Allied Telesis AT-AR300 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36

Ir a la página of

Buen manual de instrucciones

Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Allied Telesis AT-AR300. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Allied Telesis AT-AR300 o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.

¿Qué es un manual de instrucciones?

El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Allied Telesis AT-AR300 se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.

Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Allied Telesis AT-AR300, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.

Entonces, ¿qué debe contener el manual de instrucciones perfecto?

Sobre todo, un manual de instrucciones Allied Telesis AT-AR300 debe contener:
- información acerca de las especificaciones técnicas del dispositivo Allied Telesis AT-AR300
- nombre de fabricante y año de fabricación del dispositivo Allied Telesis AT-AR300
- condiciones de uso, configuración y mantenimiento del dispositivo Allied Telesis AT-AR300
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas

¿Por qué no leemos los manuales de instrucciones?

Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Allied Telesis AT-AR300 no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Allied Telesis AT-AR300 y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Allied Telesis en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Allied Telesis AT-AR300, como se suele hacer teniendo una versión en papel.

¿Por qué vale la pena leer los manuales de instrucciones?

Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Allied Telesis AT-AR300, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.

Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Allied Telesis AT-AR300. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.

Índice de manuales de instrucciones

  • Página 1

    Simply connecting the world Softwar e Release 2.3.1 For Rapier Sw itches, AR30 0 and AR 700 Ser ies Rou ters, an d AR800 Series Modular Swit ching Routers Introduction ... .................... ................... ................... ............. .................... ........ 2 Hardware Platforms ................. ............. ................... [...]

  • Página 2

    2 Release Note Software Release 2.3.1 C613-10325 -00 REV B Intr oduction Allied T elesyn Interna tional anno unces the release of Softwa r e Releas e 2.3.1 on the AR300 and AR700 Series r outers, Rapi er Series layer 3 switches, a n d AR80 0 Series modular sw itching routers. This release note describes software features that ar e new sin ce Softwa[...]

  • Página 3

    Softw are Rel ease 2 .3.1 3 Softwar e Release 2.3.1 C613-103 25-00 REV B Hot Swapping Network Service Module s In routers and switches that have NSM bays, this release allows the fol lowing NSMs to be hot swapped, so that they ca n be insta lled and uninstal led without powering down the entire r outer or switch : ■ A T - AR040 NSM with 4 PI C sl[...]

  • Página 4

    4 Release Note Software Release 2.3.1 C613-10325 -00 REV B files, feature li cences and ot her files. (If this happens, FLASH m emory may need to be clear ed completely , leaving no functioning software to run the r outer .) Hot swap an NSM out of an NSM bay Follow these steps to hot swap an NSM, or PICs in an NSM-4 PIC, out of an NSM bay . 1. Prep[...]

  • Página 5

    Softw are Rel ease 2 .3.1 5 Softwar e Release 2.3.1 C613-103 25-00 REV B Software Features The following feature s are available on all r outers and switches supported by this r eleas e, un less other wise s tated: Major f eatures ■ NSM Hot Swap softwar e support for models with NSM bays (“ NSM H ot Swap Software Support ” on page 6) ■ Doma[...]

  • Página 6

    6 Release Note Software Release 2.3.1 C613-10325 -00 REV B NSM Hot Swap Softw ar e Support When a card i s hot-sw apped out of a bay , its in terface i nstances be come dormant. They stay dormant until either another card of the same type is ho t- swapped into the bay , in which case they ar e reactivated, or a card o f a differ ent type is hot-swa[...]

  • Página 7

    Softw are Rel ease 2 .3.1 7 Softwar e Release 2.3.1 C613-103 25-00 REV B Figur e 2: Example o utput fr om the SHOW INTERF ACE comma nd for a specific i nterface. Domain Name S erver Enha ncements Softwar e Release 2.3.1 includes two en hancements to Domain Name Server (DNS) functio nality: ■ The r outer can now stor e recently obtained DNS inform[...]

  • Página 8

    8 Release Note Software Release 2.3.1 C613-10325 -00 REV B If the DNS s ervers have already been configured, the configuration informatio n can be set using the com mand: SET IP DNS [DOMAIN={ANY| domain-name }] {INTERFACE= interf ace | [PRIMARY= ipadd ] [SECONDARY= ipadd ]} For example, to add or set the IP addresses of the default primary and seco[...]

  • Página 9

    Softw are Rel ease 2 .3.1 9 Softwar e Release 2.3.1 C613-103 25-00 REV B Auto matic Na meserver Con figura t ion The primary and s econdary name server ’s addresses can either be stat ically configured as above, or learned dynamically o ver an interface. Name servers can be learned via DHCP over an Ethernet interface o r via IPCP over a PPP inter[...]

  • Página 10

    10 Release Note Software Release 2.3.1 C613-10325 -00 REV B SET TRIGGER= trigger-id [INTERFACE[= int erface ]] EVENT={UP| DOWN|FAIL|ANY} [CIRCUIT= miox-circuit ] [CP={ APPLE|ATCP|BCP| CCP|DCP|DNCP|IPCP|IPXCP|LCP}] [DLCI= dlci ] [AFTER= hh:mm ] [BEFORE= hh:mm ] [{DATE= date |DAYS= day-lis t }] [NAME= name ] [REPEAT={YES|NO|ONCE|FOREVER| count }] [T [...]

  • Página 11

    Softw are Rel ease 2 .3.1 11 Softwar e Release 2.3.1 C613-103 25-00 REV B IP Secur ity (IPse c) Sour c e Interface a nd Enhancem ents A source in terface can now be specified for tunnelled IPsec traffic. The performance of IPsec is also enhanced, and mor e simult aneous IPsec tunnels are supported, because of the incre ase in ENCO channels. A new S[...]

  • Página 12

    12 Release Note Software Release 2.3.1 C613-10325 -00 REV B OSPF on Dem and OSPF on demand circuits allow data lin k connections to be clo sed when not carrying application traf fic. A new parameter , DEMAND, has been added to the following com mands to support this feature: ADD OSPF INTERFACE [DEMAND={ON|OFF|YES |NO|TRUE|FALSE}] SET OSPF INTERFACE[...]

  • Página 13

    Softw are Rel ease 2 .3.1 13 Softwar e Release 2.3.1 C613-103 25-00 REV B Figur e 3: Example of dial-on-dema nd ISDN befor e configuring OSPF on d emand. Figur e 4: Example of dial-on-dema nd ISDN after configuring O SPF on d emand. For more information, see t he Open Shor test Path First (OSPF ) chapter of your swi tch o r rou ter ’s S oft ware [...]

  • Página 14

    14 Release Note Software Release 2.3.1 C613-10325 -00 REV B Paladi n Fir ewal l Enhanc ements The existing firewall NA T performs add r ess transla tion for traffic passing between a pair of interfa ces. W ith Softw are Releas e 2.3.1, fi r ewall r ules can also be configured which selectively perfo rm address translation on sessions passing throug[...]

  • Página 15

    Softw are Rel ease 2 .3.1 15 Softwar e Release 2.3.1 C613-103 25-00 REV B ■ Reve rse N A T This transla tes the addresses of public side de vices to addresses suit able for the private side of the firewall (destination addr es s will be transl ated for outboun d packets, sou r ce address for inboun d packets). ■ Double NA T This tra nslates bot[...]

  • Página 16

    16 Release Note Software Release 2.3.1 C613-10325 -00 REV B additiona l rules can be added to allow or deny acce ss based on IP addresses , por t nu mbe rs, day of t he w eek , or tim e of d ay . E ach ru le f or a sp ecif ic i nter fa ce in a policy is pro cessed in order , starting with the lowest numbered r u le and proceeding to the highest num[...]

  • Página 17

    Softw are Rel ease 2 .3.1 17 Softwar e Release 2.3.1 C613-103 25-00 REV B translates both the public and priva te side source and desti nation add resses. ENHANCED NA T d efined for a private interface will translat e the private side source ad dress (specified using the IP parameter) and pr otocol dependent ports to a sing le source address (speci[...]

  • Página 18

    18 Release Note Software Release 2.3.1 C613-10325 -00 REV B T able 2: Require d parameters for Firewall NA T rules. Key to table: ■ Direction I = in. The rule is applied to a public in terface. O = out. The rule is applied to a private interface. ■ S = Selector . The value supplied for this parameter is co mpared to the cor respo ndi ng fi eld [...]

  • Página 19

    Softw are Rel ease 2 .3.1 19 Softwar e Release 2.3.1 C613-103 25-00 REV B redir e ction any web traffic fr om the user ’s PC or laptop can be redirected to the ISP's web server . This force s the user to arrange payment for using the service before being able to br owse to any o ther site. W ith appropriate supportin g “deny” rules, all [...]

  • Página 20

    20 Release Note Software Release 2.3.1 C613-10325 -00 REV B Figur e 5: Using enhanced NA T in an IPsec tunne l with differ ent IPsec and default g a teways. Standard NA T T o translate the source addr ess of traffic r eceived on the private interfa ce eth0 and dest ined for addr esses in the range 210 .25.4.1-210.25 .4.99 to t he global subnet 210.[...]

  • Página 21

    Softw are Rel ease 2 .3.1 21 Softwar e Release 2.3.1 C613-103 25-00 REV B Rever se NA T T o r edirect all traffic r eceived on a private interface to a destin ation of 210.25.7.1, w ithout changing the sour ce address, use the command: ADD FIREWALL POLICY=zone1 RULE=51 ACTI ON=NAT NATTYPE=REVERSE INT=eth1 PROTOCOL=all GBLREMOTEIP=210.2 5.7.1 Changi[...]

  • Página 22

    22 Release Note Software Release 2.3.1 C613-10325 -00 REV B Fir ewall HTTP Pr oxies and Fir ewall Policies T o add or delete a Firewall HTTP proxy , use the new HTTP option for the PROXY parameter in the commands: ADD FIREWALL POLICY= po licy- name PROXY={ HTTP |SMTP} INTERFACE= interface GB LINTERFACE= interface DIRECTION={IN| OUT|BOTH} [IP= ipadd[...]

  • Página 23

    Softw are Rel ease 2 .3.1 23 Softwar e Release 2.3.1 C613-103 25-00 REV B per line. Options are supplied after the entry and a colon . Each option is separated by a spa ce. The option keyw ords that are allowed for each ent ry are “allow” and “nocook ies”. The “allow” opt ion will explicitl y allow the U RL, or part of the URL, given on[...]

  • Página 24

    24 Release Note Software Release 2.3.1 C613-10325 -00 REV B Figur e 6: Example o f a HTTP fi lter file. HTTP Cookies By default, HTTP cook ie r equests are allowed t o pass through the HTTP proxy configur ed under the fir ewall policy . T o discar d cookie sets fr om particular domains or URLs, put entries in the filter file for the direction in wh[...]

  • Página 25

    Softw are Rel ease 2 .3.1 25 Softwar e Release 2.3.1 C613-103 25-00 REV B T o r e-enable HTTP cooki e r equests to pass through the HTTP proxy , use the command: ENABLE FIREWALL POLICY= name HTTPCOOKIE S For example, to enable the passi ng of HTTP cookies through HTTP proxies configured for the policy zone1, use the command: ENABLE FIREWALL POLICY=[...]

  • Página 26

    26 Release Note Software Release 2.3.1 C613-10325 -00 REV B VRRP Port Monitoring V i rtual Router Redundancy Protocol (VRRP) is now able to monitor ports in the VLAN over which it is runn ing, and reduce the priority of the router or switch if ports in th e VLAN fail. Ports th at are part of a VLAN o ver which a VR is r unning can be monitore d to [...]

  • Página 27

    Softw are Rel ease 2 .3.1 27 Softwar e Release 2.3.1 C613-103 25-00 REV B If the PROPOR TIONAL option is specified, the virtual router r educes the priority to a percentage of the original priority in pr oportion th e per centage of availa ble ports. F or example, if a r outer has f ive ports and a port fails, the router will drop its priority by a[...]

  • Página 28

    28 Release Note Software Release 2.3.1 C613-10325 -00 REV B Border Gateway Protocol 4 (BGP-4) The Border Gateway Pr otocol version 4 (BGP-4) i s an external g ateway prot ocol which allows two routers in differe nt routing doma ins to exchange routing information. Softwar e release 2.3 .1 supports phase one implementation of BGPv4 on AR700 Series r[...]

  • Página 29

    Softw are Rel ease 2 .3.1 29 Softwar e Release 2.3.1 C613-103 25-00 REV B Inter net Protocol (IP) In conjunction with BGP-4, a n umber of new commands have been added to the implementation of IP , an d several commands have been modified. The new co mmands ar e: ■ ADD IP ASP A TH LIST ■ ADD IP COMMUNITYLIST ■ ADD IP ROUTEMAP ■ DELETE IP ASP[...]

  • Página 30

    30 Release Note Software Release 2.3.1 C613-10325 -00 REV B T o reset IP interfaces, use the command: RESET IP COUNTER={ALL|ARP|EGP|ICMP|INTERFACE|IP|MULTICAST| ROUTE|SNMP|UDP} This command resets the specified group of IP counters to zer o (0). The COUNTER parameter specifies the group of counters to be reset. If ALL is specified, all IP counters [...]

  • Página 31

    Softw are Rel ease 2 .3.1 31 Softwar e Release 2.3.1 C613-103 25-00 REV B Figur e 8: Example o utput fr om the SHOW IP CO UNTER=INTER FACE com m and. IP Interface Counters -------------------------------------- ------------------------------------------ Interface ifInPkts ifInBcastP kts ifInUcastPkts ifInDiscards Type ifOutPkts ifOutBcastP kts ifOu[...]

  • Página 32

    32 Release Note Software Release 2.3.1 C613-10325 -00 REV B Figur e 9: Example o utput fr om the SHOW IP CO UNTER=SNMP command. SNMP counters: inPkts .......................... 0 outPkts ......................... 0 inBadVersions ................... 0 outTooBigs ...................... 0 inBadCommunityNames ............. 0 outNoSuchNames ............[...]

  • Página 33

    Softw are Rel ease 2 .3.1 33 Softwar e Release 2.3.1 C613-103 25-00 REV B T elephon y (PBX) Functionality AR300 Series r o uters with telephony ports now off er a choice of ISDN supplemental services or internal PBX functions. The PBX functions are enabled by default, but one or mo r e extensions can be set to su pport ISDN supplemental services in[...]

  • Página 34

    34 Release Note Software Release 2.3.1 C613-10325 -00 REV B Bandwi dth Limi ting This feature will be available on Rapier i Series layer 3 switches only , when these models become available. Ingres s and egress ban dwidth limits are specified separa tely . Limits can be configured fo r each switch port using the command: SET SWITCH PORT= port-list [...]

  • Página 35

    Softw are Rel ease 2 .3.1 35 Softwar e Release 2.3.1 C613-103 25-00 REV B ENABLE TELNET SERVER Synt ax ENABLE TELNET SERVER Description This command enables the T elnet server to be accessed remotely . The T elnet server is enabled by default. SHOW TELNET Synt ax SHOW TELNET Description This command dis plays information a bout the current T elnet [...]

  • Página 36

    36 Release Note Software Release 2.3.1 C613-10325 -00 REV B The LOGIN parameter is used to specify whether or not users with a privilege of “user” w ill be able to login to th e command line interfac e. Usernames with LOGIN set to TRUE can be used both for P AP and CHAP authenticatio n, and to login and access the com mand line. Usernames with [...]