Sign In
Upload
Manuals
Brands
3Com Manuals
Switch
4510G
3Com 4510G Manuals
Manuals and User Guides for 3Com 4510G. We have
1
3Com 4510G manual available for free PDF download: Configuration Manual
3Com 4510G Configuration Manual (1166 pages)
3Com Switch 4510G Family
Brand:
3Com
| Category:
Switch
| Size: 13.13 MB
Table of Contents
Table of Contents
34
Configuration Guide
1
About this Manual
3
Obtaining Documentation
5
Related Documentation
5
Product Features
6
Access Volume
8
Ip Services Volume
10
Ip Routing Volume
12
Qos Volume
13
Security Volume
14
High Availability Volume
16
System Volume
18
1 Ethernet Port Configuration
39
Combo Port Configuration
39
Basic Ethernet Interface Configuration
40
Configuring Flow Control on an Ethernet Interface
41
Configuring the Suppression Time of Physical-Link-State Change on an Ethernet Interface
41
Configuring Loopback Testing on an Ethernet Interface
42
Configuring a Port Group
42
Configuring an Auto-Negotiation Transmission Rate
43
Configuring Storm Suppression
44
Setting the Interval for Collecting Ethernet Interface Statistics
45
Enabling Forwarding of Jumbo Frames
45
Enabling Loopback Detection on an Ethernet Interface
46
Configuring the MDI Mode for an Ethernet Interface
47
Testing the Cable on an Ethernet Interface
48
Configuring the Storm Constrain Function on an Ethernet Interface
48
Displaying and Maintaining an Ethernet Interface
50
2 Link Aggregation Configuration
51
Overview
51
Basic Concepts of Link Aggregation
51
Link Aggregation Modes
54
Load Sharing Mode of an Aggregation Group
55
Link Aggregation Configuration Task List
55
Configuring an Aggregation Group
56
Configuring a Static Aggregation Group
56
Configuring a Dynamic Aggregation Group
57
Configuring an Aggregate Interface
58
Configuring the Description of an Aggregate Interface
58
Enabling Linkup/Linkdown Trap Generation for an Aggregate Interface
58
Shutting down an Aggregate Interface
59
Configuring a Load Sharing Mode for Load-Sharing Link Aggregation Groups
59
Displaying and Maintaining Link Aggregation
60
Link Aggregation Configuration Examples
61
Layer 2 Static Aggregation Configuration Example
61
Layer 2 Dynamic Aggregation Configuration Example
62
Layer 2 Aggregation Load Sharing Mode Configuration Example
63
3 Port Isolation Configuration
65
Introduction to Port Isolation
65
Configuring the Isolation Group
65
Assigning a Port to the Isolation Group
65
Displaying and Maintaining Isolation Groups
66
Port Isolation Configuration Example
66
4 MSTP Configuration
68
Overview
68
Introduction to STP
68
Protocol Packets of STP
68
Why STP
68
Basic Concepts in STP
69
How STP Works
70
Introduction to RSTP
76
Introduction to MSTP
77
Why MSTP
77
Basic Concepts in MSTP
78
How MSTP Works
81
Implementation of MSTP on Devices
82
Protocols and Standards
82
MSTP Configuration Task List
82
Configuring MSTP
84
Configuring an MST Region
84
Configuring the Root Bridge or a Secondary Root Bridge
85
Configuring the Priority of a Device
86
Configuring the Work Mode of an MSTP Device
86
Configuring the Maximum Hops of an MST Region
87
Configuring the Network Diameter of a Switched Network
87
Configuring Timers of MSTP
88
Configuring the Timeout Factor
89
Configuring Ports as Edge Ports
90
Configuring the Maximum Port Rate
90
Configuring Path Costs of Ports
91
Configuring Port Priority
93
Configuring the Link Type of Ports
94
Configuring the Mode a Port Uses to Recognize/Send MSTP Packets
94
Enabling the Output of Port State Transition Information
95
Enabling the MSTP Feature
96
Performing Mcheck
96
Configuring Digest Snooping
97
Configuring no Agreement Check
99
Configuring Protection Functions
101
Enabling BPDU Dropping
104
Displaying and Maintaining MSTP
105
MSTP Configuration Example
105
5 LLDP Configuration
110
Overview
110
Background
110
Basic Concepts
110
Operating Modes of LLDP
114
How LLDP Works
115
Protocols and Standards
115
LLDP Configuration Task List
115
Performing Basic LLDP Configuration
116
Enabling LLDP
116
Setting LLDP Operating Mode
116
Configuring the Tlvs to be Advertised
117
Enabling LLDP Polling
117
Setting the LLDP Re-Initialization Delay
117
Configuring the Management Address and Its Encoding Format
118
Setting an Encapsulation Format for Lldpdus
119
Setting Other LLDP Parameters
119
Configuring CDP Compatibility
120
Configuration Prerequisites
120
Configuring CDP Compatibility
121
Configuring LLDP Trapping
121
Displaying and Maintaining LLDP
122
LLDP Configuration Examples
122
Basic LLDP Configuration Example
122
Configuration Procedure
123
CDP-Compatible LLDP Configuration Example
125
6 VLAN Configuration
127
Introduction to VLAN
127
VLAN Overview
127
VLAN Fundamentals
128
Types of VLAN
129
Configuring Basic VLAN Settings
129
Configuring Basic Settings of a VLAN Interface
130
Port-Based VLAN Configuration
131
Introduction to Port-Based VLAN
131
Assigning an Access Port to a VLAN
132
Assigning a Trunk Port to a VLAN
134
Assigning a Hybrid Port to a VLAN
135
MAC-Based VLAN Configuration
136
Introduction to MAC-Based VLAN
136
Configuring a MAC Address-Based VLAN
137
Protocol-Based VLAN Configuration
138
Configuring a Protocol-Based VLAN
138
Introduction to Protocol-Based VLAN
138
IP Subnet-Based VLAN Configuration
140
Configuring an IP Subnet-Based VLAN
140
Introduction
140
Displaying and Maintaining VLAN
141
VLAN Configuration Example
142
7 Isolate-User-VLAN Configuration
145
Overview
145
Configuring Isolate-User-VLAN
145
Displaying and Maintaining Isolate-User-VLAN
147
Isolate-User-VLAN Configuration Example
147
8 Voice VLAN Configuration
150
Overview
150
OUI Addresses
150
Voice VLAN Assignment Modes
151
Security Mode and Normal Mode of Voice Vlans
152
Configuring a Voice VLAN
153
Configuration Prerequisites
153
Setting a Port to Operate in Automatic Voice VLAN Assignment Mode
153
Setting a Port to Operate in Manual Voice VLAN Assignment Mode
154
Displaying and Maintaining Voice VLAN
155
Voice VLAN Configuration Examples
155
Automatic Voice VLAN Mode Configuration Example
155
Manual Voice VLAN Assignment Mode Configuration Example
157
9 GVRP Configuration
160
Introduction to GVRP
160
Garp
160
Gvrp
163
Protocols and Standards
163
GVRP Configuration Task List
163
Configuring GVRP Functions
163
Configuring GARP Timers
164
Displaying and Maintaining GVRP
165
GVRP Configuration Examples
166
Gvrp Configuration Example I
166
GVRP Configuration Example II
167
GVRP Configuration Example III
168
10 Qinq Configuration
170
Introduction to Qinq
170
Background
170
Qinq Mechanism and Benefits
170
Qinq Frame Structure
171
Implementations of Qinq
172
Modifying the TPID in a VLAN Tag
172
Qinq Configuration Task List
174
Configuring Basic Qinq
174
Enabling Basic Qinq
174
Configuring Selective Qinq
174
Configuring Selective Qinq Based on Ports
175
Configuring Selective Qinq through Qos Policies
175
Configuring the TPID Value in VLAN Tags
176
Qinq Configuration Examples
177
Basic Qinq Configuration Example
177
Selective Qinq Configuration Example (Port-Based Configuration)
179
Selective Qinq Configuration Example (Qos Policy-Based Configuration)
182
11 BPDU Tunneling Configuration
186
Introduction to BPDU Tunneling
186
Background
186
BPDU Tunneling Implementation
187
Configuring BPDU Tunneling
188
Configuration Prerequisites
188
Enabling BPDU Tunneling
189
Configuring Destination Multicast MAC Address for Bpdus
190
BPDU Tunneling Configuration Examples
190
BPDU Tunneling for STP Configuration Example
190
BPDU Tunneling for PVST Configuration Example
191
12 Port Mirroring Configuration
193
Introduction to Port Mirroring
193
Classification of Port Mirroring
193
Implementing Port Mirroring
193
Configuring Local Port Mirroring
195
Configuring Remote Port Mirroring
196
Configuration Prerequisites
196
Configuring a Remote Source Mirroring Group (on the Source Device)
196
Configuring a Remote Destination Mirroring Group (on the Destination Device)
198
Displaying and Maintaining Port Mirroring
199
Port Mirroring Configuration Examples
199
Local Port Mirroring Configuration Example
199
Remote Port Mirroring Configuration Example
200
Table of Contents
203
1 IP Addressing Configuration
208
IP Addressing Overview
208
IP Address Classes
208
Special IP Addresses
209
Subnetting and Masking
209
Configuring IP Addresses
210
Assigning an IP Address to an Interface
210
IP Addressing Configuration Example
211
Displaying and Maintaining IP Addressing
212
2 ARP Configuration
213
ARP Overview
213
ARP Function
213
ARP Message Format
213
ARP Address Resolution Process
214
ARP Table
215
Configuring ARP
215
Configuring a Static ARP Entry
215
Configuring the Maximum Number of ARP Entries for a Interface
216
Setting the Aging Time for Dynamic ARP Entries
216
ARP Configuration Example
217
Enabling the ARP Entry Check
217
Configuring Gratuitous ARP
217
Introduction to Gratuitous ARP
217
Configuring Gratuitous ARP
218
Displaying and Maintaining ARP
218
3 Proxy ARP Configuration
219
Proxy ARP Overview
219
Proxy ARP
219
Local Proxy ARP
220
Enabling Proxy ARP
220
Displaying and Maintaining Proxy ARP
221
Proxy ARP Configuration Examples
221
Proxy ARP Configuration Example
221
Local Proxy ARP Configuration Example in Case of Port Isolation
222
Local Proxy ARP Configuration Example in Isolate-User-Vlan
223
4 ARP Attack Defense Configuration
225
Configuring ARP Source Suppression
225
Introduction to ARP Source Suppression
225
Displaying and Maintaining ARP Source Suppression
226
Configuring ARP Defense against IP Packet Attacks
226
Enabling ARP Defense against IP Packet Attacks
226
Introduction to ARP Defense against IP Packet Attacks
226
Configuring ARP Active Acknowledgement
226
Introduction
226
Configuring the ARP Active Acknowledgement Function
227
Configuring Source MAC Address Based ARP Attack Detection
227
Configuration Procedure
227
Introduction
227
Displaying and Maintaining Source MAC Address Based ARP Attack Detection
228
Configuring ARP Packet Source MAC Address Consistency Check
228
Introduction
228
Configuring ARP Packet Source MAC Address Consistency Check
229
Configuring ARP Packet Rate Limit
229
Configuring the ARP Packet Rate Limit Function
229
Introduction
229
Configuring ARP Detection
229
Introduction to ARP Detection
229
IP-To-MAC Bindings
231
Configuring ARP Detection Based on Specified Objects
232
Arp Detection Configuration Example I
233
Displaying and Maintaining ARP Detection
233
ARP Detection Configuration Example II
234
5 DHCP Overview
236
Introduction to DHCP
236
DHCP Address Allocation
237
Allocation Mechanisms
237
Dynamic IP Address Allocation Process
237
IP Address Lease Extension
238
DHCP Message Format
238
DHCP Options
239
DHCP Options Overview
239
Introduction to DHCP Options
239
Self-Defined Options
240
Protocols and Standards
243
6 DHCP Relay Agent Configuration
244
Introduction to DHCP Relay Agent
244
Application Environment
244
Fundamentals
244
Dhcp Relay Agent Support for Option
245
DHCP Relay Agent Configuration Task List
246
Configuring the DHCP Relay Agent
246
Enabling DHCP
246
Correlating a DHCP Server Group with a Relay Agent Interface
247
Enabling the DHCP Relay Agent on an Interface
247
Configuring the DHCP Relay Agent Security Functions
248
Configuring the DHCP Relay Agent to Send a DHCP-Release Request
250
Configuring the DHCP Relay Agent to Support Option 82
250
Displaying and Maintaining DHCP Relay Agent Configuration
252
DHCP Relay Agent Configuration Examples
252
DHCP Relay Agent Configuration Example
252
DHCP Relay Agent Option 82 Support Configuration Example
253
Troubleshooting DHCP Relay Agent Configuration
254
7 DHCP Client Configuration
255
Introduction to DHCP Client
255
Enabling the DHCP Client on an Interface
255
Displaying and Maintaining the DHCP Client
256
DHCP Client Configuration Example
256
8 DHCP Snooping Configuration
258
DHCP Snooping Overview
258
Function of DHCP Snooping
258
Application Environment of Trusted Ports
259
DHCP Snooping Support for Option 82
260
Configuring DHCP Snooping Basic Functions
261
Prerequisites
262
Configuring Dhcp Snooping to Support Option 82
262
Displaying and Maintaining DHCP Snooping
264
DHCP Snooping Configuration Examples
264
DHCP Snooping Configuration Example
264
DHCP Snooping Option 82 Support Configuration Example
265
9 BOOTP Client Configuration
266
Introduction to BOOTP Client
266
BOOTP Application
266
Obtaining an IP Address Dynamically
267
Protocols and Standards
267
Configuring an Interface to Dynamically Obtain an IP Address through BOOTP
267
Displaying and Maintaining BOOTP Client Configuration
268
BOOTP Client Configuration Example
268
10 DNS Configuration
269
DNS Overview
269
Dynamic Domain Name Resolution
269
Static Domain Name Resolution
269
DNS Proxy
271
Configuring the DNS Client
272
Configuring Dynamic Domain Name Resolution
272
Configuring Static Domain Name Resolution
272
Configuring the DNS Proxy
273
Displaying and Maintaining DNS
273
DNS Configuration Examples
273
Static Domain Name Resolution Configuration Example
273
Dynamic Domain Name Resolution Configuration Example
274
DNS Proxy Configuration Example
277
Troubleshooting DNS Configuration
278
11 IP Performance Optimization Configuration
279
IP Performance Overview
279
Enabling Reception and Forwarding of Directed Broadcasts to a Directly Connected Network
279
Enabling Reception of Directed Broadcasts to a Directly Connected Network
279
Configuration Example
280
Enabling Forwarding of Directed Broadcasts to a Directly Connected Network
280
Configuring TCP Optional Parameters
281
Configuring ICMP to Send Error Packets
282
Displaying and Maintaining IP Performance Optimization
284
12 UDP Helper Configuration
285
Introduction to UDP Helper
285
Configuring UDP Helper
285
Displaying and Maintaining UDP Helper
286
UDP Helper Configuration Examples
286
UDP Helper Configuration Example
286
13 Ipv6 Basics Configuration
288
Ipv6 Overview
288
Ipv6 Features
288
Introduction to Ipv6 Address
290
Introduction to Ipv6 Neighbor Discovery Protocol
293
Ipv6 PMTU Discovery
295
Introduction to Ipv6 DNS
296
Protocols and Standards
296
Ipv6 Basics Configuration Task List
297
Configuring Basic Ipv6 Functions
297
Configuring an Ipv6 Unicast Address
297
Enabling Ipv6
297
Configuring Ipv6 NDP
299
Configuring a Static Neighbor Entry
299
Configuring the Maximum Number of Neighbors Dynamically Learned
299
Configuring Parameters Related to RA Messages
300
Configuring the Maximum Number of Attempts to Send an NS Message for DAD
302
Configuring PMTU Discovery
302
Configuring a Static PMTU for a Specified Ipv6 Address
302
Configuring the Aging Time for Dynamic Pmtus
302
Configuring Ipv6 TCP Properties
303
Configuring Icmpv6 Packet Sending
303
Configuring the Maximum Icmpv6 Error Packets Sent in an Interval
303
Enable Sending of Multicast Echo Replies
304
Enabling Sending of Icmpv6 Time Exceeded Packets
304
Configuring Ipv6 DNS Client
305
Configuring Dynamic Ipv6 Domain Name Resolution
305
Configuring Static Ipv6 Domain Name Resolution
305
Displaying and Maintaining Ipv6 Basics Configuration
306
Ipv6 Configuration Example
307
Troubleshooting Ipv6 Basics Configuration
312
14 Dual Stack Configuration
313
Dual Stack Overview
313
Configuring Dual Stack
313
15 Sflow Configuration
315
Sflow Overview
315
Introduction to Sflow
315
Operation of Sflow
315
Configuring Sflow
316
Displaying and Maintaining Sflow
316
Sflow Configuration Example
317
Troubleshooting Sflow Configuration
318
The Remote Sflow Collector Cannot Receive Sflow Packets
318
Table of Contents
319
1 IP Routing Overview
322
IP Routing and Routing Table
322
Routing
322
Routing Table
322
Routing Protocol Overview
324
Routing Protocols and Routing Priority
324
Static Routing and Dynamic Routing
324
Displaying and Maintaining a Routing Table
324
2 Static Routing Configuration
326
Introduction
326
Default Route
326
Static Route
326
Application Environment of Static Routing
327
Configuring a Static Route
327
Configuration Prerequisites
327
Configuration Procedure
328
Detecting Reachability of the Static Route's Nexthop
328
Detecting Nexthop Reachability through Track
328
Displaying and Maintaining Static Routes
329
Static Route Configuration Example
329
Basic Static Route Configuration Example
329
3 RIP Configuration
332
RIP Overview
332
Operation of RIP
332
RIP Version
333
RIP Message Format
334
Protocols and Standards
336
Supported RIP Features
336
Configuring RIP Basic Functions
336
Configuration Prerequisites
336
Configuration Procedure
336
Configuring RIP Route Control
338
Configuring an Additional Routing Metric
338
Configuring Ripv2 Route Summarization
339
Advertising a Default Route
340
Disabling Host Route Reception
340
Configuring a Priority for RIP
341
Configuring Inbound/Outbound Route Filtering
341
Configuring RIP Route Redistribution
342
Configuring RIP Network Optimization
342
Configuring RIP Timers
342
Configuring Split Horizon and Poison Reverse
343
Configuring Ripv2 Message Authentication
344
Enabling Source IP Address Check on Incoming RIP Updates
344
Enabling Zero Field Check on Incoming Ripv1 Messages
344
Configuring RIP-To-MIB Binding
345
Specifying a RIP Neighbor
345
Configuring the RIP Packet Sending Rate
346
Displaying and Maintaining RIP
346
RIP Configuration Examples
346
Configuring RIP Version
346
Configuring RIP Route Redistribution
348
Configuring an Additional Metric for a RIP Interface
351
Troubleshooting RIP
352
No RIP Updates Received
352
Route Oscillation Occurred
353
4 Ipv6 Static Routing Configuration
354
Introduction to Ipv6 Static Routing
354
Default Ipv6 Route
354
Features of Ipv6 Static Routes
354
Configuring an Ipv6 Static Route
354
Configuration Prerequisites
354
Configuring an Ipv6 Static Route
355
Displaying and Maintaining Ipv6 Static Routes
355
Ipv6 Static Routing Configuration Example
355
5 Ripng Configuration
358
Introduction to Ripng
358
Ripng Working Mechanism
358
Ripng Packet Format
359
Protocols and Standards
360
Ripng Packet Processing Procedure
360
Configuring Ripng Basic Functions
360
Configuration Prerequisites
360
Configuration Procedure
361
Configuring Ripng Route Control
361
Configuring an Additional Routing Metric
361
Advertising a Default Route
362
Configuring Ripng Route Summarization
362
Configuring a Priority for Ripng
363
Configuring a Ripng Route Filtering Policy
363
Configuring Ripng Route Redistribution
363
Tuning and Optimizing the Ripng Network
364
Configuring Ripng Timers
364
Configuring Split Horizon and Poison Reverse
364
Configuring Zero Field Check on Ripng Packets
365
Displaying and Maintaining Ripng
366
Ripng Configuration Example
366
Configure Ripng Basic Functions
366
6 Route Policy Configuration
369
Introduction to Route Policy
369
Filters
369
Route Policy
369
Route Policy Application
370
Route Policy Configuration Task List
370
Defining Filters
370
Prerequisites
370
Defining an IP-Prefix List
371
Configuring a Route Policy
372
Creating a Route Policy
372
Prerequisites
372
Defining If-Match Clauses
373
Defining Apply Clauses
374
Displaying and Maintaining the Route Policy
375
Route Policy Configuration Example
375
Applying a Route Policy to Ipv4 Route Redistribution
375
Applying a Route Policy to Ipv6 Route Redistribution
376
Troubleshooting Route Policy Configuration
378
Ipv4 Routing Information Filtering Failure
378
Ipv6 Routing Information Filtering Failure
378
Multicast Overview/Igmp Snooping Configuration
379
1 Multicast Overview
382
Introduction to Multicast
382
Comparison of Information Transmission Techniques
382
Features of Multicast
385
Advantages and Applications of Multicast
386
Common Notations in Multicast
386
Multicast Models
386
Multicast Architecture
387
Multicast Addresses
388
Multicast Protocols
391
Multicast Packet Forwarding Mechanism
393
2 IGMP Snooping Configuration
394
IGMP Snooping Overview
394
Principle of IGMP Snooping
394
Basic Concepts in IGMP Snooping
395
How IGMP Snooping Works
396
Protocols and Standards
398
IGMP Snooping Configuration Task List
398
Configuring Basic Functions of IGMP Snooping
399
Configuration Prerequisites
399
Enabling IGMP Snooping
399
Configuring the Version of IGMP Snooping
400
Configuring IGMP Snooping Port Functions
400
Configuration Prerequisites
400
Configuring Aging Timers for Dynamic Ports
401
Configuring Static Ports
401
Configuring Simulated Joining
402
Configuring Fast Leave Processing
403
Configuring IGMP Snooping Querier
404
Configuration Prerequisites
404
Enabling IGMP Snooping Querier
404
Configuring IGMP Queries and Responses
405
Configuring Source IP Address of IGMP Queries
406
Configuring an IGMP Snooping Policy
406
Configuration Prerequisites
406
Configuring a Multicast Group Filter
407
Configuring Multicast Source Port Filtering
407
Configuring the Function of Dropping Unknown Multicast Data
408
Configuring IGMP Report Suppression
409
Configuring Maximum Multicast Groups that Can be Joined on a Port
409
Configuring Multicast Group Replacement
410
Displaying and Maintaining IGMP Snooping
411
IGMP Snooping Configuration Examples
412
Configuring Group Policy and Simulated Joining
412
Static Port Configuration
414
Network Diagram
415
IGMP Snooping Querier Configuration
418
Troubleshooting IGMP Snooping Configuration
420
Configured Multicast Group Policy Fails to Take Effect
420
Switch Fails in Layer 2 Multicast Forwarding
420
3 Multicast VLAN Configuration
421
Introduction to Multicast VLAN
421
Multicast VLAN Configuration Task List
423
Configuring Sub-VLAN-Based Multicast VLAN
423
Configuration Prerequisites
423
Configuring Port-Based Multicast VLAN
424
Configuration Prerequisites
424
Configuring User Port Attributes
424
Configuring Multicast VLAN Ports
425
Displaying and Maintaining Multicast VLAN
426
Multicast VLAN Configuration Examples
426
Sub-VLAN-Based Multicast VLAN Configuration
426
Port-Based Multicast VLAN Configuration
430
4 MLD Snooping Configuration
433
MLD Snooping Overview
433
Introduction to MLD Snooping
433
Basic Concepts in MLD Snooping
434
How MLD Snooping Works
435
Protocols and Standards
437
MLD Snooping Configuration Task List
437
Configuring Basic Functions of MLD Snooping
438
Configuration Prerequisites
438
Enabling MLD Snooping
438
Configuring the Version of MLD Snooping
439
Configuring MLD Snooping Port Functions
439
Configuration Prerequisites
439
Configuring Aging Timers for Dynamic Ports
440
Configuring Static Ports
440
Configuring Simulated Joining
441
Configuring Fast Leave Processing
442
Configuring MLD Snooping Querier
443
Configuration Prerequisites
443
Enabling MLD Snooping Querier
443
Configuring MLD Queries and Responses
444
Configuring Source Ipv6 Addresses of MLD Queries
445
Configuring an MLD Snooping Policy
446
Configuration Prerequisites
446
Configuring an Ipv6 Multicast Group Filter
446
Configuring Ipv6 Multicast Source Port Filtering
447
Configuring Maximum Multicast Groups that Can be Joined on a Port
448
Configuring MLD Report Suppression
448
Configuring Ipv6 Multicast Group Replacement
449
Displaying and Maintaining MLD Snooping
450
MLD Snooping Configuration Examples
451
Configuring Ipv6 Group Policy and Simulated Joining
451
Static Port Configuration
453
MLD Snooping Querier Configuration
457
Troubleshooting MLD Snooping
458
Switch Fails in Layer 2 Multicast Forwarding
458
Configured Ipv6 Multicast Group Policy Fails to Take Effect
459
5 Ipv6 Multicast VLAN Configuration
460
Introduction to Ipv6 Multicast VLAN
460
Ipv6 Multicast VLAN Configuration Task List
462
Configuring Ipv6 Sub-VLAN-Based Ipv6 Multicast VLAN
462
Configuration Prerequisites
462
Configuring Sub-VLAN-Based Ipv6 Multicast VLAN
462
Configuring Port-Based Ipv6 Multicast VLAN
463
Configuration Prerequisites
463
Configuring User Port Attributes
463
Configuring Ipv6 Multicast VLAN Ports
464
Displaying and Maintaining Ipv6 Multicast VLAN
465
Ipv6 Multicast VLAN Configuration Examples
465
Sub-VLAN-Based Multicast VLAN Configuration Example
465
Port-Based Multicast VLAN Configuration Example
468
Table of Contents
472
1 Qos Overview
475
Introduction to Qos
475
Introduction to Qos Service Models
475
Best-Effort Service Model
475
Intserv Service Model
475
Diffserv Service Model
476
Qos Techniques Overview
476
Positions of the Qos Techniques in a Network
476
2 Qos Configuration Approaches
478
Qos Configuration Approach Overview
478
Non Policy-Based Configuration
478
Policy-Based Configuration
478
Configuring a Qos Policy
479
Defining a Class
479
Defining a Traffic Behavior
481
Applying the Qos Policy
482
Defining a Policy
482
Displaying and Maintaining Qos Policies
485
3 Priority Mapping Configuration
487
Priority Mapping Overview
487
Introduction to Priority Mapping
487
Priority Mapping Tables
487
Priority Mapping Procedure
488
Priority Trust Mode on a Port
488
Priority Mapping Configuration Tasks
489
Configuring Priority Mapping
490
Configuring a Priority Mapping Table
490
Configuring the Priority Trust Mode on a Port
490
Configuring the Port Priority of a Port
491
Displaying and Maintaining Priority Mapping
491
Priority Mapping Configuration Examples
491
Priority Mapping Table and Priority Marking Configuration Example
491
Traffic Policing, Traffic Shaping, and Line Rate Overview
495
Traffic Evaluation and Token Buckets
495
Traffic Policing
496
Traffic Shaping
497
Line Rate
498
Configuring Traffic Policing
499
Configuration Example
499
Configuration Procedure
499
Configuring GTS
500
Configuration Example
500
Configuration Procedure
500
Configuring the Line Rate
501
Configuration Example
501
Configuration Procedure
501
Displaying and Maintaining Traffic Policing, GTS, and Line Rate
501
5 Congestion Management Configuration
503
Congestion Management Overview
503
Causes, Impacts, and Countermeasures of Congestion
503
Congestion Management Policies
503
Congestion Management Configuration Approaches
506
Configuring Congestion Management
507
Configure WRR Queuing
507
Configuring SP Queuing
507
Configuring WFQ Queuing
508
Configuring SP+WRR Queues
509
Configuration Example
510
Displaying and Maintaining Congestion Management
511
6 Traffic Filtering Configuration
512
Traffic Filtering Overview
512
Configuring Traffic Filtering
512
Traffic Filtering Configuration Example
513
7 Priority Marking Configuration
515
Priority Marking Overview
515
Configuring Priority Marking
515
Priority Marking Configuration Example
516
8 Traffic Redirecting Configuration
519
Traffic Redirecting Overview
519
Traffic Redirecting
519
Configuring Traffic Redirecting
519
9 Traffic Mirroring Configuration
521
Traffic Mirroring Overview
521
Configuring Traffic Mirroring
521
Mirroring Traffic to an Interface
521
Mirroring Traffic to the CPU
522
Displaying and Maintaining Traffic Mirroring
523
Traffic Mirroring Configuration Examples
523
Configuration Procedure
523
Example for Mirroring Traffic to an Interface
523
10 Class-Based Accounting Configuration
525
Class-Based Accounting Overview
525
Configuring Class-Based Accounting
525
Displaying and Maintaining Traffic Accounting
526
Class-Based Accounting Configuration Example
526
11 User Profile Configuration
528
User Profile Overview
528
User Profile Configuration Task List
528
Applying a Qos Policy to User Profile
529
Creating a User Profile
529
Enabling a User Profile
530
Displaying and Maintaining User Profile
530
12 Appendix
531
Appendix A Acronym
531
Appendix B Default Priority Mapping Tables
532
Uncolored Priority Mapping Tables
532
Appendix C Introduction to Packet Precedences
533
IP Precedence and DSCP Values
533
802.1P Priority
535
Aaa Configuration
536
1 AAA Configuration
543
Introduction to AAA
543
Introduction to RADIUS
544
Client/Server Model
544
Basic Message Exchange Process of RADIUS
545
Security and Authentication Mechanisms
545
RADIUS Packet Format
546
Extended RADIUS Attributes
549
Introduction to HWTACACS
549
Basic Message Exchange Process of HWTACACS
550
Differences between HWTACACS and RADIUS
550
Protocols and Standards
552
AAA Configuration Task List
552
RADIUS Configuration Task List
553
HWTACACS Configuration Task List
554
Configuring AAA
554
Configuration Prerequisites
554
Creating an ISP Domain
554
Configuring ISP Domain Attributes
555
Configuring AAA Authentication Methods for an ISP Domain
556
Configuring AAA Authorization Methods for an ISP Domain
557
Configuring AAA Accounting Methods for an ISP Domain
559
Configuring Local User Attributes
561
Configuring User Group Attributes
562
Displaying and Maintaining AAA
563
Tearing down User Connections Forcibly
563
Configuring RADIUS
564
Creating a RADIUS Scheme
564
Specifying the RADIUS Accounting Servers and Relevant Parameters
565
Specifying the RADIUS Authentication/Authorization Servers
565
Setting the Shared Key for RADIUS Packets
566
Setting the Supported RADIUS Server Type
567
Setting the Upper Limit of RADIUS Request Retransmission Attempts
567
Setting the Status of RADIUS Servers
568
Configuring Attributes Related to Data to be Sent to the RADIUS Server
569
Setting Timers Regarding RADIUS Servers
570
Specifying a Security Policy Server
571
Displaying and Maintaining RADIUS
572
Enabling the Listening Port of the RADIUS Client
572
Configuring HWTACACS
572
Creating a HWTACACS Scheme
573
Specifying the HWTACACS Authentication Servers
573
Specifying the Hwtacacs Accounting Servers
574
Specifying the Hwtacacs Authorization Servers
574
Configuring Attributes Related to the Data Sent to Hwtacacs Server
575
Setting the Shared Key for Hwtacacs Packets
575
Setting Timers Regarding Hwtacacs Servers
576
Aaa Configuration Examples
577
Aaa for Telnet Users by a Hwtacacs Server
577
Displaying and Maintaining Hwtacacs
577
Aaa for Telnet Users by Separate Servers
579
Aaa for Ssh Users by a Radius Server
580
Troubleshooting Aaa
584
Troubleshooting Radius
584
Troubleshooting Hwtacacs
585
X Configuration
586
X Overview
586
Architecture of 802.1X
586
Authentication Modes of 802.1X
587
Basic Concepts of 802.1X
587
Eap over Lans
588
Eap over Radius
590
X Authentication Triggering
590
Authentication Process of 802.1X
591
X Timers
594
Extensions to 802.1X
595
Features Working Together with 802.1X
595
Configuring 802.1X
597
Configuring 802.1X Globally
597
Configuring 802.1X for a Port
599
Configuring an 802.1X Port-Based Guest Vlan
600
X Configuration Example
601
Displaying and Maintaining 802.1X
601
Guest Vlan and Vlan Assignment Configuration Example
603
Acl Assignment Configuration Example
606
3 Ead Fast Deployment Configuration
608
Ead Fast Deployment Overview
608
Ead Fast Deployment Implementation
608
Configuring Ead Fast Deployment
609
Displaying and Maintaining Ead Fast Deployment
610
Ead Fast Deployment Configuration Example
611
Troubleshooting Ead Fast Deployment
612
Users Cannot be Redirected Correctly
612
Introduction to Habp
613
4 Habp Configuration
613
Configuring Habp
614
Configuring the Habp Server
614
Displaying and Maintaining Habp
615
Habp Configuration Example
615
Configuring an Habp Client
615
5 Mac Authentication Configuration
617
Mac Authentication Overview
617
Local Mac Authentication
617
Radius-Based Mac Authentication
617
Related Concepts
618
Configuring Mac Authentication
618
Acl Assigning
618
Mac Authentication Timers
618
Quiet Mac Address
618
Vlan Assigning
618
Displaying and Maintaining Mac Authentication
620
Mac Authentication Configuration Examples
620
Local Mac Authentication Configuration Example
620
Radius-Based Mac Authentication Configuration Example
622
6 Port Security Configuration
626
Introduction to Port Security
626
Port Security Overview
626
Port Security Features
627
Port Security Modes
627
Port Security Configuration Task List
629
Enabling Port Security
630
Setting the Maximum Number of Secure Mac Addresses
630
Setting the Port Security Mode
631
Configuring Port Security Features
632
Configuring Intrusion Protection
633
Configuring Secure Mac Addresses
634
Configuring Trapping
634
Displaying and Maintaining Port Security
635
Ignoring Authorization Information from the Server
635
Port Security Configuration Examples
636
Configuring the Autolearn Mode
636
Configuring the Userloginwithoui Mode
638
Configuring the Macaddresselseuserloginsecure Mode
642
Cannot Set the Port Security Mode
644
Troubleshooting Port Security
644
Cannot Change Port Security Mode When a User Is Online
645
7 Ip Source Guard Configuration
646
Ip Source Guard Overview
646
Configuring a Static Binding Entry
646
Configuring Dynamic Binding Function
647
Ip Source Guard Configuration Examples
648
Displaying and Maintaining Ip Source Guard
648
Static Binding Entry Configuration Example
648
Dynamic Binding Function Configuration Example
649
Troubleshooting Ip Source Guard
651
Failed to Configure Static Binding Entries and Dynamic Binding Function
651
8 Ssh2.0 Configuration
652
Ssh2.0 Overview
652
Introduction to Ssh
652
Operation of Ssh
652
Configuring the Device as an Ssh Server
655
Generating a Dsa or Rsa Key Pair
655
Ssh Server Configuration Task List
655
Configuring the User Interfaces for Ssh Clients
656
Enabling Ssh Server
656
Configuring a Client Public Key
657
Configuring an Ssh User
658
Setting the Ssh Management Parameters
659
Configuring the Device as an Ssh Client
660
Specifying a Source Ip Address/Interface for the Ssh Client
660
Ssh Client Configuration Task List
660
Configuring Whether First-Time Authentication Is Supported
661
Displaying and Maintaining Ssh
662
Establishing a Connection between the Ssh Client and the Server
662
Ssh Server Configuration Examples
663
When Switch Acts as Server for Password Authentication
663
When Switch Acts as Server for Publickey Authentication
665
Ssh Client Configuration Examples
670
When Switch Acts as Client for Password Authentication
670
When Switch Acts as Client for Publickey Authentication
673
9 Sftp Configuration
675
Sftp Overview
675
Configuring an Sftp Server
675
Enabling the Sftp Server
675
Configuring an Sftp Client
676
Configuring the Sftp Connection Idle Timeout Period
676
Establishing a Connection to the Sftp Server
676
Specifying a Source Ip Address or Interface for the Sftp Client
676
Working with the Sftp Directories
677
Displaying Help Information
678
Working with Sftp Files
678
Terminating the Connection to the Remote Sftp Server
679
Sftp Client Configuration Example
679
Sftp Server Configuration Example
683
10 Pki Configuration
685
Introduction to Pki
685
Pki Overview
685
Pki Terms
685
Architecture of Pki
686
Applications of Pki
687
Operation of Pki
687
Pki Configuration Task List
688
Configuring an Entity Dn
688
Configuring a Pki Domain
690
Submitting a Pki Certificate Request
691
Submitting a Certificate Request in Auto Mode
692
Submitting a Certificate Request in Manual Mode
692
Retrieving a Certificate Manually
693
Configuring Pki Certificate Verification
694
Destroying a Local Rsa Key Pair
695
Deleting a Certificate
695
Configuring an Access Control Policy
696
Displaying and Maintaining Pki
696
Pki Configuration Examples
697
Requesting a Certificate from a Ca Running Rsa Keon
697
Requesting a Certificate from a Ca Running Windows 2003 Server
700
Configuring a Certificate Attribute-Based Access Control Policy
704
Failed to Retrieve a Ca Certificate
705
Troubleshooting Pki
705
Failed to Request a Local Certificate
706
Failed to Retrieve Crls
706
11 Ssl Configuration
707
Ssl Overview
707
Ssl Security Mechanism
707
Ssl Configuration Task List
708
Ssl Protocol Stack
708
Configuring an Ssl Server Policy
709
Ssl Server Policy Configuration Example
710
Configuring an Ssl Client Policy
711
Displaying and Maintaining Ssl
712
Ssl Handshake Failure
712
Troubleshooting Ssl
712
12 Public Key Configuration
714
Asymmetric Key Algorithm Overview
714
Basic Concepts
714
Key Algorithm Types
714
Asymmetric Key Algorithm Applications
715
Configuring the Local Asymmetric Key Pair
715
Creating an Asymmetric Key Pair
715
Destroying an Asymmetric Key Pair
716
Displaying or Exporting the Local Rsa or Dsa Host Public Key
716
Configuring the Public Key of a Peer
716
Displaying and Maintaining Public Keys
717
Public Key Configuration Examples
718
Configuring the Public Key of a Peer Manually
718
Importing the Public Key of a Peer from a Public Key File
719
13 Acl Overview
722
Introduction to Acl
722
Application of Acls on the Switch
722
Introduction to Ipv4 Acl
723
Ipv4 Acl Classification
723
Ipv4 Acl Naming
723
Ipv4 Acl Match Order
724
Effective Period of an Ipv4 Acl
725
Ip Fragments Filtering with Ipv4 Acl
725
Ipv4 Acl Step
725
Introduction to Ipv6 Acl
726
Ipv6 Acl Classification
726
Ipv6 Acl Match Order
726
Ipv6 Acl Naming
726
Effective Period of an Ipv6 Acl
727
Ipv6 Acl Step
727
Acl Application
727
14 Ipv4 Acl Configuration
728
Configuring a Basic Ipv4 Acl
729
Configuring an Advanced Ipv4 Acl
731
Configuring an Ethernet Frame Header Acl
733
Copying an Ipv4 Acl
734
Displaying and Maintaining Ipv4 Acls
735
Ipv4 Acl Configuration Example
735
15 Ipv6 Acl Configuration
738
Configuring a Basic Ipv6 Acl
738
Configuring an Advanced Ipv6 Acl
739
Copying an Ipv6 Acl
741
Displaying and Maintaining Ipv6 Acls
742
Ipv6 Acl Configuration Example
742
16 Acl Application for Packet Filtering
744
Filtering Ethernet Frames
744
Filtering Ipv4 Packets
744
Filtering Ipv6 Packets
745
Configuring Packet Filtering Statistics Function
745
Acl Application Examples
746
Acl Application to an Ethernet Interface
746
Acl Application to a Vlan Interface
747
Table of Contents
748
1 Smart Link Configuration
751
Smart Link Overview
751
Terminology
752
How Smart Link Works
753
Smart Link Configuration Task List
754
Configuring a Smart Link Device
754
Configuration Prerequisites
754
Configuring Member Ports for a Smart Link Group
755
Configuring Protected Vlans for a Smart Link Group
755
Configuring Role Preemption for a Smart Link Group
756
Enabling the Sending of Flush Messages
756
Smart Link Device Configuration Example
757
Configuring an Associated Device
757
Enabling the Receiving of Flush Messages
757
Associated Device Configuration Example
758
Displaying and Maintaining Smart Link
758
Smart Link Configuration Examples
759
Single Smart Link Group Configuration Example
759
Multiple Smart Link Groups Load Sharing Configuration Example
763
2 Monitor Link Configuration
767
Overview
767
How Monitor Link Works
767
Terminology
767
Configuring Monitor Link
768
Configuration Prerequisites
768
Configuration Procedure
768
Monitor Link Configuration Example
769
Displaying and Maintaining Monitor Link
769
3 RRPP Configuration
772
RRPP Overview
772
Background
772
Basic Concepts in RRPP
773
Rrppdus
775
How RRPP Works
776
RRPP Timers
776
Typical RRPP Networking
777
Protocols and Standards
780
Rrpp Configuration Task List
780
Creating an RRPP Domain
781
Configuring Control Vlans
781
Configuring Protected Vlans
781
Configuring RRPP Rings
781
Configuring Rrpp Ports
783
Configuring Rrpp Nodes
784
Activating an Rrpp Domain
786
Configuring Rrpp Timers
786
Configuring an Rrpp Ring Group
787
Displaying and Maintaining Rrpp
788
Rrpp Configuration Examples
788
Single Ring Configuration Example
788
Intersecting Ring Configuration Example
790
Intersecting-Ring Load Balancing Configuration Example
795
Received Packets
803
Troubleshooting
805
4 Dldp Configuration
806
How Dldp Works
807
Dldp Configuration Task List
813
Enabling Dldp
813
Setting Dldp Mode
814
Setting the Interval for Sending Advertisement Packets
814
Setting the Delaydown Timer
815
Setting the Port Shutdown Mode
815
Configuring Dldp Authentication
816
Resetting Dldp State
816
Displaying and Maintaining Dldp
817
Resetting Dldp State in Port View/Port Group View
817
Resetting Dldp State in System View
817
Dldp Configuration Example
818
5 Ethernet Oam Configuration
821
Ethernet Oam Overview
821
Ethernet Oampdus
821
Major Functions of Ethernet Oam
821
How Ethernet Oam Works
823
Standards and Protocols
825
Ethernet Oam Configuration Task List
825
Configuring Link Monitoring
826
Configuring Basic Ethernet Oam Functions
826
Configuring Errored Frame Event Detection
827
Configuring Errored Frame Period Event Detection
827
Configuring Errored Frame Seconds Event Detection
827
Configuring Errored Symbol Event Detection
827
Enabling Oam Remote Loopback
828
Displaying and Maintaining Ethernet Oam Configuration
829
Ethernet Oam Configuration Example
829
6 Connectivity Fault Detection Configuration
832
Basic Concepts in Cfd
832
Basic Functions of Cfd
835
Basic Configuration Tasks
836
Cfd Configuration Task List
836
Configuring Mip Generation Rules
838
Configuring CC on Meps
839
Configuring Lt on Meps
840
Displaying and Maintaining Cfd
841
Cfd Configuration Examples
841
Configuring Mep and Enabling CC on It
842
Configuring the Rules for Generating Mips
844
Configuring Lb on Meps
845
Track Overview
846
7 Track Configuration
846
Collaboration between the Track Module and the Detection Modules
846
Track Configuration Task List
847
Configuring Collaboration between the Track Module and the Detection Modules
847
Configuring Collaboration between the Track Module and the Application Modules
848
Configuring Track-Static Routing Collaboration
848
Displaying and Maintaining Track Object(S)
849
Track Configuration Examples
849
Static Routing-Track-Nqa Collaboration Configuration Example
849
Table of Contents
852
1 Logging in to an Ethernet Switch
862
Introduction to User Interface
862
Supported User Interfaces
862
Common User Interface Configuration
863
User Interface Number
863
Users and User Interfaces
863
2 Logging in through the Console Port
865
Setting up the Connection to the Console Port
865
Console Port Login Configuration
867
Common Configuration
867
Console Port Login Configurations for Different Authentication Modes
869
Console Port Login Configuration with Authentication Mode Being None
869
Configuration Procedure
869
Configuration Example
870
Console Port Login Configuration with Authentication Mode Being Password
871
Configuration Example
871
Configuration Procedure
871
Console Port Login Configuration with Authentication Mode Being Scheme
873
Configuration Procedure
873
Configuration Example
874
Configuring Command Authorization
875
Configuring Command Accounting
876
3 Logging in through Telnet/Ssh
877
Logging in through Telnet
877
Introduction
877
Telnet Connection Establishment
877
Common Configuration
879
Telnet Login Configuration with Authentication Mode Being None
879
Telnet Login Configuration with Authentication Mode Being Password
881
Telnet Login Configuration with Authentication Mode Being Scheme
884
Logging in through SSH
886
Configuring Command Authorization
886
Configuring Command Accounting
887
4 User Interface Configuration Examples
888
User Authentication Configuration Example
888
Configuration Procedure
888
Command Authorization Configuration Example
889
Network Diagram
889
Command Accounting Configuration Example
891
Web Server Configuration
893
Displaying Web Users
894
Connection Establishment Using Nms
896
6 Logging in through Nms
896
7 Specifying Source for Telnet Packets
897
Specifying Source Ip Address/Interface for Telnet Packets
897
Displaying the Source Ip Address/Interface Specified for Telnet Packets
898
Controlling Telnet Users
899
8 Controlling Login Users
899
Controlling Telnet Users by Source Ip Addresses
899
Controlling Telnet Users by Source and Destination Ip Addresses
900
Controlling Telnet Users by Source Mac Addresses
901
Controlling Network Management Users by Source Ip Addresses
902
Controlling Web Users by Source Ip Addresses
904
Configuration Display
906
Basic Configurations
906
9 Basic System Configurations
906
Entering/Exiting System View
907
Configuring the Device Name
907
Configuring the System Clock
907
Enabling/Disabling the Display of Copyright Information
910
Configuring a Banner
911
Configuring Cli Hotkeys
912
Configuring Command Aliases
913
Configuring User Privilege Levels and Command Levels
914
Displaying and Maintaining Basic Configurations
919
Cli Features
920
Introduction to Cli
920
Online Help with Command Lines
921
Editing Features
922
Synchronous Information Output
922
Undo Form of a Command
922
Cli Display
923
Saving History Commands
926
Command Line Error Information
927
10 Device Management
928
Device Management Overview
928
Device Management Configuration Task List
928
Configuring the Exception Handling Method
928
Rebooting a Device
929
Configuring the Scheduled Automatic Execution Function
930
Upgrading Device Software
931
Device Software Overview
931
Upgrading the Boot File through Command Lines
932
Upgrading the Boot Rom Program through Command Lines
932
Disabling Boot Rom Access
933
Configuring a Detection Interval
933
Clearing the 16-Bit Interface Indexes Not Used in the Current System
934
Identifying and Diagnosing Pluggable Transceivers
934
Introduction to Pluggable Transceivers
934
Identifying Pluggable Transceivers
935
Displaying and Maintaining Device Management Configuration
936
Diagnosing Pluggable Transceivers
936
Device Management Configuration Examples
937
Remote Scheduled Automatic Upgrade Configuration Example (Centralized Device)
937
Remote Scheduled Automatic Upgrade Configuration Example (Centralized Irf Device)
938
File System Management
941
11 File System Management Configuration
941
Directory Operations
942
File Operations
943
Batch Operations
945
Storage Medium Operations
946
Setting File System Prompt Modes
946
Configuration File Management
947
File System Operations Example
947
Configuration File Overview
948
Saving the Current Configuration
949
Setting Configuration Rollback
951
Backing up the Startup Configuration File
955
Specifying a Startup Configuration File for the Next System Startup
955
Deleting the Startup Configuration File for the Next Startup
956
Restoring the Startup Configuration File
956
Displaying and Maintaining Device Configuration
957
12 Ftp Configuration
958
Ftp Overview
958
Introduction to Ftp
958
Operation of Ftp
958
Configuring the Ftp Client
960
Establishing an Ftp Connection
960
Ftp Client Configuration Example
963
Configuring the Ftp Server
966
Configuring Ftp Server Operating Parameters
966
Configuring Authentication and Authorization on the Ftp Server
967
Ftp Server Configuration Example
968
Displaying and Maintaining Ftp
972
13 Tftp Configuration
973
Tftp Overview
973
Introduction to Tftp
973
Operation of Tftp
973
Configuring the Tftp Client
974
Displaying and Maintaining the Tftp Client
975
Tftp Client Configuration Example
976
14 Http Configuration
979
Http Overview
979
How Http Works
979
Logging in to the Device through Http
979
Enabling the Http Service
979
Configuring the Port Number of the Http Service
980
Associating the Http Service with an Acl
980
Displaying and Maintaining Http
980
15 Https Configuration
981
Https Overview
981
Https Configuration Task List
981
Associating the Https Service with an Ssl Server Policy
982
Enabling the Https Service
982
Associating the Https Service with a Certificate Attribute Access Control Policy
983
Configuring the Port Number of the Https Service
983
Associating the Https Service with an Acl
984
Displaying and Maintaining Https
984
Https Configuration Example
984
16 Snmp Configuration
987
Snmp Overview
987
Mib Overview
988
Snmp Protocol Version
988
Configuring Snmp Logging
991
Enabling Snmp Logging
991
Introduction to Snmp Logging
991
Snmp Trap Configuration
992
Enabling the Trap Function
992
Configuring Trap Parameters
993
Displaying and Maintaining Snmp
994
Snmp Configuration Example
995
Snmp Logging Configuration Example
996
Mib Style Configuration
998
Displaying and Maintaining Mib
998
Setting the Mib Style
998
17 Rmon Configuration
999
Rmon Overview
999
Working Mechanism
999
Rmon Groups
1000
Configuring Rmon
1001
Displaying and Maintaining Rmon
1003
Rmon Configuration Example
1003
18 Mac Address Table Management Configuration
1005
Introduction to Mac Address Table
1005
How a Mac Address Table Entry Is Generated
1005
Mac Address Table-Based Frame Forwarding
1006
Types of Mac Address Table Entries
1006
Configuring Mac Address Table Management
1007
Configuring Mac Address Table Entries
1007
Disabling Mac Address Learning on a Vlan
1007
Configuring the Aging Timer for Dynamic Mac Address Entries
1008
Configuring the Mac Learning Limit
1008
Displaying and Maintaining Mac Address Table Management
1009
Mac Address Table Management Configuration Example
1009
Mac Information Configuration
1011
Configuring Mac Information
1011
Enabling Mac Information Globally
1011
How Mac Information Works
1011
Introduction to Mac Information
1011
Configuring Mac Information Mode
1012
Configuring the Interval for Sending Syslog or Trap Messages
1012
Configuring the Mac Information Queue Length
1012
Enabling Mac Information on an Interface
1012
20 System Maintenance and Debugging
1015
Ping Configuration Example
1016
Configuring Tracert
1018
System Debugging
1019
Introduction to System Debugging
1019
Configuring System Debugging
1020
Ping and Tracert Configuration Example
1020
21 Information Center Configuration
1022
Information Center Overview
1022
System Information Format
1025
Configuring Information Center
1027
Information Center Configuration Task List
1027
Outputting System Information to the Console
1027
Outputting System Information to a Monitor Terminal
1028
Outputting System Information to a Log Host
1029
Outputting System Information to the Trap Buffer
1030
Outputting System Information to the Log Buffer
1031
Configuring Synchronous Information Output
1032
Outputting System Information to the Snmp Module
1032
Disabling a Port from Generating Link Up/Down Logging Information
1033
Displaying and Maintaining Information Center
1034
Information Center Configuration Examples
1034
Outputting Log Information to a Unix Log Host
1034
Outputting Log Information to a Linux Log Host
1036
Outputting Log Information to the Console
1038
22 Hotfix Configuration
1040
Hotfix Overview
1040
Basic Concepts in Hotfix
1040
Patch Status
1040
Hotfix Configuration Task List
1043
One-Step Patch Installation
1044
Step-By-Step Patch Installation
1045
Configuring the Patch File Location
1045
Loading a Patch File
1045
Step-By-Step Patch Installation Task List
1045
Activating Patches
1046
Confirm Running Patches
1046
One-Step Patch Uninstallation
1047
Step-By-Step Patch Uninstallation
1047
Deleting Patches
1047
Step-By-Step Patch Uninstallation Task List
1047
Stop Running Patches
1047
Displaying and Maintaining Hotfix
1048
Hotfix Configuration Examples
1048
Hotfix Configuration Example (Irf Device)
1049
23 Nqa Configuration
1051
Nqa Overview
1051
Features of Nqa
1051
Introduction to Nqa
1051
Basic Concepts of Nqa
1053
Nqa Configuration Task List
1054
Nqa Test Operation
1054
Configuring the Nqa Server
1055
Enabling the Nqa Client
1055
Creating an Nqa Test Group
1055
Configuring an Nqa Test Group
1056
Configuring an Icmp Echo Test
1056
Configuring a Dhcp Test
1057
Configuring an Ftp Test
1058
Configuring an Http Test
1059
Configuring a Udp Jitter Test
1060
Configuring an Snmp Test
1062
Configuring a Tcp Test
1063
Configuring a Udp Echo Test
1064
Configuring a Voice Test
1065
Configuring a Dlsw Test
1067
Configuring the Collaboration Function
1068
Configuring Trap Delivery
1069
Configuring Optional Parameters Common to an Nqa Test Group
1070
Configuring the Nqa Statistics Function
1070
Scheduling an Nqa Test Group
1072
Displaying and Maintaining Nqa
1073
Nqa Configuration Examples
1073
Icmp Echo Test Configuration Example
1073
Dhcp Test Configuration Example
1074
Network Requirements
1074
Ftp Test Configuration Example
1075
Http Test Configuration Example
1076
Udp Jitter Test Configuration Example
1078
Snmp Test Configuration Example
1080
Tcp Test Configuration Example
1081
Udp Echo Test Configuration Example
1083
Voice Test Configuration Example
1084
Dlsw Test Configuration Example
1087
Nqa Collaboration Configuration Example
1088
24 Ntp Configuration
1091
Ntp Overview
1091
Advantages of Ntp
1091
Applications of Ntp
1091
How Ntp Works
1092
Ntp Message Format
1093
Operation Modes of Ntp
1094
Ntp Configuration Task List
1096
Multiple Instances of Ntp
1096
Configuring the Operation Modes of Ntp
1097
Configuring the Ntp Symmetric Peers Mode
1098
Configuring Optional Parameters of Ntp
1100
Specifying the Source Interface for Ntp Messages
1100
Configuring the Maximum Number of Dynamic Sessions Allowed
1101
Disabling an Interface from Receiving Ntp Messages
1101
Configuring Access-Control Rights
1101
Configuring Ntp Authentication
1102
Displaying and Maintaining Ntp
1104
Ntp Configuration Examples
1105
Configuring the Ntp Symmetric Mode
1106
Configuring Ntp Broadcast Mode
1108
Configuring Ntp Multicast Mode
1109
Configuring Ntp Client/Server Mode with Authentication
1112
Configuring Ntp Broadcast Mode with Authentication
1113
25 Cluster Management Configuration
1116
Cluster Management Overview
1116
Cluster Management Definition
1116
Roles in a Cluster
1116
How a Cluster Works
1117
Cluster Configuration Task List
1120
Configuring the Management Device
1122
Enabling Ndp Globally and for Specific Ports
1122
Configuring Ndp Parameters
1123
Configuring Ntdp Parameters
1123
Enabling Ntdp Globally and for Specific Ports
1123
Manually Collecting Topology Information
1124
Enabling the Cluster Function
1125
Establishing a Cluster
1125
Configuring Cluster Management Protocol Packets
1126
Enabling Management Vlan Auto-Negotiation
1126
Cluster Member Management
1127
Configuring the Member Devices
1128
Configuring Access between the Management Device and Its Member Devices
1128
Adding a Candidate Device to a Cluster
1129
Configuring Advanced Cluster Functions
1130
Configuring Topology Management
1130
Configuring Interaction for a Cluster
1131
Snmp Configuration Synchronization Function
1132
Configuring Web User Accounts in Batches
1133
Displaying and Maintaining Cluster Management
1134
Cluster Management Configuration Example
1134
26 Irf Configuration
1138
Irf Overview
1138
Irf Working Process
1139
Irf Connections
1139
Role Election
1144
Topology Collection
1144
Irf Management
1145
Irf Configuration Task List
1148
Configuring Irf Ports
1149
Setting a Member ID for a Device
1150
Specifying a Priority for an Irf Member
1151
Specifying the Preservation Time of Irf Bridge Mac Address
1151
Enabling Auto Upgrade of Boot Files
1152
Setting the Delay Time for the Link Layer to Report a Link-Down Event
1153
Logging in to an Irf
1154
Logging in to a Slave
1154
Logging in to the Master
1154
Displaying and Maintaining Irf
1155
Irf Configuration Examples
1155
Irf Connection Configuration Example
1155
27 Ipc Configuration
1157
Ipc Overview
1157
Introduction to Ipc
1157
Enabling Ipc Performance Statistics
1158
Displaying and Maintaining Ipc
1159
28 Automatic Configuration
1160
Introduction to Automatic Configuration
1160
Typical Networking of Automatic Configuration
1160
How Automatic Configuration Works
1161
Work Flow of Automatic Configuration
1161
Obtaining the Ip Address of an Interface and Related Information through Dhcp
1162
Obtaining the Configuration File from the Tftp Server
1164
Executing the Configuration File
1166
Advertisement
Advertisement
Related Products
3Com 4500G Series
3Com Switch 4500 Family
3Com 4500G 24-Port
3Com 4500G 48-Port
3Com 4500G 3CR17761-91
3Com 4500G 3C17772-91
3Com 4500G 3CR17771-91
3Com 4500G 3CR17762-91
3Com 4500G PWR
3Com SuperStack 4 5500G-EI Series
3Com Categories
Switch
Network Router
Wireless Access Point
Modem
Network Card
More 3Com Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL