beautypg.com

Allied Telesis AT-S20 User Manual

Page 123

background image

AT-S20 User’s Guide

Index-3

S

SAT (Source Address Table) 6-13
secure mode 6-13
security 6-18
Security Threshold 6-20
security threshold 6-15
security threshold, setting 6-20
Security/Source Address Table 6-12
setting, MAC Address 6-20
setting, security threshold 6-20
setting, source address 6-19
SNMP

community strings 4-7

SNMP MIB 6-17
SNMP trap message 6-17
software upgrades

network downloads 4-24–4-26

source address learning Mode 6-12
source address learning mode 6-19
source address setting 6-19
source address table (SAT) 6-12–6-18
Source AddressTable (SAT) 6-13
source port 6-23
sourceaddress learning mode 6-13
spanning tree

concepts Preface-ii, A-1–A-2
parameters, configuring 4-29–4-32

spanning tree protocol

features A-2
operations A-3
parameters A-2

static MAC Address, clearing 6-11
statistics, viewing 6-28, 6-33
store-and-forward 4-15
subnet mask 2-4, 4-7
switch configuration, task list 4-1
switch identifiers 4-8
switch name, deleting 4-10
switch naming 1-3, 2-5

T

Telnet 2-3
terminal settings 2-1
TFTP, get request 2-4
TFTP, software downloads 4-24
threshold security 6-12
timeout value 1-3, 2-5

transmission mode 6-27
transmitted frames, Ethernet 6-31–6-32
trap message

intruder protection 6-17–6-18

trunking, port (sharing) 4-34

V

variables, entering Preface-v
Virtual LAN Configuration 5-1
virtual local area networks (VLANs)

about,

local area network

virtual, 5-1

advantages, 5-2
default, 5-1

VLAN

communication, 5-2
maximum number 5-5

VT100 4-19