Sign In
Upload
Manuals
Brands
3Com Manuals
Switch
4210G Series
3Com 4210G Series Manuals
Manuals and User Guides for 3Com 4210G Series. We have
2
3Com 4210G Series manuals available for free PDF download: Configuration Manual, Getting Started Manual
3Com 4210G Series Configuration Manual (1133 pages)
24-Port/48-Port
Brand:
3Com
| Category:
Switch
| Size: 12.77 MB
Table of Contents
Table of Contents
6
Configuration Guide
1
About this Manual
3
Obtaining Documentation
5
Related Documentation
5
1 Product Features
7
Introduction to Product
7
Feature Lists
7
2 Features
9
Access Volume
9
IP Services Volume
11
IP Routing Volume
13
Multicast Volume
13
Qos Volume
14
Security Volume
15
High Availability Volume
17
System Volume
18
Table of Contents
35
1 Ethernet Port Configuration
40
Combo Port Configuration
40
Basic Ethernet Interface Configuration
41
Configuring Flow Control on an Ethernet Interface
42
Configuring the Suppression Time of Physical-Link-State Change on an Ethernet Interface
42
Configuring Loopback Testing on an Ethernet Interface
43
Configuring a Port Group
43
Configuring an Auto-Negotiation Transmission Rate
44
Configuring Storm Suppression
45
Setting the Interval for Collecting Ethernet Interface Statistics
46
Enabling Forwarding of Jumbo Frames
46
Enabling Loopback Detection on an Ethernet Interface
47
Configuring the MDI Mode for an Ethernet Interface
48
Testing the Cable on an Ethernet Interface
49
Configuring the Storm Constrain Function on an Ethernet Interface
49
Displaying and Maintaining an Ethernet Interface
51
2 Link Aggregation Configuration
52
Overview
52
Basic Concepts of Link Aggregation
52
Link Aggregation Modes
55
Load Sharing Mode of an Aggregation Group
57
Link Aggregation Configuration Task List
57
Configuring an Aggregation Group
57
Configuring a Static Aggregation Group
57
Configuring a Dynamic Aggregation Group
58
Configuring an Aggregate Interface
59
Configuring the Description of an Aggregate Interface
59
Enabling Linkup/Linkdown Trap Generation for an Aggregate Interface
59
Shutting down an Aggregate Interface
60
Configuring a Load Sharing Mode for Load-Sharing Link Aggregation Groups
60
Displaying and Maintaining Link Aggregation
61
Link Aggregation Configuration Examples
62
Layer 2 Static Aggregation Configuration Example
62
Layer 2 Dynamic Aggregation Configuration Example
63
Layer 2 Aggregation Load Sharing Mode Configuration Example
64
3 Port Isolation Configuration
66
Introduction to Port Isolation
66
Configuring the Isolation Group
66
Assigning a Port to the Isolation Group
66
Displaying and Maintaining Isolation Groups
67
Port Isolation Configuration Example
67
4 MSTP Configuration
69
Overview
69
Introduction to STP
69
Why STP
69
Protocol Packets of STP
69
Basic Concepts in STP
70
How STP Works
71
Introduction to RSTP
77
Introduction to MSTP
78
Why MSTP
78
Basic Concepts in MSTP
79
How MSTP Works
82
Implementation of MSTP on Devices
83
Protocols and Standards
83
MSTP Configuration Task List
83
Configuring MSTP
85
Configuring an MST Region
85
Configuring the Root Bridge or a Secondary Root Bridge
86
Configuring the Work Mode of an MSTP Device
87
Configuring the Priority of a Device
87
Configuring the Maximum Hops of an MST Region
88
Configuring the Network Diameter of a Switched Network
88
Configuring Timers of MSTP
89
Configuring the Timeout Factor
90
Configuring the Maximum Port Rate
91
Configuring Ports as Edge Ports
91
Configuring Path Costs of Ports
92
Configuring Port Priority
94
Configuring the Link Type of Ports
95
Configuring the Mode a Port Uses to Recognize/Send MSTP Packets
95
Enabling the Output of Port State Transition Information
96
Enabling the MSTP Feature
97
Performing Mcheck
97
Configuring Digest Snooping
98
Configuring no Agreement Check
100
Configuring Protection Functions
102
Enabling BPDU Dropping
105
Displaying and Maintaining MSTP
106
MSTP Configuration Example
106
5 LLDP Configuration
111
Overview
111
Background
111
Basic Concepts
111
Operating Modes of LLDP
115
How LLDP Works
116
Protocols and Standards
116
LLDP Configuration Task List
116
Performing Basic LLDP Configuration
117
Enabling LLDP
117
Setting LLDP Operating Mode
117
Setting the LLDP Re-Initialization Delay
118
Enabling LLDP Polling
118
Configuring the Tlvs to be Advertised
118
Configuring the Management Address and Its Encoding Format
119
Setting Other LLDP Parameters
120
Setting an Encapsulation Format for Lldpdus
120
Configuring CDP Compatibility
121
Configuration Prerequisites
121
Configuring CDP Compatibility
122
Configuring LLDP Trapping
122
Displaying and Maintaining LLDP
123
LLDP Configuration Examples
123
Basic LLDP Configuration Example
123
Configuration Procedure
124
CDP-Compatible LLDP Configuration Example
126
6 VLAN Configuration
128
Introduction to VLAN
128
VLAN Overview
128
VLAN Fundamentals
129
Types of VLAN
130
Configuring Basic VLAN Settings
130
Configuring Basic Settings of a VLAN Interface
131
Port-Based VLAN Configuration
132
Introduction to Port-Based VLAN
132
Assigning an Access Port to a VLAN
133
Assigning a Trunk Port to a VLAN
135
Assigning a Hybrid Port to a VLAN
136
MAC-Based VLAN Configuration
137
Introduction to MAC-Based VLAN
137
Configuring a MAC Address-Based VLAN
138
Protocol-Based VLAN Configuration
139
Introduction to Protocol-Based VLAN
139
Configuring a Protocol-Based VLAN
139
IP Subnet-Based VLAN Configuration
141
Introduction
141
Configuring an IP Subnet-Based VLAN
141
Displaying and Maintaining VLAN
142
VLAN Configuration Example
143
7 Isolate-User-VLAN Configuration
146
Overview
146
Configuring Isolate-User-VLAN
146
Displaying and Maintaining Isolate-User-VLAN
148
Isolate-User-VLAN Configuration Example
148
8 Voice VLAN Configuration
151
Overview
151
OUI Addresses
151
Voice VLAN Assignment Modes
152
Security Mode and Normal Mode of Voice Vlans
153
Configuring a Voice VLAN
154
Configuration Prerequisites
154
Setting a Port to Operate in Automatic Voice VLAN Assignment Mode
154
Setting a Port to Operate in Manual Voice VLAN Assignment Mode
155
Displaying and Maintaining Voice VLAN
156
Voice VLAN Configuration Examples
156
Automatic Voice VLAN Mode Configuration Example
156
Manual Voice VLAN Assignment Mode Configuration Example
158
9 GVRP Configuration
161
Introduction to GVRP
161
Garp
161
Gvrp
164
Protocols and Standards
164
GVRP Configuration Task List
164
Configuring GVRP Functions
164
Configuring GARP Timers
165
Displaying and Maintaining GVRP
166
GVRP Configuration Examples
167
Gvrp Configuration Example I
167
GVRP Configuration Example II
168
GVRP Configuration Example III
169
10 Qinq Configuration
171
Introduction to Qinq
171
Background
171
Qinq Mechanism and Benefits
171
Qinq Frame Structure
172
Implementations of Qinq
173
Modifying the TPID in a VLAN Tag
173
Qinq Configuration Task List
175
Configuring Basic Qinq
175
Enabling Basic Qinq
175
Configuring Selective Qinq
175
Configuring Selective Qinq Based on Ports
176
Configuring Selective Qinq through Qos Policies
176
Configuring the TPID Value in VLAN Tags
177
Qinq Configuration Examples
178
Basic Qinq Configuration Example
178
Selective Qinq Configuration Example (Port-Based Configuration)
180
Selective Qinq Configuration Example (Qos Policy-Based Configuration)
183
11 BPDU Tunneling Configuration
187
Introduction to BPDU Tunneling
187
Background
187
BPDU Tunneling Implementation
188
Configuring BPDU Tunneling
190
Configuration Prerequisites
190
Enabling BPDU Tunneling
190
Configuring Destination Multicast MAC Address for Bpdus
191
BPDU Tunneling Configuration Examples
191
BPDU Tunneling for STP Configuration Example
191
BPDU Tunneling for PVST Configuration Example
193
12 Port Mirroring Configuration
195
Introduction to Port Mirroring
195
Classification of Port Mirroring
195
Implementing Port Mirroring
195
Configuring Local Port Mirroring
197
Configuring Remote Port Mirroring
198
Configuration Prerequisites
198
Configuring a Remote Source Mirroring Group (on the Source Device)
198
Configuring a Remote Destination Mirroring Group (on the Destination Device)
200
Displaying and Maintaining Port Mirroring
201
Port Mirroring Configuration Examples
201
Local Port Mirroring Configuration Example
201
Remote Port Mirroring Configuration Example
202
Table of Contents
205
1 IP Addressing Configuration
210
IP Addressing Overview
210
IP Address Classes
210
Special IP Addresses
211
Subnetting and Masking
211
Configuring IP Addresses
212
Assigning an IP Address to an Interface
212
IP Addressing Configuration Example
213
Displaying and Maintaining IP Addressing
214
2 ARP Configuration
215
ARP Overview
215
ARP Function
215
ARP Message Format
215
ARP Address Resolution Process
216
ARP Table
217
Configuring ARP
217
Configuring a Static ARP Entry
217
Configuring the Maximum Number of ARP Entries for a Interface
218
Setting the Aging Time for Dynamic ARP Entries
218
Enabling the ARP Entry Check
219
ARP Configuration Example
219
Configuring Gratuitous ARP
219
Introduction to Gratuitous ARP
219
Configuring Gratuitous ARP
220
Displaying and Maintaining ARP
220
3 Proxy ARP Configuration
221
Proxy ARP Overview
221
Proxy ARP
221
Local Proxy ARP
222
Enabling Proxy ARP
222
Displaying and Maintaining Proxy ARP
223
Proxy ARP Configuration Examples
223
Proxy ARP Configuration Example
223
Local Proxy ARP Configuration Example in Case of Port Isolation
224
Local Proxy ARP Configuration Example in Isolate-User-Vlan
225
4 ARP Attack Defense Configuration
227
Configuring ARP Source Suppression
227
Introduction to ARP Source Suppression
227
Displaying and Maintaining ARP Source Suppression
228
Configuring ARP Defense against IP Packet Attacks
228
Introduction to ARP Defense against IP Packet Attacks
228
Enabling ARP Defense against IP Packet Attacks
228
Configuring ARP Active Acknowledgement
228
Introduction
228
Configuring the ARP Active Acknowledgement Function
229
Configuring Source MAC Address Based ARP Attack Detection
229
Introduction
229
Configuration Procedure
229
Displaying and Maintaining Source MAC Address Based ARP Attack Detection
230
Configuring ARP Packet Source MAC Address Consistency Check
230
Introduction
230
Configuring ARP Packet Source MAC Address Consistency Check
231
Configuring ARP Packet Rate Limit
231
Introduction
231
Configuring the ARP Packet Rate Limit Function
231
Configuring ARP Detection
231
Introduction to ARP Detection
231
IP-To-MAC Bindings
233
Configuring ARP Detection Based on Specified Objects
234
Displaying and Maintaining ARP Detection
235
Arp Detection Configuration Example I
235
ARP Detection Configuration Example II
236
5 DHCP Overview
238
Introduction to DHCP
238
DHCP Address Allocation
239
Allocation Mechanisms
239
Dynamic IP Address Allocation Process
239
IP Address Lease Extension
240
DHCP Message Format
240
DHCP Options
241
DHCP Options Overview
241
Introduction to DHCP Options
241
Self-Defined Options
242
Protocols and Standards
245
6 DHCP Relay Agent Configuration
246
Introduction to DHCP Relay Agent
246
Application Environment
246
Fundamentals
246
Dhcp Relay Agent Support for Option
247
DHCP Relay Agent Configuration Task List
248
Configuring the DHCP Relay Agent
248
Enabling DHCP
248
Enabling the DHCP Relay Agent on an Interface
249
Correlating a DHCP Server Group with a Relay Agent Interface
249
Configuring the DHCP Relay Agent Security Functions
250
Configuring the DHCP Relay Agent to Send a DHCP-Release Request
252
Configuring the DHCP Relay Agent to Support Option 82
252
Displaying and Maintaining DHCP Relay Agent Configuration
254
DHCP Relay Agent Configuration Examples
254
DHCP Relay Agent Configuration Example
254
DHCP Relay Agent Option 82 Support Configuration Example
255
Troubleshooting DHCP Relay Agent Configuration
256
7 DHCP Client Configuration
257
Introduction to DHCP Client
257
Enabling the DHCP Client on an Interface
257
Displaying and Maintaining the DHCP Client
258
DHCP Client Configuration Example
258
8 DHCP Snooping Configuration
260
DHCP Snooping Overview
260
Function of DHCP Snooping
260
Application Environment of Trusted Ports
261
DHCP Snooping Support for Option 82
262
Configuring DHCP Snooping Basic Functions
263
Prerequisites
264
Configuring Dhcp Snooping to Support Option 82
264
Displaying and Maintaining DHCP Snooping
266
DHCP Snooping Configuration Examples
266
DHCP Snooping Configuration Example
266
DHCP Snooping Option 82 Support Configuration Example
267
9 BOOTP Client Configuration
268
Introduction to BOOTP Client
268
BOOTP Application
268
Obtaining an IP Address Dynamically
269
Protocols and Standards
269
Configuring an Interface to Dynamically Obtain an IP Address through BOOTP
269
Displaying and Maintaining BOOTP Client Configuration
270
BOOTP Client Configuration Example
270
10 DNS Configuration
271
DNS Overview
271
Static Domain Name Resolution
271
Dynamic Domain Name Resolution
271
DNS Proxy
273
Configuring the DNS Client
274
Configuring Static Domain Name Resolution
274
Configuring Dynamic Domain Name Resolution
274
Configuring the DNS Proxy
275
Displaying and Maintaining DNS
275
DNS Configuration Examples
275
Static Domain Name Resolution Configuration Example
275
Dynamic Domain Name Resolution Configuration Example
276
DNS Proxy Configuration Example
279
Troubleshooting DNS Configuration
280
11 IP Performance Optimization Configuration
281
IP Performance Overview
281
Enabling Reception and Forwarding of Directed Broadcasts to a Directly Connected Network
281
Enabling Reception of Directed Broadcasts to a Directly Connected Network
281
Enabling Forwarding of Directed Broadcasts to a Directly Connected Network
282
Configuration Example
282
Configuring TCP Optional Parameters
283
Configuring ICMP to Send Error Packets
284
Displaying and Maintaining IP Performance Optimization
286
12 UDP Helper Configuration
287
Introduction to UDP Helper
287
Configuring UDP Helper
287
Displaying and Maintaining UDP Helper
288
UDP Helper Configuration Examples
288
UDP Helper Configuration Example
288
13 Ipv6 Basics Configuration
290
Ipv6 Overview
290
Ipv6 Features
290
Introduction to Ipv6 Address
292
Introduction to Ipv6 Neighbor Discovery Protocol
295
Ipv6 PMTU Discovery
297
Introduction to Ipv6 DNS
298
Protocols and Standards
298
Ipv6 Basics Configuration Task List
299
Configuring Basic Ipv6 Functions
299
Enabling Ipv6
299
Configuring an Ipv6 Unicast Address
299
Configuring Ipv6 NDP
301
Configuring a Static Neighbor Entry
301
Configuring the Maximum Number of Neighbors Dynamically Learned
301
Configuring Parameters Related to RA Messages
302
Configuring the Maximum Number of Attempts to Send an NS Message for DAD
304
Configuring PMTU Discovery
304
Configuring a Static PMTU for a Specified Ipv6 Address
304
Configuring the Aging Time for Dynamic Pmtus
304
Configuring Ipv6 TCP Properties
305
Configuring Icmpv6 Packet Sending
305
Configuring the Maximum Icmpv6 Error Packets Sent in an Interval
305
Enable Sending of Multicast Echo Replies
306
Enabling Sending of Icmpv6 Time Exceeded Packets
306
Configuring Ipv6 DNS Client
307
Configuring Static Ipv6 Domain Name Resolution
307
Configuring Dynamic Ipv6 Domain Name Resolution
307
Displaying and Maintaining Ipv6 Basics Configuration
308
Ipv6 Configuration Example
309
Troubleshooting Ipv6 Basics Configuration
314
14 Dual Stack Configuration
315
Dual Stack Overview
315
Configuring Dual Stack
315
15 Sflow Configuration
317
Sflow Overview
317
Introduction to Sflow
317
Operation of Sflow
317
Configuring Sflow
318
Displaying and Maintaining Sflow
318
Sflow Configuration Example
319
Troubleshooting Sflow Configuration
320
The Remote Sflow Collector Cannot Receive Sflow Packets
320
Table of Contents
321
1 IP Routing Overview
322
IP Routing and Routing Table
322
Routing
322
Routing Table
322
Routing Protocol Overview
324
Static Routing
324
Routing Protocols and Routing Priority
324
Displaying and Maintaining a Routing Table
324
2 Static Routing Configuration
326
Introduction
326
Static Route
326
Default Route
326
Application Environment of Static Routing
327
Configuring a Static Route
327
Configuration Prerequisites
327
Configuration Procedure
327
Detecting Reachability of the Static Route's Nexthop
328
Detecting Nexthop Reachability through Track
328
Displaying and Maintaining Static Routes
329
Static Route Configuration Example
329
Basic Static Route Configuration Example
329
3 Ipv6 Static Routing Configuration
332
Introduction to Ipv6 Static Routing
332
Features of Ipv6 Static Routes
332
Default Ipv6 Route
332
Configuring an Ipv6 Static Route
332
Configuration Prerequisites
332
Configuring an Ipv6 Static Route
333
Displaying and Maintaining Ipv6 Static Routes
333
Ipv6 Static Routing Configuration Example
333
Multicast Overview/Igmp Snooping Configuration
336
1 Multicast Overview
339
Introduction to Multicast
339
Comparison of Information Transmission Techniques
339
Features of Multicast
342
Common Notations in Multicast
343
Advantages and Applications of Multicast
343
Multicast Models
343
Multicast Architecture
344
Multicast Addresses
345
Multicast Protocols
348
Multicast Packet Forwarding Mechanism
350
2 IGMP Snooping Configuration
351
IGMP Snooping Overview
351
Principle of IGMP Snooping
351
Basic Concepts in IGMP Snooping
352
How IGMP Snooping Works
353
Protocols and Standards
355
IGMP Snooping Configuration Task List
355
Configuring Basic Functions of IGMP Snooping
356
Configuration Prerequisites
356
Enabling IGMP Snooping
356
Configuring the Version of IGMP Snooping
357
Configuring IGMP Snooping Port Functions
357
Configuration Prerequisites
357
Configuring Aging Timers for Dynamic Ports
358
Configuring Static Ports
358
Configuring Simulated Joining
359
Configuring Fast Leave Processing
360
Configuring IGMP Snooping Querier
361
Configuration Prerequisites
361
Enabling IGMP Snooping Querier
361
Configuring IGMP Queries and Responses
362
Configuring Source IP Address of IGMP Queries
363
Configuring an IGMP Snooping Policy
363
Configuration Prerequisites
363
Configuring a Multicast Group Filter
364
Configuring Multicast Source Port Filtering
364
Configuring the Function of Dropping Unknown Multicast Data
365
Configuring IGMP Report Suppression
366
Configuring Maximum Multicast Groups that Can be Joined on a Port
366
Configuring Multicast Group Replacement
367
Displaying and Maintaining IGMP Snooping
368
IGMP Snooping Configuration Examples
369
Configuring Group Policy and Simulated Joining
369
Static Port Configuration
371
IGMP Snooping Querier Configuration
375
Troubleshooting IGMP Snooping Configuration
377
Switch Fails in Layer 2 Multicast Forwarding
377
Configured Multicast Group Policy Fails to Take Effect
377
3 Multicast VLAN Configuration
378
Introduction to Multicast VLAN
378
Multicast VLAN Configuration Task List
380
Configuring Sub-VLAN-Based Multicast VLAN
380
Configuration Prerequisites
380
Configuring Port-Based Multicast VLAN
381
Configuration Prerequisites
381
Configuring User Port Attributes
381
Configuring Multicast VLAN Ports
382
Displaying and Maintaining Multicast VLAN
383
Multicast VLAN Configuration Examples
383
Sub-VLAN-Based Multicast VLAN Configuration
383
Port-Based Multicast VLAN Configuration
387
4 MLD Snooping Configuration
390
MLD Snooping Overview
390
Introduction to MLD Snooping
390
Basic Concepts in MLD Snooping
391
How MLD Snooping Works
392
Protocols and Standards
394
MLD Snooping Configuration Task List
394
Configuring Basic Functions of MLD Snooping
395
Configuration Prerequisites
395
Enabling MLD Snooping
395
Configuring the Version of MLD Snooping
396
Configuring MLD Snooping Port Functions
396
Configuration Prerequisites
396
Configuring Aging Timers for Dynamic Ports
397
Configuring Static Ports
397
Configuring Simulated Joining
398
Configuring Fast Leave Processing
399
Configuring MLD Snooping Querier
400
Configuration Prerequisites
400
Enabling MLD Snooping Querier
400
Configuring MLD Queries and Responses
401
Configuring Source Ipv6 Addresses of MLD Queries
402
Configuring an MLD Snooping Policy
403
Configuration Prerequisites
403
Configuring an Ipv6 Multicast Group Filter
403
Configuring Ipv6 Multicast Source Port Filtering
404
Configuring MLD Report Suppression
405
Configuring Maximum Multicast Groups that Can be Joined on a Port
405
Configuring Ipv6 Multicast Group Replacement
406
Displaying and Maintaining MLD Snooping
407
MLD Snooping Configuration Examples
408
Configuring Ipv6 Group Policy and Simulated Joining
408
Static Port Configuration
410
MLD Snooping Querier Configuration
414
Troubleshooting MLD Snooping
415
Switch Fails in Layer 2 Multicast Forwarding
415
Configured Ipv6 Multicast Group Policy Fails to Take Effect
416
5 Ipv6 Multicast VLAN Configuration
417
Introduction to Ipv6 Multicast VLAN
417
Ipv6 Multicast VLAN Configuration Task List
419
Configuring Ipv6 Sub-VLAN-Based Ipv6 Multicast VLAN
419
Configuration Prerequisites
419
Configuring Sub-VLAN-Based Ipv6 Multicast VLAN
419
Configuring Port-Based Ipv6 Multicast VLAN
420
Configuration Prerequisites
420
Configuring User Port Attributes
420
Configuring Ipv6 Multicast VLAN Ports
421
Displaying and Maintaining Ipv6 Multicast VLAN
422
Ipv6 Multicast VLAN Configuration Examples
422
Sub-VLAN-Based Multicast VLAN Configuration Example
422
Port-Based Multicast VLAN Configuration Example
425
Table of Contents
429
1 Qos Overview
432
Introduction to Qos
432
Introduction to Qos Service Models
432
Best-Effort Service Model
432
Intserv Service Model
432
Diffserv Service Model
433
Qos Techniques Overview
433
Positions of the Qos Techniques in a Network
433
2 Qos Configuration Approaches
435
Qos Configuration Approach Overview
435
Non Policy-Based Configuration
435
Policy-Based Configuration
435
Configuring a Qos Policy
436
Defining a Class
436
Defining a Traffic Behavior
438
Defining a Policy
439
Applying the Qos Policy
439
Displaying and Maintaining Qos Policies
442
3 Priority Mapping Configuration
444
Priority Mapping Overview
444
Introduction to Priority Mapping
444
Priority Mapping Tables
444
Priority Trust Mode on a Port
445
Priority Mapping Procedure
445
Priority Mapping Configuration Tasks
446
Configuring Priority Mapping
447
Configuring a Priority Mapping Table
447
Configuring the Priority Trust Mode on a Port
447
Configuring the Port Priority of a Port
448
Displaying and Maintaining Priority Mapping
448
Priority Mapping Configuration Examples
448
Priority Mapping Table and Priority Marking Configuration Example
448
Traffic Policing, Traffic Shaping, and Line Rate Overview
452
Traffic Evaluation and Token Buckets
452
Traffic Policing
453
Traffic Shaping
454
Line Rate
455
Configuring Traffic Policing
456
Configuration Procedure
456
Configuration Example
456
Configuring the Line Rate
458
Configuration Procedure
458
Configuration Example
458
Displaying and Maintaining Traffic Policing, GTS, and Line Rate
458
5 Congestion Management Configuration
460
Congestion Management Overview
460
Causes, Impacts, and Countermeasures of Congestion
460
Congestion Management Policies
460
Congestion Management Configuration Approaches
463
Configuring Congestion Management
464
Configuring SP Queuing
464
Configure WRR Queuing
464
Configuring WFQ Queuing
465
Configuring SP+WRR Queues
466
Configuration Example
466
Configuration Example
467
Displaying and Maintaining Congestion Management
468
6 Traffic Filtering Configuration
469
Traffic Filtering Overview
469
Configuring Traffic Filtering
469
Traffic Filtering Configuration Example
470
7 Priority Marking Configuration
472
Priority Marking Overview
472
Configuring Priority Marking
472
Priority Marking Configuration Example
473
8 Traffic Redirecting Configuration
476
Traffic Redirecting Overview
476
Traffic Redirecting
476
Configuring Traffic Redirecting
476
9 Traffic Mirroring Configuration
478
Traffic Mirroring Overview
478
Configuring Traffic Mirroring
478
Mirroring Traffic to an Interface
478
Mirroring Traffic to the CPU
479
Displaying and Maintaining Traffic Mirroring
480
Traffic Mirroring Configuration Examples
480
Example for Mirroring Traffic to an Interface
480
Configuration Procedure
480
10 Class-Based Accounting Configuration
482
Class-Based Accounting Overview
482
Configuring Class-Based Accounting
482
Displaying and Maintaining Traffic Accounting
483
Class-Based Accounting Configuration Example
483
11 User Profile Configuration
485
User Profile Overview
485
User Profile Configuration Task List
485
Creating a User Profile
486
Applying a Qos Policy to User Profile
486
Enabling a User Profile
487
Displaying and Maintaining User Profile
487
12 Appendix
487
Appendix A Acronym
488
Appendix B Default Priority Mapping Tables
489
Uncolored Priority Mapping Tables
489
Appendix C Introduction to Packet Precedences
490
IP Precedence and DSCP Values
490
802.1P Priority
491
Aaa Configuration
494
Configuration Example
495
Configuration Procedure
495
1 AAA Configuration
501
Introduction to AAA
501
Introduction to RADIUS
502
Client/Server Model
502
Security and Authentication Mechanisms
503
Basic Message Exchange Process of RADIUS
503
RADIUS Packet Format
504
Extended RADIUS Attributes
507
Introduction to HWTACACS
507
Differences between HWTACACS and RADIUS
508
Basic Message Exchange Process of HWTACACS
508
Protocols and Standards
510
AAA Configuration Task List
510
RADIUS Configuration Task List
511
HWTACACS Configuration Task List
512
Configuring AAA
512
Configuration Prerequisites
512
Creating an ISP Domain
512
Configuring ISP Domain Attributes
513
Configuring AAA Authentication Methods for an ISP Domain
514
Configuring AAA Authorization Methods for an ISP Domain
515
Configuring AAA Accounting Methods for an ISP Domain
517
Configuring Local User Attributes
519
Configuring User Group Attributes
520
Tearing down User Connections Forcibly
521
Displaying and Maintaining AAA
521
Configuring RADIUS
522
Creating a RADIUS Scheme
522
Specifying the RADIUS Authentication/Authorization Servers
523
Specifying the RADIUS Accounting Servers and Relevant Parameters
523
Setting the Shared Key for RADIUS Packets
524
Setting the Upper Limit of RADIUS Request Retransmission Attempts
525
Setting the Supported RADIUS Server Type
525
Setting the Status of RADIUS Servers
526
Configuring Attributes Related to Data to be Sent to the RADIUS Server
527
Setting Timers Regarding RADIUS Servers
528
Specifying a Security Policy Server
529
Enabling the Listening Port of the RADIUS Client
530
Displaying and Maintaining RADIUS
530
Configuring HWTACACS
530
Creating a HWTACACS Scheme
531
Specifying the HWTACACS Authentication Servers
531
Specifying the Hwtacacs Authorization Servers
532
Specifying the Hwtacacs Accounting Servers
532
Setting the Shared Key for Hwtacacs Packets
533
Configuring Attributes Related to the Data Sent to Hwtacacs Server
533
Setting Timers Regarding Hwtacacs Servers
534
Aaa Configuration Examples
535
Displaying and Maintaining Hwtacacs
535
Aaa for Telnet Users by a Hwtacacs Server
535
Aaa for Telnet Users by Separate Servers
537
Aaa for Ssh Users by a Radius Server
538
Troubleshooting Aaa
542
Troubleshooting Radius
542
Troubleshooting Hwtacacs
543
X Configuration
544
X Overview
544
Architecture of 802.1X
544
Authentication Modes of 802.1X
545
Basic Concepts of 802.1X
545
Eap over Lans
546
Eap over Radius
548
X Authentication Triggering
548
Authentication Process of 802.1X
549
X Timers
552
Extensions to 802.1X
553
Features Working Together with 802.1X
553
Configuring 802.1X
555
Configuring 802.1X Globally
555
Configuring 802.1X for a Port
557
Configuring an 802.1X Port-Based Guest Vlan
558
X Configuration Example
559
Displaying and Maintaining 802.1X
559
Guest Vlan and Vlan Assignment Configuration Example
561
Acl Assignment Configuration Example
564
3 Ead Fast Deployment Configuration
566
Ead Fast Deployment Overview
566
Configuring Ead Fast Deployment
567
Displaying and Maintaining Ead Fast Deployment
568
Ead Fast Deployment Configuration Example
569
Troubleshooting Ead Fast Deployment
570
Users Cannot be Redirected Correctly
570
Introduction to Habp
571
4 Habp Configuration
571
Configuring Habp
572
Configuring the Habp Server
572
Displaying and Maintaining Habp
573
Habp Configuration Example
573
Configuring an Habp Client
573
5 Mac Authentication Configuration
575
Mac Authentication Overview
575
Related Concepts
576
Configuring Mac Authentication
576
Mac Authentication Timers
576
Quiet Mac Address
576
Vlan Assigning
576
Acl Assigning
576
Displaying and Maintaining Mac Authentication
578
Mac Authentication Configuration Examples
578
Local Mac Authentication Configuration Example
578
Radius-Based Mac Authentication Configuration Example
580
Network Requirements
581
6 Port Security Configuration
584
Introduction to Port Security
584
Port Security Features
585
Port Security Modes
585
Port Security Configuration Task List
587
Enabling Port Security
588
Setting the Maximum Number of Secure Mac Addresses
588
Setting the Port Security Mode
589
Configuring Port Security Features
590
Configuring Intrusion Protection
591
Configuring Secure Mac Addresses
592
Configuring Trapping
592
Displaying and Maintaining Port Security
593
Ignoring Authorization Information from the Server
593
Port Security Configuration Examples
594
Configuring the Autolearn Mode
594
Configuring the Userloginwithoui Mode
596
Configuring the Macaddresselseuserloginsecure Mode
600
Troubleshooting Port Security
602
Cannot Change Port Security Mode When a User Is Online
603
7 Ip Source Guard Configuration
604
Ip Source Guard Overview
604
Configuring a Static Binding Entry
604
Configuring Dynamic Binding Function
605
Ip Source Guard Configuration Examples
606
Displaying and Maintaining Ip Source Guard
606
Static Binding Entry Configuration Example
606
Dynamic Binding Function Configuration Example
607
Troubleshooting Ip Source Guard
609
Failed to Configure Static Binding Entries and Dynamic Binding Function
609
8 Ssh2.0 Configuration
610
Ssh2.0 Overview
610
Introduction to Ssh
610
Operation of Ssh
610
Configuring the Device as an Ssh Server
613
Ssh Server Configuration Task List
613
Generating a Dsa or Rsa Key Pair
613
Enabling Ssh Server
614
Configuring the User Interfaces for Ssh Clients
614
Configuring a Client Public Key
615
Configuring an Ssh User
616
Setting the Ssh Management Parameters
617
Configuring the Device as an Ssh Client
618
Ssh Client Configuration Task List
618
Specifying a Source Ip Address/Interface for the Ssh Client
618
Configuring Whether First-Time Authentication Is Supported
619
Displaying and Maintaining Ssh
620
Establishing a Connection between the Ssh Client and the Server
620
Ssh Server Configuration Examples
621
When Switch Acts as Server for Password Authentication
621
When Switch Acts as Server for Publickey Authentication
623
Ssh Client Configuration Examples
628
When Switch Acts as Client for Publickey Authentication
631
9 Sftp Configuration
633
Sftp Overview
633
Configuring an Sftp Server
633
Configuring an Sftp Client
634
Configuring the Sftp Connection Idle Timeout Period
634
Specifying a Source Ip Address or Interface for the Sftp Client
634
Establishing a Connection to the Sftp Server
634
Working with the Sftp Directories
635
Working with Sftp Files
636
Displaying Help Information
636
Terminating the Connection to the Remote Sftp Server
637
Sftp Client Configuration Example
637
Sftp Server Configuration Example
641
10 Pki Configuration
643
Introduction to Pki
643
Pki Overview
643
Pki Terms
643
Architecture of Pki
644
Pki Configuration Task List
646
Configuring an Entity Dn
646
Configuring a Pki Domain
648
Submitting a Pki Certificate Request
649
Submitting a Certificate Request in Auto Mode
650
Submitting a Certificate Request in Manual Mode
650
Retrieving a Certificate Manually
651
Configuring Pki Certificate Verification
652
Destroying a Local Rsa Key Pair
653
Deleting a Certificate
653
Configuring an Access Control Policy
654
Displaying and Maintaining Pki
654
Pki Configuration Examples
655
Requesting a Certificate from a Ca Running Rsa Keon
655
Requesting a Certificate from a Ca Running Windows 2003 Server
658
Configuring a Certificate Attribute-Based Access Control Policy
662
Troubleshooting Pki
663
Failed to Retrieve a Ca Certificate
663
Failed to Request a Local Certificate
664
Failed to Retrieve Crls
664
11 Ssl Configuration
665
Ssl Overview
665
Ssl Security Mechanism
665
Ssl Configuration Task List
666
Ssl Protocol Stack
666
Configuring an Ssl Server Policy
667
Ssl Server Policy Configuration Example
668
Configuring an Ssl Client Policy
669
Displaying and Maintaining Ssl
670
Ssl Handshake Failure
670
Troubleshooting Ssl
670
12 Public Key Configuration
672
Asymmetric Key Algorithm Overview
672
Configuring the Local Asymmetric Key Pair
673
Displaying or Exporting the Local Rsa or Dsa Host Public Key
674
Destroying an Asymmetric Key Pair
674
Configuring the Public Key of a Peer
674
Displaying and Maintaining Public Keys
675
Public Key Configuration Examples
676
Configuring the Public Key of a Peer Manually
676
Importing the Public Key of a Peer from a Public Key File
677
13 Acl Overview
680
Introduction to Acl
680
Application of Acls on the Switch
680
Introduction to Ipv4 Acl
681
Ipv4 Acl Classification
681
Ipv4 Acl Naming
681
Ipv4 Acl Match Order
682
Ipv4 Acl Step
683
Effective Period of an Ipv4 Acl
683
Ip Fragments Filtering with Ipv4 Acl
683
Introduction to Ipv6 Acl
684
Ipv6 Acl Classification
684
Ipv6 Acl Naming
684
Ipv6 Acl Match Order
684
Ipv6 Acl Step
685
Effective Period of an Ipv6 Acl
685
Acl Application
685
14 Ipv4 Acl Configuration
686
Configuring a Basic Ipv4 Acl
687
Configuring an Advanced Ipv4 Acl
689
Configuring an Ethernet Frame Header Acl
691
Copying an Ipv4 Acl
692
Displaying and Maintaining Ipv4 Acls
693
Ipv4 Acl Configuration Example
693
15 Ipv6 Acl Configuration
696
Configuring a Basic Ipv6 Acl
696
Configuring an Advanced Ipv6 Acl
697
Copying an Ipv6 Acl
699
Displaying and Maintaining Ipv6 Acls
700
Ipv6 Acl Configuration Example
700
16 Acl Application for Packet Filtering
702
Filtering Ethernet Frames
702
Filtering Ipv4 Packets
702
Filtering Ipv6 Packets
703
Configuring Packet Filtering Statistics Function
703
Acl Application Examples
704
Acl Application to an Ethernet Interface
704
Acl Application to a Vlan Interface
705
Advertisement
3Com 4210G Series Getting Started Manual (78 pages)
Brand:
3Com
| Category:
Switch
| Size: 3 MB
Table of Contents
Table of Contents
5
1 Product Overview
8
Overview
8
Introduction to Switch 4210G
10
Switch 4210G 24-Port
10
Switch 4210G 48-Port
11
Switch 4210G PWR 24-Port
12
Switch 4210G PWR 48-Port
13
Switch 4210G NT 24-Port
14
Switch 4210G NT 48-Port
15
Ports
15
Console Port
15
10/100/1000Base-T Ethernet Port
16
1000Base-X SFP Port
16
Combo Port
17
Leds
17
System Status LED
18
RPS Status LED
18
Port Mode LED
18
Seven-Segment LED
19
10/100/1000Base-T Auto-Sensing Ethernet Port Status LED
20
1000Base-X SFP Port Status LED
21
Interface Module Status LED
22
Optional Interface Modules
22
Short-Haul Dual-Port 10 GE CX4 Interface Module
22
Dual-Port 10 GE XFP Interface Module
23
One-Port 10 GE XFP Interface Module
24
Dual-Port 10 GE SFP+ Interface Module
25
Description of Leds of Interface Modules
26
2 Preparing for Installation
27
Safety Precautions
27
Installation Site
27
Temperature/Humidity
28
Cleanness
28
Electromagnetic Susceptibility
28
Laser Safety
29
Installation Tools
29
3 Installing the Switch
30
Installation Flow of the Switch
30
Installing the Switch into a 19-Inch Rack Using Mounting Brackets
31
Introduction to Mounting Bracket
31
Use Front Mounting Brackets to Install a Switch
32
Use Front Mounting Brackets and a Tray to Install a Switch
33
Use Front and Rear Mounting Brackets to Install a Switch
34
Mounting the Switch on a Workbench
37
Connecting the Grounding Cable
38
When a Grounding Strip Is Available
38
Where a Grounding Conductor Can be Buried
39
In Other Installation Sites
40
Connecting the Power Cords
41
Connecting the AC Power Cord
41
Connecting the RPS Power Cord
42
Installing an Interface Module
44
Installing an Interface Card
44
Removing an Interface Module
45
Installing Dedicated CX4/SFP+ Cable
45
Removing Dedicated CX4/SFP+ Cable
46
Installing Switches for an IRF
46
Installation Flow for an IRF
47
Drawing a Plan for an IRF with Switches
48
Verifying the Installation
51
Advertisement
Related Products
3Com 4210 Series
3Com 4210 PWR
3Com Switch 4210 18-Port
3Com Switch 4210 26-Port
3Com 4210G NT
3Com 4210G PWR
3Com 4210G 24-Port
3Com 4210G 48-Port
3Com 4210G NT 24-Port
3Com 4250T - SuperStack 3 Switch
3Com Categories
Switch
Network Router
Wireless Access Point
Modem
Network Card
More 3Com Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL