Sign In
Upload
Manuals
Brands
3Com Manuals
Switch
4210G PWR
3Com 4210G PWR Manuals
Manuals and User Guides for 3Com 4210G PWR. We have
1
3Com 4210G PWR manual available for free PDF download: Configuration Manual
3Com 4210G PWR Configuration Manual (1133 pages)
24-Port/48-Port
Brand:
3Com
| Category:
Switch
| Size: 12.77 MB
Table of Contents
Table of Contents
6
Configuration Guide
1
About this Manual
3
Obtaining Documentation
5
Related Documentation
5
1 Product Features
7
Introduction to Product
7
Feature Lists
7
2 Features
9
Access Volume
9
IP Services Volume
11
IP Routing Volume
13
Multicast Volume
13
Qos Volume
14
Security Volume
15
High Availability Volume
17
System Volume
18
Table of Contents
35
1 Ethernet Port Configuration
40
Combo Port Configuration
40
Basic Ethernet Interface Configuration
41
Configuring Flow Control on an Ethernet Interface
42
Configuring the Suppression Time of Physical-Link-State Change on an Ethernet Interface
42
Configuring Loopback Testing on an Ethernet Interface
43
Configuring a Port Group
43
Configuring an Auto-Negotiation Transmission Rate
44
Configuring Storm Suppression
45
Setting the Interval for Collecting Ethernet Interface Statistics
46
Enabling Forwarding of Jumbo Frames
46
Enabling Loopback Detection on an Ethernet Interface
47
Configuring the MDI Mode for an Ethernet Interface
48
Testing the Cable on an Ethernet Interface
49
Configuring the Storm Constrain Function on an Ethernet Interface
49
Displaying and Maintaining an Ethernet Interface
51
2 Link Aggregation Configuration
52
Overview
52
Basic Concepts of Link Aggregation
52
Link Aggregation Modes
55
Load Sharing Mode of an Aggregation Group
57
Link Aggregation Configuration Task List
57
Configuring an Aggregation Group
57
Configuring a Static Aggregation Group
57
Configuring a Dynamic Aggregation Group
58
Configuring an Aggregate Interface
59
Configuring the Description of an Aggregate Interface
59
Enabling Linkup/Linkdown Trap Generation for an Aggregate Interface
59
Shutting down an Aggregate Interface
60
Configuring a Load Sharing Mode for Load-Sharing Link Aggregation Groups
60
Displaying and Maintaining Link Aggregation
61
Link Aggregation Configuration Examples
62
Layer 2 Static Aggregation Configuration Example
62
Layer 2 Dynamic Aggregation Configuration Example
63
Layer 2 Aggregation Load Sharing Mode Configuration Example
64
3 Port Isolation Configuration
66
Introduction to Port Isolation
66
Configuring the Isolation Group
66
Assigning a Port to the Isolation Group
66
Displaying and Maintaining Isolation Groups
67
Port Isolation Configuration Example
67
4 MSTP Configuration
69
Overview
69
Introduction to STP
69
Why STP
69
Protocol Packets of STP
69
Basic Concepts in STP
70
How STP Works
71
Introduction to RSTP
77
Introduction to MSTP
78
Why MSTP
78
Basic Concepts in MSTP
79
How MSTP Works
82
Implementation of MSTP on Devices
83
Protocols and Standards
83
MSTP Configuration Task List
83
Configuring MSTP
85
Configuring an MST Region
85
Configuring the Root Bridge or a Secondary Root Bridge
86
Configuring the Work Mode of an MSTP Device
87
Configuring the Priority of a Device
87
Configuring the Maximum Hops of an MST Region
88
Configuring the Network Diameter of a Switched Network
88
Configuring Timers of MSTP
89
Configuring the Timeout Factor
90
Configuring the Maximum Port Rate
91
Configuring Ports as Edge Ports
91
Configuring Path Costs of Ports
92
Configuring Port Priority
94
Configuring the Link Type of Ports
95
Configuring the Mode a Port Uses to Recognize/Send MSTP Packets
95
Enabling the Output of Port State Transition Information
96
Enabling the MSTP Feature
97
Performing Mcheck
97
Configuring Digest Snooping
98
Configuring no Agreement Check
100
Configuring Protection Functions
102
Enabling BPDU Dropping
105
Displaying and Maintaining MSTP
106
MSTP Configuration Example
106
5 LLDP Configuration
111
Overview
111
Background
111
Basic Concepts
111
Operating Modes of LLDP
115
How LLDP Works
116
Protocols and Standards
116
LLDP Configuration Task List
116
Performing Basic LLDP Configuration
117
Enabling LLDP
117
Setting LLDP Operating Mode
117
Setting the LLDP Re-Initialization Delay
118
Enabling LLDP Polling
118
Configuring the Tlvs to be Advertised
118
Configuring the Management Address and Its Encoding Format
119
Setting Other LLDP Parameters
120
Setting an Encapsulation Format for Lldpdus
120
Configuring CDP Compatibility
121
Configuration Prerequisites
121
Configuring CDP Compatibility
122
Configuring LLDP Trapping
122
Displaying and Maintaining LLDP
123
LLDP Configuration Examples
123
Basic LLDP Configuration Example
123
Configuration Procedure
124
CDP-Compatible LLDP Configuration Example
126
6 VLAN Configuration
128
Introduction to VLAN
128
VLAN Overview
128
VLAN Fundamentals
129
Types of VLAN
130
Configuring Basic VLAN Settings
130
Configuring Basic Settings of a VLAN Interface
131
Port-Based VLAN Configuration
132
Introduction to Port-Based VLAN
132
Assigning an Access Port to a VLAN
133
Assigning a Trunk Port to a VLAN
135
Assigning a Hybrid Port to a VLAN
136
MAC-Based VLAN Configuration
137
Introduction to MAC-Based VLAN
137
Configuring a MAC Address-Based VLAN
138
Protocol-Based VLAN Configuration
139
Introduction to Protocol-Based VLAN
139
Configuring a Protocol-Based VLAN
139
IP Subnet-Based VLAN Configuration
141
Introduction
141
Configuring an IP Subnet-Based VLAN
141
Displaying and Maintaining VLAN
142
VLAN Configuration Example
143
7 Isolate-User-VLAN Configuration
146
Overview
146
Configuring Isolate-User-VLAN
146
Displaying and Maintaining Isolate-User-VLAN
148
Isolate-User-VLAN Configuration Example
148
8 Voice VLAN Configuration
151
Overview
151
OUI Addresses
151
Voice VLAN Assignment Modes
152
Security Mode and Normal Mode of Voice Vlans
153
Configuring a Voice VLAN
154
Configuration Prerequisites
154
Setting a Port to Operate in Automatic Voice VLAN Assignment Mode
154
Setting a Port to Operate in Manual Voice VLAN Assignment Mode
155
Displaying and Maintaining Voice VLAN
156
Voice VLAN Configuration Examples
156
Automatic Voice VLAN Mode Configuration Example
156
Manual Voice VLAN Assignment Mode Configuration Example
158
9 GVRP Configuration
161
Introduction to GVRP
161
Garp
161
Gvrp
164
Protocols and Standards
164
GVRP Configuration Task List
164
Configuring GVRP Functions
164
Configuring GARP Timers
165
Displaying and Maintaining GVRP
166
GVRP Configuration Examples
167
Gvrp Configuration Example I
167
GVRP Configuration Example II
168
GVRP Configuration Example III
169
10 Qinq Configuration
171
Introduction to Qinq
171
Background
171
Qinq Mechanism and Benefits
171
Qinq Frame Structure
172
Implementations of Qinq
173
Modifying the TPID in a VLAN Tag
173
Qinq Configuration Task List
175
Configuring Basic Qinq
175
Enabling Basic Qinq
175
Configuring Selective Qinq
175
Configuring Selective Qinq Based on Ports
176
Configuring Selective Qinq through Qos Policies
176
Configuring the TPID Value in VLAN Tags
177
Qinq Configuration Examples
178
Basic Qinq Configuration Example
178
Selective Qinq Configuration Example (Port-Based Configuration)
180
Selective Qinq Configuration Example (Qos Policy-Based Configuration)
183
11 BPDU Tunneling Configuration
187
Introduction to BPDU Tunneling
187
Background
187
BPDU Tunneling Implementation
188
Configuring BPDU Tunneling
190
Configuration Prerequisites
190
Enabling BPDU Tunneling
190
Configuring Destination Multicast MAC Address for Bpdus
191
BPDU Tunneling Configuration Examples
191
BPDU Tunneling for STP Configuration Example
191
BPDU Tunneling for PVST Configuration Example
193
12 Port Mirroring Configuration
195
Introduction to Port Mirroring
195
Classification of Port Mirroring
195
Implementing Port Mirroring
195
Configuring Local Port Mirroring
197
Configuring Remote Port Mirroring
198
Configuration Prerequisites
198
Configuring a Remote Source Mirroring Group (on the Source Device)
198
Configuring a Remote Destination Mirroring Group (on the Destination Device)
200
Displaying and Maintaining Port Mirroring
201
Port Mirroring Configuration Examples
201
Local Port Mirroring Configuration Example
201
Remote Port Mirroring Configuration Example
202
Table of Contents
205
1 IP Addressing Configuration
210
IP Addressing Overview
210
IP Address Classes
210
Special IP Addresses
211
Subnetting and Masking
211
Configuring IP Addresses
212
Assigning an IP Address to an Interface
212
IP Addressing Configuration Example
213
Displaying and Maintaining IP Addressing
214
2 ARP Configuration
215
ARP Overview
215
ARP Function
215
ARP Message Format
215
ARP Address Resolution Process
216
ARP Table
217
Configuring ARP
217
Configuring a Static ARP Entry
217
Configuring the Maximum Number of ARP Entries for a Interface
218
Setting the Aging Time for Dynamic ARP Entries
218
Enabling the ARP Entry Check
219
ARP Configuration Example
219
Configuring Gratuitous ARP
219
Introduction to Gratuitous ARP
219
Configuring Gratuitous ARP
220
Displaying and Maintaining ARP
220
3 Proxy ARP Configuration
221
Proxy ARP Overview
221
Proxy ARP
221
Local Proxy ARP
222
Enabling Proxy ARP
222
Displaying and Maintaining Proxy ARP
223
Proxy ARP Configuration Examples
223
Proxy ARP Configuration Example
223
Local Proxy ARP Configuration Example in Case of Port Isolation
224
Local Proxy ARP Configuration Example in Isolate-User-Vlan
225
4 ARP Attack Defense Configuration
227
Configuring ARP Source Suppression
227
Introduction to ARP Source Suppression
227
Displaying and Maintaining ARP Source Suppression
228
Configuring ARP Defense against IP Packet Attacks
228
Introduction to ARP Defense against IP Packet Attacks
228
Enabling ARP Defense against IP Packet Attacks
228
Configuring ARP Active Acknowledgement
228
Introduction
228
Configuring the ARP Active Acknowledgement Function
229
Configuring Source MAC Address Based ARP Attack Detection
229
Introduction
229
Configuration Procedure
229
Displaying and Maintaining Source MAC Address Based ARP Attack Detection
230
Configuring ARP Packet Source MAC Address Consistency Check
230
Introduction
230
Configuring ARP Packet Source MAC Address Consistency Check
231
Configuring ARP Packet Rate Limit
231
Introduction
231
Configuring the ARP Packet Rate Limit Function
231
Configuring ARP Detection
231
Introduction to ARP Detection
231
IP-To-MAC Bindings
233
Configuring ARP Detection Based on Specified Objects
234
Displaying and Maintaining ARP Detection
235
Arp Detection Configuration Example I
235
ARP Detection Configuration Example II
236
5 DHCP Overview
238
Introduction to DHCP
238
DHCP Address Allocation
239
Allocation Mechanisms
239
Dynamic IP Address Allocation Process
239
IP Address Lease Extension
240
DHCP Message Format
240
DHCP Options
241
DHCP Options Overview
241
Introduction to DHCP Options
241
Self-Defined Options
242
Protocols and Standards
245
6 DHCP Relay Agent Configuration
246
Introduction to DHCP Relay Agent
246
Application Environment
246
Fundamentals
246
Dhcp Relay Agent Support for Option
247
DHCP Relay Agent Configuration Task List
248
Configuring the DHCP Relay Agent
248
Enabling DHCP
248
Enabling the DHCP Relay Agent on an Interface
249
Correlating a DHCP Server Group with a Relay Agent Interface
249
Configuring the DHCP Relay Agent Security Functions
250
Configuring the DHCP Relay Agent to Send a DHCP-Release Request
252
Configuring the DHCP Relay Agent to Support Option 82
252
Displaying and Maintaining DHCP Relay Agent Configuration
254
DHCP Relay Agent Configuration Examples
254
DHCP Relay Agent Configuration Example
254
DHCP Relay Agent Option 82 Support Configuration Example
255
Troubleshooting DHCP Relay Agent Configuration
256
7 DHCP Client Configuration
257
Introduction to DHCP Client
257
Enabling the DHCP Client on an Interface
257
Displaying and Maintaining the DHCP Client
258
DHCP Client Configuration Example
258
8 DHCP Snooping Configuration
260
DHCP Snooping Overview
260
Function of DHCP Snooping
260
Application Environment of Trusted Ports
261
DHCP Snooping Support for Option 82
262
Configuring DHCP Snooping Basic Functions
263
Prerequisites
264
Configuring Dhcp Snooping to Support Option 82
264
Displaying and Maintaining DHCP Snooping
266
DHCP Snooping Configuration Examples
266
DHCP Snooping Configuration Example
266
DHCP Snooping Option 82 Support Configuration Example
267
9 BOOTP Client Configuration
268
Introduction to BOOTP Client
268
BOOTP Application
268
Obtaining an IP Address Dynamically
269
Protocols and Standards
269
Configuring an Interface to Dynamically Obtain an IP Address through BOOTP
269
Displaying and Maintaining BOOTP Client Configuration
270
BOOTP Client Configuration Example
270
10 DNS Configuration
271
DNS Overview
271
Static Domain Name Resolution
271
Dynamic Domain Name Resolution
271
DNS Proxy
273
Configuring the DNS Client
274
Configuring Static Domain Name Resolution
274
Configuring Dynamic Domain Name Resolution
274
Configuring the DNS Proxy
275
Displaying and Maintaining DNS
275
DNS Configuration Examples
275
Static Domain Name Resolution Configuration Example
275
Dynamic Domain Name Resolution Configuration Example
276
DNS Proxy Configuration Example
279
Troubleshooting DNS Configuration
280
11 IP Performance Optimization Configuration
281
IP Performance Overview
281
Enabling Reception and Forwarding of Directed Broadcasts to a Directly Connected Network
281
Enabling Reception of Directed Broadcasts to a Directly Connected Network
281
Enabling Forwarding of Directed Broadcasts to a Directly Connected Network
282
Configuration Example
282
Configuring TCP Optional Parameters
283
Configuring ICMP to Send Error Packets
284
Displaying and Maintaining IP Performance Optimization
286
12 UDP Helper Configuration
287
Introduction to UDP Helper
287
Configuring UDP Helper
287
Displaying and Maintaining UDP Helper
288
UDP Helper Configuration Examples
288
UDP Helper Configuration Example
288
13 Ipv6 Basics Configuration
290
Ipv6 Overview
290
Ipv6 Features
290
Introduction to Ipv6 Address
292
Introduction to Ipv6 Neighbor Discovery Protocol
295
Ipv6 PMTU Discovery
297
Introduction to Ipv6 DNS
298
Protocols and Standards
298
Ipv6 Basics Configuration Task List
299
Configuring Basic Ipv6 Functions
299
Enabling Ipv6
299
Configuring an Ipv6 Unicast Address
299
Configuring Ipv6 NDP
301
Configuring a Static Neighbor Entry
301
Configuring the Maximum Number of Neighbors Dynamically Learned
301
Configuring Parameters Related to RA Messages
302
Configuring the Maximum Number of Attempts to Send an NS Message for DAD
304
Configuring PMTU Discovery
304
Configuring a Static PMTU for a Specified Ipv6 Address
304
Configuring the Aging Time for Dynamic Pmtus
304
Configuring Ipv6 TCP Properties
305
Configuring Icmpv6 Packet Sending
305
Configuring the Maximum Icmpv6 Error Packets Sent in an Interval
305
Enable Sending of Multicast Echo Replies
306
Enabling Sending of Icmpv6 Time Exceeded Packets
306
Configuring Ipv6 DNS Client
307
Configuring Static Ipv6 Domain Name Resolution
307
Configuring Dynamic Ipv6 Domain Name Resolution
307
Displaying and Maintaining Ipv6 Basics Configuration
308
Ipv6 Configuration Example
309
Troubleshooting Ipv6 Basics Configuration
314
14 Dual Stack Configuration
315
Dual Stack Overview
315
Configuring Dual Stack
315
15 Sflow Configuration
317
Sflow Overview
317
Introduction to Sflow
317
Operation of Sflow
317
Configuring Sflow
318
Displaying and Maintaining Sflow
318
Sflow Configuration Example
319
Troubleshooting Sflow Configuration
320
The Remote Sflow Collector Cannot Receive Sflow Packets
320
Table of Contents
321
1 IP Routing Overview
322
IP Routing and Routing Table
322
Routing
322
Routing Table
322
Routing Protocol Overview
324
Static Routing
324
Routing Protocols and Routing Priority
324
Displaying and Maintaining a Routing Table
324
2 Static Routing Configuration
326
Introduction
326
Static Route
326
Default Route
326
Application Environment of Static Routing
327
Configuring a Static Route
327
Configuration Prerequisites
327
Configuration Procedure
327
Detecting Reachability of the Static Route's Nexthop
328
Detecting Nexthop Reachability through Track
328
Displaying and Maintaining Static Routes
329
Static Route Configuration Example
329
Basic Static Route Configuration Example
329
3 Ipv6 Static Routing Configuration
332
Introduction to Ipv6 Static Routing
332
Features of Ipv6 Static Routes
332
Default Ipv6 Route
332
Configuring an Ipv6 Static Route
332
Configuration Prerequisites
332
Configuring an Ipv6 Static Route
333
Displaying and Maintaining Ipv6 Static Routes
333
Ipv6 Static Routing Configuration Example
333
Multicast Overview/Igmp Snooping Configuration
336
1 Multicast Overview
339
Introduction to Multicast
339
Comparison of Information Transmission Techniques
339
Features of Multicast
342
Common Notations in Multicast
343
Advantages and Applications of Multicast
343
Multicast Models
343
Multicast Architecture
344
Multicast Addresses
345
Multicast Protocols
348
Multicast Packet Forwarding Mechanism
350
2 IGMP Snooping Configuration
351
IGMP Snooping Overview
351
Principle of IGMP Snooping
351
Basic Concepts in IGMP Snooping
352
How IGMP Snooping Works
353
Protocols and Standards
355
IGMP Snooping Configuration Task List
355
Configuring Basic Functions of IGMP Snooping
356
Configuration Prerequisites
356
Enabling IGMP Snooping
356
Configuring the Version of IGMP Snooping
357
Configuring IGMP Snooping Port Functions
357
Configuration Prerequisites
357
Configuring Aging Timers for Dynamic Ports
358
Configuring Static Ports
358
Configuring Simulated Joining
359
Configuring Fast Leave Processing
360
Configuring IGMP Snooping Querier
361
Configuration Prerequisites
361
Enabling IGMP Snooping Querier
361
Configuring IGMP Queries and Responses
362
Configuring Source IP Address of IGMP Queries
363
Configuring an IGMP Snooping Policy
363
Configuration Prerequisites
363
Configuring a Multicast Group Filter
364
Configuring Multicast Source Port Filtering
364
Configuring the Function of Dropping Unknown Multicast Data
365
Configuring IGMP Report Suppression
366
Configuring Maximum Multicast Groups that Can be Joined on a Port
366
Configuring Multicast Group Replacement
367
Displaying and Maintaining IGMP Snooping
368
IGMP Snooping Configuration Examples
369
Configuring Group Policy and Simulated Joining
369
Static Port Configuration
371
IGMP Snooping Querier Configuration
375
Troubleshooting IGMP Snooping Configuration
377
Switch Fails in Layer 2 Multicast Forwarding
377
Configured Multicast Group Policy Fails to Take Effect
377
3 Multicast VLAN Configuration
378
Introduction to Multicast VLAN
378
Multicast VLAN Configuration Task List
380
Configuring Sub-VLAN-Based Multicast VLAN
380
Configuration Prerequisites
380
Configuring Port-Based Multicast VLAN
381
Configuration Prerequisites
381
Configuring User Port Attributes
381
Configuring Multicast VLAN Ports
382
Displaying and Maintaining Multicast VLAN
383
Multicast VLAN Configuration Examples
383
Sub-VLAN-Based Multicast VLAN Configuration
383
Port-Based Multicast VLAN Configuration
387
4 MLD Snooping Configuration
390
MLD Snooping Overview
390
Introduction to MLD Snooping
390
Basic Concepts in MLD Snooping
391
How MLD Snooping Works
392
Protocols and Standards
394
MLD Snooping Configuration Task List
394
Configuring Basic Functions of MLD Snooping
395
Configuration Prerequisites
395
Enabling MLD Snooping
395
Configuring the Version of MLD Snooping
396
Configuring MLD Snooping Port Functions
396
Configuration Prerequisites
396
Configuring Aging Timers for Dynamic Ports
397
Configuring Static Ports
397
Configuring Simulated Joining
398
Configuring Fast Leave Processing
399
Configuring MLD Snooping Querier
400
Configuration Prerequisites
400
Enabling MLD Snooping Querier
400
Configuring MLD Queries and Responses
401
Configuring Source Ipv6 Addresses of MLD Queries
402
Configuring an MLD Snooping Policy
403
Configuration Prerequisites
403
Configuring an Ipv6 Multicast Group Filter
403
Configuring Ipv6 Multicast Source Port Filtering
404
Configuring MLD Report Suppression
405
Configuring Maximum Multicast Groups that Can be Joined on a Port
405
Configuring Ipv6 Multicast Group Replacement
406
Displaying and Maintaining MLD Snooping
407
MLD Snooping Configuration Examples
408
Configuring Ipv6 Group Policy and Simulated Joining
408
Static Port Configuration
410
MLD Snooping Querier Configuration
414
Troubleshooting MLD Snooping
415
Switch Fails in Layer 2 Multicast Forwarding
415
Configured Ipv6 Multicast Group Policy Fails to Take Effect
416
5 Ipv6 Multicast VLAN Configuration
417
Introduction to Ipv6 Multicast VLAN
417
Ipv6 Multicast VLAN Configuration Task List
419
Configuring Ipv6 Sub-VLAN-Based Ipv6 Multicast VLAN
419
Configuration Prerequisites
419
Configuring Sub-VLAN-Based Ipv6 Multicast VLAN
419
Configuring Port-Based Ipv6 Multicast VLAN
420
Configuration Prerequisites
420
Configuring User Port Attributes
420
Configuring Ipv6 Multicast VLAN Ports
421
Displaying and Maintaining Ipv6 Multicast VLAN
422
Ipv6 Multicast VLAN Configuration Examples
422
Sub-VLAN-Based Multicast VLAN Configuration Example
422
Port-Based Multicast VLAN Configuration Example
425
Table of Contents
429
1 Qos Overview
432
Introduction to Qos
432
Introduction to Qos Service Models
432
Best-Effort Service Model
432
Intserv Service Model
432
Diffserv Service Model
433
Qos Techniques Overview
433
Positions of the Qos Techniques in a Network
433
2 Qos Configuration Approaches
435
Qos Configuration Approach Overview
435
Non Policy-Based Configuration
435
Policy-Based Configuration
435
Configuring a Qos Policy
436
Defining a Class
436
Defining a Traffic Behavior
438
Defining a Policy
439
Applying the Qos Policy
439
Displaying and Maintaining Qos Policies
442
3 Priority Mapping Configuration
444
Priority Mapping Overview
444
Introduction to Priority Mapping
444
Priority Mapping Tables
444
Priority Trust Mode on a Port
445
Priority Mapping Procedure
445
Priority Mapping Configuration Tasks
446
Configuring Priority Mapping
447
Configuring a Priority Mapping Table
447
Configuring the Priority Trust Mode on a Port
447
Configuring the Port Priority of a Port
448
Displaying and Maintaining Priority Mapping
448
Priority Mapping Configuration Examples
448
Priority Mapping Table and Priority Marking Configuration Example
448
Traffic Policing, Traffic Shaping, and Line Rate Overview
452
Traffic Evaluation and Token Buckets
452
Traffic Policing
453
Traffic Shaping
454
Line Rate
455
Configuring Traffic Policing
456
Configuration Procedure
456
Configuration Example
456
Configuring the Line Rate
458
Configuration Procedure
458
Configuration Example
458
Displaying and Maintaining Traffic Policing, GTS, and Line Rate
458
5 Congestion Management Configuration
460
Congestion Management Overview
460
Causes, Impacts, and Countermeasures of Congestion
460
Congestion Management Policies
460
Congestion Management Configuration Approaches
463
Configuring Congestion Management
464
Configuring SP Queuing
464
Configure WRR Queuing
464
Configuring WFQ Queuing
465
Configuring SP+WRR Queues
466
Configuration Example
466
Configuration Example
467
Displaying and Maintaining Congestion Management
468
6 Traffic Filtering Configuration
469
Traffic Filtering Overview
469
Configuring Traffic Filtering
469
Traffic Filtering Configuration Example
470
7 Priority Marking Configuration
472
Priority Marking Overview
472
Configuring Priority Marking
472
Priority Marking Configuration Example
473
8 Traffic Redirecting Configuration
476
Traffic Redirecting Overview
476
Traffic Redirecting
476
Configuring Traffic Redirecting
476
9 Traffic Mirroring Configuration
478
Traffic Mirroring Overview
478
Configuring Traffic Mirroring
478
Mirroring Traffic to an Interface
478
Mirroring Traffic to the CPU
479
Displaying and Maintaining Traffic Mirroring
480
Traffic Mirroring Configuration Examples
480
Example for Mirroring Traffic to an Interface
480
Configuration Procedure
480
10 Class-Based Accounting Configuration
482
Class-Based Accounting Overview
482
Configuring Class-Based Accounting
482
Displaying and Maintaining Traffic Accounting
483
Class-Based Accounting Configuration Example
483
11 User Profile Configuration
485
User Profile Overview
485
User Profile Configuration Task List
485
Creating a User Profile
486
Applying a Qos Policy to User Profile
486
Enabling a User Profile
487
Displaying and Maintaining User Profile
487
12 Appendix
487
Appendix A Acronym
488
Appendix B Default Priority Mapping Tables
489
Uncolored Priority Mapping Tables
489
Appendix C Introduction to Packet Precedences
490
IP Precedence and DSCP Values
490
802.1P Priority
491
Aaa Configuration
494
Configuration Example
495
Configuration Procedure
495
1 AAA Configuration
501
Introduction to AAA
501
Introduction to RADIUS
502
Client/Server Model
502
Security and Authentication Mechanisms
503
Basic Message Exchange Process of RADIUS
503
RADIUS Packet Format
504
Extended RADIUS Attributes
507
Introduction to HWTACACS
507
Differences between HWTACACS and RADIUS
508
Basic Message Exchange Process of HWTACACS
508
Protocols and Standards
510
AAA Configuration Task List
510
RADIUS Configuration Task List
511
HWTACACS Configuration Task List
512
Configuring AAA
512
Configuration Prerequisites
512
Creating an ISP Domain
512
Configuring ISP Domain Attributes
513
Configuring AAA Authentication Methods for an ISP Domain
514
Configuring AAA Authorization Methods for an ISP Domain
515
Configuring AAA Accounting Methods for an ISP Domain
517
Configuring Local User Attributes
519
Configuring User Group Attributes
520
Tearing down User Connections Forcibly
521
Displaying and Maintaining AAA
521
Configuring RADIUS
522
Creating a RADIUS Scheme
522
Specifying the RADIUS Authentication/Authorization Servers
523
Specifying the RADIUS Accounting Servers and Relevant Parameters
523
Setting the Shared Key for RADIUS Packets
524
Setting the Upper Limit of RADIUS Request Retransmission Attempts
525
Setting the Supported RADIUS Server Type
525
Setting the Status of RADIUS Servers
526
Configuring Attributes Related to Data to be Sent to the RADIUS Server
527
Setting Timers Regarding RADIUS Servers
528
Specifying a Security Policy Server
529
Enabling the Listening Port of the RADIUS Client
530
Displaying and Maintaining RADIUS
530
Configuring HWTACACS
530
Creating a HWTACACS Scheme
531
Specifying the HWTACACS Authentication Servers
531
Specifying the Hwtacacs Authorization Servers
532
Specifying the Hwtacacs Accounting Servers
532
Setting the Shared Key for Hwtacacs Packets
533
Configuring Attributes Related to the Data Sent to Hwtacacs Server
533
Setting Timers Regarding Hwtacacs Servers
534
Aaa Configuration Examples
535
Displaying and Maintaining Hwtacacs
535
Aaa for Telnet Users by a Hwtacacs Server
535
Aaa for Telnet Users by Separate Servers
537
Aaa for Ssh Users by a Radius Server
538
Troubleshooting Aaa
542
Troubleshooting Radius
542
Troubleshooting Hwtacacs
543
X Configuration
544
X Overview
544
Architecture of 802.1X
544
Authentication Modes of 802.1X
545
Basic Concepts of 802.1X
545
Eap over Lans
546
Eap over Radius
548
X Authentication Triggering
548
Authentication Process of 802.1X
549
X Timers
552
Extensions to 802.1X
553
Features Working Together with 802.1X
553
Configuring 802.1X
555
Configuring 802.1X Globally
555
Configuring 802.1X for a Port
557
Configuring an 802.1X Port-Based Guest Vlan
558
X Configuration Example
559
Displaying and Maintaining 802.1X
559
Guest Vlan and Vlan Assignment Configuration Example
561
Acl Assignment Configuration Example
564
3 Ead Fast Deployment Configuration
566
Ead Fast Deployment Overview
566
Configuring Ead Fast Deployment
567
Displaying and Maintaining Ead Fast Deployment
568
Ead Fast Deployment Configuration Example
569
Troubleshooting Ead Fast Deployment
570
Users Cannot be Redirected Correctly
570
Introduction to Habp
571
4 Habp Configuration
571
Configuring Habp
572
Configuring the Habp Server
572
Displaying and Maintaining Habp
573
Habp Configuration Example
573
Configuring an Habp Client
573
5 Mac Authentication Configuration
575
Mac Authentication Overview
575
Related Concepts
576
Configuring Mac Authentication
576
Mac Authentication Timers
576
Quiet Mac Address
576
Vlan Assigning
576
Acl Assigning
576
Displaying and Maintaining Mac Authentication
578
Mac Authentication Configuration Examples
578
Local Mac Authentication Configuration Example
578
Radius-Based Mac Authentication Configuration Example
580
Network Requirements
581
6 Port Security Configuration
584
Introduction to Port Security
584
Port Security Features
585
Port Security Modes
585
Port Security Configuration Task List
587
Enabling Port Security
588
Setting the Maximum Number of Secure Mac Addresses
588
Setting the Port Security Mode
589
Configuring Port Security Features
590
Configuring Intrusion Protection
591
Configuring Secure Mac Addresses
592
Configuring Trapping
592
Displaying and Maintaining Port Security
593
Ignoring Authorization Information from the Server
593
Port Security Configuration Examples
594
Configuring the Autolearn Mode
594
Configuring the Userloginwithoui Mode
596
Configuring the Macaddresselseuserloginsecure Mode
600
Troubleshooting Port Security
602
Cannot Change Port Security Mode When a User Is Online
603
7 Ip Source Guard Configuration
604
Ip Source Guard Overview
604
Configuring a Static Binding Entry
604
Configuring Dynamic Binding Function
605
Ip Source Guard Configuration Examples
606
Displaying and Maintaining Ip Source Guard
606
Static Binding Entry Configuration Example
606
Dynamic Binding Function Configuration Example
607
Troubleshooting Ip Source Guard
609
Failed to Configure Static Binding Entries and Dynamic Binding Function
609
8 Ssh2.0 Configuration
610
Ssh2.0 Overview
610
Introduction to Ssh
610
Operation of Ssh
610
Configuring the Device as an Ssh Server
613
Ssh Server Configuration Task List
613
Generating a Dsa or Rsa Key Pair
613
Enabling Ssh Server
614
Configuring the User Interfaces for Ssh Clients
614
Configuring a Client Public Key
615
Configuring an Ssh User
616
Setting the Ssh Management Parameters
617
Configuring the Device as an Ssh Client
618
Ssh Client Configuration Task List
618
Specifying a Source Ip Address/Interface for the Ssh Client
618
Configuring Whether First-Time Authentication Is Supported
619
Displaying and Maintaining Ssh
620
Establishing a Connection between the Ssh Client and the Server
620
Ssh Server Configuration Examples
621
When Switch Acts as Server for Password Authentication
621
When Switch Acts as Server for Publickey Authentication
623
Ssh Client Configuration Examples
628
When Switch Acts as Client for Publickey Authentication
631
9 Sftp Configuration
633
Sftp Overview
633
Configuring an Sftp Server
633
Configuring an Sftp Client
634
Configuring the Sftp Connection Idle Timeout Period
634
Specifying a Source Ip Address or Interface for the Sftp Client
634
Establishing a Connection to the Sftp Server
634
Working with the Sftp Directories
635
Working with Sftp Files
636
Displaying Help Information
636
Terminating the Connection to the Remote Sftp Server
637
Sftp Client Configuration Example
637
Sftp Server Configuration Example
641
10 Pki Configuration
643
Introduction to Pki
643
Pki Overview
643
Pki Terms
643
Architecture of Pki
644
Pki Configuration Task List
646
Configuring an Entity Dn
646
Configuring a Pki Domain
648
Submitting a Pki Certificate Request
649
Submitting a Certificate Request in Auto Mode
650
Submitting a Certificate Request in Manual Mode
650
Retrieving a Certificate Manually
651
Configuring Pki Certificate Verification
652
Destroying a Local Rsa Key Pair
653
Deleting a Certificate
653
Configuring an Access Control Policy
654
Displaying and Maintaining Pki
654
Pki Configuration Examples
655
Requesting a Certificate from a Ca Running Rsa Keon
655
Requesting a Certificate from a Ca Running Windows 2003 Server
658
Configuring a Certificate Attribute-Based Access Control Policy
662
Troubleshooting Pki
663
Failed to Retrieve a Ca Certificate
663
Failed to Request a Local Certificate
664
Failed to Retrieve Crls
664
11 Ssl Configuration
665
Ssl Overview
665
Ssl Security Mechanism
665
Ssl Configuration Task List
666
Ssl Protocol Stack
666
Configuring an Ssl Server Policy
667
Ssl Server Policy Configuration Example
668
Configuring an Ssl Client Policy
669
Displaying and Maintaining Ssl
670
Ssl Handshake Failure
670
Troubleshooting Ssl
670
12 Public Key Configuration
672
Asymmetric Key Algorithm Overview
672
Configuring the Local Asymmetric Key Pair
673
Displaying or Exporting the Local Rsa or Dsa Host Public Key
674
Destroying an Asymmetric Key Pair
674
Configuring the Public Key of a Peer
674
Displaying and Maintaining Public Keys
675
Public Key Configuration Examples
676
Configuring the Public Key of a Peer Manually
676
Importing the Public Key of a Peer from a Public Key File
677
13 Acl Overview
680
Introduction to Acl
680
Application of Acls on the Switch
680
Introduction to Ipv4 Acl
681
Ipv4 Acl Classification
681
Ipv4 Acl Naming
681
Ipv4 Acl Match Order
682
Ipv4 Acl Step
683
Effective Period of an Ipv4 Acl
683
Ip Fragments Filtering with Ipv4 Acl
683
Introduction to Ipv6 Acl
684
Ipv6 Acl Classification
684
Ipv6 Acl Naming
684
Ipv6 Acl Match Order
684
Ipv6 Acl Step
685
Effective Period of an Ipv6 Acl
685
Acl Application
685
14 Ipv4 Acl Configuration
686
Configuring a Basic Ipv4 Acl
687
Configuring an Advanced Ipv4 Acl
689
Configuring an Ethernet Frame Header Acl
691
Copying an Ipv4 Acl
692
Displaying and Maintaining Ipv4 Acls
693
Ipv4 Acl Configuration Example
693
15 Ipv6 Acl Configuration
696
Configuring a Basic Ipv6 Acl
696
Configuring an Advanced Ipv6 Acl
697
Copying an Ipv6 Acl
699
Displaying and Maintaining Ipv6 Acls
700
Ipv6 Acl Configuration Example
700
16 Acl Application for Packet Filtering
702
Filtering Ethernet Frames
702
Filtering Ipv4 Packets
702
Filtering Ipv6 Packets
703
Configuring Packet Filtering Statistics Function
703
Acl Application Examples
704
Acl Application to an Ethernet Interface
704
Acl Application to a Vlan Interface
705
Table of Contents
706
1 Smart Link Configuration
709
Smart Link Overview
709
Terminology
710
How Smart Link Works
711
Smart Link Configuration Task List
712
Configuring a Smart Link Device
712
Configuration Prerequisites
712
Configuring Protected Vlans for a Smart Link Group
713
Configuring Member Ports for a Smart Link Group
713
Configuring Role Preemption for a Smart Link Group
714
Enabling the Sending of Flush Messages
714
Smart Link Device Configuration Example
715
Configuring an Associated Device
715
Enabling the Receiving of Flush Messages
715
Associated Device Configuration Example
716
Displaying and Maintaining Smart Link
716
Smart Link Configuration Examples
717
Single Smart Link Group Configuration Example
717
Multiple Smart Link Groups Load Sharing Configuration Example
721
2 Monitor Link Configuration
725
Overview
725
Terminology
725
How Monitor Link Works
725
Configuring Monitor Link
726
Configuration Prerequisites
726
Configuration Procedure
726
Monitor Link Configuration Example
727
Displaying and Maintaining Monitor Link
727
3 RRPP Configuration
730
RRPP Overview
730
Background
730
Basic Concepts in RRPP
731
Rrppdus
733
RRPP Timers
734
How RRPP Works
734
Typical RRPP Networking
735
Protocols and Standards
738
Rrpp Configuration Task List
738
Creating an RRPP Domain
739
Configuring Control Vlans
739
Configuring Protected Vlans
739
Configuring RRPP Rings
739
Configuring Rrpp Ports
741
Configuring Rrpp Nodes
742
Activating an Rrpp Domain
744
Configuring Rrpp Timers
744
Configuring an Rrpp Ring Group
745
Displaying and Maintaining Rrpp
746
Rrpp Configuration Examples
746
Intersecting Ring Configuration Example
748
Received Packets
750
Intersecting-Ring Load Balancing Configuration Example
753
Troubleshooting
763
4 Dldp Configuration
764
How Dldp Works
765
Dldp Configuration Task List
771
Enabling Dldp
771
Setting Dldp Mode
772
Setting the Interval for Sending Advertisement Packets
772
Setting the Delaydown Timer
773
Setting the Port Shutdown Mode
773
Configuring Dldp Authentication
774
Resetting Dldp State
774
Displaying and Maintaining Dldp
775
Resetting Dldp State in System View
775
Resetting Dldp State in Port View/Port Group View
775
Dldp Configuration Example
776
5 Ethernet Oam Configuration
779
Ethernet Oam Overview
779
Major Functions of Ethernet Oam
779
Ethernet Oampdus
779
How Ethernet Oam Works
781
Standards and Protocols
783
Ethernet Oam Configuration Task List
783
Configuring Link Monitoring
784
Configuring Basic Ethernet Oam Functions
784
Configuring Errored Symbol Event Detection
785
Configuring Errored Frame Event Detection
785
Configuring Errored Frame Period Event Detection
785
Configuring Errored Frame Seconds Event Detection
785
Enabling Oam Remote Loopback
786
Displaying and Maintaining Ethernet Oam Configuration
787
Ethernet Oam Configuration Example
787
6 Connectivity Fault Detection Configuration
790
Basic Concepts in Cfd
790
Basic Functions of Cfd
793
Basic Configuration Tasks
794
Cfd Configuration Task List
794
Configuring Mip Generation Rules
796
Configuring CC on Meps
797
Configuring Lt on Meps
798
Displaying and Maintaining Cfd
799
Cfd Configuration Examples
799
Configuring Mep and Enabling CC on It
800
Configuring the Rules for Generating Mips
802
Configuring Lb on Meps
803
Track Overview
804
7 Track Configuration
804
Collaboration between the Track Module and the Detection Modules
804
Track Configuration Task List
805
Configuring Collaboration between the Track Module and the Detection Modules
805
Configuring Collaboration between the Track Module and the Application Modules
806
Configuring Track-Static Routing Collaboration
806
Displaying and Maintaining Track Object(S)
807
Track Configuration Examples
807
Static Routing-Track-Nqa Collaboration Configuration Example
807
Table of Contents
810
1 Logging in to an Ethernet Switch
820
Introduction to User Interface
820
Supported User Interfaces
820
Users and User Interfaces
821
User Interface Number
821
Common User Interface Configuration
821
2 Logging in through the Console Port
823
Introduction
823
Setting up the Connection to the Console Port
823
Setting up Connection to Console Port
823
Console Port Login Configuration
825
Common Configuration
825
Console Port Login Configurations for Different Authentication Modes
827
Console Port Login Configuration with Authentication Mode Being None
827
Configuration Procedure
827
Configuration Example
828
Console Port Login Configuration with Authentication Mode Being Password
829
Configuration Procedure
829
Configuration Example
829
Console Port Login Configuration with Authentication Mode Being Scheme
831
Configuration Procedure
831
Configuration Example
832
Configuring Command Authorization
833
Configuring Command Accounting
834
3 Logging in through Telnet/Ssh
835
Logging in through Telnet
835
Introduction
835
Common Configuration
835
Telnet Connection Establishment
835
Telnet Login Configuration Task List
838
Telnet Login Configuration with Authentication Mode Being None
839
Telnet Login Configuration with Authentication Mode Being Password
840
Telnet Login Configuration with Authentication Mode Being Scheme
842
Logging in through SSH
844
Configuring Command Authorization
844
Configuring Command Accounting
845
4 User Interface Configuration Examples
846
User Authentication Configuration Example
846
Network Diagram
846
Configuration Procedure
846
Command Authorization Configuration Example
847
Network Diagram
847
Command Accounting Configuration Example
849
Web Server Configuration
851
Displaying Web Users
852
Connection Establishment Using Nms
854
6 Logging in through Nms
854
7 Specifying Source for Telnet Packets
855
Specifying Source Ip Address/Interface for Telnet Packets
855
Displaying the Source Ip Address/Interface Specified for Telnet Packets
856
Controlling Telnet Users
857
8 Controlling Login Users
857
Controlling Telnet Users by Source and Destination Ip Addresses
858
Controlling Telnet Users by Source Mac Addresses
859
Controlling Network Management Users by Source Ip Addresses
860
Controlling Web Users by Source Ip Addresses
862
Configuration Display
864
Basic Configurations
864
9 Basic System Configurations
864
Entering/Exiting System View
865
Configuring the Device Name
865
Configuring the System Clock
865
Enabling/Disabling the Display of Copyright Information
868
Configuring a Banner
869
Configuring Cli Hotkeys
870
Configuring Command Aliases
871
Configuring User Privilege Levels and Command Levels
872
Displaying and Maintaining Basic Configurations
877
Cli Features
878
Introduction to Cli
878
Online Help with Command Lines
879
Synchronous Information Output
880
Undo Form of a Command
880
Editing Features
880
Cli Display
881
Saving History Commands
884
Command Line Error Information
885
10 Device Management
886
Device Management Overview
886
Device Management Configuration Task List
886
Configuring the Exception Handling Method
886
Rebooting a Device
887
Configuring the Scheduled Automatic Execution Function
888
Upgrading Device Software
889
Device Software Overview
889
Upgrading the Boot Rom Program through Command Lines
890
Upgrading the Boot File through Command Lines
890
Disabling Boot Rom Access
891
Configuring a Detection Interval
891
Clearing the 16-Bit Interface Indexes Not Used in the Current System
892
Identifying and Diagnosing Pluggable Transceivers
892
Introduction to Pluggable Transceivers
892
Identifying Pluggable Transceivers
893
Displaying and Maintaining Device Management Configuration
894
Diagnosing Pluggable Transceivers
894
Device Management Configuration Examples
895
Remote Scheduled Automatic Upgrade Configuration Example (Centralized Device)
895
Remote Scheduled Automatic Upgrade Configuration Example (Centralized Irf Device)
896
11 File System Management
899
File System Management Configuration
899
Directory Operations
900
File Operations
901
Batch Operations
903
Setting File System Prompt Modes
904
Storage Medium Operations
904
Configuration File Management
905
File System Operations Example
905
Configuration File Overview
906
Saving the Current Configuration
907
Setting Configuration Rollback
909
Backing up the Startup Configuration File
913
Specifying a Startup Configuration File for the Next System Startup
913
Deleting the Startup Configuration File for the Next Startup
914
Restoring the Startup Configuration File
914
Displaying and Maintaining Device Configuration
915
12 Ftp Configuration
916
Ftp Overview
916
Introduction to Ftp
916
Operation of Ftp
916
Configuring the Ftp Client
918
Establishing an Ftp Connection
918
Ftp Client Configuration Example
921
Configuring the Ftp Server
924
Configuring Ftp Server Operating Parameters
924
Configuring Authentication and Authorization on the Ftp Server
925
Ftp Server Configuration Example
926
Displaying and Maintaining Ftp
930
13 Tftp Configuration
931
Tftp Overview
931
Introduction to Tftp
931
Operation of Tftp
931
Configuring the Tftp Client
932
Displaying and Maintaining the Tftp Client
933
Tftp Client Configuration Example
934
14 Http Configuration
937
Http Overview
937
Enabling the Http Service
937
Configuring the Port Number of the Http Service
938
Associating the Http Service with an Acl
938
Displaying and Maintaining Http
938
15 Https Configuration
939
Https Overview
939
Https Configuration Task List
939
Associating the Https Service with an Ssl Server Policy
940
Enabling the Https Service
940
Associating the Https Service with a Certificate Attribute Access Control Policy
941
Configuring the Port Number of the Https Service
941
Associating the Https Service with an Acl
942
Displaying and Maintaining Https
942
Https Configuration Example
942
16 Snmp Configuration
945
Snmp Overview
945
Snmp Protocol Version
946
Mib Overview
946
Configuring Snmp Logging
949
Introduction to Snmp Logging
949
Enabling Snmp Logging
949
Snmp Trap Configuration
950
Enabling the Trap Function
950
Configuring Trap Parameters
951
Displaying and Maintaining Snmp
952
Snmp Configuration Example
953
Snmp Logging Configuration Example
954
17 Mib Style Configuration
956
Setting the Mib Style
956
Displaying and Maintaining Mib
956
18 Rmon Configuration
957
Rmon Overview
957
Working Mechanism
957
Rmon Groups
958
Configuring Rmon
959
Displaying and Maintaining Rmon
961
Rmon Configuration Example
961
19 Mac Address Table Management Configuration
963
Introduction to Mac Address Table
963
Types of Mac Address Table Entries
964
Mac Address Table-Based Frame Forwarding
964
Configuring Mac Address Table Management
965
Configuring the Aging Timer for Dynamic Mac Address Entries
966
Configuring the Mac Learning Limit
966
Displaying and Maintaining Mac Address Table Management
967
Mac Address Table Management Configuration Example
967
Mac Information Configuration
969
Configuring Mac Information
969
Enabling Mac Information on an Interface
970
Configuring Mac Information Mode
970
Configuring the Interval for Sending Syslog or Trap Messages
970
Configuring the Mac Information Queue Length
970
21 System Maintenance and Debugging
973
Ping Configuration Example
974
Configuring Tracert
976
System Debugging
977
Introduction to System Debugging
977
Ping and Tracert Configuration Example
978
22 Information Center Configuration
980
Information Center Overview
980
System Information Format
983
Configuring Information Center
985
Information Center Configuration Task List
985
Outputting System Information to the Console
985
Outputting System Information to a Monitor Terminal
986
Outputting System Information to a Log Host
987
Outputting System Information to the Trap Buffer
988
Outputting System Information to the Log Buffer
989
Outputting System Information to the Snmp Module
990
Configuring Synchronous Information Output
990
Disabling a Port from Generating Link Up/Down Logging Information
991
Displaying and Maintaining Information Center
992
Information Center Configuration Examples
992
Outputting Log Information to a Unix Log Host
992
Outputting Log Information to a Linux Log Host
994
Outputting Log Information to the Console
996
23 Hotfix Configuration
998
Hotfix Overview
998
Basic Concepts in Hotfix
998
Patch Status
998
Hotfix Configuration Task List
1001
One-Step Patch Installation
1002
Step-By-Step Patch Installation
1003
Activating Patches
1004
Confirm Running Patches
1004
One-Step Patch Uninstallation
1005
Step-By-Step Patch Uninstallation
1005
Displaying and Maintaining Hotfix
1006
Hotfix Configuration Examples
1006
Hotfix Configuration Example (Irf Device)
1007
24 Nqa Configuration
1009
Nqa Overview
1009
Introduction to Nqa
1009
Features of Nqa
1009
Basic Concepts of Nqa
1011
Nqa Configuration Task List
1012
Nqa Test Operation
1012
Configuring the Nqa Server
1013
Enabling the Nqa Client
1013
Creating an Nqa Test Group
1013
Configuring an Nqa Test Group
1014
Configuring an Icmp Echo Test
1014
Configuring a Dhcp Test
1015
Configuring an Ftp Test
1016
Configuring an Http Test
1017
Configuring a Udp Jitter Test
1018
Configuring an Snmp Test
1020
Configuring a Tcp Test
1021
Configuring a Udp Echo Test
1022
Configuring a Voice Test
1023
Configuring a Dlsw Test
1025
Configuring the Collaboration Function
1026
Configuring Trap Delivery
1027
Configuring Optional Parameters Common to an Nqa Test Group
1028
Configuring the Nqa Statistics Function
1028
Scheduling an Nqa Test Group
1030
Displaying and Maintaining Nqa
1031
Nqa Configuration Examples
1031
Icmp Echo Test Configuration Example
1031
Dhcp Test Configuration Example
1032
Ftp Test Configuration Example
1033
Http Test Configuration Example
1034
Udp Jitter Test Configuration Example
1036
Snmp Test Configuration Example
1038
Tcp Test Configuration Example
1039
Udp Echo Test Configuration Example
1041
Voice Test Configuration Example
1042
Dlsw Test Configuration Example
1045
Nqa Collaboration Configuration Example
1046
25 Ntp Configuration
1049
Ntp Overview
1049
Applications of Ntp
1049
Advantages of Ntp
1049
How Ntp Works
1050
Ntp Message Format
1051
Operation Modes of Ntp
1052
Ntp Configuration Task List
1054
Multiple Instances of Ntp
1054
Configuring the Operation Modes of Ntp
1055
Configuring the Ntp Symmetric Peers Mode
1056
Configuring Optional Parameters of Ntp
1058
Specifying the Source Interface for Ntp Messages
1058
Disabling an Interface from Receiving Ntp Messages
1059
Configuring the Maximum Number of Dynamic Sessions Allowed
1059
Configuring Access-Control Rights
1059
Configuring Ntp Authentication
1060
Displaying and Maintaining Ntp
1062
Ntp Configuration Examples
1063
Configuring the Ntp Symmetric Mode
1064
Configuring Ntp Multicast Mode
1067
Configuring Ntp Client/Server Mode with Authentication
1070
Configuring Ntp Broadcast Mode with Authentication
1071
Cluster Management Configuration
1074
Cluster Management Overview
1074
How a Cluster Works
1075
Cluster Configuration Task List
1078
Configuring the Management Device
1080
Enabling Ndp Globally and for Specific Ports
1080
Configuring Ndp Parameters
1081
Enabling Ntdp Globally and for Specific Ports
1081
Configuring Ntdp Parameters
1081
Manually Collecting Topology Information
1082
Enabling the Cluster Function
1083
Establishing a Cluster
1083
Cluster Member Management
1085
Configuring the Member Devices
1086
Configuring Access between the Management Device and Its Member Devices
1086
Adding a Candidate Device to a Cluster
1087
Configuring Advanced Cluster Functions
1088
Configuring Topology Management
1088
Configuring Interaction for a Cluster
1089
Snmp Configuration Synchronization Function
1090
Configuring Web User Accounts in Batches
1091
Displaying and Maintaining Cluster Management
1092
Cluster Management Configuration Example
1092
27 Irf Configuration
1096
Irf Overview
1096
Irf Working Process
1097
Irf Connections
1097
Topology Collection
1102
Role Election
1102
Irf Management
1103
Irf Configuration Task List
1106
Configuring Irf Ports
1107
Setting a Member ID for a Device
1108
Specifying a Priority for an Irf Member
1109
Specifying the Preservation Time of Irf Bridge Mac Address
1109
Enabling Auto Upgrade of Boot Files
1110
Setting the Delay Time for the Link Layer to Report a Link-Down Event
1111
Logging in to an Irf
1112
Logging in to the Master
1112
Logging in to a Slave
1112
Displaying and Maintaining Irf
1113
Irf Configuration Examples
1113
Irf Connection Configuration Example
1113
Configure Switch
1114
28 Ipc Configuration
1115
Ipc Overview
1115
Enabling Ipc Performance Statistics
1116
Displaying and Maintaining Ipc
1117
29 Poe Configuration
1118
Poe Overview
1118
Introduction to Poe
1118
Poe Configuration Task List
1119
Configuring the Poe Interface
1119
Protocol Specification
1119
Configuring a Poe Interface through the Command Line
1120
Configuring Poe Interfaces through a Poe Configuration File
1120
Configuring Poe Power Management
1121
Configuring Pd Power Management
1121
Configuring the Poe Monitoring Function
1122
Upgrading Pse Processing Software Online
1123
Configuring a Pd Disconnection Detection Mode
1123
Enabling the Pse to Detect Nonstandard Pds
1124
Displaying and Maintaining Poe
1124
Poe Configuration Example
1125
Troubleshooting Poe
1126
30 Automatic Configuration
1127
Introduction to Automatic Configuration
1127
Typical Networking of Automatic Configuration
1127
How Automatic Configuration Works
1128
Work Flow of Automatic Configuration
1128
Configuration File
1129
Obtaining the Ip Address of an Interface and Related Information through Dhcp
1129
Obtaining the Configuration File from the Tftp Server
1131
Executing the Configuration File
1133
Advertisement
Advertisement
Related Products
3Com 4210 Series
3Com 4210G Series
3Com 4210 PWR
3Com Switch 4210 18-Port
3Com Switch 4210 26-Port
3Com 4210G NT
3Com 4210G 24-Port
3Com 4210G 48-Port
3Com 4210G NT 24-Port
3Com 4200G Family - L2 and Static L3
3Com Categories
Switch
Network Router
Wireless Access Point
Modem
Network Card
More 3Com Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL