beautypg.com

Allied Telesis AT-S62 User Manual

Page 7

background image

AT-S62 Management Software Menus Interface User’s Guide

7

Mapping CoS Priorities to Egress Queues ..................................................................................................... 316
Configuring Egress Scheduling ...................................................................................................................... 318
Displaying Port CoS Priorities ........................................................................................................................ 320

Chapter 17: IGMP Snooping ....................................................................................................................... 323
IGMP Snooping Overview .............................................................................................................................. 324
Configuring IGMP Snooping........................................................................................................................... 326
Displaying a List of Host Nodes...................................................................................................................... 329
Displaying a List of Multicast Routers............................................................................................................. 331

Chapter 18: Denial of Service Defenses .................................................................................................... 333
Denial of Service Defense Overview .............................................................................................................. 334

SYN Flood Attack..................................................................................................................................... 334
SMURF Attack ......................................................................................................................................... 335
Land Attack .............................................................................................................................................. 335
Teardrop Attack........................................................................................................................................ 337
Ping of Death Attack ................................................................................................................................ 337
IP Options Attack ..................................................................................................................................... 338
Mirroring Traffic ........................................................................................................................................ 338
Denial of Service Defense Guidelines...................................................................................................... 339

Enabling or Disabling Denial of Service Prevention ....................................................................................... 340

Chapter 19: Power Over Ethernet .............................................................................................................. 343
Power Over Ethernet Overview ...................................................................................................................... 344

PoE Implementation on the AT-8524POE Switch.................................................................................... 345
Power Budgeting...................................................................................................................................... 345
Port Prioritization...................................................................................................................................... 346
PoE Device Classes................................................................................................................................. 347

Setting the PoE Threshold.............................................................................................................................. 348
Configuring PoE Port Settings........................................................................................................................ 350
Displaying PoE Status and Settings ............................................................................................................... 352

Chapter 20: Networking Stack .................................................................................................................... 359
Managing the Address Resolution Protocol Table ......................................................................................... 360

Displaying the ARP Table ........................................................................................................................ 361
Deleting an ARP Entry ............................................................................................................................. 363
Deleting All ARP Entries .......................................................................................................................... 363
Configuring the ARP Table Timeout Value .............................................................................................. 364

Displaying the Routing Table.......................................................................................................................... 365
Displaying the TCP Connections Table.......................................................................................................... 367
Deleting a TCP Connection ............................................................................................................................ 370
Displaying the TCP Global Information Table ................................................................................................ 371

Section III: SNMPv3 Operations ........................................................................... 373

Chapter 21: SNMPv3 ................................................................................................................................... 375
SNMPv3 Overview ......................................................................................................................................... 376

SNMPv3 Authentication Protocols ........................................................................................................... 377
SNMPv3 Privacy Protocol ........................................................................................................................ 377
SNMPv3 MIB Views ................................................................................................................................. 378
SNMPv3 Storage Types........................................................................................................................... 379
SNMPv3 Message Notification................................................................................................................. 379
SNMPv3 Tables ....................................................................................................................................... 380
SNMPv3 Configuration Example.............................................................................................................. 384

Configuring the SNMPv3 Protocol.................................................................................................................. 385
Configuring the SNMPv3 User Table ............................................................................................................. 386