Sign In
Upload
Manuals
Brands
3Com Manuals
Network Hardware
Switch 4210 52-Port
3Com Switch 4210 52-Port Manuals
Manuals and User Guides for 3Com Switch 4210 52-Port. We have
3
3Com Switch 4210 52-Port manuals available for free PDF download: Configuration Manual, Getting Started, Datasheet
3Com Switch 4210 52-Port Configuration Manual (870 pages)
Switch 4210 Family
Brand:
3Com
| Category:
Network Hardware
| Size: 9 MB
Table of Contents
Table of Contents
6
About this Manual
3
1 Logging in to an Ethernet Switch
8
Introduction to the User Interface
8
Supported User Interfaces
8
Relationship between a User and a User Interface
9
User Interface Index
9
Common User Interface Configuration
9
2 Logging in through the Console Port
11
Introduction
11
Setting up a Login Environment for Login through the Console Port
11
Console Port Login Configuration
13
Common Configuration
13
Console Port Login Configurations for Different Authentication Modes
15
Console Port Login Configuration with Authentication Mode Being None
16
Configuration Procedure
16
Configuration Example
16
Console Port Login Configuration with Authentication Mode Being Password
17
Configuration Procedure
17
Configuration Example
18
Console Port Login Configuration with Authentication Mode Being Scheme
19
Configuration Procedure
19
Configuration Example
20
3 Logging in through Telnet
23
Introduction
23
Common Configuration to Control Telnet Access
23
Telnet Configurations for Different Authentication Modes
25
Telnet Configuration with Authentication Mode Being None
26
Configuration Procedure
26
Configuration Example
26
Telnet Configuration with Authentication Mode Being Password
27
Configuration Procedure
27
Configuration Example
28
Telnet Configuration with Authentication Mode Being Scheme
29
Configuration Procedure
29
Configuration Example
30
Telnetting to a Switch
31
Telnetting to a Switch from a Terminal
31
Telnetting to Another Switch from the Current Switch
33
4 Logging in Using a Modem
34
Introduction
34
Configuration on the Switch Side
34
Modem Configuration
34
Switch Configuration
35
Modem Connection Establishment
35
151 CLI Configuration
38
Introduction to the CLI
38
Command Hierarchy
38
Command Level and User Privilege Level
38
Modifying the Command Level
39
Switching User Level
40
CLI Views
44
CLI Features
48
Online Help
48
Terminal Display
49
Command History
49
Error Prompts
50
Command Edit
50
Introduction
52
Establishing an HTTP Connection
52
Configuring the Login Banner
53
Configuration Procedure
53
Configuration Example
54
Enabling/Disabling the WEB Server
54
7 Logging in through NMS
56
Introduction
56
Connection Establishment Using NMS
56
8 User Control
57
Introduction
57
Controlling Telnet Users
57
Controlling Telnet Users by ACL
58
Configuration Example
59
Controlling Network Management Users by Source IP Addresses
59
Prerequisites
60
Controlling Network Management Users by Source IP Addresses
60
Configuration Example
60
Controlling Web Users by Source IP Address
61
Prerequisites
61
Controlling Web Users by Source IP Addresses
61
Logging out a Web User
62
Configuration Example
62
Configuration File Management
64
Configuration File Management
65
Introduction to Configuration File
65
Management of Configuration File
66
Saving the Current Configuration
66
Erasing the Startup Configuration File
67
Specifying a Configuration File for Next Startup
68
Displaying Device Configuration
69
VLAN Overview/Vlan Configuration
70
1 VLAN Overview
71
Introduction to VLAN
71
Advantages of Vlans
72
VLAN Fundamentals
72
VLAN Interface
74
VLAN Classification
74
Port-Based VLAN
74
Link Types of Ethernet Ports
75
Assigning an Ethernet Port to Specified Vlans
75
Configuring the Default VLAN ID for a Port
75
2 VLAN Configuration
77
VLAN Configuration Task List
77
Basic VLAN Configuration
77
Basic VLAN Interface Configuration
78
Displaying VLAN Configuration
79
Configuring a Port-Based VLAN
79
Configuring an Access-Port-Based VLAN
79
Configuring a Hybrid-Port-Based VLAN
80
Configuring a Trunk-Port-Based VLAN
80
Displaying and Maintaining Port-Based VLAN
81
Port-Based VLAN Configuration Example
81
Troubleshooting Ethernet Port Configuration
83
Management VLAN Configuration
84
Introduction to Management VLAN
85
Management VLAN
85
Static Route
85
Default Route
85
Management VLAN Configuration
85
Management VLAN Configuration
86
Prerequisites
86
Configuring the Management VLAN
86
Configuration Example
87
Displaying and Maintaining Management VLAN Configuration
88
IP Addressing Configuration/Ip Performance Configuration
89
1 IP Addressing Configuration
90
IP Addressing Overview
90
IP Address Classes
90
Special Case IP Addresses
91
Subnetting and Masking
91
Configuring IP Addresses
92
Displaying IP Addressing Configuration
92
IP Address Configuration Examples
93
IP Address Configuration Example
93
2 IP Performance Configuration
94
IP Performance Overview
94
Introduction to IP Performance Configuration
94
Introduction to FIB
94
Configuring IP Performance
94
Introduction to IP Performance Configuration Tasks
94
Configuring TCP Attributes
94
Disabling ICMP to Send Error Packets
95
Displaying and Maintaining IP Performance Configuration
95
DNS Configuration
97
DNS Configuration
98
DNS Overview
98
Static Domain Name Resolution
98
Dynamic Domain Name Resolution
98
Configuring Domain Name Resolution
99
Configuring Static Domain Name Resolution
99
Configuring Dynamic Domain Name Resolution
100
Displaying and Maintaining DNS
100
DNS Configuration Example
101
Static Domain Name Resolution Configuration Example
101
Dynamic Domain Name Resolution Configuration Example
102
Troubleshooting DNS
103
Voice VLAN Configuration
104
Voice VLAN Configuration
105
Voice VLAN Overview
105
How an IP Phone Works
105
How Switch S4210 Identify Voice Traffic
107
Setting the Voice Traffic Transmission Priority
107
Configuring Voice VLAN Assignment Mode of a Port
108
Support for Voice VLAN on Various Ports
108
Security Mode of Voice VLAN
110
Voice VLAN Configuration
111
Configuration Prerequisites
111
Configuring Qos Priority Settings for Voice Traffic on an Interface
111
Configuring the Voice VLAN to Operate in Automatic Voice VLAN Assignment Mode
112
Configuring the Voice VLAN to Operate in Manual Voice VLAN Assignment Mode
113
Displaying and Maintaining Voice VLAN
115
Voice VLAN Configuration Example
116
Voice VLAN Configuration Example (Automatic Voice VLAN Assignment Mode)
116
Voice VLAN Configuration Example (Manual Voice VLAN Assignment Mode)
117
Gvrp Configuration
119
GVRP Configuration
120
Introduction to GVRP
120
Garp
120
Gvrp
123
Protocol Specifications
123
GVRP Configuration
123
GVRP Configuration Tasks
123
Enabling GVRP
123
Configuring GVRP Timers
124
Configuring GVRP Port Registration Mode
125
Displaying and Maintaining GVRP
126
GVRP Configuration Example
126
# Display the VLAN Information Dynamically Registered on Switch E.
130
Ethernet Port Configuration
131
Combo Port Configuration
131
Initially Configuring a Port
132
Configuring Port Auto-Negotiation Speed
132
Limiting Traffic on Individual Ports
133
Enabling Flow Control on a Port
134
Duplicating the Configuration of a Port to Other Ports
134
Configuring Loopback Detection for an Ethernet Port
135
Configuring Loopback Detection for Ethernet Port
136
Enabling Loopback Test
137
Enabling the System to Test Connected Cable
137
Configuring the Interval to Perform Statistical Analysis on Port Traffic
138
Disabling Up/Down Log Output on a Port
138
Configuring Storm Control on a Port
139
Setting the Port State Change Delay
140
Displaying and Maintaining Basic Port Configuration
142
Port Basic Configuration
131
Ethernet Port Configuration Example
142
Troubleshooting Ethernet Port Configuration
143
Link Aggregation Configuration
144
Link Aggregation Configuration
145
Overview
145
Introduction to Link Aggregation
145
Introduction to LACP
145
Operational Key
146
Requirements on Ports for Link Aggregation
146
Link Aggregation Classification
146
Manual Aggregation Group
146
Static LACP Aggregation Group
147
Dynamic LACP Aggregation Group
148
Aggregation Group Categories
149
Link Aggregation Configuration
150
Configuring a Manual Aggregation Group
150
Configuring a Static LACP Aggregation Group
151
Configuring a Dynamic LACP Aggregation Group
152
Configuring a Description for an Aggregation Group
152
Displaying and Maintaining Link Aggregation Configuration
153
Link Aggregation Configuration Example
153
Ethernet Port Aggregation Configuration Example
153
Port Isolation Configuration
156
Port Isolation Configuration
157
Port Isolation Overview
157
Displaying Port Isolation Configuration
158
Port Isolation Configuration Example
158
Port Security Configuration/Port Binding Configuration
160
1 Port Security Configuration
161
Port Security Overview
161
Introduction
161
Port Security Features
161
Port Security Modes
161
Port Security Configuration Task List
164
Enabling Port Security
165
Setting the Maximum Number of MAC Addresses Allowed on a Port
165
Setting the Port Security Mode
166
Configuring Port Security Features
167
Configuring Guest VLAN for a Port in Macaddressoruserloginsecure Mode
168
Ignoring the Authorization Information from the RADIUS Server
169
Configuring Security MAC Addresses
170
Displaying and Maintaining Port Security Configuration
171
Port Security Configuration Example
172
Guest VLAN Configuration Example
173
2 Port Binding Configuration
175
Port Binding Overview
175
Introduction
175
Configuring Port Binding
175
Displaying and Maintaining Port Binding Configuration
176
Port Binding Configuration Example
176
Dldp Configuration
178
DLDP Configuration
179
Overview
179
DLDP Fundamentals
180
DLDP Packets
180
DLDP Status
182
DLDP Timers
182
DLDP Operating Mode
183
DLDP Implementation
184
DLDP Neighbor State
186
Link Auto-Recovery Mechanism
186
DLDP Configuration
187
Performing Basic DLDP Configuration
187
Resetting DLDP State
188
Displaying and Maintaining DLDP
188
DLDP Configuration Example
189
Mac Address Table Management
191
MAC Address Table Management
192
Overview
192
Introduction to MAC Address Table
192
Introduction to MAC Address Learning
192
Managing MAC Address Table
195
MAC Address Table Management
196
MAC Address Table Management Configuration Task List
196
Configuring a MAC Address Entry
196
Setting the MAC Address Aging Timer
197
Setting the Maximum Number of MAC Addresses a Port Can Learn
198
Displaying MAC Address Table Information
198
Adding a Static Mac Address Entry Manually
199
Mstp Configuration
200
MSTP Configuration
202
Overview
202
Spanning Tree Protocol Overview
202
Rapid Spanning Tree Protocol Overview
211
Multiple Spanning Tree Protocol Overview
211
MSTP Implementation on Switches
215
Protocols and Standards
216
MSTP Configuration Task List
216
Configuring Root Bridge
218
Configuring an MST Region
218
Specifying the Current Switch as a Root Bridge/Secondary Root Bridge
219
Configuring the Bridge Priority of the Current Switch
221
Configuring How a Port Recognizes and Sends MSTP Packets
221
Configuring the MSTP Operation Mode
222
Configuring the Maximum Hop Count of an MST Region
223
Configuring the Network Diameter of the Switched Network
224
Configuring the MSTP Time-Related Parameters
224
Configuring the Timeout Time Factor
226
Configuring the Maximum Transmitting Rate on the Current Port
226
Configuring the Current Port as an Edge Port
227
Setting the Link Type of a Port to P2P
228
Enabling MSTP
230
Configuring Leaf Nodes
231
Configuring the MST Region
231
Configuring How a Port Recognizes and Sends MSTP Packets
231
Configuring the Timeout Time Factor
231
Configuring the Maximum Transmitting Rate on the Current Port
231
Configuring a Port as an Edge Port
231
Configuring the Path Cost for a Port
231
Configuring Port Priority
233
Setting the Link Type of a Port to P2P
234
Enabling MSTP
234
Performing Mcheck Operation
235
Configuration Prerequisites
235
Configuration Procedure
235
Configuring Guard Functions
236
Configuring BPDU Guard
236
Configuring Root Guard
237
Configuring Loop Guard
238
Configuring TC-BPDU Attack Guard
239
Configuring BPDU Dropping
240
Configuring Digest Snooping
241
Introduction
241
Configuring Rapid Transition
242
Introduction
242
Configuring Rapid Transition
244
Configuring VLAN-VPN Tunnel
245
Introduction
245
MSTP Maintenance Configuration
246
Introduction
246
Enabling Log/Trap Output for Ports of MSTP Instance
246
Configuration Example
246
Displaying and Maintaining MSTP
247
Enabling Trap Messages Conforming to 802.1D Standard
247
MSTP Configuration Example
248
VLAN-VPN Tunnel Configuration Example
250
Igmp Snooping Configuration/Common Multicast Configuration
252
Multicast Overview
254
Information Transmission in the Unicast Mode
254
Information Transmission in the Broadcast Mode
255
Information Transmission in the Multicast Mode
255
Roles in Multicast
256
Advantages and Applications of Multicast
257
Multicast Models
257
Multicast Architecture
258
Multicast Address
259
Multicast Protocols
261
Multicast Packet Forwarding Mechanism
263
Implementation of the RPF Mechanism
263
Rpf Check
264
2 IGMP Snooping Configuration
266
IGMP Snooping Overview
266
Principle of IGMP Snooping
266
Basic Concepts in IGMP Snooping
266
Work Mechanism of IGMP Snooping
267
IGMP Snooping Configuration
269
Enabling IGMP Snooping
270
Configuring the Version of IGMP Snooping
270
Configuring Timers
271
Configuring Fast Leave Processing
271
Configuring a Multicast Group Filter
272
Configuring the Maximum Number of Multicast Groups on a Port
273
Configuring IGMP Snooping Querier
274
Suppressing Flooding of Unknown Multicast Traffic in a VLAN
275
Configuring Static Member Port for a Multicast Group
276
Configuring a Static Router Port
277
Configuring a Port as a Simulated Group Member
277
Configuring a VLAN Tag for Query Messages
278
Configuring Multicast VLAN
279
Displaying and Maintaining IGMP Snooping
280
IGMP Snooping Configuration Examples
281
Configuring IGMP Snooping
281
Configuring Multicast VLAN
283
Troubleshooting IGMP Snooping
285
3 Common Multicast Configuration
286
Configuring Suppression on the Multicast Source Port
286
Configuring a Multicast MAC Address Entry
287
Table of Contents
289
X Configuration
290
Introduction to 802.1X
290
Architecture of 802.1X Authentication
290
The Mechanism of an 802.1X Authentication System
291
Encapsulation of Eapol Messages
292
802.1X Authentication Procedure
294
Timers Used in 802.1X
297
802.1X Implementation on an S4210 Series Switch
298
Introduction to 802.1X Configuration
301
Basic 802.1X Configuration
301
Configuration Prerequisites
301
Configuring Basic 802.1X Functions
302
Timer and Maximum User Number Configuration
303
Advanced 802.1X Configuration
304
Specifying a Mandatory Authentication Domain for a Port
304
Configuring Proxy Checking
306
Configuring Client Version Checking
306
Enabling DHCP-Triggered Authentication
307
Configuring Guest VLAN
307
Configuring 802.1X Re-Authentication
308
Configuring the 802.1X Re-Authentication Timer
308
Displaying and Debugging 802.1X
309
Configuration Example
309
802.1X Mandatory Authentication Domain Configuration Example
312
2 HABP Configuration
314
Introduction to HABP
314
HABP Server Configuration
314
HABP Client Configuration
315
Displaying HABP
315
3 System-Guard Configuration
316
System-Guard Overview
316
Configuring the System-Guard Feature
316
Displaying and Maintaining System-Guard
317
Aaa Overview/Aaa Configuration
318
1 Aaa Overview
320
Introduction to AAA
320
Authentication
320
Authorization
320
Accounting
321
Introduction to ISP Domain
321
Introduction to AAA Services
322
Introduction to RADIUS
322
Introduction to HWTACACS
326
2 AAA Configuration
329
AAA Configuration Task List
329
Configuration Introduction
329
Creating an ISP Domain and Configuring Its Attributes
330
Configuring an AAA Scheme for an ISP Domain
331
Configuring Dynamic VLAN Assignment
336
Configuring the Attributes of a Local User
337
Cutting down User Connections Forcibly
338
RADIUS Configuration Task List
338
Creating a RADIUS Scheme
340
Configuring RADIUS Authentication/Authorization Servers
341
Configuring Ignorance of Assigned RADIUS Authorization Attributes
341
Configuring the Sending Mode of Accounting Start Requests
342
Configuring RADIUS Accounting Servers
343
Configuring Shared Keys for RADIUS Messages
344
Configuring the Maximum Number of RADIUS Request Transmission Attempts
345
Configuring the Type of RADIUS Servers to be Supported
345
Configuring the Status of RADIUS Servers
346
Configuring the Attributes of Data to be Sent to RADIUS Servers
347
Configuring the Local RADIUS Authentication Server Function
348
Configuring Timers for RADIUS Servers
349
Enabling Sending Trap Message When a RADIUS Server Goes down
350
Enabling the User Re-Authentication at Restart Function
350
HWTACACS Configuration Task List
352
Creating a HWTACACS Scheme
352
Configuring TACACS Authentication Servers
352
Configuring TACACS Authorization Servers
353
Configuring TACACS Accounting Servers
354
Configuring Shared Keys for HWTACACS Messages
354
Configuring the Attributes of Data to be Sent to TACACS Servers
355
Configuring the Timers Regarding TACACS Servers
356
Displaying and Maintaining AAA
356
AAA Configuration Examples
358
Per User Type AAA Configuration Example
358
Remote RADIUS Authentication of Telnet/Ssh Users
359
Local Authentication of Ftp/Telnet Users
360
HWTACACS Authentication and Authorization of Telnet Users
362
Troubleshooting AAA
363
Troubleshooting RADIUS Configuration
363
Troubleshooting HWTACACS Configuration
363
Mac Authentication Configuration
364
MAC Authentication Configuration
365
MAC Authentication Overview
365
Performing MAC Authentication on a RADIUS Server
365
Performing MAC Authentication Locally
365
Configuring Basic MAC Authentication Functions
366
Related Concepts
366
MAC Authentication Timers
366
Quiet MAC Address
366
MAC Address Authentication Enhanced Function Configuration
367
MAC Address Authentication Enhanced Function Configuration Tasks
367
Configuring a Guest VLAN
368
Configuring the Maximum Number of Mac Address Authentication Users Allowed to Access a Port
369
Configuring the Quiet MAC Function on a Port
370
Displaying and Debugging MAC Authentication
370
MAC Authentication Configuration Example
371
Table of Contents
373
Introduction to ARP
374
ARP Function
374
ARP Message Format
374
ARP Table
375
Arp Process
376
Introduction to ARP Attack Detection
377
Introduction to ARP Packet Rate Limit
378
Introduction to Gratuitous ARP
378
ARP Configuration
378
Configuring ARP Basic Functions
378
Configuring ARP Attack Detection
379
Configuring the ARP Packet Rate Limit Function
380
Displaying and Debugging ARP
381
Gratuitous ARP Packet Configuration
381
ARP Configuration Example
382
ARP Basic Configuration Example
382
ARP Attack Detection and Packet Rate Limit Configuration Example
382
Dhcp Overview/Dhcp Server Configuration
385
1 Dhcp Overview
387
DHCP IP Address Assignment
387
IP Address Assignment Policy
387
Obtaining IP Addresses Dynamically
388
Updating IP Address Lease
388
Introduction to DHCP
387
DHCP Packet Format
389
Protocol Specification
390
2 DHCP Server Configuration
391
Introduction to DHCP Server
391
Usage of DHCP Server
391
DHCP Address Pool
391
DHCP IP Address Preferences
393
DHCP Server Configuration Task List
393
Enabling DHCP
393
Configuring the Global Address Pool Based DHCP Server
394
Configuration Task List
394
Enabling the Global Address Pool Mode on Interface
395
Creating a DHCP Global Address Pool
395
Configuring an Address Allocation Mode for the Global Address Pool
395
Configuring a Domain Name Suffix for the DHCP Client
398
Configuring DNS Servers for the DHCP Client
398
Configuring WINS Servers for the DHCP Client
399
Configuring Gateways for the DHCP Client
400
Configuring BIMS Server Information for the DHCP Client
400
Configuring Option 184 Parameters for the Client with Voice Service
400
Configuring a Self-Defined DHCP Option
403
Configuring the Interface Address Pool Based DHCP Server
404
Configuration Task List
404
Enabling the Interface Address Pool Mode on Interface
405
Configuring an Address Allocation Mode for an Interface Address Pool
406
Configuring a Domain Name Suffix for the DHCP Client
408
Configuring DNS Servers for the DHCP Client
408
Configuring WINS Servers for the DHCP Client
409
Configuring BIMS Server Information for the DHCP Client
410
Configuring Option 184 Parameters for the Client with Voice Service
410
Configuring a Self-Defined DHCP Option
411
Configuring DHCP Server Security Functions
412
Prerequisites
412
Enabling Unauthorized DHCP Server Detection
412
Configuring IP Address Detecting
413
Configuring DHCP Accounting Functions
413
Introduction to DHCP Accounting
413
DHCP Accounting Fundamentals
413
DHCP Accounting Configuration
414
Enabling the DHCP Server to Process Option 82
414
Displaying and Maintaining the DHCP Server
415
DHCP Server Configuration Examples
416
DHCP Server Configuration Example
416
DHCP Server with Option 184 Support Configuration Example
418
DHCP Accounting Configuration Example
419
Troubleshooting a DHCP Server
421
3 DHCP Snooping Configuration
422
Introduction
422
Introduction to DHCP Snooping
422
Introduction to DHCP Snooping Trusted/Untrusted Ports
422
Overview of DHCP-Snooping Option 82
423
Overview of IP Filtering
425
DHCP Snooping Configuration
426
Configuring DHCP Snooping
426
Configuring DHCP Snooping Trusted/Untrusted Ports
426
Configuring DHCP Snooping to Support Option 82
427
Configuring IP Filtering
430
Displaying DHCP Snooping Configuration
431
DHCP Snooping Configuration Example
431
DHCP-Snooping Option 82 Support Configuration Example
431
IP Filtering Configuration Example
432
4 DHCP Packet Rate Limit Configuration
435
Introduction to DHCP Packet Rate Limit
435
Configuring DHCP Packet Rate Limit
436
Rate Limit Configuration Example
436
5 DHCP/BOOTP Client Configuration
438
Introduction to DHCP Client
438
Introduction to Automatic Configuration
438
Application Background
438
How Automatic Configuration Works
439
Introduction to BOOTP Client
440
Configuring a DHCP/BOOTP Client
441
DHCP Client Configuration Example
442
Displaying DHCP/BOOTP Client Configuration
442
Acl Configuration
443
ACL Configuration
444
ACL Matching Order
444
Ways to Apply an ACL on a Switch
445
Types of Acls Supported by Switch 4210 Series
446
ACL Configuration
446
Configuring Time Range
446
Configuring Basic ACL
447
Configuring Advanced ACL
448
Configuring Layer 2 ACL
450
ACL Assignment
451
Assigning an ACL Globally
451
Assigning an ACL to a VLAN
452
Assigning an ACL to a Port
452
Displaying ACL Configuration
453
Example for Upper-Layer Software Referencing Acls
454
Example for Controlling Telnet Login Users by Source IP
454
Example for Controlling Web Login Users by Source IP
454
Example for Applying Acls to Hardware
455
Basic ACL Configuration Example
455
Advanced ACL Configuration Example
456
Layer 2 ACL Configuration Example
456
Qos Configuration/Qos Profile Configuration
458
1 Qos Configuration
459
Overview
459
Introduction to Qos
459
Traditional Packet Forwarding Service
459
New Applications and New Requirements
459
Major Traffic Control Techniques
460
Qos Supported by the 4210 Series Ethernet Switches
461
Introduction to Qos Features
461
Traffic Classification
461
Priority Trust Mode
462
Priority Marking
466
Traffic Policing
466
Port Rate Limiting
468
Traffic Redirecting
468
Queue Scheduling
468
Flow-Based Traffic Accounting
469
Burst
469
Traffic Mirroring
470
Qos Configuration
470
Configuring Priority Trust Mode
470
Configuring Priority Mapping
470
Marking Packet Priority
470
Configuring Traffic Policing
470
Configuring Port Rate Limiting
470
Configuring Traffic Redirecting
477
Configuring Queue Scheduling
478
Configuring Traffic Accounting
479
Enabling the Burst Function
480
Configuring Traffic Mirroring
481
Displaying Qos
483
Qos Configuration Example
484
Configuration Example of Traffic Policing
484
2 Qos Profile Configuration
486
Overview
486
Introduction to Qos Profile
486
Qos Profile Application Mode
486
Qos Profile Configuration
487
Configuring a Qos Profile
487
Applying a Qos Profile
487
Displaying Qos Profile Configuration
488
Qos Profile Configuration Example
489
Mirroring Configuration
491
Mirroring Configuration
492
Mirroring Overview
492
Local Port Mirroring
492
Remote Port Mirroring
492
Mirroring Configuration
494
Configuring Local Port Mirroring
494
Configuring Remote Port Mirroring
495
Displaying Port Mirroring
498
Mirroring Configuration Example
498
Local Port Mirroring Configuration Example
498
Remote Port Mirroring Configuration Example
499
Cluster
503
Cluster
504
Cluster Overview
504
Introduction to HGMP
504
Roles in a Cluster
505
How a Cluster Works
506
Cluster Configuration Tasks
511
Configuring the Management Device
512
Configuring Member Devices
516
Managing a Cluster through the Management Device
518
Configuring the Enhanced Cluster Features
519
Configuring the Cluster Synchronization Function
521
Displaying and Maintaining Cluster Configuration
525
Cluster Configuration Example
526
Basic Cluster Configuration Example
526
Enhanced Cluster Feature Configuration Example
529
Poe Profile Configuration
531
Poe Overview
532
Introduction to Poe
532
Poe Features Supported by Switch 4210
532
Poe Configuration Tasks
532
Enabling the Poe Feature on a Port
534
Setting the Maximum Output Power on a Port
535
Setting Poe Management Mode and Poe Priority of a Port
535
Setting the Poe Mode on a Port
536
Configuring the PD Compatibility Detection Function
536
Configuring Poe Over-Temperature Protection on the Switch
537
Upgrading the PSE Processing Software Online
537
Displaying Poe Configuration
538
Poe Configuration Example
538
Introduction to Poe Profile
540
Configuring Poe Profile
540
Poe Profile Configuration
540
Displaying Poe Profile Configuration
541
Poe Profile Configuration Example
541
Poe Profile Application Example
541
Snmp Configuration
544
Snmp Configuration
545
Snmp Overview
545
Snmp Operation Mechanism
545
Snmp Versions
545
Supported Mibs
545
Configuring Basic Snmp Functions
546
Configuring Trap Parameters
548
Configuring Basic Trap
548
Configuring Extended Trap
549
Enabling Logging for Network Management
549
Displaying Snmp
550
Snmp Configuration Examples
550
Commonly Used Rmon Groups
554
Displaying Rmon
556
Rmon Configuration Examples
556
Ntp Configuration
558
Introduction to NTP
559
Applications of NTP
559
Implementation Principle of NTP
560
NTP Implementation Modes
561
NTP Configuration
559
Configuring NTP Implementation Modes
563
NTP Configuration Tasks
563
Configuring Access Control Right
567
Configuration Prerequisites
568
Configuration Procedure
568
Configuring NTP Authentication
568
Configuration Prerequisites
569
Configuration Procedure
569
Configuring Optional NTP Parameters
571
Configuring an Interface on the Local Switch to Send NTP Messages
571
Configuring the Number of Dynamic Sessions Allowed on the Local Switch
571
Disabling an Interface from Receiving NTP Messages
572
Configuration Example
572
Configuring NTP Server/Client Mode
572
Configuring Ntp Symmetric Peer Mode
574
Configuring NTP Broadcast Mode
575
Configuring NTP Multicast Mode
577
Configuring NTP Server/Client Mode with Authentication
578
Displaying NTP Configuration
572
Ssh Configuration
581
SSH Configuration
582
SSH Overview
582
Introduction to SSH
582
Algorithm and Key
582
Asymmetric Key Algorithm
583
SSH Operating Process
583
Configuring the SSH Server
585
Configuring the User Interfaces for SSH Clients
586
Configuring the SSH Management Functions
586
Configuring the SSH Server to be Compatible with SSH1 Clients
586
Generating/Destroying Key Pairs
588
Specifying a Service Type for an SSH User
588
Configuring the Public Key of a Client on the Server
590
Assigning a Public Key to an SSH User
591
Exporting the RSA or DSA Public Key
592
SSH Server and Client Configuration Task List
585
Configuring the SSH Client
593
SSH Client Configuration Task List
593
Configuring an SSH Client that Runs SSH Client Software
593
Configuring an SSH Client Assumed by an SSH2-Capable Switch
593
Comparison of SSH Commands with the same Functions
601
Displaying and Maintaining SSH Configuration
601
SSH Configuration Examples
602
When Switch Acts as Server for Local Password Authentication
602
When Switch Acts as Server for Password and RADIUS Authentication
605
When Switch Acts as Server for Password and HWTACACS Authentication
610
When Switch Acts as Server for Publickey Authentication
612
When Switch Acts as Client for Password Authentication
618
When Switch Acts as Client for Publickey Authentication
619
When Switch Acts as Client and First-Time Authentication Is Not Supported
622
File System Management Configuration
625
File System Configuration
626
Introduction to File System
626
File System Configuration Tasks
626
Directory Operations
626
File Operations
627
Flash Memory Operations
628
Prompt Mode Configuration
628
File System Configuration Example
629
File System Management Configuration
626
File Attribute Configuration
630
Introduction to File Attributes
630
Booting with the Startup File
631
Configuring File Attributes
631
Ftp and Sftp Configuration/Tftp Configuration
633
1 FTP and SFTP Configuration
634
Introduction to FTP and SFTP
634
Introduction to FTP
634
Introduction to SFTP
634
FTP Configuration
635
FTP Configuration: a Switch Operating as an FTP Server
635
FTP Configuration: a Switch Operating as an FTP Client
638
Configuration Example: a Switch Operating as an FTP Server
640
FTP Banner Display Configuration Example
642
FTP Configuration: a Switch Operating as an FTP Client
643
SFTP Configuration: a Switch Operating as an SFTP Server
644
SFTP Configuration Example
644
2 TFTP Configuration
651
Introduction to TFTP
651
TFTP Configuration: a Switch Operating as a TFTP Client
651
TFTP Configuration Example
651
Information Center
654
Information Center
655
System Information Format
658
Information Center Configuration
661
Introduction to the Information Center Configuration Tasks
661
Configuring Synchronous Information Output
661
Configuring to Display the Time Stamp with the UTC Time Zone
662
Setting to Output System Information to the Console
662
Setting to Output System Information to a Monitor Terminal
664
Setting to Output System Information to a Log Host
666
Setting to Output System Information to the Trap Buffer
666
Setting to Output System Information to the Log Buffer
667
Setting to Output System Information to the SNMP NMS
667
Displaying and Maintaining Information Center
668
Information Center Configuration Examples
669
Log Output to a UNIX Log Host
669
Log Output to a Linux Log Host
670
Log Output to the Console
672
Configuration Example
672
Advertisement
3Com Switch 4210 52-Port Getting Started (74 pages)
Switch 4210 Series
Brand:
3Com
| Category:
Switch
| Size: 1 MB
Table of Contents
Getting Started
1
Table of Contents
3
About this Guide
5
Before You Start
5
Download the Latest Software and Documentation for Your 3Com Switch
5
Related Documentation
6
Product Introduction
7
Overview
7
Introduction to the Switch 4210 Family PWR Switches
8
Front Panel
8
Power System
11
Cooling System
11
Introduction to the Switch 4210 Family Non-PWR Models
14
Switch 4210 9-Port
14
Switch 4210 18-Port
15
Switch 4210 26-Port
16
Power Led
18
Technical Specifications
19
Related Standards
20
Earthing Lead
20
SFP Modules Supported for the Switch 4210
21
Installing the Switch
23
Rack-Mounting the Switch
24
Mounting the Switch on a Desktop
27
The Power-Up Sequence
27
Powering-Up the Switch
27
Connecting a Redundant Power Supply
28
Connecting the Switch to the Redundant Power System
30
Using Power over Ethernet
31
Connecting the Console Cable
32
Managing Your Switch
35
Methods of Managing a Switch
36
SNMP Management
37
Setting up Your Switch
37
Viewing Automatically Configured IP Information
40
Connecting to the Console Port
40
Connecting Workstation to Switch
42
Manually Configuring IP Information
42
Setting up Switch with IP Information
43
Setting up Command Line Interface Management
47
Setting up Command Line Interface Management Using SSH
48
Setting up Web Interface Management
48
Web Management over Network
49
Setting up SNMP Management
49
Default Users and Passwords
50
Problem Solving
51
Solving Problems Indicated by Leds
52
Solving Hardware Problems
53
Command Line Interface
53
Web Interface
53
Solving Communication Problems
54
Solving Fabric Formation Problems
55
Pin - Outs
57
Null Modem Cable
57
PC-AT Serial Cable
57
Modem Cable
58
Ethernet Port RJ-45 Pin Assignments
58
Upport for Your
59
Register Your Product to Gain Service Benefits
59
Solve Problems Online
59
Purchase Extended Warranty and Professional Services
59
Access Software Downloads
59
Products
59
Contact Us
60
3Com Switch 4210 52-Port Datasheet (8 pages)
SWITCH 4210 10/100 Series
Brand:
3Com
| Category:
Switch
| Size: 0 MB
Advertisement
Advertisement
Related Products
3Com AccessBuilder 4000
3Com Switch 4210 9-Port
3Com 486
3Com Switch 4210 PWR 18-Port
3Com Switch 4210 PWR 9-Port
3Com 4210 Series
3Com Switch 4210 18-Port
3Com Switch 4210 26-Port
3Com 4210G PWR
3Com 4210G 24-Port
3Com Categories
Switch
Network Router
Wireless Access Point
Modem
Network Card
More 3Com Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL