI Prionties CIST Ports MSTI Ports Bridge Status Por Status Port Statistics gt IGMP Snooping MLD Snooping gt MVR gt LLOP Filtering Data Base gt VLAN gt Voice VLAN E AMS 24 T6SFP x ye f 5 192 168 1 1 a Hen Auto Logoul OFF a STP Port Status Autowelresh E Rehesh Port CISTRole CIST State Uptime 1 Non STP Forwarding 2 Non STP Forwarding Nan SIP Forwardeng Non STP Forwarding 5 Non STP Forwarding 6 NonSTP Forwarding 7 Now STP Forwaechng 8 Non STP Forwarding m 93 Non STP Forwarding 10 Non STP Forwarding 11 NanStP Forwarding 12 NonSTP Forwarding 13 Non STP Forwarding 14 Non STP Forwarding 15
311. ttings but configuration done here is for each MSTI rather than the CIST Web Interface To configure the MSTI Port Parameters via the Web Interface 1 Click Configuration Spanning Tree and MSTI Ports 2 Select the MSTI you would like to configure and press the GET button 3 Now you can configure the appropriate port settings for the MSTI 4 Repeat for all MSTIs 5 Click the Apply button to save your changes or the Reset button to revert to previous settin gs j z _ _ a 7 AMS 24 165FP x o 7 i lt C 192 168 1 1 amp AMS 24T6SFP Auto Logout OFF z SEEN MEIN v system a n Y System Information MSTI Port Configuration Information Connguraton CPU Load MST1 j Get Time gt Account j m Fig 42 MSTI selection 96 AMS User Manual r v 5 P f E Ln hee emm M a 9 CA 1 19216811 amp ALLOY AMS 24T6SFP w Larae Tay System Information Information Gantiquration CPU Load gt Time gt Account IP gt Syslog gt SNMP aaia Configuration E E gt r Port fawo e 128 r gt ACL 5 gt Aggregation 2 Auto e gt Spanning Tree 3 Auto gt 178 Bridge Settings 7 3 MSTI Mapping a 120 MSTI Prionties S Auto e 128 CIST Ports r 6 Auto 128 MSTI Ports ml Bridge Status T Ato e 174 e Pon status mi B Ato z 178 Pon Statistics Ee iz IGMP Snooping 9 Auto 12
312. ty limit to allow how many device can access the port via MAC address If Limit is reached the switch can take one of the following actions None Do not allow more than Limit MAC addresses on the port but take no further action Trap If Limit 1 MAC addresses is seen on the port send an SNMP trap If Aging is disabled only one SNMP trap will be sent but with Aging enabled new SNMP traps will be sent every time the limit gets exceeded Shutdown If Limit 1 MAC addresses is seen on the port shut down the port This implies that all secured MAC addresses will be removed from the port and no new address will be learned The maximum number of MAC addresses that can be secured This number cannot exceed 1024 If the limit is exceeded the corresponding action is taken The switch is born with a total number of MAC addresses from which all ports draw whenever a new MAC address is seen on a Port 233 AMS User Manual Security enabled port Since all ports draw from the same pool it may happen that a configured maximum cannot be granted if the remaining ports have already used all available MAC addresses Spanning Tree Admin Edge Controls whether the operEdge flag should start as set or cleared The initial operEdge state when a port is initialized Spanning Tree BPDU Guard lf enabled causes the port to disable itself upon receiving valid BPDU s Contrary to the similar bridge setting the port Edge status does not effect
313. u would like to enable filtering for the configured Multicast address Filtering Groups Enter the IP Address of the Multicast group to be filtered Reset Button Used to reset unsaved changes to original configuration Apply Button Used to save the settings configured on this page 123 AMS User Manual 1 2 6 4 Status This section is used to view the status of all configured MLD parameters on the AMS Series switches Web Interface To view the MLD Status via the Web Interface 1 Click Configuration MLD Snooping and Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information est el y AMS 24 TOSFP x C AW D 19216811 amp ANS 24T6SFP Auto Logout orr gt E AI gt Account a a rir MLD Snooping Status Autovefiesh E Relesh Clear E aan Statistics j 7 Configuration en VLAN Querier Host Querier Queries Queries V1 Reports V2Reports Vi Leaves Port ID Version Version Status Transmitted Received Received Received Received ENE Router Port Aggregation gt Spanning Tree Port Status gt IGMP Snooping 4 Y MLD Snooping 2 Basic Configuration 4 VLAN Configuration 4 r i Port Group Filtering Status 6 Groups information p t IPv SSM Information MVR 3 gt LLDP Filtering Data Base 12 VLAN ie gt Voice VLAN 14 gt GARP 15 GVRP 16 gt QoS 7 Thermal Protection 18 gt sFlo
314. uct in outdoor locations e Before installation please make sure input power supply and product specifications are compatible to each other e To reduce the risk of electric shock Disconnect all AC or DC power cords and RPS cables to completely remove power from the unit e Before importing exporting configuration please make sure the firmware version is always the same 10 AMS User Manual Introduction Overview In this user s manual we will explain how to configure and monitor the AMS Series switches through the Web Management Interface The AMS Series the next generation Web managed switches from Alloy are a portfolio of affordable managed switches that provides a reliable infrastructure for your business network These switches deliver more intelligent features you need to improve the availability of your critical business applications protect your sensitive information and optimize your network bandwidth to deliver information and applications more effectively It provides the ideal combination of affordability and capabilities for entry level networking includes small business or enterprise application and helps you create a more efficient better connected workforce The major features of the AMS series Switches are outlined below e Wirespeed performance up to 130 94mpps switching architecture 136Gbps forwarding rate e High density port configurations up to 52 ports e Dual speed SFP slots supporting Gigabi
315. ult DSCP value as defined in RFC 2475 Click to add a new policy Specify the Application type Tag VLAN ID L2 Priority and DSCP for the new policy Click Save The port number to which the configuration applies The set of policies that shall apply to a given port The set of policies is selected by ticking the checkboxes corresponding to the policies Used to reset unsaved changes to original configuration Used to save the settings configured on this page 146 AMS User Manual 1 2 8 4 LLDP MED Neighbors This page provides a status overview of all LLDP MED neighbors The displayed table contains a row for each port on which an LLDP neighbour is detected This function applies to VoIP devices which support LLDP MED Web Interface To view the LLDP MED neighbors that have been learnt from the switch via the Web Interface 1 Click Configuration LLDP and LLDP MED Neighbors 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information ree ere EE Ascuxuxixa s gt a AMS 2476SFP Auto Logout OFF gt EI I Y System Information LLDP MED Neighbour Information Auto ratrann Ratresh information Conliowraiton No LLDP MED neighbour information found CPU Load gt Time gt Account gt P syslog gt SNMP gt ACL Aggregation Spanning Tree gt IGMP Snooping gt MLO Snooping gt MVR Y LLOP L
316. uration Apply Button Used to save the settings configured on this page 110 AMS User Manual 1 2 5 4 Status This section is used to view the status of all configured IGMP parameters on the AMS Series switches Web Interface To view the IGMP Status via the Web Interface 1 Click Configuration IGMP Snooping and Status 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information pee Ser J D Ans 20T6SFP amp fF 5 19216811 AMS 24T6SFP AutoLogout orF TEER ME gt ACL IGMP Snooping Status Auto refresh Refresh Clear gt Aggregation S Spanning Tree Statistics r ONO VLAN Querier Host Querer Queries Queries ViRepors V2Reports V3Reports V2Leaves SOW Ir eY OR ID Version Version Status Transmitted Received Received Received Received Received VLAN Configuration Port Group Filtering Router Port Status Port Status Groups Intarmation IPv4 SSM information MLD Snooping gt MVR gt LLOP Filtering Data Base gt VLAN gt Voice VLAN GARP 9 GVRP 10 gt QoS 1 Thermal Protection 12 gt sFlow Agent 3 gt Loop Protection u gt Single IP 15 Easy Port 16 Mirroring 17 Trap Event Severity 1 SMTP Configuration sd UPnP z eNnanune SSS SE EE Ee 21 tomatoe i ee z t Fig 50 IGMP Status Parameter Description VLAN ID The VLAN ID of the entry Querier Versi
317. uto Logout oF gt EEE AE gt System 2 gt oe Port Security Switch Status Aaomiesh Refresh Y Security User Module Legend gt IP Source Guard gt ARP Inspection User Module Name Abbr gt DHCP Snooping Limit Control L 902 1 8 3 Ft oy DHCP Snooping D Voice VLAN v gt AAA Port Security Port Status Limit Control Switen status Port Users State MAC Count i Port Status I gt Oisabd gt Access Management 2 Disabled SSH 2 Disabled HTTPS 4 cick somes Auth Method amp Disabled gt Mainiin nce g Osaa on I Disabied Disabled g Disabled dt Disabled nu Disabled RnR Disabled 13 Disabled J4 Disabled 1 Disabled 16 Disabled 3l Disabled i Disabled 19 Disabled Fig 135 Port Security Switch Status Parameter Description User Module Legend User Module Name The full name of a module that may request Port Security services 292 Abbr Port Status Port Users State MAC Count Auto Refresh Refresh AMS User Manual A one letter abbreviation of the user module This is used in the Users column in the port status table The port number for which the status applies Click the port number to see the status for this particular port Each of the user modules has a column that shows whether that module has enabled Port Security or not A means that the corresponding user module is not enabled whereas a letter indicates that the user module ab
318. val is 10 in tenths of seconds 1 second Unsolicited Report Interval The Unsolicited Report Interval is the time between repetitions of a host s initial report of membership in a group The allowed range is O to 31744 seconds Default unsolicited report interval is 1 second Used to reset unsaved changes to original configuration Used to save the settings configured on this page Used to manually refresh the information on the page The arrow keys are used to navigate between the pages displaying the current VLAN s configured on the switch 108 AMS User Manual 1 2 5 3 Port Group Filtering With this feature you can filter multicast joins on a per port basis by configuring IP multicast profiles and associating them with individual switch ports An IGMP profile can contain one or more multicast groups and when applied to a port to deny access to that port on the configured multicast address If an IGMP profile denying access to a multicast group is applied to a switch port the IGMP join report requesting the stream of IP multicast traffic is dropped and the port is not allowed to receive IP multicast traffic from that group IGMP filtering controls only IGMP membership join reports and has no relationship to the function that directs the forwarding of IP multicast traffic Web Interface To configure the IGMP Port Group Filtering entries via the Web Interface 1 Click Configuration IGMP Snooping and Port Group Filtering 2 Cl
319. vious request This will stop the switch from continually trying to contact a server that it has already determined as dead 278 AMS User Manual Setting the Dead Time to a value greater than 0 zero will enable this feature but only if more than one server has been configured TACACS Authorization and Accounting Configuration Authorisation Fallback to Local Auth Accounting Every command will be authorized by the TACACS server when enabled The authorization table on the TACACS server is able to configure which command can be passed successfully For example TACACS server is set to accept STP command but deny VLAN command The server will block any commands related to VLAN s entered by the user but it will allow STP commands to be configured when entered by the user Enable to allow the user who typed wrong account or password to login successfully when the user account is on the local authorization list of the local switch For example when user entered the wrong account or password TACACS server will refer to the account information on the local end of switch If the account is recorded on the local switch the user will be authorized to login with the privilege level set on the local switch Enable to record all commands entered by a specific user All the log data will be recorded on the server when enabled For instance login time log out time IGMP setting VLAN setting etc RADIUS Authentication Server Co
320. w Agent 49 Loop Protection 20 i Single IP 21 Easy Por 22 Fig 56 MLD Status Parameter Description VLAN ID The VLAN ID of the entry Querier Version The current version of the MLD Querier Host Version The current version of the host Querier Status Shows the Querier status of either Active or Idle Queries Transmitted The number of transmitted queries Queries Received The number of received queries 124 V1 Reports Received V2 Reports Received V1 Leaves Received Auto Refresh Refresh AMS User Manual The number of Received V1 Reports The number of Received V2 Reports The number of Received V2 Leaves Tick the box to enable the information to be automatically refreshed Used to manually refresh the information on the page 125 AMS User Manual 1 2 6 5 Groups Information This section displays the learnt MLD groups The MLD Group Table is sorted first by VLAN ID and then by group They will use the last entry of the currently displayed table as a basis for the next lookup When the end is reached the text No more entries is shown in the displayed table Use the button to start over Web Interface To view the MLD Group Information via the Web Interface 1 Click Configuration MLD Snooping and Groups Information 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information H A
321. y applications also known as broadcast applications SSM is a core network technology of IP multicast targeted for audio and video broadcast application environments For the SSM delivery mode an IP multicast receiver host must use IGMP Version 3 IGMPv3 to subscribe to channel S G By subscribing to this channel the receiver host is indicating that it wants to receive IP multicast traffic sent by source host S to group G The network will deliver IP multicast packets from source host S to group G to all hosts in the network that have subscribed to the channel S G SSM does not require group address allocation within the network only within each source host Different applications running on the same source host must use different SSM groups Different applications running on different source hosts can arbitrarily reuse SSM group addresses without causing any excess traffic on the network Web Interface To view the IPv6 SSM Information via the Web Interface 1 Click Configuration MLD Snooping and IPv6 SSM Information 2 If you want to auto refresh the information you will need to check the Auto Refresh tick box 3 Click Refresh to manually refresh the information am jee ws 2o m ao y AIMS 24 TOSFP x Ji E C 192 168 1 1 ALLOY AMER TOSEP Auto Logout orr gt LES MZ gt Account p riF MLD SFM Information Aulo tefresh Retest ase xx syslog gt SNMP Start from VLAN 1 and Group ff00 wi
322. ze Counters 2010336 Tx 64 Bytes 23754 gt ACL Rx 65 12 Bytes 2114843 Tx 65 127 Bytes 658 Aggregation y Rx 128 255 Bytes 356709 Tx 128 255 Byles 102021 Spanning Tree Rx 256 511 Bytas 151047 Tx 256 511 Bytes 222037 SP rere fix 1024 1526 Bon ica Ta 1024 1526 Oye 221089 gt MLD Si z gt MVR gi wean Receive Queue Counters ergs Transmit Queue Counters gt LLOP Rx Q0 5013802 Tx Q0 0 gt Filtering Data Base Rx 1 0 1x01 0 gt VLAN Rx Q2 0 TxaQ2 0 Voice VLAN se e gt GARP x z ES Qos Rx Q7 0 Txa7 569923 Thermal Protection Receive Error Counters Transmit Error Counters gt sFlow Agent Rx Drops 0 Tx Drops 0 gt Loop Protection Rx CRC Alignment O Tx Late Exe Coll 0 Single IP Rx Undersize 0 Faev Ont RxOversize Q Fig 23 Detailed Port Statistics Parameter Description Port Select the port you wish to view the statistics for from the drop down box at the top of the page Auto Refresh To enable auto refreshing of the statistics on the screen tick this tick box Refresh Used to manually refresh the statistics 53 Clear Receive Total Transmit Total Receive Size Counters Transmit Size Counters AMS User Manual Used to clear the current statistical data The total number of received Rx traffic including good and bad packets Types of traffic displayed are Rx Packets Rx Octets Rx Unicast Rx Multicast Rx Broadcast and Rx Pause packets The total number of transmitted Tx traffic in
Download Pdf Manuals
Related Search
Related Contents
Hamilton Beach 49754 coffee maker auf dem HP iPAQ YSP-Ⅱ 取扱説明書 StarTech.com 5m DVI-D Dual Link Cable – M/M Memory morse keyer Copyright © All rights reserved.
Failed to retrieve file