H3C S1600V2 Series Web Configuration Manual
H3C S1600V2 Series Web Configuration Manual

H3C S1600V2 Series Web Configuration Manual

Hide thumbs Also See for S1600V2 Series:
Table of Contents

Advertisement

Quick Links

H3C S1600V2 Switch Series
Web Configuration Guide
New H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: Release 8806 and later
Document version: 6W100-20240307

Advertisement

Table of Contents
loading

Summary of Contents for H3C S1600V2 Series

  • Page 1 H3C S1600V2 Switch Series Web Configuration Guide New H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 8806 and later Document version: 6W100-20240307...
  • Page 2 The information in this document is subject to change without notice. All contents in this document, including statements, information, and recommendations, are believed to be accurate, but they are presented without warranty of any kind, express or implied. H3C shall not be liable for technical or editorial errors or omissions contained herein.
  • Page 3 Preface This configuration guide describes the software features available on the Web interface. It guides you through the feature configuration procedures and provides configuration examples to help you apply the software features to different network scenarios. This preface includes the following topics about the documentation: •...
  • Page 4 Convention Description Folder. Symbols Convention Description An alert that calls attention to important information that if not understood or followed WARNING! can result in personal injury. An alert that calls attention to important information that if not understood or followed CAUTION: can result in data loss, data corruption, or damage to hardware or software.
  • Page 5 It is normal that the port numbers, sample output, screenshots, and other information in the examples differ from what you have on your device. Documentation feedback You can e-mail your comments about product documentation to info@h3c.com. We appreciate your comments.
  • Page 6: Table Of Contents

    Contents Logging in to the device ················································································· 1 Using the web interface ················································································· 2 Overview ···························································································································································· 2 Webpage layout ················································································································································· 2 Top-level menu items and features ···················································································································· 3 Home ·························································································································································· 3 System menu ············································································································································· 3 Monitoring menu ········································································································································ 3 Switch Settings menu ································································································································· 4 VLAN Settings menu ··································································································································...
  • Page 7 MAC List··························································································································································· 25 DHCP Snooping ··············································································································································· 26 Overview ·················································································································································· 26 DHCP snooping benefits ·························································································································· 26 Configuring DHCP snooping ···················································································································· 26 Displaying DHCP snooping information ··································································································· 28 PoE Settings ···················································································································································· 28 Overview ·················································································································································· 28 Procedure ················································································································································· 29 Configuration examples ··································································································································· 30 Example: Configuring port mirroring ········································································································...
  • Page 8: Logging In To The Device

    Logging in to the device NOTE: As a best practice, use the following Web browsers: • Google Chrome 109.0.5414.120 or higher. • Mozilla Firefox 110.0 or higher. • Microsoft Edge 89.0.774.68 or higher. Internet Explorer Web browsers are not supported in the current software version. Connect the PC to the LAN port on the device.
  • Page 9: Using The Web Interface

    Navigation pane—Provides the Web menu for device functions in a tree structure. You can easily select function menus in the navigation pane. The content pane displays the selection result. You can click the H3C logo on the top of the navigation pane to access the H3C official website, and click the feedback icon on the bottom of the navigation pane to open the feedback page.
  • Page 10: Top-Level Menu Items And Features

    When the port state pane is displayed, the pane displays the port quantity and port physical  state, and the information is refreshed every 10 seconds. Table 1 provides the port state description.  • Content pane—Allows users to perform configuration tasks, and view information and the operation result.
  • Page 11: Switch Settings Menu

    Table 3 Monitoring menu navigator Menus Tasks Port Statistics Display port statistics information. Cable Detection Perform cable diagnosis and analysis. • Loop protection Loop Prevention • Loop detection Switch Settings menu Table 4 to navigate to the tasks you can perform from the Switch Settings menu. Table 4 Switch Settings menu navigator Menus Tasks...
  • Page 12: Qos Settings

    Menus Tasks • Divide VLANs based on ports. • Display port VLAN information. QoS Settings Table 6 to navigate to the tasks you can perform from the QoS Settings menu. Table 6 QoS Settings menu navigator Menus Tasks • Enable/disable port rate limiting. Port Rate Limit •...
  • Page 13: Home

    Home Overview The homepage displays device information and port information. Port Statistics From the navigation pane, select Home. In the port statistics area, you can view port statistics information, including port physical state, packets sent successfully, and packets failed to be sent. Figure 3 Homepage...
  • Page 14: System

    System IP Settings Configuring IP settings From the navigation pane, select System > IP Settings. Configure the DHCP enabling state. By default, DHCP is enabled. Select the management VLAN. Enter the management IP address, subnet mask, and gateway address. Click Submit. In the dialog box that opens, click OK.
  • Page 15: Configuring Dns Settings

    Configuring DNS settings From the navigation pane, select System > IP Settings. Enter the DNS address. Click Submit. Account From the navigation pane, select System > Account. In the New Password field, enter a new password. The default password is admin. Enter the new password again in the Confirm Password field.
  • Page 16: System Upgrade

    Figure 7 System restart page Figure 8 Prompt page System Upgrade From the navigation pane, select System > System Upgrade. Click Select File, and then select the target local file. Click Upgrade. In the dialog box that opens, click OK. Refresh the webpage after the file is uploaded successfully to re-enter the system.
  • Page 17: Restore To Factory

    Figure 9 System upgrade page Figure 10 Confirming operation Restore to Factory From the navigation pane, select System > Restore to Factory. Click Restore to Factory. Wait for the restoration to complete.
  • Page 18 Figure 11 Restoring factory default settings Figure 12 Prompt page...
  • Page 19: Monitoring

    Monitoring Port Statistics From the navigation pane, select Monitoring > Port Statistics. You can view port statistics information, including port physical state, packets sent successfully, and packets failed to be sent. Figure 13 Port statistics page Cable Detection Overview Table 7 Cable detection results Detection result Description Error...
  • Page 20: Procedure

    Procedure From the navigation pane, select Monitoring > Cable Detection. Select the target ports. Click the detect icon Figure 14 Cable detection page Figure 15 Cable detection results Loop Prevention Overview Background The loop detection mechanism performs periodic checks for Layer 2 loops. The mechanism immediately generates a log message when a loop occurs so that you are promptly notified to adjust network connections and configurations.
  • Page 21: Procedure

    • Loop protection—When the system detects a loop on a port, it automatically blocks that port to avoid packet flooding. The system also displays the port as blocked in the Port Loop Info list and the port state pane (yellow icon). Loop prevention interval Loop detection is a continuous process as the network changes.
  • Page 22 Figure 16 Loop prevention page Figure 17 Loop protection...
  • Page 23: Configuration Examples

    Figure 18 Loop detection Configuration examples Example: Configuring basic loop detection functions Network configuration As shown in Figure 19, configure loop detection on Device A to automatically shut down the interface on which a loop is detected. Figure 19 Network diagram Device A Port 1 Port 2...
  • Page 24 Figure 20 Loop prevention page Figure 21 Loop protection Verifying the configuration As shown in Figure 22, when a loop is detected on port 3, you can view that port 2 is blocked and its icon is displayed in yellow.
  • Page 25 Figure 22 Port loop information...
  • Page 26: Switch Settings

    Switch Settings Port Settings Overview This feature allows you to view the physical state, operating mode, rate, and traffic control information about each port and edit port settings. Interface rate Generally, a device automatically negotiates the rate of an Ethernet interface with the peer device. The negotiated rate can be any rate within the rate capability range.
  • Page 27: Port Info

    Figure 23 Configuring port settings Port Info From the navigation pane, select Switch Settings > Port Settings. You can view port information in the Port Info area. Port Mirroring Overview Port mirroring copies the packets passing through a port to the destination port that connects to a data monitoring device for packet analysis.
  • Page 28: Configuring Port Mirroring

    Configuring port mirroring From the navigation pane, select Switch Settings > Port Mirroring. Select a mirroring direction. By default, port mirroring is disabled. Select the monitor and source ports. Click Submit. Figure 24 Configuring port mirroring Displaying and clearing port mirroring information From the navigation pane, select Switch Settings >...
  • Page 29: Displaying Port Isolation Information

    Figure 25 Configuring port isolation settings Figure 26 Confirming operation Displaying port isolation information From the navigation pane, select Switch Settings > Port Isolation. You can view port isolation information in the Port Isolation Info area. Static MAC Overview An Ethernet device uses a MAC address table to forward frames. A MAC address entry includes a destination MAC address, an outgoing interface, and a VLAN ID.
  • Page 30: Configuring Static Mac Address Settings

    MAC address learning The device can automatically populate its MAC address table by learning the source MAC addresses of incoming frames on each interface. The device performs the following operations to learn the source MAC address of incoming packets: Checks the source MAC address (for example, MAC-SOURCE) of the frame. Looks up the source MAC address in the MAC address table.
  • Page 31: Displaying Static Mac Addresses

    Figure 27 Configuring static MAC address settings Displaying static MAC addresses From the navigation pane, select Switch Settings > Static MAC. You can view the static MAC addresses in the Static MAC Info area. Filtering MAC addresses From the navigation pane, select Switch Settings > MAC Search. Enter the target MAC address and its VLAN ID, and then click Search.
  • Page 32: Mac List

    Figure 28 MAC address filtering Figure 29 MAC address filtering result MAC List From the navigation pane, select Switch Settings > MAC List. You can view the MAC address information.
  • Page 33: Dhcp Snooping

    Figure 30 MAC address list DHCP Snooping Overview DHCP snooping is a security feature for DHCP. DHCP snooping works between the DHCP client and server, or between the DHCP client and DHCP relay agent. When a DHCP snooping device is located between a DHCP server and a DHCP relay agent, the DHCP snooping feature does not take effect.
  • Page 34 Configure DHCP snooping settings: a. Select the trusted or untrusted port state. By default, all ports on the device are trusted ports after DHCP snooping is enabled. b. Select the target ports from the port list. c. Click Submit. Figure 31 DHCP snooping page Figure 32 Confirming operation...
  • Page 35: Displaying Dhcp Snooping Information

    Figure 33 DHCP snooping page Displaying DHCP snooping information From the navigation pane, select Switch Settings > DHCP Snooping. You can view DHCP snooping information in the Port Info area. PoE Settings Overview Power over Ethernet (PoE) enables a device to supply power for powered devices (PDs) over twisted pair cables.
  • Page 36: Procedure

    Figure 34 PoE system diagram PoE power supply Procedure From the navigation pane, select Switch Settings > PoE Settings. In the PoE Info area, configure the PoE state for the target port. By default, PoE is enabled for a port. In the dialog box that opens, click OK.
  • Page 37: Configuration Examples

    Configuration examples Example: Configuring port mirroring Network configuration As shown in Figure 37, the device connects to the marketing departments through port 1 and to the server through port 2. Configure local port mirroring in source port mode to enable the server to monitor the bidirectional traffic of the two departments.
  • Page 38 Figure 38 Port mirroring page Figure 39 Configuring port mirroring Verifying the configuration As shown in Figure 40, the port mirroring direction is both, the monitor port is port 2, and the source port is port 1. Verify that you can monitor the incoming packets and outgoing packets of the marketing and technology departments on the server.
  • Page 39: Example: Configuring Port Isolation

    Figure 40 Port mirroring information Example: Configuring port isolation Network configuration As shown in Figure 41, LAN users Host A, Host B, and Host C are connected to Port 1, Port 2, and Port 3 on the device, respectively. The device connects to the Internet through Port 4. Configure the device to provide Internet access for all the hosts, and isolate them from one another.
  • Page 40 Figure 42 Port isolation page Figure 43 Confirming operation Verifying the configuration From the navigation pane, select Switch Settings > Port Isolation. Verify that Port 1, Port 2, and Port 3 are isolated from one another at Layer 2, and Host A, Host B, and Host C cannot communicate with each other at Layer 2.
  • Page 41: Mac Address Configuration Example

    MAC address configuration example Network configuration Host A at MAC address 00:0f:e2:35:dc:71 is connected to Port 1 of Device and belongs to VLAN 1. Host B at MAC address 00:0f:e2:35:ab:cd, which behaved suspiciously on the network, also belongs to VLAN 1. Configure the MAC address table as follows: •...
  • Page 42 Figure 47 Adding a static MAC address entry Figure 48 Adding a static MAC address entry and blocking it Verifying the configuration Verify that the MAC address entries are displayed in the list.
  • Page 43: Example: Enabling Dhcp Snooping Globally

    Figure 49 Static MAC address entries Example: Enabling DHCP snooping globally Network configuration Switch B is connected to the authorized DHCP server through Ethernet port 1, to the unauthorized DHCP server through Ethernet port 3, and to the DHCP client through Ethernet port 2. Configure only the port connected to the authorized DHCP server to forward the responses from the DHCP server.
  • Page 44 Figure 51 DHCP snooping page # Configure port 1 as a trusted port: From the navigation pane, select Switch Settings > DHCP Snooping. Select the port state to trusted. Select port 1 from the port list. Click Submit. Figure 52 Configuring DHCP snooping settings Verifying the configuration Verify that the DHCP client can obtain an IP address and other configuration parameters only from the authorized DHCP server.
  • Page 45: Vlan Settings

    VLAN Settings Overview The Virtual Local Area Network (VLAN) technology divides a physical LAN into multiple logical LANs. Each VLAN is a broadcast domain. Hosts in the same VLAN can communicate with one another at Layer 2, but they are isolated from hosts in other VLANs at Layer 2. VLAN features Overview If you disable the VLAN feature, the device forwards received packets without processing VLAN...
  • Page 46: Deleting Vlans

    Figure 53 Creating a VLAN Deleting VLANs From the navigation pane, select VLAN Settings > VLAN Members. Select the VLANs to be deleted, and then click Delete. VLAN 1 cannot be deleted. VLAN Settings Overview Port-based VLANs group VLAN members by port. A port forwards packets from a VLAN only after it is assigned to the VLAN.
  • Page 47: Configuring Port Vlan Settings

    How ports of different link types handle frames Actions Access Trunk • If the PVID is permitted on the port, In the inbound direction for Tags the frame with the PVID tags the frame with the PVID tag. an untagged frame tag.
  • Page 48: Displaying Port Vlan Information

    Select the trunk link type. The default link type is access. Select native and permit VLANs. Click Submit. Displaying port VLAN information From the navigation pane, select VLAN Settings > VLAN Settings. You can view port VLAN information in the Port VLAN Info area.
  • Page 49: Configuration Example

    Configuration example Network configuration • Host A and Host C belong to Department A but access the company network through different devices. Host B and Host D belong to Department B and access the company network through different devices. • To ensure communication security and avoid flooding broadcast packets, use VLANs to isolate Layer 2 traffic of different departments.
  • Page 50 # Configure port VLANs: From the navigation pane, select VLAN Settings > VLAN Settings. Assign port 1 to VLAN 100: a. Select port 1 from the port list. b. Select the access link type. c. Select VLAN 100 from the access VLAN list. d.
  • Page 51 Figure 58 Configuring VLAN settings for port 2 Configure port 3 as a trunk port and assign it to VLANs 100 and 200, so that Device A can send packets from VLAN 100 and VLAN 200 to Device B. a. Select port 3 from the port list. b.
  • Page 52 Figure 59 Configuring VLAN settings for port 3 Configuring Device B Configure Device B in the same way you configure Device A. Configuring the hosts Assign Host A and Host C to the same subnet, for example, 192.168.100.0/24. Assign Host B and Host D to the same subnet, for example, 192.168.200.0/24.
  • Page 53: Qos Settings

    QoS Settings Port Rate Limit Overview This feature allows you to limit the total packet rate. Configuring port bandwidth settings From the navigation pane, select QoS Settings > Port Rate Limit. Select the target ports from the port list. Select Tx or Rx from the type list. Select a port rate limit state.
  • Page 54: Storm Control

    Storm Control Overview After you configure broadcast/unknown unicast/unknown multicast storm control on an interface, if the broadcast/unknown unicast/unknown multicast traffic exceeds the specified threshold, the system discards the excessive traffic. On a Layer 2 Ethernet interface, you can also configure traffic thresholds to suppress traffic storms. Traffic threshold control suppresses traffic through software, which might affect device performance.
  • Page 55: Troubleshooting

    Fiber correct? Replace fiber Resolved? Contact H3C Support Solution Verifying that the ports at both ends are operating correctly Use a transceiver module and a fiber to connect the port to another port on the local end. Identify whether the port can come up: •...
  • Page 56: A Copper Port Fails To Come Up

    Verifying that the transceiver module and cable are operating correctly If the transceiver module is not operating correctly, replace it with a H3C transceiver module that matches the fiber port. Perform the following tasks to troubleshoot the transceiver module: Verify that the wavelength and transmission distance of the local transceiver module are consistent with the wavelength and transmission distance of the peer transceiver module.
  • Page 57: Troubleshooting Flowchart

    Replace the local port with a new one to verify that the local port is operating correctly. Verifying that the peer port is operating correctly Replace the peer port with a new one to verify that the peer port is operating correctly. Contacting H3C Support If the issue persists after the above procedures, contact H3C Support.
  • Page 58: Poe Power Supply Anomaly

    Replace the PoE port with a new one to verify that the PoE port is operating correctly. If the PoE port is not operating correctly, replace and port and send the fault information to Technical Support. If the issue persists after the above procedures, collect the fault information, and contact H3C Support.
  • Page 59: Error Packets On A Port

    Resolved? operating correctly? link Resolved after port restart? Contact H3C Support Solution Verify that the port and cable connector are operating correctly. Verify that the port and cable connector are connected tightly.  Inspect the port for any abnormalities, such as foreign objects inside the port, bent pins, or ...
  • Page 60 In case of any failures, replace the devices or link. Access the details page of the failed port, restart the link, and verify whether the port recovers. If the issue persists after the above procedures, collect the fault information, and contact H3C Support.

Table of Contents