Sign In
Upload
Manuals
Brands
3Com Manuals
Switch
4500 PWR
3Com 4500 PWR Manuals
Manuals and User Guides for 3Com 4500 PWR. We have
6
3Com 4500 PWR manuals available for free PDF download: Configuration Manual, Getting Started Manual, Datasheet
3Com 4500 PWR Configuration Manual (742 pages)
26/50-Port
Brand:
3Com
| Category:
Switch
| Size: 13 MB
Table of Contents
About this Manual
3
Configuration Guide
1
Table of Contents
3
Obtaining Documentation
5
Related Documentation
5
Login
6
Logging in to an Ethernet Switch
8
Introduction to the User Interface
8
Supported User Interfaces
8
Relationship between a User and a User Interface
9
User Interface Index
9
Common User Interface Configuration
10
Logging in through the Console Port
11
Introduction
11
Setting up a Login Environment for Login through the Console Port
11
Console Port Login Configuration
13
Common Configuration
13
Console Port Login Configurations for Different Authentication Modes
15
Console Port Login Configuration with Authentication Mode Being None
16
Configuration Example
16
Configuration Procedure
16
Console Port Login Configuration with Authentication Mode Being Password
17
Configuration Procedure
17
Configuration Example
18
Console Port Login Configuration with Authentication Mode Being Scheme
19
Configuration Procedure
19
Configuration Example
20
Logging in through Telnet
23
Introduction
23
Common Configuration to Control Telnet Access
23
Telnet Configurations for Different Authentication Modes
25
Telnet Configuration with Authentication Mode Being None
26
Configuration Example
26
Configuration Procedure
26
Telnet Configuration with Authentication Mode Being Password
27
Configuration Procedure
27
Configuration Example
28
Telnet Configuration with Authentication Mode Being Scheme
29
Configuration Procedure
29
Configuration Example
30
Telnetting to a Switch
31
Telnetting to a Switch from a Terminal
31
Telnetting to Another Switch from the Current Switch
33
Logging in Using a Modem
34
Introduction
34
Configuration on the Switch Side
34
Modem Configuration
34
Switch Configuration
35
Modem Connection Establishment
35
CLI Configuration
38
Introduction to the CLI
38
Command Hierarchy
38
Command Level and User Privilege Level
38
Modifying the Command Level
39
Switching User Level
40
CLI Views
42
CLI Features
45
Online Help
45
Terminal Display
46
Command History
47
Error Prompts
47
Command Edit
48
Introduction
49
Management Interface
49
Establishing an HTTP Connection
49
Configuring the Login Banner
50
Configuration Procedure
50
Configuration Example
51
Enabling/Disabling the WEB Server
51
Logging in through NMS
53
Introduction
53
Connection Establishment Using NMS
53
Configuring Source IP Address for Telnet Service Packets
54
Overview
54
Displaying Source IP Address Configuration
55
User Control
56
Introduction
56
Controlling Telnet Users
56
Controlling Telnet Users by ACL
57
Configuration Example
58
Controlling Network Management Users by Source IP Addresses
58
Configuration Example
59
Controlling Network Management Users by Source IP Addresses
59
Prerequisites
59
Controlling Web Users by Source IP Address
60
Controlling Web Users by Source IP Addresses
60
Prerequisites
60
Configuration Example
61
Logging out a Web User
61
Configuration File Management
63
Configuration File Management
64
Introduction to Configuration File
64
Configuration Task List
65
Saving the Current Configuration
65
Erasing the Startup Configuration File
66
Specifying a Configuration File for Next Startup
67
Displaying Switch Configuration
68
Vlan
68
VLAN Overview/Vlan Configuration
69
1 VLAN Overview
70
Introduction to VLAN
70
Advantages of Vlans
71
VLAN Principles
71
Port-Based VLAN
73
Link Types of Ethernet Ports
73
Assigning an Ethernet Port to Specified Vlans
74
Configuring the Default VLAN ID for a Port
74
VLAN Classification
73
VLAN Interface
73
2 VLAN Configuration
76
VLAN Configuration Task List
76
Basic VLAN Configuration
76
Basic VLAN Interface Configuration
77
Displaying VLAN Configuration
78
Configuring a Port-Based VLAN
78
Configuring the Link Type of an Ethernet Port
78
Port-Based VLAN Configuration Task List
78
Assigning an Ethernet Port to a VLAN
79
Configuring the Default VLAN for a Port
80
Displaying and Maintaining Port-Based VLAN
80
Port-Based VLAN Configuration Example
80
IP Addressing Configuration/Ip Performance Optimization Configuration
83
1 IP Addressing Configuration
84
IP Addressing Overview
84
IP Address Classes
84
Special IP Addresses
85
Subnetting and Masking
85
Configuring IP Addresses
86
Configuring Static Domain Name Resolution
87
Displaying IP Addressing Configuration
87
IP Address Configuration Examples
87
IP Address Configuration Example
87
Static Domain Name Resolution Configuration Example
88
2 IP Performance Optimization Configuration
90
IP Performance Overview
90
Introduction to FIB
90
Introduction to IP Performance Configuration
90
Protocols and Standards
90
Configuring IP Performance Optimization
90
Configuring TCP Attributes
90
IP Performance Optimization Configuration Task List
90
Disabling Sending of ICMP Error Packets
91
Displaying and Maintaining IP Performance Optimization Configuration
92
Voice VLAN Configuration
94
Voice VLAN Configuration
95
Voice VLAN Overview
95
How an IP Phone Works
95
How Switch 4500 Series Switches Identify Voice Traffic
97
Setting the Voice Traffic Transmission Priority
97
Configuring Voice VLAN Assignment Mode of a Port
98
Support for Voice VLAN on Various Ports
98
Security Mode of Voice VLAN
100
Voice VLAN Configuration
101
Configuration Prerequisites
101
Configuring the Voice VLAN to Operate in Automatic Voice VLAN Assignment Mode
101
Configuring the Voice VLAN to Operate in Manual Voice VLAN Assignment Mode
102
Displaying and Maintaining Voice VLAN
104
Voice VLAN Configuration Example
105
Voice VLAN Configuration Example (Automatic Voice VLAN Assignment Mode)
105
Voice VLAN Configuration Example (Manual Voice VLAN Assignment Mode)
107
Port Basic Configuration
109
Ethernet Port Configuration
110
Combo Port Configuration
110
Initially Configuring a Port
110
Configuring Port Auto-Negotiation Speed
111
Limiting Traffic on Individual Ports
112
Enabling Flow Control on a Port
113
Duplicating the Configuration of a Port to Other Ports
113
Configuring Loopback Detection for an Ethernet Port
114
Enabling Loopback Test
115
Enabling the System to Test Connected Cable
115
Configuring the Interval to Perform Statistical Analysis on Port Traffic
116
Enabling Giant-Frame Statistics Function
116
Setting the Port State Change Delay
116
Displaying and Maintaining Basic Port Configuration
117
Port Basic Configuration
110
Ethernet Port Configuration Example
118
Troubleshooting Ethernet Port Configuration
119
Link Aggregation Configuration
120
Link Aggregation Configuration
121
Overview
121
Introduction to Link Aggregation
121
Introduction to LACP
121
Consistency Considerations for the Ports in Aggregation
121
Link Aggregation Classification
122
Manual Aggregation Group
122
Static LACP Aggregation Group
123
Dynamic LACP Aggregation Group
124
Aggregation Group Categories
125
Link Aggregation Configuration
126
Configuring a Manual Aggregation Group
126
Configuring a Static LACP Aggregation Group
127
Configuring a Dynamic LACP Aggregation Group
127
Configuring a Description for an Aggregation Group
128
Displaying and Maintaining Link Aggregation Configuration
129
Link Aggregation Configuration Example
129
Ethernet Port Aggregation Configuration Example
129
Port Isolation
132
Port Isolation Configuration
133
Port Isolation Overview
133
Displaying and Maintaining Port Isolation Configuration
134
Port Isolation Configuration Example
134
Port Security Configuration
136
Port Security Configuration
137
Port Security Overview
137
Introduction
137
Port Security Features
137
Port Security Modes
137
Port Security Configuration Task List
140
Enabling Port Security
141
Setting the Maximum Number of MAC Addresses Allowed on a Port
141
Setting the Port Security Mode
142
Configuring Port Security Features
143
Ignoring the Authorization Information from the RADIUS Server
144
Configuring Security MAC Addresses
145
Displaying and Maintaining Port Security Configuration
146
Port Security Configuration Examples
146
Port Security Configuration Example
146
Dldp
148
DLDP Configuration
149
Overview
149
DLDP Fundamentals
150
DLDP Packets
150
DLDP Status
152
DLDP Timers
152
DLDP Operating Mode
153
DLDP Implementation
154
DLDP Neighbor State
156
Link Auto-Recovery Mechanism
156
DLDP Configuration
157
Performing Basic DLDP Configuration
157
Resetting DLDP State
158
Displaying and Maintaining DLDP
158
DLDP Configuration Example
159
Mac Address Table Management
161
MAC Address Table Management
162
Overview
162
Introduction to the MAC Address Table
162
Introduction to MAC Address Learning
162
Managing MAC Address Table
164
MAC Address Table Management
165
MAC Address Table Management Configuration Task List
165
Configuring a MAC Address Entry
166
Setting the MAC Address Aging Timer
167
Setting the Maximum Number of MAC Addresses a Port Can Learn
167
Enabling Destination MAC Address Triggered Update
168
Displaying MAC Address Table Information
168
Configuration Examples
169
Adding a Static Mac Address Entry Manually
169
Auto Detect Configuration
170
Auto Detect Configuration
171
Introduction to the Auto Detect Function
171
Auto Detect Basic Configuration
172
Auto Detect Implementation in Static Routing
172
Auto Detect Implementation in VLAN Interface Backup
173
Auto Detect Configuration Examples
174
Configuration Example for Auto Detect Implementation with Static Routing
174
Configuration Example for Auto Detect Implementation with VLAN Interface Backup
175
Mstp
177
Overview
179
Spanning Tree Protocol Overview
179
Rapid Spanning Tree Protocol Overview
188
Multiple Spanning Tree Protocol Overview
188
MSTP Implementation on Switches
192
Protocols and Standards
193
MSTP Configuration Task List
193
Configuring Root Bridge
194
Configuring an MST Region
194
Specifying the Current Switch as a Root Bridge/Secondary Root Bridge
196
Configuring the Bridge Priority of the Current Switch
197
Configuring How a Port Recognizes and Sends MSTP Packets
198
Configuring the MSTP Operation Mode
199
Configuring the Maximum Hop Count of an MST Region
200
Configuring the Network Diameter of the Switched Network
200
Configuring the MSTP Time-Related Parameters
201
Configuring the Timeout Time Factor
202
Configuring the Maximum Transmitting Rate on the Current Port
203
Configuring the Current Port as an Edge Port
204
Setting the Link Type of a Port to P2P
205
Enabling MSTP
206
Configuring Leaf Nodes
207
Configuring the MST Region
207
Configuring How a Port Recognizes and Sends MSTP Packets
207
Configuring the Timeout Time Factor
207
Configuring the Maximum Transmitting Rate on the Current Port
207
Configuring a Port as an Edge Port
207
Configuring the Path Cost for a Port
208
Configuring Port Priority
210
Setting the Link Type of a Port to P2P
211
Enabling MSTP
211
Performing Mcheck Operation
211
Configuration Prerequisites
211
Configuration Procedure
211
Configuration Example
212
Configuring Guard Functions
212
Configuring BPDU Guard
212
Configuring Root Guard
213
Configuring Loop Guard
214
Configuring TC-BPDU Attack Guard
215
Configuring Digest Snooping
216
Introduction
216
Configuring Rapid Transition
218
Introduction
218
Configuring Rapid Transition
220
Enabling Trap Messages Conforming to 802.1D Standard
221
MSTP Maintenance Configuration
221
Introduction
221
Enabling Log/Trap Output for Ports of MSTP Instance
221
Configuration Example
221
Displaying and Maintaining MSTP
222
MSTP Configuration Example
222
Table of Contents
225
1 IP Routing Protocol Overview
227
Introduction to IP Route and Routing Table
227
IP Route
227
Routing Table
227
Multicast
229
Routing Protocol Overview
229
Classification of Dynamic Routing Protocols
229
Routing Protocols and Routing Priority
229
Static Routing and Dynamic Routing
229
Load Sharing and Route Backup
230
Routing Information Sharing
230
Displaying and Maintaining a Routing Table
231
2 Static Route Configuration
232
Introduction to Static Route
232
Static Route
232
Default Route
233
Static Route Configuration
233
Configuration Prerequisites
233
Configuring a Static Route
233
Displaying and Maintaining Static Routes
233
Static Route Configuration Example
234
Troubleshooting a Static Route
235
3 RIP Configuration
236
RIP Overview
236
Basic Concepts
236
RIP Startup and Operation
237
RIP Configuration Task List
237
Basic RIP Configuration
238
Configuration Prerequisites
238
Configuring Basic RIP Functions
238
RIP Route Control
239
Configuration Prerequisites
240
Configuring RIP Route Control
240
RIP Network Adjustment and Optimization
243
Configuration Prerequisites
243
Configuration Tasks
243
Displaying and Maintaining RIP Configuration
245
RIP Configuration Example
245
Troubleshooting RIP Configuration
246
Failed to Receive RIP Updates
246
4 IP Route Policy Configuration
247
IP Route Policy Overview
247
Filters
247
Introduction to IP Route Policy
247
IP Route Policy Configuration Task List
248
Route Policy Configuration
248
Configuration Prerequisites
249
Defining a Route Policy
249
Defining If-Match Clauses and Apply Clauses
249
IP-Prefix Configuration
251
Configuration Prerequisites
251
Configuring an Ip-Prefix List
251
Displaying IP Route Policy
251
IP Route Policy Configuration Example
252
Controlling RIP Packet Cost to Implement Dynamic Route Backup
252
Troubleshooting IP Route Policy
255
Common Multicast Configuration/Igmp Snooping Configuration
256
Multicast Overview
258
Information Transmission in the Unicast Mode
258
Information Transmission in the Broadcast Mode
259
Information Transmission in the Multicast Mode
260
Roles in Multicast
260
Advantages and Applications of Multicast
261
Common Notations in Multicast
261
Multicast Models
262
Multicast Architecture
263
Multicast Address
263
Multicast Protocols
266
Multicast Packet Forwarding Mechanism
267
Implementation of the RPF Mechanism
268
RPF Check
268
2 Common Multicast Configuration
270
Configuring Suppression on the Multicast Source Port
270
Configuring a Multicast MAC Address Entry
271
Configuring Dropping Unknown Multicast Packets
272
Displaying and Maintaining Common Multicast Configuration
272
3 IGMP Snooping Configuration
273
IGMP Snooping Overview
273
Principle of IGMP Snooping
273
Basic Concepts in IGMP Snooping
274
Work Mechanism of IGMP Snooping
275
Configuring IGMP Snooping
277
Enabling IGMP Snooping
277
Configuring the Version of IGMP Snooping
278
Configuring Fast Leave Processing
279
Configuring Timers
279
Configuring a Multicast Group Filter
280
Configuring the Maximum Number of Multicast Groups on a Port
281
Configuring IGMP Snooping Querier
282
Suppressing Flooding of Unknown Multicast Traffic in a VLAN
283
Configuring Static Member Port for a Multicast Group
284
Configuring a Port as a Simulated Group Member
285
Configuring a Static Router Port
285
Configuring a VLAN Tag for Query Messages
286
Configuring Multicast VLAN
287
Displaying and Maintaining IGMP Snooping
288
IGMP Snooping Configuration Examples
289
Troubleshooting Igmp Snooping
293
Table of Contents
295
802.1X Configuration
297
Introduction to 802.1X
297
Architecture of 802.1X Authentication
297
Encapsulation of Eapol Messages
299
The Mechanism of an 802.1X Authentication System
299
802.1X Authentication Procedure
301
Timers Used in 802.1X
305
Additional 802.1X Features on Switch 4500
306
Introduction to 802.1X Configuration
309
Basic 802.1X Configuration
310
Configuration Prerequisites
310
Configuring Basic 802.1X Functions
310
Timer and Maximum User Number Configuration
311
Advanced 802.1X Configuration
312
Configuring Proxy Checking
312
Configuring Client Version Checking
313
Configuring Guest VLAN
314
Enabling DHCP-Triggered Authentication
314
Configuring 802.1X Re-Authentication
315
Configuring the 802.1X Re-Authentication Timer
315
Displaying and Maintaining 802.1X Configuration
316
X Configuration Example
316
2 Quick EAD Deployment Configuration
319
Introduction to Quick EAD Deployment
319
Operation of Quick EAD Deployment
319
Quick EAD Deployment Overview
319
MAC Address Authentication
320
Configuring Quick EAD Deployment
320
Configuration Prerequisites
320
Configuration Procedure
320
Displaying and Maintaining Quick EAD Deployment
321
Quick EAD Deployment Configuration Example
321
Troubleshooting
322
3 HABP Configuration
323
Introduction to HABP
323
HABP Server Configuration
323
HABP Client Configuration
324
Displaying and Maintaining HABP Configuration
324
4 System Guard Configuration
325
System Guard Overview
325
Guard against IP Attacks
325
Guard against TCN Attacks
325
Layer 3 Error Control
325
Configuring System Guard
325
Configuring System Guard against IP Attacks
325
