Sign In
Upload
Manuals
Brands
3Com Manuals
Switch
E4500-24
3Com E4500-24 Manuals
Manuals and User Guides for 3Com E4500-24. We have
1
3Com E4500-24 manual available for free PDF download: Cli Configuration Manual
3Com E4500-24 Cli Configuration Manual (848 pages)
HP E4500-24: User Guide
Brand:
3Com
| Category:
Switch
| Size: 9.68 MB
Table of Contents
Table of Contents
16
Cli Configuration
2
Command Hierarchy
2
Command Level and User Privilege Level
2
Introduction to the Cli
2
Modifying the Command Level
3
Switching User Level
4
Cli Views
8
Cli Features
12
Online Help
12
Command History
13
Terminal Display
13
Command Edit
14
Error Prompts
14
1 Logging in to an Ethernet Switch
18
Introduction to the User Interface
18
Supported User Interfaces
18
Common User Interface Configuration
19
User Interface Index
19
2 Logging in through the Console Port
21
Introduction
21
Console Port Login Configuration
23
Common Configuration
23
Console Port Login Configurations for Different Authentication Modes
24
Console Port Login Configuration with Authentication Mode Being None
25
Configuration Procedure
25
Configuration Example
26
Console Port Login Configuration with Authentication Mode Being Password
28
Configuration Procedure
28
Configuration Example
29
Console Port Login Configuration with Authentication Mode Being Scheme
30
Configuration Procedure
30
Configuration Example
32
3 Logging in through Telnet
34
Introduction
34
Common Configuration
34
Telnet Configurations for Different Authentication Modes
35
Telnet Configuration with Authentication Mode Being None
36
Configuration Procedure
36
Configuration Example
37
Telnet Configuration with Authentication Mode Being Password
38
Configuration Procedure
38
Configuration Example
39
Telnet Configuration with Authentication Mode Being Scheme
40
Configuration Procedure
40
Configuration Example
43
Telnetting to a Switch
44
Telnetting to a Switch from a Terminal
44
Telnetting to Another Switch from the Current Switch
46
4 Logging in Using a Modem
47
Introduction
47
Configuration on the Switch Side
47
Modem Configuration
47
Switch Configuration
48
Modem Connection Establishment
48
Introduction
51
Establishing an HTTP Connection
51
Configuring the Login Banner
52
Configuration Procedure
52
Configuration Example
53
Enabling/Disabling the WEB Server
53
6 Logging in through NMS
55
Introduction
55
Connection Establishment Using NMS
55
7 Configuring Source IP Address for Telnet Service Packets
56
Overview
56
Displaying Source IP Address Configuration
57
8 User Control
58
Introduction
58
Controlling Telnet Users
59
Controlling Telnet Users by Source and Destination IP Addresses
59
Controlling Telnet Users by Source IP Addresses
59
Prerequisites
59
Configuration Example
60
Controlling Telnet Users by Source MAC Addresses
60
Controlling Network Management Users by Source IP Addresses
61
Prerequisites
61
Configuration Example
62
Controlling Web Users by Source IP Address
63
Controlling Web Users by Source IP Addresses
63
Disconnecting a Web User by Force
63
Prerequisites
63
Configuration Example
64
Configuration File Management
65
Configuration File Management
66
Introduction to Configuration File
66
Configuration Task List
67
Saving the Current Configuration
67
Erasing the Startup Configuration File
69
Specifying a Configuration File for Next Startup
69
Displaying Switch Configuration
70
VLAN Overview/Vlan Configuration
71
1 VLAN Overview
72
Introduction to VLAN
72
Advantages of Vlans
73
VLAN Principles
73
VLAN Interface
75
VLAN Classification
75
Port-Based VLAN
75
Link Types of Ethernet Ports
75
Assigning an Ethernet Port to Specified Vlans
76
Configuring the Default VLAN ID for a Port
76
2 VLAN Configuration
78
VLAN Configuration Task List
78
Basic VLAN Configuration
78
Basic VLAN Interface Configuration
79
Displaying VLAN Configuration
80
Configuring a Port-Based VLAN
80
Configuring the Link Type of an Ethernet Port
80
Port-Based VLAN Configuration Task List
80
Assigning an Ethernet Port to a VLAN
81
Configuring the Default VLAN for a Port
82
Displaying and Maintaining Port-Based VLAN
82
Port-Based VLAN Configuration Example
82
IP Addressing Configuration/Ip Performance Optimization Configuration
85
1 IP Addressing Configuration
86
IP Addressing Overview
86
IP Address Classes
86
Special Case IP Addresses
87
Subnetting and Masking
87
Configuring IP Addresses
88
Configuring Static Domain Name Resolution
89
Displaying IP Addressing Configuration
89
IP Address Configuration Examples
90
IP Address Configuration Example II
90
Static Domain Name Resolution Configuration Example
92
2 IP Performance Optimization Configuration
93
IP Performance Overview
93
Introduction to FIB
93
Introduction to IP Performance Configuration
93
Configuring IP Performance
93
Configuring TCP Attributes
93
IP Performance Configuration Task List
93
Disabling ICMP to Send Error Packets
94
Displaying and Maintaining IP Performance Configuration
95
Voice VLAN Configuration
96
Voice VLAN Configuration
97
Voice VLAN Overview
97
How an IP Phone Works
97
How Switch 4500 Series Switches Identify Voice Traffic
99
Setting the Voice Traffic Transmission Priority
99
Configuring Voice VLAN Assignment Mode of a Port
100
Support for Voice VLAN on Various Ports
100
Security Mode of Voice VLAN
102
Voice VLAN Configuration
103
Configuration Prerequisites
103
Configuring the Voice VLAN to Operate in Automatic Voice VLAN Assignment Mode
103
Configuring the Voice VLAN to Operate in Manual Voice VLAN Assignment Mode
104
Displaying and Maintaining Voice VLAN
106
Voice VLAN Configuration Example
106
Voice VLAN Configuration Example (Automatic Voice VLAN Assignment Mode)
106
Voice VLAN Configuration Example (Manual Voice VLAN Assignment Mode)
109
Gvrp Configuration
111
GVRP Configuration
112
Introduction to GVRP
112
Garp
112
Gvrp
115
Protocol Specifications
115
GVRP Configuration
115
GVRP Configuration Tasks
115
Enabling GVRP
115
Configuring GVRP Timers
116
Configuring GVRP Port Registration Mode
117
Displaying and Maintaining GVRP
118
GVRP Configuration Example
118
# Display the VLAN Information Dynamically Registered on Switch E.
122
Ethernet Port Configuration
123
Combo Port Configuration
123
Initially Configuring a Port
123
Configuring Port Auto-Negotiation Speed
124
Limiting Traffic on Individual Ports
125
Configuring Flow Control on a Port
126
Duplicating the Configuration of a Port to Other Ports
127
Configuring Loopback Detection for an Ethernet Port
127
Enabling Loopback Test
129
Enabling the System to Test Connected Cable
130
Configuring the Interval to Perform Statistical Analysis on Port Traffic
130
Enabling Giant-Frame Statistics Function
131
Disabling Up/Down Log Output on a Port
131
Setting the Port State Change Delay
132
Displaying and Maintaining Basic Port Configuration
133
Port Basic Configuration
123
Ethernet Port Configuration Example
133
Troubleshooting Ethernet Port Configuration
134
Link Aggregation Configuration
135
Link Aggregation Configuration
136
Overview
136
Introduction to Link Aggregation
136
Introduction to LACP
136
Consistency Considerations for the Ports in Aggregation
136
Link Aggregation Classification
137
Manual Aggregation Group
137
Static LACP Aggregation Group
138
Dynamic LACP Aggregation Group
139
Aggregation Group Categories
140
Link Aggregation Configuration
141
Configuring a Manual Aggregation Group
141
Configuring a Static LACP Aggregation Group
142
Configuring a Dynamic LACP Aggregation Group
143
Configuring a Description for an Aggregation Group
144
Displaying and Maintaining Link Aggregation Configuration
144
Link Aggregation Configuration Example
145
Ethernet Port Aggregation Configuration Example
145
Port Isolation Configuration
147
Port Isolation Configuration
148
Port Isolation Overview
148
Port Isolation Configuration Example
149
Displaying and Maintaining Port Isolation Configuration
149
Port Security Configuration
151
Port Security Configuration
152
Port Security Overview
152
Introduction
152
Port Security Features
152
Port Security Modes
152
Port Security Configuration Task List
155
Enabling Port Security
156
Setting the Maximum Number of MAC Addresses Allowed on a Port
156
Setting the Port Security Mode
157
Configuring Port Security Features
158
Configuring Guest VLAN for a Port in Macaddressoruserloginsecure Mode
159
Ignoring the Authorization Information from the RADIUS Server
161
Configuring Security MAC Addresses
161
Displaying and Maintaining Port Security Configuration
163
Port Security Configuration Examples
163
Port Security Configuration Example
163
Guest VLAN Configuration Example
164
Dldp Configuration
166
DLDP Configuration
167
Overview
167
DLDP Fundamentals
168
DLDP Packets
168
DLDP Status
170
DLDP Timers
170
DLDP Operating Mode
171
DLDP Implementation
172
DLDP Neighbor State
174
Link Auto-Recovery Mechanism
174
DLDP Configuration
175
Performing Basic DLDP Configuration
175
Resetting DLDP State
176
Displaying and Maintaining DLDP
176
DLDP Configuration Example
177
Mac Address Table Management
179
MAC Address Table Management
180
Overview
180
Introduction to the MAC Address Table
180
Introduction to MAC Address Learning
180
Managing MAC Address Table
182
MAC Address Table Management
183
MAC Address Table Management Configuration Task List
183
Configuring a MAC Address Entry
184
Setting the MAC Address Aging Timer
185
Setting the Maximum Number of MAC Addresses a Port Can Learn
185
Enabling Destination MAC Address Triggered Update
186
Displaying MAC Address Table Information
186
Configuration Examples
187
Adding a Static Mac Address Entry Manually
187
Auto Detect Configuration
188
Auto Detect Configuration
189
Introduction to the Auto Detect Function
189
Auto Detect Basic Configuration
190
Auto Detect Implementation in Static Routing
190
Auto Detect Implementation in VLAN Interface Backup
191
Auto Detect Configuration Examples
192
Configuration Example for Auto Detect Implementation with Static Routing
192
Configuration Example for Auto Detect Implementation with VLAN Interface Backup
193
Mstp Configuration
195
MSTP Configuration
197
Overview
197
Spanning Tree Protocol Overview
197
Rapid Spanning Tree Protocol Overview
206
Multiple Spanning Tree Protocol Overview
206
MSTP Implementation on Switches
210
MSTP Configuration Task List
211
Configuring Root Bridge
213
Configuring an MST Region
213
Specifying the Current Switch as a Root Bridge/Secondary Root Bridge
214
Configuring the Bridge Priority of the Current Switch
216
Configuring How a Port Recognizes and Sends MSTP Packets
216
Configuring the MSTP Operation Mode
217
Configuring the Maximum Hop Count of an MST Region
218
Configuring the Network Diameter of the Switched Network
219
Configuring the MSTP Time-Related Parameters
219
Configuring the Timeout Time Factor
221
Configuring the Maximum Transmitting Rate on the Current Port
221
Configuring the Current Port as an Edge Port
222
Setting the Link Type of a Port to P2P
223
Enabling MSTP
224
Configuring Leaf Nodes
225
Configuring the MST Region
225
Configuring How a Port Recognizes and Sends MSTP Packets
225
Configuring the Timeout Time Factor
226
Configuring the Maximum Transmitting Rate on the Current Port
226
Configuring a Port as an Edge Port
226
Configuring the Path Cost for a Port
226
Configuring Port Priority
228
Setting the Link Type of a Port to P2P
229
Enabling MSTP
229
Performing Mcheck Operation
229
Configuration Prerequisites
229
Configuration Procedure
230
Configuration Example
230
Configuring Guard Functions
230
Configuring BPDU Guard
230
Configuring Root Guard
231
Configuring Loop Guard
233
Configuring TC-BPDU Attack Guard
233
Configuring BPDU Dropping
234
Configuring Digest Snooping
235
Introduction
235
Configuring Digest Snooping
236
Configuring Rapid Transition
237
Introduction
237
Configuring Rapid Transition
239
Configuring VLAN-VPN Tunnel
240
Introduction
240
MSTP Maintenance Configuration
241
Introduction
241
Enabling Log/Trap Output for Ports of MSTP Instance
241
Configuration Example
241
Displaying and Maintaining MSTP
242
Enabling Trap Messages Conforming to 802.1D Standard
242
MSTP Configuration Example
243
VLAN-VPN Tunnel Configuration Example
245
Table of Contents
247
1 IP Routing Protocol Overview
249
Introduction to IP Route and Routing Table
249
IP Route
249
Routing Table
249
Routing Protocol Overview
251
Classification of Dynamic Routing Protocols
251
Routing Protocols and Routing Priority
251
Static Routing and Dynamic Routing
251
Load Sharing and Route Backup
252
Routing Information Sharing
252
Displaying and Maintaining a Routing Table
253
2 Static Route Configuration
254
Introduction to Static Route
254
Static Route
254
Default Route
255
Static Route Configuration
255
Configuration Prerequisites
255
Configuring a Static Route
255
Displaying and Maintaining Static Routes
255
Static Route Configuration Example
256
Troubleshooting a Static Route
257
3 RIP Configuration
258
RIP Overview
258
Basic Concepts
258
RIP Startup and Operation
259
RIP Configuration Task List
259
Basic RIP Configuration
260
Configuration Prerequisites
260
Configuring Basic Rip Functions
260
RIP Route Control
261
Configuration Prerequisites
262
Configuring RIP Route Control
262
RIP Network Adjustment and Optimization
265
Configuration Prerequisites
265
Configuration Tasks
265
Displaying and Maintaining RIP Configuration
267
RIP Configuration Example
267
Troubleshooting RIP Configuration
268
Failed to Receive RIP Updates
268
4 IP Route Policy Configuration
269
IP Route Policy Overview
269
Filters
269
Introduction to IP Route Policy
269
IP Route Policy Configuration Task List
270
Route Policy Configuration
270
Configuration Prerequisites
271
Defining a Route Policy
271
Defining If-Match Clauses and Apply Clauses
271
IP-Prefix Configuration
273
Configuring an Ip-Prefix List
273
Displaying IP Route Policy
273
IP Route Policy Configuration Example
274
Controlling RIP Packet Cost to Implement Dynamic Route Backup
274
Troubleshooting IP Route Policy
277
Table of Contents
278
1 Multicast Overview
280
Information Transmission in the Unicast Mode
280
Information Transmission in the Broadcast Mode
281
Information Transmission in the Multicast Mode
282
Roles in Multicast
282
Common Notations in Multicast
283
Advantages and Applications of Multicast
283
Multicast Models
284
Multicast Architecture
284
Multicast Address
285
Multicast Protocols
287
Multicast Packet Forwarding Mechanism
289
Implementation of the RPF Mechanism
290
RPF Check
290
2 Common Multicast Configuration
292
Configuring Suppression on the Multicast Source Port
292
Configuring a Multicast MAC Address Entry
293
Configuring Dropping Unknown Multicast Packets
294
Displaying and Maintaining Common Multicast Configuration
294
3 IGMP Snooping Configuration
295
IGMP Snooping Overview
295
Principle of IGMP Snooping
295
Basic Concepts in IGMP Snooping
296
Work Mechanism of IGMP Snooping
297
Configuring IGMP Snooping
299
Enabling IGMP Snooping
299
Configuring the Version of IGMP Snooping
300
Configuring Timers
300
Configuring Fast Leave Processing
301
Configuring a Multicast Group Filter
302
Configuring the Maximum Number of Multicast Groups on a Port
303
Configuring IGMP Snooping Querier
304
Configuring Static Member Port for a Multicast Group
305
Suppressing Flooding of Unknown Multicast Traffic in a VLAN
305
Configuring a Static Router Port
306
Configuring a Port as a Simulated Group Member
307
Configuring a VLAN Tag for Query Messages
308
Configuring Multicast VLAN
308
Displaying and Maintaining IGMP Snooping
310
IGMP Snooping Configuration Examples
310
Troubleshooting Igmp Snooping
315
Table of Contents
316
802.1X Configuration
318
Introduction to 802.1X
318
Architecture of 802.1X Authentication
318
Encapsulation of Eapol Messages
320
The Mechanism of an 802.1X Authentication System
320
802.1X Authentication Procedure
322
Timers Used in 802.1X
326
Additional 802.1X Features on Switch 4500
327
Introduction to 802.1X Configuration
330
Basic 802.1X Configuration
330
Configuration Prerequisites
330
Configuring Basic 802.1X Functions
331
Timer and Maximum User Number Configuration
332
Advanced 802.1X Configuration
333
Configuring Proxy Checking
333
Configuring Client Version Checking
334
Configuring 802.1X Re-Authentication
335
Configuring Guest VLAN
335
Enabling DHCP-Triggered Authentication
335
Configuring the 802.1X Re-Authentication Timer
336
Displaying and Maintaining 802.1X Configuration
337
Configuration Example
337
2 Quick EAD Deployment Configuration
340
Introduction to Quick EAD Deployment
340
Operation of Quick EAD Deployment
340
Quick EAD Deployment Overview
340
Configuring Quick EAD Deployment
341
Configuration Prerequisites
341
Configuration Procedure
341
Displaying and Maintaining Quick EAD Deployment
342
Quick EAD Deployment Configuration Example
342
Troubleshooting
343
3 HABP Configuration
344
Introduction to HABP
344
HABP Server Configuration
344
HABP Client Configuration
345
Displaying and Maintaining HABP Configuration
345
4 System Guard Configuration
346
System Guard Overview
346
Guard against IP Attacks
346
Guard against TCN Attacks
346
Layer 3 Error Control
346
Configuring System Guard
346
Configuring System Guard against IP Attacks
346
Configuring System Guard against TCN Attacks
347
Enabling Layer 3 Error Control
348
Displaying and Maintaining System Guard Configuration
348
Aaa Overview/Aaa Configuration
349
1 AAA Overview
351
Introduction to AAA
351
Accounting
351
Authentication
351
Introduction to ISP Domain
352
Introduction to AAA Services
352
Introduction to RADIUS
352
Introduction to HWTACACS
356
2 AAA Configuration
361
Creating an ISP Domain and Configuring Its Attributes
361
Configuring an AAA Scheme for an ISP Domain
362
Configuring Dynamic VLAN Assignment
365
Configuring the Attributes of a Local User
366
Cutting down User Connections Forcibly
368
RADIUS Configuration Task List
368
Configuring RADIUS Authentication/Authorization Servers
370
Creating a RADIUS Scheme
370
Configuring RADIUS Accounting Servers
371
Configuring Shared Keys for RADIUS Messages
372
Configuring the Maximum Number of RADIUS Request Transmission Attempts
373
Configuring the Type of RADIUS Servers to be Supported
373
Configuring the Attributes of Data to be Sent to RADIUS Servers
374
Configuring the Status of RADIUS Servers
374
Configuring the Local RADIUS Server
376
Configuring Timers for RADIUS Servers
377
Enabling Sending Trap Message When a RADIUS Server Goes down
378
Enabling the User Re-Authentication at Restart Function
378
HWTACACS Configuration Task List
380
Configuring TACACS Authentication Servers
380
Creating a HWTACACS Scheme
380
Configuring TACACS Authorization Servers
381
Configuring Shared Keys for HWTACACS Messages
382
Configuring TACACS Accounting Servers
382
Configuring the Attributes of Data to be Sent to TACACS Servers
383
Configuring the Timers Regarding TACACS Servers
383
Displaying and Maintaining AAA Configuration
384
Displaying and Maintaining HWTACACS Protocol Configuration
385
Displaying and Maintaining RADIUS Protocol Configuration
385
AAA Configuration Examples
385
Remote RADIUS Authentication of Telnet/Ssh Users
385
Local Authentication of Ftp/Telnet Users
387
HWTACACS Authentication and Authorization of Telnet Users
388
Troubleshooting AAA
389
Troubleshooting RADIUS Configuration
389
Troubleshooting HWTACACS Configuration
390
Typical Network Application of EAD
391
Introduction to Ead
391
EAD Configuration
391
EAD Configuration Example
392
Mac Address Authentication Configuration
394
MAC Address Authentication Configuration
395
MAC Address Authentication Overview
395
Performing MAC Address Authentication on a RADIUS Server
395
Performing MAC Address Authentication Locally
395
Configuring Basic MAC Address Authentication Functions
396
Related Concepts
396
MAC Address Authentication Timers
396
Quiet MAC Address
396
MAC Address Authentication Enhanced Function Configuration
397
MAC Address Authentication Enhanced Function Configuration Task List
397
Configuring a Guest VLAN
398
Configuring the Maximum Number of Mac Address Authentication Users Allowed to Access a Port
400
Displaying and Maintaining MAC Address Authentication Configuration
401
MAC Address Authentication Configuration Examples
401
Arp Configuration/Arp Attack Defense Configuration
403
1 ARP Configuration
404
Introduction to ARP
404
ARP Function
404
ARP Message Format
404
ARP Process
406
ARP Table
406
Introduction to Gratuitous ARP
407
Configuring ARP
407
Configuring Gratuitous ARP
408
Displaying and Debugging ARP
409
ARP Configuration Examples
409
2 ARP Attack Defense Configuration
410
Introduction to Maximum Number of Dynamic ARP Entries a VLAN Interface Can Learn
410
Introduction to ARP Attack Detection
410
Introduction to ARP Packet Rate Limit
412
Introduction to ARP Packet Filtering Based on Gateway's Address
412
Configuring ARP Attack Defense
413
ARP Attack Defense Configuration Task List
413
ARP Packet Filtering Based on Gateway's Address
414
Configuring ARP Source MAC Address Consistency Check
414
Configuring the Maximum Number of Dynamic ARP Entries that a VLAN Interface Can Learn
414
Configuring ARP Attack Detection
415
Configuring the ARP Packet Rate Limit Function
416
ARP Attack Defense Configuration Example
417
Arp Attack Defense Configuration Example I
417
Arp Attack Defense Configuration Example II
419
Arp Attack Defense Configuration Example III
420
Arp Attack Defense Configuration Example IV
420
Dhcp Overview/Dhcp Server Configuration
422
1 Dhcp Overview
425
DHCP IP Address Assignment
425
IP Address Assignment Policy
425
Obtaining IP Addresses Dynamically
426
Updating IP Address Lease
426
Introduction to DHCP
425
DHCP Packet Format
427
Protocol Specification
428
2 DHCP Server Configuration
429
Introduction to DHCP Server
429
DHCP Address Pool
429
Usage of DHCP Server
429
DHCP IP Address Preferences
431
XRN Support
431
DHCP Server Configuration Task List
432
Enabling DHCP
432
Configuring the Global Address Pool Based DHCP Server
433
Configuration Task List
433
Enabling the Global Address Pool Mode on Interface
433
Configuring an Address Allocation Mode for the Global Address Pool
434
Creating a DHCP Global Address Pool
434
Configuring a Domain Name Suffix for the DHCP Client
437
Configuring DNS Servers for the DHCP Client
437
Configuring WINS Servers for the DHCP Client
438
Configuring BIMS Server Information for the DHCP Client
439
Configuring Gateways for the DHCP Client
439
Configuring Option 184 Parameters for the Client with Voice Service
439
Configuring a Self-Defined DHCP Option
442
Configuring the TFTP Server and Bootfile Name for the DHCP Client
442
Configuring the Interface Address Pool Based DHCP Server
443
Configuration Task List
443
Enabling the Interface Address Pool Mode on Interface
444
Configuring an Address Allocation Mode for an Interface Address Pool
445
Configuring a Domain Name Suffix for the DHCP Client
447
Configuring DNS Servers for the DHCP Client
447
Configuring WINS Servers for the DHCP Client
448
Configuring BIMS Server Information for the DHCP Client
449
Configuring Option 184 Parameters for the Client with Voice Service
449
Configuring the TFTP Server and Bootfile Name for the DHCP Client
450
Configuring a Self-Defined DHCP Option
451
Configuring DHCP Server Security Functions
452
Configuring IP Address Detecting
452
Enabling Unauthorized DHCP Server Detection
452
Prerequisites
452
Configuring DHCP Accounting Functions
453
DHCP Accounting Fundamentals
453
Introduction to DHCP Accounting
453
DHCP Accounting Configuration
454
Enabling the DHCP Server to Process Option 82
454
Displaying and Maintaining the DHCP Server
455
DHCP Server Configuration Examples
455
DHCP Server Configuration Example
455
DHCP Server with Option 184 Support Configuration Example
457
DHCP Accounting Configuration Example
459
Troubleshooting a DHCP Server
460
3 DHCP Relay Agent Configuration
461
Introduction to DHCP Relay Agent
461
DHCP Relay Agent Fundamentals
461
Usage of DHCP Relay Agent
461
Option 82 Support on DHCP Relay Agent
462
Configuring the DHCP Relay Agent
463
Correlating a DHCP Server Group with a Relay Agent Interface
464
DHCP Relay Agent Configuration Task List
464
Enabling DHCP
464
Configuring DHCP Relay Agent Security Functions
465
Configuring the DHCP Relay Agent to Support Option 82
467
Displaying and Maintaining DHCP Relay Agent Configuration
468
DHCP Relay Agent Configuration Example
468
Troubleshooting DHCP Relay Agent Configuration
469
4 DHCP Snooping Configuration
471
DHCP Snooping Overview
471
Introduction to DHCP Snooping
471
Introduction to DHCP-Snooping Option 82
472
Introduction to IP Filtering
474
Configuring DHCP Snooping
475
Configuring DHCP Snooping to Support Option 82
476
Configuring IP Filtering
479
Displaying and Maintaining DHCP Snooping Configuration
480
DHCP Snooping Configuration Examples
481
DHCP-Snooping Option 82 Support Configuration Example
481
IP Filtering Configuration Example
482
5 DHCP Packet Rate Limit Configuration
484
Introduction to DHCP Packet Rate Limit
484
Configuring DHCP Packet Rate Limit
485
Configuring Port State Auto Recovery
485
Rate Limit Configuration Example
486
6 DHCP/BOOTP Client Configuration
488
Introduction to DHCP Client
488
Introduction to BOOTP Client
488
Configuring a DHCP/BOOTP Client
489
BOOTP Client Configuration Example
490
DHCP Client Configuration Example
490
Displaying DHCP/BOOTP Client Configuration
490
Acl Configuration
491
Acl Configuration
492
ACL Overview
492
ACL Matching Order
492
Ways to Apply an ACL on a Switch
493
Types of Acls Supported by Switch 4500 Series
494
ACL Configuration Task List
494
Configuring Time Range
496
Configuring Basic ACL
496
Configuring Advanced ACL
497
Configuring Layer 2 ACL
498
Configuring User-Defined ACL
499
Applying ACL Rules on Ports
501
Applying ACL Rules to Ports in a VLAN
501
Displaying and Maintaining ACL Configuration
502
Examples for Upper-Layer Software Referencing Acls
502
Example for Controlling Telnet Login Users by Source IP
502
Example for Controlling Web Login Users by Source IP
503
Examples for Applying Acls to Hardware
503
Basic ACL Configuration Example
503
Advanced ACL Configuration Example
504
Layer 2 ACL Configuration Example
505
User-Defined ACL Configuration Example
506
Example for Applying an ACL to a VLAN
506
Qos Configuration
508
Overview
509
Introduction to Qos
509
Traditional Packet Forwarding Service
509
New Applications and New Requirements
509
Major Traffic Control Techniques
510
Qos Configuration
509
Introduction to Qos Functions
511
Traffic Classification
511
Priority Trust Mode
512
Protocol Priority
515
Priority Marking
516
Traffic Policing
516
Line Rate
517
VLAN Mapping
517
Queue Scheduling
517
Congestion Avoidance
520
Traffic Mirroring
521
Qos Supported by Switch 4500 Series
511
Qos Configuration
521
Configuring Priority Trust Mode
521
Configuring the Mapping between 802.1P Priority and Local Precedence
522
Setting the Priority of Protocol Packets
523
Marking Packet Priority
524
Configuring Traffic Policing
525
Configuring Line Rate
526
Configuring VLAN Mapping
527
Configuring Queue Scheduling
527
Configuring WRED
529
Configuring Traffic Mirroring
530
Displaying and Maintaining Qos
531
Qos Configuration Examples
532
Configuration Example of Traffic Policing and Line Rate
532
Configuration Example of Priority Marking and Queue Scheduling
533
VLAN Mapping Configuration Example
534
Mirroring Configuration
537
Mirroring Configuration
538
Mirroring Overview
538
Local Port Mirroring
538
Remote Port Mirroring
539
Traffic Mirroring
540
Mirroring Configuration
540
Configuring Local Port Mirroring
541
Configuring Remote Port Mirroring
541
Displaying and Maintaining Port Mirroring
544
Mirroring Configuration Examples
545
Local Port Mirroring Configuration Example
545
Remote Port Mirroring Configuration Example
546
Xrn Fabric Configuration
549
Introduction to XRN
550
Establishment of an XRN Fabric
550
How XRN Works
553
XRN Fabric Configuration
550
XRN Fabric Configuration
553
XRN Fabric Configuration Task List
553
Specifying the Fabric Port of a Switch
554
Specifying the VLAN Used to Form an XRN Fabric
555
Setting a Unit ID for a Switch
556
Assigning a Unit Name to a Switch
557
Assigning an XRN Fabric Name to a Switch
557
Setting the XRN Fabric Authentication Mode
557
Displaying and Maintaining XRN Fabric
558
XRN Fabric Configuration Example
558
Network Diagram
559
Cluster
561
Cluster
562
Cluster Overview
562
Introduction to HGMP
562
Roles in a Cluster
563
How a Cluster Works
565
Cluster Configuration Task List
570
Configuring the Management Device
570
Configuring Member Devices
575
Managing a Cluster through the Management Device
577
Configuring the Enhanced Cluster Features
578
Displaying and Maintaining Cluster Configuration
580
Cluster Configuration Examples
581
Basic Cluster Configuration Example
581
Network Management Interface Configuration Example
585
Enhanced Cluster Feature Configuration Example
586
Poe Configuration/Poe Profile Configuration
588
1 Poe Configuration
589
Poe Overview
589
Introduction to Poe
589
Poe Features Supported by Switch 4500
589
Poe Configuration Task List
590
Enabling the Poe Feature on a Port
591
Setting Poe Management Mode and Poe Priority of a Port
591
Setting the Maximum Output Power on a Port
591
Setting the Poe Mode on a Port
592
Configuring a PD Disconnection Detection Mode
593
Configuring Poe Over-Temperature Protection on the Switch
593
Configuring the PD Compatibility Detection Function
593
Upgrading the PSE Processing Software of Fabric Switches Online
594
Upgrading the PSE Processing Software Online
594
Displaying Poe Configuration
595
Poe Configuration Example
595
2 Poe Profile Configuration
597
Introduction to Poe Profile
597
Displaying Poe Profile Configuration
599
Poe Profile Configuration Example
599
Poe Profile Application Example
599
UDP Helper Configuration
602
UDP Helper Configuration
603
Introduction to UDP Helper
603
Configuring UDP Helper
604
Displaying and Maintaining UDP Helper
604
UDP Helper Configuration Example
605
Cross-Network Computer Search through UDP Helper
605
Snmp Configuration/Rmon Configuration
606
1 Snmp Configuration
607
Snmp Overview
607
SNMP Operation Mechanism
607
Snmp Versions
607
Configuring Basic SNMP Functions
608
Supported Mibs
608
Configuring Trap-Related Functions
610
Configuring Basic Trap Functions
610
Configuring Extended Trap Function
611
Enabling Logging for Network Management
611
Displaying Snmp
612
SNMP Configuration Example
612
2 Rmon Configuration
615
Introduction to RMON
615
Working Mechanism of RMON
615
Commonly Used RMON Groups
616
Displaying Rmon
618
RMON Configuration Example
618
Ntp Configuration
620
Introduction to NTP
621
Applications of NTP
621
Implementation Principle of NTP
622
NTP Implementation Modes
623
Ntp Configuration
621
Configuring NTP Implementation Modes
626
Configuring NTP Server/Client Mode
627
Configuring the NTP Symmetric Peer Mode
627
Configuring NTP Broadcast Mode
628
Configuring NTP Multicast Mode
629
NTP Configuration Task List
626
Configuring Access Control Right
630
Configuring NTP Authentication
631
Configuring Optional NTP Parameters
633
Configuring an Interface on the Local Switch to Send NTP Messages
633
Configuring the Number of Dynamic Sessions Allowed on the Local Switch
633
Disabling an Interface from Receiving NTP Messages
633
Displaying NTP Configuration
634
Configuring NTP Server/Client Mode
635
Configuring Ntp Symmetric Peer Mode
636
Configuring NTP Broadcast Mode
638
Configuring NTP Server/Client Mode with Authentication
641
Ssh Configuration
643
Ssh Configuration
644
Ssh Overview
644
Introduction to SSH
644
Algorithm and Key
644
SSH Operating Process
645
SSH Server and Client
647
Configuring the SSH Server
648
Configuring the User Interfaces for SSH Clients
649
Configuring the SSH Management Functions
650
Configuring Key Pairs
651
Creating an SSH User and Specifying an Authentication Type
652
Specifying a Service Type for an SSH User on the Server
653
Configuring the Public Key of a Client on the Server
654
Assigning a Public Key to an SSH User
655
Exporting the Host Public Key to a File
655
Configuring the SSH Client
656
SSH Client Configuration Task List
656
Configuring an SSH Client that Runs SSH Client Software
656
Configuring an SSH Client Assumed by an SSH2-Capable Switch
662
Displaying and Maintaining SSH Configuration
664
Comparison of SSH Commands with the same Functions
665
SSH Configuration Examples
666
When Switch Acts as Server for Local Password Authentication
666
When Switch Acts as Server for Password and RADIUS Authentication
668
When Switch Acts as Server for Password and HWTACACS Authentication
673
When Switch Acts as Server for Publickey Authentication
675
When Switch Acts as Client for Password Authentication
681
When Switch Acts as Client for Publickey Authentication
682
When Switch Acts as Client and First-Time Authentication Is Not Supported
684
File System Management Configuration
688
File System Configuration
689
Introduction to File System
689
File System Configuration Task List
689
Directory Operations
690
File Operations
690
Flash Memory Operations
691
Prompt Mode Configuration
692
File System Configuration Examples
692
File System Management Configuration
689
File Attribute Configuration
693
Introduction to File Attributes
693
Booting with the Startup File
694
Configuring File Attributes
695
Configuration File Backup and Restoration
696
Introduction to Configuration File Backup and Restoration
696
File Backup and Restoration
696
Ftp and Sftp Configuration/Tftp Configuration
697
1 FTP and SFTP Configuration
698
Introduction to FTP and SFTP
698
Introduction to FTP
698
FTP Configuration: a Switch Operating as an FTP Server
699
Introduction to SFTP
699
FTP Configuration: a Switch Operating as an FTP Client
703
Configuration Example: a Switch Operating as an FTP Server
706
FTP Banner Display Configuration Example
708
FTP Configuration: a Switch Operating as an FTP Client
709
SFTP Configuration: a Switch Operating as an SFTP Server
711
SFTP Configuration: a Switch Operating as an SFTP Client
712
SFTP Configuration Example
714
2 Tftp Configuration
718
Introduction to Tftp
718
TFTP Configuration: a Switch Operating as a TFTP Client
719
TFTP Configuration Example
720
Information Center
723
Information Center
724
Information Center Overview
724
System Information Format
727
Information Center Configuration
730
Configuring Synchronous Information Output
730
Configuring to Display the Time Stamp with the UTC Time Zone
731
Setting to Output System Information to the Console
731
Setting to Output System Information to a Monitor Terminal
733
Setting to Output System Information to a Log Host
734
Setting to Output System Information to the Trap Buffer
735
Setting to Output System Information to the Log Buffer
736
Setting to Output System Information to the SNMP NMS
736
Displaying and Maintaining Information Center
737
Information Center Configuration Examples
738
Log Output to a Unix Log Host
738
Log Output to a Linux Log Host
739
Log Output to the Console
741
Table of Contents
743
1 Boot Rom and Host Software Loading
744
Introduction to Loading Approaches
744
Local Boot Rom and Software Loading
744
Boot Menu
745
Loading by Xmodem through Console Port
746
Loading by TFTP through Ethernet Port
750
Loading by FTP through Ethernet Port
752
Remote Boot ROM and Software Loading
754
Remote Loading Using Ftp
754
Remote Loading Using TFTP
758
2 Basic System Configuration and Debugging
759
Displaying the System Status
760
Debugging the System
760
Enabling/Disabling System Debugging
760
Displaying Debugging Status
761
Displaying Operating Information about Modules in System
761
3 Network Connectivity Test
762
Ping
762
Tracert
762
4 Device Management
763
Introduction to Device Management
763
Device Management Configuration
763
Configuring Real-Time Monitoring of the Running Status of the System
764
Scheduling a Reboot on the Switch
764
Enabling Auto Power down on an Ethernet Port
765
Specifying the APP to be Used at Reboot
765
Upgrading the Boot ROM
765
Identifying and Diagnosing Pluggable Transceivers
766
Upgrading the Host Software in the Fabric
766
Displaying the Device Management Configuration
767
Remote Switch APP Upgrade Configuration Example
768
Vlan-Vpn Configuration/Selective Qinq Configuration
771
1 VLAN-VPN Configuration
772
Implementation of VLAN-VPN
773
Configuring the TPID for VLAN-VPN Packets
773
Inner-To-Outer Tag Priority Replicating and Mapping
774
Transparent Igmp Message Transmission on a Vlan-Vpn Port
774
VLAN-VPN Configuration
774
Configuring the TPID Value for VLAN-VPN Packets on a Port
775
Enabling the VLAN-VPN Feature for a Port
775
Configuring the Inner-To-Outer Tag Priority Replicating and Mapping Feature
776
Displaying and Maintaining VLAN-VPN Configuration
776
VLAN-VPN Configuration Example
777
Transmitting User Packets through a Tunnel in the Public Network by Using Vlan-Vpn
777
2 Selective Qinq Configuration
780
Selective Qinq Overview
780
MAC Address Replicating
781
Enabling the Selective Qinq Feature for a Port
782
Selective Qinq Configuration Task List
782
Selective Qinq Configuration Example
783
Enabling the Inter-Vlan Mac Address Replicating Feature
783
Processing Private Network Packets by Their Types
783
Configuring Remote-Ping
789
Displaying Remote-Ping Configuration
789
Ipv6 Configuration/Ipv6 Application Configuration
792
1 Ipv6 Configuration
793
Ipv6 Overview
793
Ipv6 Features
793
Introduction to Ipv6 Address
795
Introduction to Ipv6 Neighbor Discovery Protocol
798
Ipv6 Configuration Task List
800
Configuring an Ipv6 Unicast Address
801
Configuring Ipv6 NDP
802
Configuring a Static Ipv6 Route
804
Configuring Ipv6 TCP Properties
804
Configuring the Hop Limit of Icmpv6 Reply Packets
805
Configuring the Maximum Number of Ipv6 ICMP Error Packets Sent Within a Specified Time
805
Displaying and Maintaining Ipv6
806
Ipv6 Configuration Example
807
Ipv6 Unicast Address Configuration
807
2 Ipv6 Application Configuration
810
Introduction to Ipv6 Application
810
Configuring Ipv6 Application
810
Ipv6 Tftp
811
Ipv6 Traceroute
811
Ipv6 Telnet
812
Ipv6 Application Configuration Example
813
Ipv6 Applications
813
Troubleshooting Ipv6 Application
814
Unable to Ping a Remote Destination
814
Unable to Run Telnet
815
Unable to Run TFTP
815
Unable to Run Traceroute
815
Introduction to Password Control Configuration
817
Password Control Configuration Operations
817
Password Control Configuration
819
Configuring Password Aging
819
Configuring the Limitation of Minimum Password Length
821
Configuring History Password Recording
822
Configuring a User Login Password in Interactive Mode
823
Configuring Login Attempt Times Limitation and Failure Processing Mode
823
Configuring the Password Authentication Timeout Time
824
Configuring Password Composition Policies
825
Displaying Password Control
826
Password Control Configuration Example
826
Access Management Configuration
829
Access Management Overview
829
Configuring Access Management
830
Access Management Configuration Example
831
Access Management Configuration Examples
831
Combining Access Management with Port Isolation
832
Lldp Configuration
834
Introduction to Lldp
835
Lldp Fundamental
835
Tlv Types
836
Lldp Configuration
835
Overview
835
LLDP Configuration Task List
838
Performing Basic LLDP Configuration
838
Enabling Lldp
838
Setting LLDP Operating Mode
839
Configuring LLDPDU Tlvs
839
Enable LLDP Polling
840
Configuring the Parameters Concerning Lldpdu Sending
841
Configuring the Encapsulation Format for Lldpdus
841
Configuring CDP Compatibility
842
Configuring LLDP Trapping
843
Displaying and Maintaining LLDP
844
LLDP Configuration Examples
844
Lldp Basic Configuration Example
844
Cdp-Compatible Lldp Configuration Example
847
Advertisement
Advertisement
Related Products
3Com ProCurve E4500-48
3Com Dual E3 Asynchronous
3Com EtherLink III ISA
3Com EtherLink
3Com ETHERLINK III LAN PC CARD
3Com EtherLink 10
3Com EtherLink 3C905C-TX-M
3Com ETHERLINK III
3Com ETHERLINK III PARALLEL TASKING
3Com TRANSCEND EM/NT 6.3
3Com Categories
Switch
Network Router
Wireless Access Point
Modem
Network Card
More 3Com Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL