8800 SR
8800 SR
AT-8824
AT-8848
AlliedWare OS Software Reference for Software Version 2.9.1
Document Number C613-03129-00 REV A.
© 2006 Allied Telesis, Inc. All rights reserved. No part of this publication may be
reproduced without prior written permission from Allied Telesis, Inc.
Allied Telesis, Inc. reserves the right to make changes in specifications and other
information in this document without prior written notice. The information provided
herein is subject to change without notice. In no event shall Allied Telesis, Inc. be liable
for any incidental, special, indirect, or consequential damages whatsoever, including
but not limited to lost profits, arising out of or related to this manual or the information
contained herein, even if Allied Telesis, Inc. has been advised of, known, or should have
known, the possibility of such damages.
All company names, logos, and product designs that are trademarks or registered
trademarks are the property of their respective owners.
Contents
Command Summary
CHAPTER 8 Switching
Introduction ................................................................................................... 8-4
Switch Ports ................................................................................................... 8-5
Enabling and Disabling Switch Ports ........................................................ 8-5
Speed and Duplex Mode ......................................................................... 8-7
Switch Instances on 48-Port Switches ...................................................... 8-9
Port Trunking ........................................................................................ 8-10
Link Aggregation Control Protocol (LACP) ............................................. 8-11
Packet Storm Protection ........................................................................ 8-12
Port Mirroring ....................................................................................... 8-12
Port Security .......................................................................................... 8-13
Virtual Local Area Networks (VLANs) ............................................................ 8-14
Dynamic VLAN Assignment ................................................................... 8-14
802.1x Guest VLAN ............................................................................... 8-16
VLAN Tagging ....................................................................................... 8-16
VLAN Membership of Untagged Packets ............................................... 8-19
Creating VLANs ..................................................................................... 8-20
Summary of VLAN Tagging Rules ........................................................... 8-22
VLAN Interaction with Trunk Groups ...................................................... 8-22
Static and Dynamic VLANs ..................................................................... 8-22
Protected VLANs ................................................................................... 8-23
Private VLANs ........................................................................................ 8-23
VLAN Relaying ............................................................................................. 8-25
Configuring VLAN Relaying ................................................................... 8-27
The Layer 2 Switching Process ...................................................................... 8-28
The Ingress Rules ................................................................................... 8-28
The Learning Process ............................................................................. 8-29
The Forwarding Process ......................................................................... 8-30
The Egress Rules .................................................................................... 8-30
Quality of Service .................................................................................. 8-31
CHAPTER 11 Interfaces
Introduction ................................................................................................. 11-2
Naming Interfaces ........................................................................................ 11-3
Simple Interface Names ......................................................................... 11-3
Ethernet ...................................................................................................... 11-4
Encapsulations ...................................................................................... 11-4
Asynchronous Interfaces .............................................................................. 11-6
Encapsulations ...................................................................................... 11-7
Configuration ........................................................................................ 11-8
Session Timeout .................................................................................. 11-10
Connecting a Modem to the Asynchronous Port ................................. 11-11
MIB Counters ...................................................................................... 11-11
Autobauding ....................................................................................... 11-12
Making Asynchronous Ports Respond More Quickly ............................. 11-13
Testing Serial Data Circuits ......................................................................... 11-13
Displaying Interfaces .................................................................................. 11-14
Interface Link Traps .................................................................................... 11-14
Managing Interfaces with SNMP ................................................................ 11-15
Command Reference ................................................................................. 11-16
connect asyn ....................................................................................... 11-16
disable asyn ......................................................................................... 11-17
disable interface linktrap ..................................................................... 11-18
enable asyn ......................................................................................... 11-19
enable interface linktrap ...................................................................... 11-20
purge asyn .......................................................................................... 11-21
reset asyn ............................................................................................ 11-21
reset asyn counter ............................................................................... 11-22
reset asyn history ................................................................................. 11-23
reset interface counters ....................................................................... 11-23
set asyn ............................................................................................... 11-24
set interface mtu ................................................................................. 11-29
set interface traplimit .......................................................................... 11-30
show asyn ........................................................................................... 11-31
show interface .................................................................................... 11-39
CHAPTER 20 IP Multicasting
Introduction ................................................................................................. 20-4
References ................................................................................................... 20-4
IP Multicast Routing ..................................................................................... 20-5
Interoperability between Multicast Routing Protocols ................................... 20-6
Distance Vector Multicast Routing Protocol (DVMRP) .................................... 20-6
Configuring DVMRP .............................................................................. 20-7
Protocol Independent Multicast (PIM) ........................................................... 20-8
PIM Dense Mode ................................................................................... 20-9
PIM Sparse Mode ................................................................................ 20-11
Internet Group Management Protocol (IGMP) ............................................ 20-19
Configuring IGMP ............................................................................... 20-19
Static IGMP ......................................................................................... 20-20
IGMP Proxy ......................................................................................... 20-22
IGMP Snooping ................................................................................... 20-24
IGMP Filtering ..................................................................................... 20-28
IGMP Throttling ................................................................................... 20-30
Multicast Switching ................................................................................... 20-30
Multicast VLAN Registration (MVR) ............................................................ 20-31
Dynamic MVR ..................................................................................... 20-31
Compatible MVR ................................................................................. 20-31
Immediate Leave ................................................................................. 20-31
Configuring MVR ................................................................................ 20-32
Configuration Examples ............................................................................. 20-33
Static IGMP ......................................................................................... 20-33
Multicasting using DVMRP .................................................................. 20-33
Protocol Independent Multicast (PIM) .................................................. 20-37
CHAPTER 29 AppleTalk
Introduction ................................................................................................. 29-3
AppleTalk Protocol Architecture ................................................................... 29-3
AppleTalk Nodes and Networks .................................................................... 29-4
LocalTalk ............................................................................................... 29-4
EtherTalk and TokenTalk ......................................................................... 29-5
AppleTalk Address Resolution Protocol (AARP) ............................................. 29-6
Address Translation ............................................................................... 29-6
Dynamic Assignment of Protocol Addresses ........................................... 29-6
Datagram Delivery Protocol .......................................................................... 29-7
Routing Table Maintenance Protocol (RTMP) ................................................ 29-8
Name Binding Protocol (NBP) ....................................................................... 29-9
Zone Information Protocol (ZIP) .................................................................. 29-10
AppleTalk on the Switch ............................................................................ 29-10
AppleTalk Filtering ..................................................................................... 29-11
DDP packet filtering ............................................................................ 29-12
RTMP or Routing Update filtering ........................................................ 29-13
Zone Filtering ...................................................................................... 29-14
AppleTalk Dial-On-Demand ........................................................................ 29-15
Extended Ping for AppleTalk ...................................................................... 29-15
Command Reference ................................................................................. 29-17
add apple packetfilter .......................................................................... 29-18
add apple port .................................................................................... 29-20
add apple route ................................................................................... 29-22
add apple routefilter ............................................................................ 29-23
add apple zone ................................................................................... 29-24
add apple zonefilter ............................................................................ 29-25
delete apple packetfilter ...................................................................... 29-26
delete apple port ................................................................................. 29-26
delete apple route ............................................................................... 29-27
delete apple routefilter ........................................................................ 29-27
delete apple zone ................................................................................ 29-28
delete apple zonefilter ......................................................................... 29-29
disable apple ....................................................................................... 29-29
disable apple debug ............................................................................ 29-30
enable apple ....................................................................................... 29-30
CHAPTER 39 Firewall
Introduction ................................................................................................. 39-4
Firewall Technologies ............................................................................. 39-4
Policies ........................................................................................................ 39-6
Rules ........................................................................................................... 39-8
Using Limit Rules to Limit Sessions ............................................................. 39-12
Access Lists ................................................................................................ 39-13
List Files ............................................................................................... 39-13
RADIUS Servers ................................................................................... 39-15
Dynamic Interfaces .................................................................................... 39-16
Dynamic Interface Templates ............................................................... 39-17
Configuring Dynamic Interfaces ........................................................... 39-18
Disabling the TCP Setup Proxy .................................................................... 39-19
Firewall UDP Session Timeouts ................................................................... 39-19
Multicast Packet Handling .......................................................................... 39-20
Enhanced Packet Fragment Handling ......................................................... 39-20
Enabling the Secure Shell Server ................................................................. 39-21
Network Address Translation (NAT) ............................................................ 39-21
Enhanced NAT ..................................................................................... 39-25
Network Address and Port Translation (NAPT) ...................................... 39-26
Enhanced Network Address and Port Translation (ENAPT) .................... 39-27
Standard NAT ...................................................................................... 39-29
Other Advanced NAT Types ................................................................. 39-30
NAT on Ethernet Interfaces .................................................................. 39-31
FTP Session Handling .................................................................................. 39-31
PPTP Pass Through ..................................................................................... 39-33
SMTP Proxy ................................................................................................ 39-34
Interaction Between the SMTP Proxy and Firewall Rules ....................... 39-34
Protecting the Email System ................................................................ 39-34
Email Relaying ..................................................................................... 39-35
HTTP Proxy ................................................................................................ 39-36
Firewall HTTP Proxies and Firewall Policies ............................................ 39-36
HTTP Filters ......................................................................................... 39-36
Logging ............................................................................................... 39-36
SIP Application Layer Gateway: VoIP Phone Calls ........................................ 39-37
Using Automatic Client Management Mode ........................................ 39-38
Using Manual Client Management Mode ............................................ 39-40
Displaying and Debugging the SIP ALG ................................................ 39-42
Attacks Recognised by the Firewall ............................................................. 39-43
Monitoring Firewall Activity ........................................................................ 39-46
Notifications ........................................................................................ 39-46
Debugging .......................................................................................... 39-47
Event Triggers ...................................................................................... 39-47
Logging ............................................................................................... 39-49
Session Monitoring .............................................................................. 39-51
Accounting ................................................................................................ 39-54
Configuration Examples ............................................................................. 39-55
Minimum Configuration for a Small Office .......................................... 39-55
Firewall with an ISP-Assigned Internet Address .................................... 39-55
Firewall with a Single Global Internet Address ..................................... 39-56
CHAPTER 49 Scripting
Introduction ................................................................................................. 49-2
Activating a Script at Login .................................................................... 49-2
Creating Scripts ........................................................................................... 49-2
Using Script Commands ........................................................................ 49-3
Using the Built-In Text Editor .................................................................. 49-3
Loading from a TFTP Server .................................................................... 49-3
Loading from an Asynchronous Port ...................................................... 49-4
Using Scripts ................................................................................................ 49-4
Script Parameters ......................................................................................... 49-4
Script Control Structures .............................................................................. 49-5
Command Reference ................................................................................... 49-6
activate script ........................................................................................ 49-7
add script .............................................................................................. 49-8
deactivate script .................................................................................... 49-9
delete script ........................................................................................ 49-10
if..then..else..endif .............................................................................. 49-11
set script ............................................................................................. 49-12
show script .......................................................................................... 49-14
wait .................................................................................................... 49-15
APPENDIX A Messages
Introduction .................................................................................................. A-3
Message Descriptions ................................................................................... A-4
smmm001–smmm255: Global Messages ................................................ A-4
s003256–s003999: Point-to-Point Protocol ........................................... A-14
s004256–s004999: AppleTalk ............................................................... A-18
s005256–s005999: Internet Protocol (IP) .............................................. A-22
s006256–s006999: Novell IPX .............................................................. A-35
s018256–s018999: TEST Module ......................................................... A-39
s021256–s021999: Stream Printing ...................................................... A-41
s022256–s022999: TCP ....................................................................... A-41
s023256–s023999: Ethernet Driver ...................................................... A-42
s026256–s026999: LPD Server ............................................................. A-42
s027256–s027999: Bridging ................................................................. A-43
s031256–s031999: FLASH Driver .......................................................... A-48
s033256–s033999: TELNET .................................................................. A-49
s034256–s034999: System ................................................................... A-50
s035256–s035999: Command Processor .............................................. A-52
s036256–s036999: TTY ........................................................................ A-53
Glossary
Index