Configuring System Guard against TCN Attacks
326
Enabling Layer 3 Error Control
327
Displaying and Maintaining System Guard Configuration
327
Table of Contents
328
1 Aaa Overview
329
Introduction to AAA
329
Authentication
329
Authorization
329
Introduction to ISP Domain
330
Introduction to AAA Services
330
Introduction to RADIUS
330
2 AAA Configuration
335
AAA Configuration Task List
335
Configuring an AAA Scheme for an ISP Domain
335
Creating an ISP Domain and Configuring Its Attributes
335
Configuring Dynamic VLAN Assignment
339
Configuring the Attributes of a Local User
340
Cutting down User Connections Forcibly
342
RADIUS Configuration Task List
342
Configuring RADIUS Authentication/Authorization Servers
344
Creating a RADIUS Scheme
344
Configuring RADIUS Accounting Servers
345
Configuring Shared Keys for RADIUS Messages
346
Configuring the Maximum Number of RADIUS Request Transmission Attempts
347
Configuring the Type of RADIUS Servers to be Supported
347
Configuring the Status of RADIUS Servers
348
Configuring the Attributes of Data to be Sent to RADIUS Servers
349
Configuring the Local RADIUS Server
350
Configuring Timers for RADIUS Servers
351
Enabling Sending Trap Message When a RADIUS Server Goes down
352
Enabling the User Re-Authentication at Restart Function
352
Displaying and Maintaining AAA Configuration
354
Displaying and Maintaining RADIUS Protocol Configuration
354
AAA Configuration Examples
354
Remote RADIUS Authentication of Telnet/Ssh Users
354
Local Authentication of Ftp/Telnet Users
356
Troubleshooting AAA
357
Troubleshooting RADIUS Configuration
357
3 EAD Configuration
358
Introduction to EAD
358
Typical Network Application of EAD
358
EAD Configuration
359
EAD Configuration Example
359
Mac Address Authentication Configuration
362
MAC Address Authentication Configuration
363
MAC Address Authentication Overview
363
Performing MAC Address Authentication on a RADIUS Server
363
Performing MAC Address Authentication Locally
363
Configuring Basic MAC Address Authentication Functions
364
Related Concepts
364
MAC Address Authentication Timers
364
Quiet MAC Address
364
MAC Address Authentication Enhanced Function Configuration
365
MAC Address Authentication Enhanced Function Configuration Task List
365
Configuring a Guest VLAN
366
Configuring the Maximum Number of Mac Address Authentication Users Allowed to Access a Port
368
Displaying and Maintaining MAC Address Authentication Configuration
369
MAC Address Authentication Configuration Examples
369
Arp Configuration
371
ARP Configuration
372
Introduction to ARP
372
ARP Function
372
ARP Message Format
372
ARP Table
374
ARP Process
374
Introduction to Gratuitous ARP
375
Introduction to ARP Source MAC Address Consistency Check
375
Configuring ARP
376
Configuring Gratuitous ARP
376
ARP Configuration Examples
377
Configuring ARP Source MAC Address Consistency Check
377
Displaying and Debugging ARP
377
Table of Contents
379
1 DHCP Overview
380
Introduction to DHCP
380
DHCP IP Address Assignment
380
IP Address Assignment Policy
380
Obtaining IP Addresses Dynamically
381
Updating IP Address Lease
381
DHCP Packet Format
382
Protocol Specification
383
2 DHCP Relay Agent Configuration
384
Introduction to DHCP Relay Agent
384
DHCP Relay Agent Fundamentals
384
Usage of DHCP Relay Agent
384
Option 82 Support on DHCP Relay Agent
385
Configuring the DHCP Relay Agent
386
Correlating a DHCP Server Group with a Relay Agent Interface
387
DHCP Relay Agent Configuration Task List
387
Enabling DHCP
387
Configuring DHCP Relay Agent Security Functions
388
Configuring the DHCP Relay Agent to Support Option 82
390
Displaying and Maintaining DHCP Relay Agent Configuration
391
DHCP Relay Agent Configuration Example
391
Troubleshooting DHCP Relay Agent Configuration
392
3 DHCP Snooping Configuration
394
DHCP Snooping Overview
394
Introduction to DHCP Snooping
394
Introduction to DHCP-Snooping Option 82
395
Configuring DHCP Snooping
397
Configuring DHCP Snooping to Support Option 82
398
Displaying and Maintaining DHCP Snooping Configuration
401
DHCP Snooping Configuration Examples
401
DHCP-Snooping Option 82 Support Configuration Example
401
4 DHCP/BOOTP Client Configuration
403
Introduction to DHCP Client
403
Introduction to BOOTP Client
403
Configuring a DHCP/BOOTP Client
404
DHCP Client Configuration Example
404
BOOTP Client Configuration Example
405
Displaying DHCP/BOOTP Client Configuration
405
Acl Configuration
406
Acl Configuration
407
ACL Overview
407
ACL Matching Order
407
Ways to Apply an ACL on a Switch
408
Types of Acls Supported by Switch 4500 Series
409
ACL Configuration Task List
409
Configuring Time Range
409
Configuring Basic ACL
411
Configuring Advanced ACL
412
Configuring Layer 2 ACL
413
Configuring User-Defined ACL
414
Applying ACL Rules on Ports
416
Applying ACL Rules to Ports in a VLAN
416
Displaying and Maintaining ACL Configuration
417
Examples for Upper-Layer Software Referencing Acls
417
Example for Controlling Telnet Login Users by Source IP
417
Example for Controlling Web Login Users by Source IP
418
Examples for Applying Acls to Hardware
418
Basic ACL Configuration Example
418
Advanced ACL Configuration Example
419
Layer 2 ACL Configuration Example
420
User-Defined ACL Configuration Example
421
Example for Applying an ACL to a VLAN
421
Mirroring
423
Overview
424
Qos Configuration
424
Introduction to Qos
424
Traditional Packet Forwarding Service
424
New Applications and New Requirements
424
Major Traffic Control Techniques
425
Introduction to Qos Functions
426
Traffic Classification
426
Priority Trust Mode
427
Protocol Priority
430
Priority Marking
431
Traffic Policing
431
Line Rate
432
VLAN Mapping
432
Queue Scheduling
432
Congestion Avoidance
435
Traffic Mirroring
436
Qos Supported by Switch 4500 Series
426
Qos Configuration
436
Configuring the Mapping between 802.1P Priority and Local Precedence
437
Setting the Priority of Protocol Packets
438
Marking Packet Priority
439
Configuring Traffic Policing
440
Configuring Line Rate
441
Configuring VLAN Mapping
442
Configuring Queue Scheduling
442
Configuring WRED
444
Configuring Traffic Mirroring
445
Displaying and Maintaining Qos
446
Qos Configuration Examples
447
Configuration Example of Traffic Policing and Line Rate
447
Configuration Example of Priority Marking and Queue Scheduling
448
VLAN Mapping Configuration Example
449
Mirroring Configuration
452
Mirroring Configuration
453
Mirroring Overview
453
Local Port Mirroring
453
Remote Port Mirroring
454
Traffic Mirroring
455
Mirroring Configuration
455
Configuring Local Port Mirroring
456
Configuring Remote Port Mirroring
456
Displaying and Maintaining Port Mirroring
459
Mirroring Configuration Examples
460
Local Port Mirroring Configuration Example
460
Remote Port Mirroring Configuration Example
461
Xrn Fabric Configuration
464
Introduction to XRN
465
Establishment of an XRN Fabric
465
How XRN Works
468
XRN Fabric Configuration
465
XRN Fabric Configuration
468
XRN Fabric Configuration Task List
468
Specifying the Fabric Port of a Switch
469
Specifying the VLAN Used to Form an XRN Fabric
470
Setting a Unit ID for a Switch
471
Assigning a Unit Name to a Switch
472
Assigning an XRN Fabric Name to a Switch
472
Setting the XRN Fabric Authentication Mode
472
Displaying and Maintaining XRN Fabric
473
XRN Fabric Configuration Example
473
Network Requirements
473
Network Diagram
474
Configuration Procedure
474
Cluster
476
Cluster
477
Cluster Overview
477
Introduction to HGMP
477
Roles in a Cluster
478
How a Cluster Works
480
Cluster Configuration Task List
485
Configuring the Management Device
485
Configuring Member Devices
490
Managing a Cluster through the Management Device
492
Configuring the Enhanced Cluster Features
493
Configuring the Cluster Synchronization Function
495
Community Name
497
Displaying and Maintaining Cluster Configuration
499
Cluster Configuration Examples
500
Basic Cluster Configuration Example
500
Network Management Interface Configuration Example
503
Enhanced Cluster Feature Configuration Example
504
Poe Profile Configuration
506
Poe Configuration
507
Poe Configuration Task List
508
Enabling the Poe Feature on a Port
509
Setting the Maximum Output Power on a Port
509
Setting Poe Management Mode and Poe Priority of a Port
509
Setting the Poe Mode on a Port
510
Configuring the PD Compatibility Detection Function
511
Configuring a PD Disconnection Detection Mode
511
Configuring Poe Over-Temperature Protection on the Switch
511
Upgrading the PSE Processing Software Online
512
Upgrading the PSE Processing Software of Fabric Switches Online
512
Displaying Poe Configuration
513
Poe Overview
507
Introduction to Poe
507
Poe Features Supported by Switch 4500
507
Poe Configuration Example
513
Introduction to Poe Profile
515
Configuring Poe Profile
515
Poe Profile Configuration
515
Displaying Poe Profile Configuration
517
Poe Profile Configuration Example
517
Poe Profile Application Example
517
UDP Helper Configuration
520
UDP Helper Configuration
521
Introduction to UDP Helper
521
Configuring UDP Helper
522
Displaying and Maintaining UDP Helper
522
UDP Helper Configuration Example
523
Cross-Network Computer Search through UDP Helper
523
Snmp Configuration/Rmon Configuration
524
1 Snmp Configuration
525
SNMP Overview
525
SNMP Operation Mechanism
525
SNMP Versions
525
Supported Mibs
526
Configuring Basic SNMP Functions
526
Configuring Trap-Related Functions
528
Configuring Basic Trap Functions
528
Configuring Extended Trap Function
529
Enabling Logging for Network Management
529
Displaying SNMP
530
SNMP Configuration Example
530
2 RMON Configuration
533
Introduction to RMON
533
Working Mechanism of RMON
533
Commonly Used RMON Groups
534
RMON Configuration
535
Displaying RMON
536
RMON Configuration Example
536
Ntp Configuration
538
Introduction to NTP
539
Applications of NTP
539
Implementation Principle of NTP
540
NTP Implementation Modes
541
Ntp Configuration
539
Configuring NTP Implementation Modes
544
Configuring NTP Server/Client Mode
545
Configuring the NTP Symmetric Peer Mode
545
Configuring NTP Broadcast Mode
546
Configuring NTP Multicast Mode
547
NTP Configuration Task List
544
Configuring Access Control Right
548
Configuration Prerequisites
548
Configuration Procedure
548
Configuring NTP Authentication
549
Configuration Prerequisites
549
Configuration Procedure
550
Configuring Optional NTP Parameters
551
Configuring an Interface on the Local Switch to Send NTP Messages
551
Configuring the Number of Dynamic Sessions Allowed on the Local Switch
552
Disabling an Interface from Receiving NTP Messages
552
Displaying NTP Configuration
552
Configuration Examples
553
Configuring NTP Server/Client Mode
553
Configuring Ntp Symmetric Peer Mode
554
Configuring NTP Broadcast Mode
556
Configuring NTP Server/Client Mode with Authentication
559
Ssh Configuration
561
Ssh Configuration
562
SSH Overview
562
Introduction to SSH
562
Algorithm and Key
562
SSH Operating Process
563
SSH Server and Client
565
Configuring the SSH Server
566
Configuring the User Interfaces for SSH Clients
567
Configuring the SSH Management Functions
567
Configuring Key Pairs
569
Creating an SSH User and Specifying an Authentication Type
570
Specifying a Service Type for an SSH User on the Server
571
Configuring the Public Key of a Client on the Server
572
Assigning a Public Key to an SSH User
573
Exporting the Host Public Key to a File
573
Configuring the SSH Client
574
SSH Client Configuration Task List
574
Configuring an SSH Client that Runs SSH Client Software
574
Configuring an SSH Client Assumed by an SSH2-Capable Switch
580
Displaying and Maintaining SSH Configuration
582
Comparison of SSH Commands with the same Functions
583
SSH Configuration Examples
584
When Switch Acts as Server for Local Password Authentication
584
When Switch Acts as Server for Password and RADIUS Authentication
586
When Switch Acts as Server for Password and HWTACACS Authentication
591
When Switch Acts as Server for Publickey Authentication
593
When Switch Acts as Client for Password Authentication
599
When Switch Acts as Client for Publickey Authentication
600
When Switch Acts as Client and First-Time Authentication Is Not Supported
602
File System Management Configuration
606
File System Configuration
607
Introduction to File System
607
File System Configuration Task List
607
Directory Operations
608
File Operations
608
Flash Memory Operations
609
Prompt Mode Configuration
610
File System Configuration Examples
610
File System Management Configuration
607
File Attribute Configuration
611
Introduction to File Attributes
611
Booting with the Startup File
612
Configuring File Attributes
613
Configuration File Backup and Restoration
614
Introduction to Configuration File Backup and Restoration
614
File Backup and Restoration
614
Ftp and Sftp Configuration/Tftp Configuration
615
1 FTP and SFTP Configuration
616
Introduction to FTP and SFTP
616
Introduction to FTP
616
FTP Configuration: a Switch Operating as an FTP Server
617
Introduction to SFTP
617
FTP Configuration: a Switch Operating as an FTP Client
621
Configuration Example: a Switch Operating as an FTP Server
624
FTP Banner Display Configuration Example
626
FTP Configuration: a Switch Operating as an FTP Client
627
SFTP Configuration: a Switch Operating as an SFTP Server
629
SFTP Configuration: a Switch Operating as an SFTP Client
630
SFTP Configuration Example
632
2 Tftp Configuration
636
Introduction to TFTP
636
TFTP Configuration: a Switch Operating as a TFTP Client
637
TFTP Configuration Example
638
Advertisement
3Com 4500 PWR Getting Started Manual (88 pages)
Switch 4500 Family 26/50-Port
Brand:
3Com
| Category:
Switch
| Size: 3 MB
Table of Contents
Getting Started Guide
1
Table of Contents
3
About this Guide
7
Before You Start
7
Conventions
8
Documentation Comments
8
Related Documentation
8
Introducing the Switch 4500 Family
11
Switch4500 Family
12
About the Switch 4500
12
Summary of Hardware Features
13
Switch 4500 - Front View Detail
13
Gigabit Ports
14
Switch 4500 - Rear View Detail
18
Redundant Power System Socket
19
Default Settings
19
Installing the Switch
21
Package Contents
21
Important Steps before Proceeding
21
Connecting a Redundant Power Supply to Your Switch 4500 PWR
22
The Power-Up Sequence
28
Powering-Up the Switch
28
SFP Operation
30
Approved SFP Transceivers
30
Inserting an SFP Transceiver
30
Packing and Shipping the Switch 4500
31
Managing Your Switch
33
Methods of Managing a Switch
34
Command Line Interface Management Using SSH
34
Web Interface Management
34
Setting up Your Switch
35
Viewing Automatically Configured IP Information
38
Connecting to the Console Port
38
Manually Configuring IP Information
39
Connecting the Workstation to the Switch
40
Setting up the Switch with IP Information
43
Setting up Command Line Interface Management
44
User Interface Overview
44
Setting up Command Line Interface Management Using SSH
45
Setting up Web Interface Management
46
Web Management over the Network
46
Default Users and Passwords
47
Setting up SNMP Management
47
Problem Solving
51
Solving Problems Indicated by Leds
52
Solving Hardware Problems
53
Solving Communication Problems
55
Solving Stack Formation Problems
57
In Outs
59
Modem Cable
59
Null Modem Cable
59
PC-AT Serial Cable
59
Ethernet Port RJ-45 Pin Assignments
60
Purchase Value-Added Services
61
Register Your Product
61
Upport for Your
61
Access Software Downloads
62
Contact Us
62
Telephone Technical Support and Repair
62
Troubleshoot Online
62
3Com Network Supervisor
65
Om Network Management
65
3Com Network Access Manager
66
3Com Network Director
66
3Com Enterprise Management Suite
67
Integration Kit with HP Openview Network Node Manager
67
Important Safety Information
69
3Com 4500 PWR Datasheet (16 pages)
SWITCH 4500 10/100 FAMILY
Brand:
3Com
| Category:
Switch
| Size: 1 MB
Advertisement
3Com 4500 PWR Datasheet (9 pages)
Switch 4500 10/100 Family
Brand:
3Com
| Category:
Switch
| Size: 0 MB
Table of Contents
Key Benefits
2
Feature Highlights
3
Service and Support
5
Specifications
6
Warranty
7
Redundant Power System
8
Product Description
8
3Com 4500 PWR Datasheet (8 pages)
Switch 4500 10/100 Family
Brand:
3Com
| Category:
Switch
| Size: 0 MB
Table of Contents
Key Benefits
2
Feature Highlights
3
Service and Support
5
Specifications
6
Redundant Power System
8
3Com 4500 PWR Datasheet (8 pages)
SWITCH 4500 10/100 FAMILY
Brand:
3Com
| Category:
Switch
| Size: 0 MB
Advertisement
Related Products
3Com 4500G Series
3Com Switch 4500 Family
3Com 4500G 24-Port
3Com 4500G 48-Port
3Com 4500G 3CR17761-91
3Com 4500G 3C17772-91
3Com 4500G 3CR17771-91
3Com 4500G 3CR17762-91
3Com 4500G PWR
3Com 4500G Family - L2, Static L3 and RIP
3Com Categories
Switch
Network Router
Wireless Access Point
Modem
Network Card
More 3Com Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL