Professional Documents
Culture Documents
ARC1000MAP
ARC2000MAP
This is the active500EM Wired Web Interface Users Manual. It contains instructions to congure the active500EM Access Control data networking switch and any of its associated access points (AP).
Intended audience
This manual is designed to be used by network managers, administrators, and technicians who are responsible for installing networking equipment in enterprise and service provider environments. Knowledge of telecommunication and Internet protocol (IP) technologies and advanced knowledge of LAN/WLAN networking is assumed.
Documentation
activeARC product and support documentation consists of a variety of manuals, installation guides, videos, knowledge articles, sample designs, and troubleshooting and FAQ guides to assist you with the deployment of your new and innovative solution. These and other documents are available for download at www.att.com/activearc/support. To view PDF files, use Adobe Acrobat Reader 5.0 or newer. Download Acrobat Reader for free from the Adobe website: www.adobe.com/products.
Contact information
Phone: 855.MYARC11 (855.692.7211) E-mail: support@activearc.att-mail.com sales@activearc.att-mail.com
Icons
Table of Contents
Contact
Previous Page
Next Page
Safety precautions
For safe and efcient use, read the following information.
Text conventions
Table 0-1: Text conventions
Icon
NOTE
Description Emphasizes information to improve product use. Indicates important information or instructions that must be followed. Indicates how to avoid equipment damage or faulty application. Issues warnings to avoid personal injury.
Description
Before working on this equipment, be aware of good safety practices and the hazards involved with electrical circuits. To reduce risk of re hazard and electric shock, do not install the unit near a damp location. To reduce the risk of re, use only number 26 AWG or larger UL Listed or CSA Certied telecommunication line cord for all network and telecommunication connections.
Keep the product in a clean and dust-free location. Use only a soft, damp cloth to clean the product. DO NOT expose the product to liquid or moisture. DO NOT expose the product to extreme temperatures.
Table of contents
Intended audience...................................................................................................i Documentation.........................................................................................................i Contact information................................................................................................i Icons............................................................................................................................i 2.2.4 Congure SNMP manager security IP..........................................24 2.2.5 SNMP statistics..................................................................................24 2.3 SSH management.......................................................................................... 25 2.3.1 Switch on-off SSH.............................................................................. 25 2.3.2 SSH management.............................................................................26 2.4.1 TFTP client service............................................................................ 27 2.4.2 TFTP server service..........................................................................28 2.4.3 FTP client service..............................................................................29 2.4.4 FTP server service............................................................................30 2.5 Telnet server conguration..........................................................................31 2.5.1 Telnet server state..............................................................................31 2.5.2 Max numbers of telnet access connection..................................31 2.6 Maintenance and debugging command.................................................. 32 2.6.1 Debug command............................................................................... 33 2.6.2 Show switchport interface..............................................................34 2.6.3 Others..................................................................................................36
Safety precautions........................................................................... ii
Text conventions.....................................................................................................ii
3.4.1 Port loopback-detection mode conguration...........................44 3.4.2 VLAN loopback-detection conguration....................................44 3.4.3 Loopback-detection interval-time conguration.....................45 3.4.4 Loopback-detection control recovery conguration..............45 3.5 Isolate-port configuration...........................................................................46 3.5.1 Isolate-port group configuration...................................................46 3.5.2 Interface join group configuration................................................46 3.5.3 Show isolate-port group.................................................................47 3.6 Port storm-control configuration..............................................................47 3.6.1 Storm-control configuration..........................................................47 3.7 Port debug and maintenance......................................................................48 3.7.1 Show port information......................................................................48 3.7.2 Show entire trafc information......................................................48 3.8 ULDP conguration.......................................................................................49 3.8.1 ULDP global enable configuration.................................................49 3.8.2 ULDP hello message configuration..............................................50 3.8.3 ULDP recovery time configuration...............................................50 3.8.4 Show ULDP configuration...............................................................50 3.9 LLDP conguration.........................................................................................51 3.9.1 LLDP global enable configuration..................................................51 3.9.2 LLDP port status configuration..................................................... 52 3.9.3 LLDP tx-interval config.................................................................... 52 3.9.4 LLDP msgTxHold configuration.................................................... 53 3.9.5 LLDP transmit delay configuration............................................... 53 3.9.6 LLDP notification interval configuration.....................................54 3.9.7 LLDP neighbors max-num configuration....................................54 3.9.8 LLDP too many neighbors configuration.................................... 55 3.9.9 LLDP transmit optional tlv configuration.................................... 55 3.9.10 Show LLDP configuration..............................................................56 3.10 Jumbo packet forwarding conguration................................................56
4.1 MAC address table conguration................................................................ 57 4.1.1 MAC address aging-time conguration........................................ 57 4.1.2 Congurate MAC address...............................................................58 4.1.3 Delete MAC address..........................................................................59 4.1.4 MAC address query...........................................................................59
13.1.3 DHCP snooping binding user conguration............................. 112 13.1.4 DHCP snooping action count conguration............................. 113 13.1.5 DHCP snooping limit-rate conguration................................... 113 13.1.6 DHCP snooping helper-server conguration........................... 114 13.2 DHCP snooping port conguration......................................................... 114 13.2.1 Enable/disable DHCP snooping binding dot1x......................... 114 13.2.2 Enable/disable DHCP snooping binding user.......................... 115 13.2.3 Enable/disable DHCP snooping trust........................................ 115 13.2.4 DHCP snooping action conguration....................................... 115 13.3 Show DHCP snooping conguration....................................................... 116 13.3.1 Show DHCP snooping conguration.......................................... 116
16.1.1 Class-map conguration.............................................................. 126 16.1.2 Classification criteria configuration...........................................127 16.2 Policy-map conguration..........................................................................127 16.2.1 Policy-map conguration............................................................ 128 16.2.2 Class-map use to policy-map conguration.......................... 128 16.3 Apply QoS to port....................................................................................... 129 16.3.1 QOS port trust state conguration............................................ 129 16.3.2 QoS port cos parameters configuration.................................. 130 16.3.3 QoS port select queue schedule algorithm configuration.. 130 16.3.4 QoS port wrr algorithm queue weight conguration............ 130 16.3.5 QoS port wdrr algorithm queue weight configuration.......... 131 16.3.6 QoS port queue bandwidth configuration.............................. 132 16.3.7 QoS service policy configuration.............................................. 132 16.4 QoS policy-class-map configuration..................................................... 133 16.4.1 Policy-class-map accounting configuration........................... 133 16.4.2 Aggregate policy configuration................................................ 133 16.4.3 Policy-class-map policy configuration.................................... 134 16.4.4 Policy-class-map set configuration......................................... 135 16.5 QoS mapping conguration.................................................................... 135 16.5.1 CoS-to-IntP mapping.................................................................... 136 16.5.2 CoS-to-DP mapping..................................................................... 136 16.5.3 DSCP-to-DSCP mapping..............................................................137 16.5.4 DSCP-to-IntP mapping................................................................ 138 16.5.5 DSCP-to-DP mapping.................................................................. 139 16.5.6 EXP-to-IntP mapping................................................................... 139 16.5.7 EXP-to-DP mapping.....................................................................140 16.5.8 IntP-to-DSCP mapping................................................................140 16.5.9 IntP-to-EXP mapping...................................................................140 16.6 QoS aggregate policy conguration...................................................... 141 16.7 QoS service policy configuration............................................................ 142
17.1 IP route aggregate conguration............................................................. 143 17.1.1 Route aggregate conguration................................................... 143 17.2 ARP conguration....................................................................................... 144 17.2.1 ARP conguration........................................................................... 144 17.2.2 Clear ARP cache............................................................................. 144 17.2.3 Show ARP......................................................................................... 145 17.2.4 Proxy ARP conguration.............................................................. 145 17.3 Gratuitous ARP conguration.................................................................. 145 17.3.1 Gratuitous-ARP interval time conguration............................. 146 17.3.2 Interface gratuitous-ARP interval time conguration.......... 146 17.3.3 Show gratuitous-ARP conguration......................................... 147 17.4 ARP protection conguration.................................................................. 147 17.4.1 ARP GUARD conguration............................................................ 147 17.4.2 ANTI-ARPSCAN conguration.................................................... 148 17.5 Show IP trafc.............................................................................................. 153
18.3.10 RIP maximum-prex................................................................... 166 18.3.11 Neighbor conguration.............................................................. 167 18.3.12 Network conguration................................................................ 167 18.3.13 Offset-list conguration............................................................ 167 18.3.14 Passive interface conguration............................................... 168 18.3.15 Receive buffer size conguration............................................ 168 18.3.16 Redistribute route conguration............................................. 168 18.3.17 RIP route conguration.............................................................. 169 18.3.18 RIP timer conguration.............................................................. 169 18.3.19 Version conguration................................................................. 169 18.4 OSPF conguration.................................................................................... 170 18.4.1 OSPF enable.................................................................................... 170 18.4.2 OSPF area conguration..............................................................172 18.4.3 OSPF interface conguration.................................................... 173 18.4.4 Other parameters conguration................................................174 18.7 Show IP route................................................................................................177
19.3.9 OSPFv3 timer conguration....................................................... 185 19.3.10 OSPFv3 IPv6 (no parameter) conguration.......................... 185 19.3.11 OSPFv3 IPv6 (two parameter) conguration......................... 186 19.3.12 OSPFv3 IPv6 (multi parameter) conguration..................... 187 19.4 Show IPv6 route.......................................................................................... 187 19.4.1 Show IPv6 route database............................................................ 187 19.4.2 Show IPv6 NSM route.................................................................... 188 19.4.3 Show IPv6 FIB................................................................................. 188 19.4.4 Show IPv6 route statistics........................................................... 188
20.3.3 DVMRP report metric conguration........................................ 197 20.3.4 Out put report delay.................................................................... 198 20.3.5 DVMRP reject-non-pruners....................................................... 198 20.3.6 DVMRP runnel conguration..................................................... 198 20.4 DCSCM conguration............................................................................... 199 20.4.1 DCSCM source-control enable/disable conguration......... 199 20.4.2 DCSCM destination-control enable/disable conguration.199 20.4.3 DCSCM source-control access-group conguration........200 20.4.4 DCSCM destination-control access-group conguration.200 20.4.5 DCSCM destination-control access-group conguration (sip). 200 20.4.6 DCSCM destination-control access-group conguration (vMAC)........................................................................................................ 201 20.4.7 Multicast policy conguration.................................................. 201 20.4.8 ACL multicast source control.................................................. 202 20.5 IGMP conguration.................................................................................. 202 20.5.1 Access-group and immediate-leave conguration............. 203 20.5.2 IGMP query-interval conguration.......................................... 203 20.5.3 Maximum response-time and timeout conguration........ 204 20.5.4 Limit and version conguration............................................... 204 20.5.5 IGMP join group conguration................................................. 205 20.5.6 IGMP static group conguration............................................. 205
21.1.8 IPv6 BSR candidate conguration............................................. 210 21.1.9 IPv6 RP candidate conguration................................................ 210 21.1.10 IPv6 register-source conguration........................................... 211 21.1.11 IPv6 SSM conguration ................................................................ 211 21.1.12 IPv6 port mode conguration.....................................................212 21.1.13 IPv6 hello interval and holdtime conguration.......................212 21.1.14 IPv6 DR-priority and neighbor-filter conguration.............. 213 21.1.15 IPv6 dxclude-genid conguration............................................ 213 21.2 PIM-DM6 conguration............................................................................. 214 21.2.1 IPv6 state-refresh interval conguration................................. 214 21.3 MLD conguration...................................................................................... 214 21.3.1 MLD access-group and immediate leave conguration....... 215 21.3.2 MLD query-interval conguration............................................. 215 21.3.3 MLD max response-time and timeout conguration........... 216 21.3.4 MLD limit and version conguration......................................... 216 21.3.5 MLD join group conguration......................................................217 21.3.6 MLD static group conguration..................................................217
23.1.1 Instance conguration..................................................................223 23.1.2 Field name conguration.............................................................223 23.1.3 Revision-level conguration.......................................................224 23.2 Spanning-tree port conguration.........................................................224 23.2.1 PortFast conguration.................................................................224 23.2.2 Port priority conguration..........................................................225 23.2.3 Port cost conguration...............................................................225 23.2.4 Spanning-tree port mode...........................................................226 23.2.5 Link-type conguration..............................................................226 23.2.6 Spanning-tree agreement port conguration......................227 23.3 Spanning-tree global conguration......................................................227 23.3.1 Spanning-tree global agreement port conguration...........228 23.3.2 Forward-time conguration.......................................................228 23.3.3 Hello-time conguration............................................................228 23.3.4 Max age time conguration........................................................229 23.3.5 Max hop time conguration.......................................................229 23.3.6 Spanning tree mode conguration......................................... 230 23.3.7 Priority conguration.................................................................. 230 23.4 Show spanning-tree................................................................................. 230 23.4.1 Instance information.................................................................... 231 23.4.2 Revision-level information......................................................... 231
Glossary......................................................................................... 274
Step 2: Set the network connection (as shown with Windows 7). Click Start. Select Control Panel. Click view network status and tasks, and then click Local Area Connection. The Local Area Connection Status dialog box will appear. The figure is as follows:
Click Properties to open the Local Area Connection Properties dialog box. The figure is as follows:
Select Internet Protocol Version 4 (TCP/IPv4), and then click Properties to open the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box. Select Use the following IP address, type the IP address (between 192.168.1.2 and 192.168.1.254) and the subnet mask (255.255.255.0), and then click OK. The figure is as follows:
Step 3: Use the PING command to ensure the connection status between the PC and the active500EM. Click Start, and then type CMD in the text box to generate the following dialog box:
Press ENTER to open the Command Prompt window. Type ping 192.168.1.1 (the active500EMs default IP address), and then press ENTER. If the network is connected, the window will include the following text:
Step 4: Cancel proxy server. If the current PC uses the proxy server to access the Internet, the proxy server must be disabled. Complete the following steps to disable the proxy server: 1. Open the Web browser, and select Tools/Internet Options to open the Internet Options window. 2. Select Connections in the Internet Options window, and then click LAN Settings to open the Local Area Network (LAN) Settings dialog box. The figure is as follows:
3. Ensure that Use a proxy server for your LAN is not selected. Otherwise, clear the selection, and then click OK.
(NCS)
Username: Password:
The Network Control System (NCS), is a data networking ecosystem comprised of hardware and software designed to control the data network. NCS is a unified platform of integrated activeARC management software, one or more Access Control Data Networking Switches, and one or more Access Points. It is the umbrella for a variety of software driven solutions made to create efficiency in data networks and communication.
Page Ethernet port conguration VLAN interface conguration SPAN conguration Loopback-detection conguration Isolate-port conguration Isolation port configuration Port debug and maintenance ULDP configuration LLDP configuration Jumbo packet forwarding configuration MAC address table configuration VLAN configuration GVRP configuration VLAN-translation configuration Dynamic VLAN configuration Dot1q tunnel configuration IGMP snooping configuration MLD snooping configuration Time range configuration Numeric ACL Name ACL Filter configuration Show ACL configuration ACL binding configuration IPv6 ACL configuration AM global configuration AM port configuration Show AM port configuration
Page function Configure port layer 1 attribution, bandwidth control, etc. Configure port layer 1 attribution, bandwidth control, etc. Configure port mirroring Configure port loopback-detection mode, port loopback-detection intervaltime, if the loopback-detection controls auto recovery Configure isolate-port group, interface join group, etc. Show storm control configuration Show port information and entire traffic information ULDP enable config, ULDP hello message config, ULDP recovery timer, etc. LLDP enable configuration, LLDP port status configuration, Tx-interval config, etc. Jumbo packet forwarding configuration Configure MAC address table and aging-time; delete MAC address, etc. Add or remove VLAN; configure ingress VLAN rules Enable global/port GVRP, GVRP configuration Enable/disable VLAN translation; add/remove VLAN translation, etc. Protocol VLAN configuration Enable dot1q tunnel and dot1q tunnel tpid configuration Global/port enable IGMP snooping, IGMP snooping configuration, etc. Switch on-off MLD snooping, MLD snooping port enable, etc. Time range configuration Standard/extended numeric ACL; delete numeric ACL Standard/extended name ACL; delete name ACL Configure firewall ACL; attach ACL to port Show access list, access group, firewall, and time range Attach ACL to port, show access group, clear PACL statistics, etc. Configure IPv6 standard/name access-list; attach IPv6 ACL to port, etc. Enable/disable AM Configure AM port enable, AM IP-pool, and AM MAC-IP-pool Show AM port configuration, clear port AM pool
Page Port channel configuration DHCP management DHCP server configuration DHCP relay configuration DHCP debugging DHCP snooping global configuration DHCP snooping port configuration Show DHCP snooping configuration SNTP configuration NTP global configuration NTP interface configuration NTP configuration display Qos port configuration QoS class-map configuration QoS policy-map configuration QoS policy-class-map configuration QoS mapping configuration QoS aggregate policy configuration QoS service policy configuration
Page function Configure LACP group LACP port, etc. Enable DHCP Configure dynamic/manual address pool DHCP relay configuration Delete record; display IP-MAC binding information and log information for addresses that have a conflict record, etc. Configure DHCP snooping status, binding, binding user, number of port defense actions, etc. Configure DHCP snooping binding dot1x, binding user, trust attributes of a port, etc. Show DHCP snooping configuration Configure SNTP/NTP server, the sending request time interval from SNTP client to NTP/SNTP server, etc. NTP global switch configuration, etc. NTP interface switch configuration Show NTP status QoS port trust state configuration, QoS port CoS parameters configuration, etc. Add/delete/configure class-map and classification criteria configuration Add/delete/configure the policy-map, class map use to policy map configuration Configure policy class-map accounting configuration, aggregate policy configuration, etc. Configure CoS-to-DSCP mapping, DSCP-to-CoS mapping, DSCP mutation mapping, IP-precedence-to-DSCP mapping, etc. Configure aggregate policy name, committed information rate, committed burst size, etc. Configure policy-map name to VLAN
QoS conguration
Route configuration
Page IP route aggregation configuration ARP configuration Gratuitous ARP configuration ARP protection configuration Show IP traffic Policy-based routing Static route configuration RIP configuration OSPF configuration Show IP route IPv6 configuration OSPFv3 configuration Show IPv6 route PIM configuration PIM-DM configuration DVMRP configuration DCSCM configuration IGMP configuration
Page function IP route aggregate configuration ARP configuration, clear ARP cache, and show ARP Configure global/interface gratuitous-arp interval time, etc. ARP GUARD configuration and anti-ARP scanning prevention configuration Check statistic information of IP packets Router map and IP prefix Static route and static VPN route configuration Enable RIP, default, neighbor, network configuration, etc. OSPF enable, area, interface, other parameters configuration Show IP route IPv6 basic, ND and tunnel configuration, etc. OSPFv3 area, route, timer configuration, etc. Show IPv6 route database, NSM route, FIB, route stations Multicast command configuration, etc. State-refresh interval configuration Configure the DVMRP report metric, reject-non-pruners, tunnel, etc. Configure DCSCM source-control, destination-control, source-control access-group, etc. Configure IGMP query-interval, static group, access-group, immediate leave, etc. IPv6 multicast common configuration, etc. IPv6 state-refresh interval configuration Configure MLD access-group and immediate leave, query-interval, max response-time and timeout, static group, join group, version, and limit Configure instance and field name and count the revision-level Set the current port as edge port, port priority, port cost, etc. Configure spanning-tree global agreement port, forward-time, hello-time, etc. Show instance information and revision-level information
IPv6 PIM configuration PIM-DM6 configuration MLD configuration Spanning-tree field configuration Spanning-tree port configuration Spanning-tree global configuration Show spanning-tree
Spanning-tree configuration
ULPP configuration
ULSM configuration
Page MRPP global configuration MRPP port configuration MRPP domain configuration MRPP domain switch configuration ULPP global configuration ULPP port configuration ULPP group configuration ULPP configuration display ULSM global configuration ULSM port configuration ULSM configuration display Cluster basic configuration
Page function MRPP global switch configuration, etc. MRPP port property configuration MRPP control VLAN configuration, etc. MRPP display, etc. ULPP group configuration ULPP port property configuration ULPP group description configuration, etc. ULPP group configuration display, etc. ULSM group configuration ULSM port property configuration ULSM display Cluster configuration, cluster candidate information, cluster member information, cluster member configuration, cluster member auto configuration, cluster member reset, cluster topology configuration, cluster topology information, etc. RADIUS global/authentication/accounting configuration TACACS global configuration, etc. Configure 802.1x global enable, port authentication, port MAC, and port status list MAB enable configuration, etc. Source IP equal destination IP DOS attack protection configuration, source port equal destination port DOS attack protection configuration, TCP DOS attack on invalid flags configuration, etc. Configure HTTP server enable, SSL enable, SSL server monitor port, etc. sFlow collector global address configuration, sFlow collector port address configuration, sFlow agent address configuration, sFlow priority configuration, sFlow header length configuration, sFlow data length configuration, sFlow rate configuration, sFlow counter interval configuration, sFlow analyzer configuration
Authentication configuration
RADIUS client configuration TACACS server configuration 802.1x configuration MAB configuration DOS attack protection configuration SSL configuration sFlow configuration
Page IPv6 security RA global configuration IPv6 security RA port configuration Show IPv6 security RA
Page function IPv6 security RA global configuration IPv6 security RA port configuration Show IPv6 security RA
The chapters that follow describe how to enable and configure various features offered by the activeARC solution. Many features must be enabled by following the configuration steps as described in this user manual in order to properly access the advanced configuration options for that particular feature. If the feature is not enabled, users may not be able perform advanced configuration for that feature and warning messages may be displayed identifying that the feature must first be enabled before configuration can complete.
Encrypted text Select whether the password information is displayed Priority Only users with the priority of 15 can log in to the WEB management interface Operation Select to Add or Remove the user
2. Congure exec timeout Example: Congure the timeout as 6 minutes and 6 seconds, and then click Apply.
3. Congure switch prompt Example: Congure the Switch name as Switch, and then click Apply.
2. Save current conguration before reboot? Select Yes or No. Reboot the active500EM by clicking Apply.
3. Reboot with the default conguration Clear all current congurations and reboot the switch by clicking Apply.
2.2.1.1 Users
From the Management tab, click SNMP conguration -> SNMP authentication -> Users to add or remove SNMP users. SNMP username The user name, containing 132 characters SNMP group The group name that the user belongs to, containing 132 characters Security level The encryption level of the current user: noAuthNoPriv does not authenticate and does not use DES for the packet encryption; authPriv uses DES for packet encryption; authNoPriv does not use DES for the packet encryption Authentication protocol Set the using algorithm: MD5 or SHA Authentication password The current users authentication password
Privacy protocol - Sets the packet encryption security level. When authPriv security level is selected, DES is used as the currently supported type for packet encryption Privacy password Password for setting packet encryption for Privacy Protocol IPv4 access control list Enter the IPv4 Access Control List number that has been previously configured (Optional) IPv6 access control list Enter the IPv6 Access Control List number that has been previously configured (Optional) Operation Select Add or Remove
Example: Set the SNMP username as tester, SNMP group as UserGroup, select authPriv for the Security level, the Authentication protocol as MD5. Set the Authentication password as hellohello, select DES for the Privacy protocol, the Operation as Add, and then click Apply. The gure is as follows:
2.2.1.2 Groups
From the Management tab, click SNMP conguration -> SNMP authentication -> Groups to add or remove SNMP user groups. SNMP group The name of the SNMP user group Security level The encryption level of the current user: noAuthNoPriv does not authenticate and does not use DES for the packet encryption; authPriv uses DES for packet encryption; authNoPriv does not use DES for the packet encryption Read SNMP view Set the readable view name Write SNMP view Set the writable view name Notify SNMP view Set the notiable view name Operation Select Add or Remove
Example: Type UserGroup in the SNMP group field, select the Security level as authPriv, and type max in three SNMP views. From the Operation drop-down list, select Add, and then click Apply.
2.2.1.3 Views
From the Management tab, click SNMP conguration -> SNMP authentication -> Views to add or remove SNMP views. SNMP view Set the view name, containing 132 characters OID OID number or corresponding node name, containing 1255 characters Type Include/exclude this OID Operation Select Add or Remove active500EM Wired Web Interface Users Manual 20
Example: In the SNMP view field, type max, and for OID, type 1.3.6.1.4.1.41721.2.2.1. Select the Type as Include, the Operation as Add, and then click Apply.
Example: Type the Engineid as a66688999f, select the Operation as Conguration, and then click Apply.
Example: Congure the Community string as public and the Access priority is Read only. After conguring the Community string and the Access priority, click Apply. The gure is as follows:
2. TRAP manager conguration Click Switch basic conguration -> SNMP conguration -> Community managers to congure the IP address and the community strings of the management station, which will receive SNMP Trap messages. Trap receiver The IP address to be used to receive SNMP Trap messages Community string (1255 characters) used to receive Trap messages
Example: Congure the Trap receiver as 192.168.1.100, the Community string as trap, and then click Apply.
SSH reauthentication Set SSH reauthentication times; the default value is 3 times.
SSH RSA key The modulus that is used to compute the host key; valid range is 768 to 2048; the default value is 1024.
1. TFTP service, including: TFTP client service to congure TFTP client TFTP server service to congure TFTP server FTP client service to congure FTP client FTP server service to congure FTP server
Example: The following gure shows how to get the system le from TFTP Server. The IP address is 192.168.1.100, the Local le name is nos.img, and the Server le is nos.img. Click Apply.
Example: Set the server state as Open, and congure suitable TFTP Timeout and Retransmit times, and then click Apply. The figure is as follows:
Example: The following gure shows how to get the system le from the FTP server. TheIP address is 192.168.1.100, Local le name is nos.img, and Server le name is nos.img. The FTP user is switch, and the Password is switch. Click Apply.
Phrases of FTP user name and password setting are explained as follows:
Example 1: Set the FTP server state as Open and the FTP Timeout as 600 seconds, and then click Apply.
Example 2: Input the User as switch and the Password as switch. Select the State as Plain text and the Operation type as Add, and then click Apply.
The sub-nodes are as follows: Debug command Debugs the connection state of the switch show clock Shows the current time show cpu usage Shows CPU usage information in the current running state show memory usage Shows memory usage information in the current running state show ash Shows Flash le information show running-cong Shows the current parameters conguration show switchport interface Shows properties of VLAN ports show tcp Shows the current TCP connection with the switch show udp Shows the current UDP connection with the switch active500EM Wired Web Interface Users Manual 32
show telnet login Shows the client messages that connect with the switch through Telnet show version Shows the version number of the switch
2. PING Phrases are explained as follows: Host name The name of the host IP address The IP address destination
Example: Type the Host name as London and the IP address as 192.168.1.180, and then click Apply. The gure is as follows:
3. Traceroute Phrases are explained as follows: IP address The destination IP address Host name The name of host Hops The maximum passing hops Timeout The timeout of data packets
2.6.3 Others
Other parts are easier to congure in the Maintenance and debugging command node. Click a conguration node, and the related messages will appear. Example: 1. Show the clock The gure is as follows:
Speed/Duplex status Set Ethernet port speed and duplex, including auto-negotiation, 10Mbps Half, 10Mbps Full, 100Mbps Half, 100Mbps Full, 1000Mbps Half, 1000Mbps Full Module type Set the type of 100Base-FX module; auto-detected: automatic to detect; no-phy-integrated: there is no phy- integrated 100Base-TX module; phy-integrated: phy- integrated 100Base-TX module (this option must be used with 100Base- FX and only used to ber or combo port; the combo port must be congured in sfp-forced mode) 1000M mode Select the 1000M mode as Master or Slave Fiber portMode Including Auto and No negotiation
Flow control status Displays the current flow control status; options include Valid flow control or Invalid flow control Loopback Whether to congure the loopback testing function of Ethernet port.
Example: Assign the Port to be Ethernet1/0/1, and set mdi as auto, the Admin status as no shutdown, Speed/Duplex status as Auto, Module type as auto detected, 1000M Mode as master, ber portMode as Auto, Flow control status as Invalid ow control, and Loopback as no loopback. Click Apply. The gure is as follows:
The Port list table displays the related information of the specic port conguration.
Example: Choose the Port to be Ethernet1/0/1, set the Bandwidth control level as 100K, the Control type as Transmit, and the Operation as Conguration, and then click Apply. The gure is as follows:
Example: Select the Session as 1, the Destination port as 1/0/7, and the Operation as Add, and then click Apply. The gures are as follows:
Example: Select the Port as Ethernet1/0/1, Loopback-detection mode as block, and the Operation as Add, and then click Apply. The gure is as follows:
Example: Type the Group name as 1, select the Operation as Add, and then click Apply.
Example: Type the Group name as 1. Select the Port as Ethernet1/0/1 and the Operation as Add, and then click Apply.
Example: Select the Port as Ethernet1/0/1 and storm-control type as broadcast. Type the storm-control value as 1000. Select the Operation as Add, and then click Apply. The figure is as follows:
Example: Choose ULDP global enable type as ULDP enable, and configure the Operation as Enable. Click Apply. The figure is as follows:
ULDP port enable configuration: Port - Appoint the configured port ULDP port enable type - ULDP port enable, ULDP port aggressive-mode, or ULDP reset port Operation - Enable or Disable
Example: Choose the Port as Ethernet1/0/1 and the ULDP port enable type as ULDP port enable, and configure the Operation as Enable. Click Apply. The figure is as follows:
LLDP port enable configuration: Port - Appoint the configured port LLDP port enable type - LLDP port enable or LLDP port trap enable Operation - Enable or Disable
Example: Choose the Port as Ethernet1/0/1 and the LLDP port enable type as LLDP port enable, and configure the Operation as Enable. Click Apply. The figure is as follows:
Example: Choose the Port as Ethernet1/0/1, choose the LLDP port status as send, and click Apply. The figure is as follows:
Example: Configure the LLDP tx-interval as 5, choose the Operation as Configuration, and click Apply. The figure is as follows:
Example: Configure the LLDP msgTxHold value as 2, choose the Operation as Configuration, and click Apply. The figure is as follows:
Example: Configure the LLDP transmit delay value as 1, choose the Operation as Configuration, and click Apply. The figure is as follows:
Example: Configure the LLDP notification interval value as 5, choose the Operation as Configuration, and click Apply. The figure is as follows:
Example: Choose the Port as Ethernet 1/0/1, configure the LLDP neighbors max-num value as 5, choose the Operation as Configuration, and click Apply. The figure is as follows:
Example: Choose the Port as Ethernet 1/0/1, choose the LLDP too many neighbors value as discard, and click Apply. The figure is as follows:
Example: Configure the Jumbo packet size as 1500, choose the Operation as Configuration, and click Apply. The figure is as follows:
Example: Type the VLAN ID as 100, and then click Apply. The gure is as follows:
Example: Select the Port as Ethernet1/0/1, the Type as trunk, and the State as Enable VLAN ingress check, and then click Apply. The gure is as follows:
Example: Type the List name as 20 and the Source IP as 192.168.1.0, and then click Apply.
Example: Type the List name as 700 and the Source MAC as 00-00-00-00-00-01, and then click Apply.
List name Ranges from 100 to 199 Rule Options include permit and deny Source address type Options include Any IP, Specied IP, and Host IP Source IP Source IP address Reverse network mask Reverse network mask for source IP Destination address type Options include Any IP, Specied IP, and Host IP Destination IP Destination IP address Reverse network mask Reverse network mask for destination IP
IP precedence IP based packet prioritization field with valid value range from 0-7, 0 being the lowest and 7 being the highest priority TOS IP Type of Service priority field (0-15) Time range name Select the time range that has been previously configured
Example: Type the List name as 110, select deny for the Rule, type the IP destination as 10.1.1.0, and then click Apply.
Destination MAC Destination MAC address Reverse network mask Reverse network mask for destination MAC Packet type Options include None, Tagged-802.3, Tagged-eth2, Untagged-802.3, and Untagged-eth2
Example: Type the List name as 1100. Select permit for the Rule, select Any MAC for both the Destination MAC and Source MAC, and select Tagged-eth2 for the Packet. Click Apply.
Example: Type the List name as mac_acl. Select deny for the Rule, Tagged-802.3 for the packet type, and type 00-12-11-23-00-00 for the Source MAC. Click Apply.
Example: Open the Switch firewall configuration dialog box, and select permit as the Firewall default action. Click Apply.
Source address type Options include Host-source (no need to type the prex for IPv6 address), Any-source, and IPv6 source prex (need to type the prex for IPv6 address) IPv6 address Type the IPv6 address and the prex length for IPv6 address Operation Select Add or Remove
Example: Type the Access list number as 520. Select the Rule as permit, the Source address type as IPv6 source prex, the IPv6 address as 2003:1:2:3::1/64, and the Operation as Add, and then click Apply. The figure is as follows:
Source address type Options include Host-source (no need to type the prex for IPv6 address), Any-source, and IPv6 source prex (need to type the prex for IPv6 address) IPv6 address Type the IPv6 address and the prex length for IPv6 address Operation Select Add or Remove
Example: Type the IPv6 name access list as ipv6Flow. Select the Rule as permit, the Source address type as IPv6 source prex, the IPv6 address as 2003:1:2:3::1/64, and the Operation as Add, and then click Apply. The figure is as follows:
10.1.1 Enable/disable AM
Pause the mouse pointer over AM conguration -> AM global conguration, and then click Enable/Disable AM to open the conguration interface. It enables/disables the AM global function. AM status Options include Enable and Disable Example: Select the AM status as Enable. Click Apply. The gure is as follows:
Example: Select the Port as Ethernet1/0/1 and the AM port status as Enable. Click Apply. The gure is as follows:
Example: Select the Port Ethernet1/0/1 of the switch to transmit ARP packets and IP packets. The IP packets source addresses are 30 consecutive IP addresses, which begin from IP address 192.168.1.1. Click Apply.
Example: Select the Port Ethernet1/0/1 of the switch to allow data packets with a source MAC address of f8-f7-d3-00-03-f1 and a source IP address of 192.168.1.1 to be forwarded. Click Apply.
Example: Type the Group number as 1 and the Load balance mode as src-mac, and then click Apply. The LACP port group conguration shows the conguration information:
Example: When binding an address manually, enter the IP address 192.168.1.25, which binds the user whose Hardware address is 00-10-5a-60-af-12 and congures the User as network for the user whose Client identier is 00-10-5a-60-af-12. Click Apply. The gure is as follows:
Example: Type the time zone as Hawaii. Select Before-utc for the time difference. Type the Time value as 10, and then click Apply. The gure is as follows:
Click NTP configuration -> NTP global configuration -> NTP access group configuration to configure the NTP access group. Example: Type the Access list as 10, select the Operation as Add, and then click Apply.
Example: Select the Port as Ethernet1/0/1, the Packet class rule as COS, and the Operation as Add, and then click Apply. The gure is as follows:
Example: Type 1 for Weight1, 2 for Weight2, 3 for Weight3, 4 for Weight4, 5 for Weight5, 6 for Weight6, 7 for Weight7, and 8 for Weight8. Select the Operation as Add, and then click Apply. The gure is as follows:
18.1.1.2 Match
Click Route conguration -> Policy based routing -> Route map conguration -> Match to match the as-path, community, interface, IP, metric, origin, route-type, and tag. The gure is as follows:
Match type: as-path (congure the AS path domain to match the BGP routing messages) community (congure the community attributes to match the BGP routing messages) interface (configure to match the interfaces) IP (congure the routing prex or next-hop) metric (congure the metric value to match the routing messages) origin (congure the origin to match the BGP routing messages) route-type (congure the route type to match the OSPF routing messages) tag (congure the tag domain to match the OSPF routing messages)
18.1.1.3 Set
Click Route conguration -> Policy based routing -> Route map conguration -> Set to set the aggregator, as-path, and atomicaggregate. The gure is as follows:
Set : aggregator (assign an AS number for BGP aggregator) as-path (add AS numbers in the AS path domain of the BGP routing message) atomic-aggregate (congure the atomic aggregate attributes) comm-list (congure BGP to delete the community attributes from the inbound or outbound routing messages) community (congure the community attributes of the BGP routing message) extcommunity (congure the extended community attributes of the BGP routing messages) nexthop (congure the next-hop of the route) local-preference (congure the local priority of BGP route) metric (congure the metric value of the route) metric-type (congure the metric type of the OSPF routing messages) origin (congure the origin code of the BGP routing messages) originator-id (congure the origin IP address of the BGP routing messages) tag (congure the tag domain of OSPF routing messages) vpnv4 (congure the next-hop of BGP VPNv4 routing messages) weight (congure the weight value of BGP routing messages)
Route class: ip-address: clear the routes which match the destination address from the RIP route tables kernel: delete kernel routes from the RIP route table static: delete static routes from the RIP route table connected: delete direct routes from the RIP route table rip: only delete RIP routes from the RIP route table ospf: only delete OSPF routes from the RIP route table isis: only delete ISIS routes from the RIP route table bgp: only delete BGP routes from the RIP route table all: delete all routes from the RIP route table
2. Set the Default metric value of the introduced route. The gure is as follows:
Command: ip rip authentication key-chain: enable RIPV2 authentication on an interface and further congure the adopted key chain ip rip authentication mode: congure the authentication mode
ip rip authentication string: set the password used in RIP authentication ip rip authentication cisco-compatible: after conguring this command, the Cisco RIP packets will be receivable by conguring the plaintext authentication or MD5 authentication no ip rip receive-packet: set the interface to be able to receive RIP packets ip rip receive version: set the version information of the RIP packets the interface receives no ip rip send-packet: set the interface to be unable to receive the RIP packets ip rip send version: set the version information of the RIP packets the interface receives ip rip split-horizon: enable split horizon
Operation type: authentication: congure the authentication mode of the OSPF area default-cost: congure the cost of the default summary route lter-list: congure the lter of broadcasting summary routing on the ABR nssa: set the area to be Not-So-Stubby-Area (NSSA) area range: aggregate the OSPF route on the area border stub: dene a stub area virtual-link: congure a logical link between two backbone areas physically divided by a non-backbone area
Operation type: authentication: specify the authentication mode required to send and receive OSPF packets on the interfaces authentication-key: specify the authentication key required to send and receive OSPF packet on the interfaces cost: specify the cost required to run OSPF protocol on the interfaces database-lter: open the LSA database lter switch on specic interface dead-interval: specify the dead interval for neighboring Layer 3 switch disable: stop the OSPF group process on the interface hello-interval: specify the hello-interval on the interface message-digest-key: specify the key ID and value of MD5 authentication on the interface mtu: specify the mtu value of the interface as the OSPF group structure mtu-ignore: use this command to ignore the mtu size when switching DD network: congure the OSPF network type of the interface priority: congure the priority when electing Dened layer 3 switch at the interface
retransmit-interval: specify the retransmit interval of link state announcements between the interface and adjacent layer 3 switches transmit-delay: set the transmit delay value of LSA transmission
Operation type: auto-cost: set the way in which OSPF calculates the default metric value compatible: congure to rfc1583 compatible default-information: create a default external route to the OSPF route area default-metric: set the default metric value of the OSPF routing protocol distance: congure the OSPF manage distance base on route type distribute-list: filter the network in the routing update host: set a stub host to belong to a certain area max-concurrent-dd: set the maximum concurrent number of dd in the OSPF process neighbor: congure the OSPF router connecting the NBMA network
abr- type: congure a OSPF ABR type database: congure the max LSA number database-external: congure the size of external link database and the waiting time before the route exits the overow state passive-interface: congure the hello group so that it is not sent on specic interfaces redistribute: introduce the route learned from other routing protocols into OSPF summary-address: summarize or restrain the external route with a specic address scope timers-spf: adjust the value of the route calculating timer
Parameter choose: destination: the destination network address prex: the destination network address, plus the prex length database: the route database connected: the direct route static: the static route rip: the RIP route ospf: the OSPF route bgp: the BGP route isis: the ISIS route kernel: the kernel route statistics: the number of routes
Command: dad attempts: set the number of neighbor requests when detecting duplicated address ns-interval: set the time interval of neighbor requests supress-ra: suppress the router advertisement ra-lifetime: congure the router advertisement lifetime min-ra-interval: set the minimum time interval max-ra-interval: set the maximum time interval prex: congure the address prex and the correlative parameters used by router advertisement neighbor : set a static neighbor table clear IPv6 neighbors: clear the neighbor cache of IPv6
Command: interface tunnel: create/delete tunnels tunnel source: congure the IPv4 address of tunnel source point tunnel destination: congure the IPv4 address of tunnel destination tunnel nexthop: congure the IPv4 address of tunnel nexthop tunnel mode: congure the tunnel mode tunnel address: configure the tunnel IP address
Operation type: area default-cost: congure the cost of sending to the default summary route in the stub or NSSA area area range: aggregate the OSPF route on the area border area stub: dene a stub area area virtual-link: congure a logical link between two backbone areas physically divided by a non-backbone area
OSPFv3 ABR type: cisco: identified by Cisco ABR ibm: realize by IBM ABR standard: realize with standard (RFC2328) ABR
OSPFv3 redistribute conguration: kernel: introduce from kernel route connected: introduce from direct route static: introduce from static route rip: introduce from the RIP route isis: introduce from ISIS route bgp: introduce from BGP route
OSPFv3 Command select: ipv6 ospf cost: specify the cost required to run the OSPF protocol on the interface ipv6 ospf dead-interval: specify the dead interval for a neighboring Layer 3 switch ipv6 ospf hello-interval: specify the hello-interval on the interface ipv6 ospf priority: congure the priority when electing Dened Layer 3 switch at the interface ipv6 ospf retransmit-interval: specify the retransmit interval of link state announcements between the interface and adjacent layer 3 switches ipv6 ospf transmit-delay: congure the LSA sending delay time on the interface
Example: Select force-true to force the Port Ethernet1/0/1 as point-to-point type. The gure is as follows:
Example: Enable the AAA authentication status, disable the AAA accounting function, and set the RADIUS key as test. Click Apply. The gure is as follows:
Example: Type the RADIUS authentication server IP address as 192.168.1.200 and the port as 3000. Click Apply. The gure is as follows:
Example: Type the Accounting server IP address as 192.168.1.200 and the port as 2000. Click Apply. The gure is as follows:
Example: Type the TACACS key as test and the TACACS server timeout as 3, and click Apply. The gure is as follows:
Example: Type TACACS authentication server IP as 192.168.1.200 and the port (optional) as 3000. Select Primary authentication server. Click Apply. The gure is as follows:
Example: Disable the 802.1x status, type the Maximum retransmission times of EAP-request/identity as 2, and Disable the Reauthenticate client periodically function. Type the Holddown time for authentication failure as 10, the Reauthenticate client interval as 3600, and the Resending EAP-request/identity interval as 30. Forbid the EAP relay authentication function and MAC ltering function, and Disable the 802.1x unicast function. Click Apply. The gure is as follows:
Example: Disable the 802.1x status on Port Ethernet1/0/1, select the Authentication type as force-unauthorized and the Authentication mode as Port-based. Type the Port maximum user as 1, and then click Apply. The gure is as follows:
Example: Select Add MAC lter entry for the MAC address 00-00-01-00-02-03 on Ethernet1/0/1. Click Apply. The gure is as follows:
Example: Display the authentication status for Ethernet1/0/1. The gure is as follows:
29.2 Source port equal destination port DOS attack protection conguration
Click DOS attack protection conguration -> Source port equal destination port DOS attack protection conguration to open the conguration interface and to enable/disable source port equal destination port DOS attack protection function. DOS attack protection status Options include Enable and Disable Example: Select the DOS attack protection status as Enable. Click Apply. The gure is as follows:
Example: Type the SSL server monitor port as 1500. Click Apply.
Glossary
ACL ANSI ASN.1 Access Control List; policies that determine which LAN endpoints can place and receive calls. American National Standards Institute; the primary organization for fostering the development of technology standards in the United States. Abstract Syntax Notation One; a language that denes the way data is sent across dissimilar communication systems. Ensures that the data received is the same as the data transmitted by providing a common syntax for specifying Application layer (program-to-program communications) protocols. Address Resolution Protocol; protocol to automatically map IP addresses to hardware MAC addresses. Command Line Interface; a user interface in which you type commands instead of choosing them from a menu or selecting an icon. Dynamic Host Conguration Protocol; a protocol that assigns unique IP addresses to devices, then releases and renews these addresses as devices leave and rejoin the network. Domain Name Server; a system for converting hostnames and domain names into IP addresses on the Internet or on local networks that use the TCP/IP protocol. A backup operation that automatically switches to a standby database, server, or network if the primary system fails or is temporarily shut down. For example, if the master active500EM goes down, a backup active500EM in the cluster mode will take over the functions of the unit that is no longer operational. Fiber Distributed Data Interface; a set of ANSI and ISO standards for data transmission on ber optic lines in a local area network (LAN) that can extend in range up to 200 km (124 miles). Fully Qualied Domain Name; the portion of an Internet Uniform Resource Locator (URL) that fully identies the server program that an Internet request is addressed to. Includes the second-level domain name (such as whatis.com) and any other levels (for example, www.whatis.com or www1.somesite.com). The prex http:// added to the fully-qualied domain name completes the URL. File Transfer Protocol; an application layer protocol that uses TCP to transfer data les between machines or hosts. Hypertext Transfer Protocol; protocol for transferring Web pages. HTTP over SSL; protocol enabling the secured transmission of Web pages. Internet Control Message Protocol; extension of the Internet Protocol (IP) used to generate message and control packets. Internet Key Exchange; an IPsec (Internet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) negotiation and remote host or network access. Internet Protocol; a packet-based protocol for delivering data across networks. Internet Protocol Security; protocol used to secure trafc across an IP network. A worldwide federation of national standards bodies from some 100 countries, with one standards body representing each member country.
FDDI FQDN
LAN
MAC MIB NAS NAT NTP OSPF PoE PPP QoS RADIUS RIP RTP SA SHA SNMP SNTP SSH
Local Area Network; a group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an ofce building). Usually, the server has applications and data storage that are shared in common by multiple computer users. The network may serve as few as two or three users (for example, in a home network) or as many as thousands of users (for example, in an FDDI network). Media Access Control address; a unique numeric code that is permanently assigned to each unit of most types of networking hardware, such as access controllers, by the manufacturer at the factory. Management Information Base; a hierarchical database used by the simple network management protocol (SNMP) to describe the particular device being monitored. MIB objects are identied using ASN.1 syntax. Network Access Server; a gateway device that acts as the single point of access to a resource. The device references an authentication server to determine if access is granted. Network Address Translation or Network Address Translator; the translation of an Internet Protocol address (IP address) used within one network to a different IP address known within another network. Network Time Protocol; a networking protocol for clock synchronization between computer systems over packetswitched, variable-latency data networks. Open Shortest Path First; a protocol for exchanging routing information within a network. Power over Ethernet; a protocol to provide power to devices like IP cameras and wireless access points via an Ethernet connection. Point-to-point protocol; a computer network protocol used to transfer a datagram between two directly connected (point-to-point) computers. Quality of Service; techniques used to assure a given level of performance as measured by the transmission rate and error rates. Remote Authentication Dial-In User Service; a client/server protocol and software that enables remote authentication of users attempting to log in to the unit. Routing Information Protocol; protocol for exchanging routing information within a network. Real-Time Transfer Protocol; an Internet protocol standard that species a way for programs to manage the real-time transmission of multimedia data over either unicast or multicast network services. Security Association; used by IKE and IPsec to determine how data is encrypted, decrypted, and authenticated by the secure gateways. Secure Hash Algorithm (SHA); a standard algorithm that makes a larger (60-bit) message digest and is similar to MD4. Simple Network Management Protocol; protocol to monitor and control devices in a TCP/IP network. Simple Network Time Protocol; a simplied version of Network Time Protocol (NTP) that is used to synchronize computer clocks on a network. Secure Shell; a network protocol that allows data to be exchanged using a secure channel between two networked devices.
Secure Socket Layer; Secure Sockets Layer (SSL) is a commonly used protocol for managing the security of a message transmission on the Internet. Maintains the last known or current status of an application. Transmission Control Protocol; a set of rules (protocol) used along with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet. Protocol that provides remote terminal connection service. Trivial File Transfer Protocol; a technology for transferring les between network devices. User Datagram Protocol; a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses Internet Protocol (IP). Virtual LAN; a logical subcomponent of a physical network. It functions as a separate network to isolate its trafc from the rest of the network. Voice over Internet Protocol; technology that allows telephone calls to be made over computer networks like the Internet. VoIP converts analog voice signals into digital data packets and supports real-time, two-way transmission of conversations using Internet Protocol (IP). Virtual Private Network; a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote ofces or individual users with secure access to their organizations network. Wide Area Network; communications network that uses such devices as telephone lines, satellite dishes, or radio waves to span a larger geographic area than can be covered by a LAN. Also known as the World Wide Web or www; the collection of sites accessible through the Internet. A client program that initiates requests to a Web server and displays the information that the server returns.
www.att.com/activearc
2013 International Communications Corporation, Inc. All Rights Reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property licensed to lnternationaI Communications Corporation, Riverside, California. Printed in U.S.A. Issue 8.0 AT&T 9/19/13. activeARC is a registered trademark of International Communications Corporation,Inc. Acrobat Reader is a registered trademark of Adobe Systems, Inc. Mac OS is a registered trademark of Apple, Inc. Windows, Windows Server 2003, Windows Vista and Microsoft Internet Explorer are registered trademarks of Microsoft. All other trademarks are property of their respective owners. Test results and examples are subject to unique business conditions, client IT environment, ICC products deployed, and other factors. These results may not be typical; your results may vary.