Sign In
Upload
Manuals
Brands
3Com Manuals
Switch
WX3024
3Com WX3024 Manuals
Manuals and User Guides for 3Com WX3024. We have
3
3Com WX3024 manuals available for free PDF download: Operation Manual, Installation Manual, Datasheet
3Com WX3024 Operation Manual (715 pages)
Unified Switches Switching Engine
Brand:
3Com
| Category:
Switch
| Size: 7.43 MB
Table of Contents
About this Manual
3
Switching Engine
1
Table of Contents
3
Login
5
CLI Configuration
7
CLI Configuration
8
Command Hierarchy
8
Switching User Levels
9
Setting the Level of a Command in a Specific View
10
Introduction to the CLI
8
CLI Views
11
CLI Features
14
Online Help
14
Terminal Display
15
Command History
15
Error Prompts
16
Command Edit
16
Table of Contents
18
1 Logging in to the Switching Engine
20
Introduction to the User Interface
20
Supported User Interfaces
20
Common User Interface Configuration
21
User Interface Index
21
2 Logging in through OAP
23
OAP Overview
23
Logging in to the Switching Engine through OAP
23
Configuring the Management IP Address of the OAP Software System
23
Configuring the Management IP Address of the OAP Software System on the Switching Engine
24
Engine
24
Resetting the OAP Software System
25
3 Logging in through Telnet
26
Introduction
26
Common Configuration
26
Telnet Configurations for Different Authentication Modes
27
Telnet Configuration with Authentication Mode Being None
28
Configuration Procedure
28
Configuration Example
29
Telnet Configuration with Authentication Mode Being Password
30
Configuration Procedure
30
Configuration Example
31
Telnet Configuration with Authentication Mode Being Scheme
32
Configuration Procedure
32
Configuration Example
35
Telnetting to the Switching Engine
36
Telnetting to the Switching Engine from a Terminal
36
Telnetting to the Switching Engine from the Access Control Engine
38
Introduction
40
Setting up a Web Configuration Environment
41
Configuring the Login Banner
42
Configuration Procedure
42
Configuration Example
43
Enabling/Disabling the WEB Server
44
5 Logging in from NMS
45
Introduction
45
Connection Establishment Using NMS
45
6 Configuring Source IP Address for Telnet Service Packets
46
Overview
46
Displaying Source IP Address Configuration
47
7 User Control
48
Introduction
48
Controlling Telnet Users
48
Controlling Telnet Users by Source IP Addresses
48
Prerequisites
48
Controlling Telnet Users by Source and Destination IP Addresses
49
Configuration Example
50
Controlling Telnet Users by Source MAC Addresses
50
Controlling Network Management Users by Source IP Addresses
51
Prerequisites
51
Configuration Example
52
Controlling Web Users by Source IP Address
52
Configuration Example
53
Controlling Web Users by Source IP Addresses
53
Disconnecting a Web User by Force
53
Prerequisites
53
Configuration File Management
55
Configuration File Management
56
Introduction to Configuration File
56
Management of Configuration File
57
Saving the Current Configuration
57
Erasing the Startup Configuration File
58
Specifying a Configuration File for Next Startup
59
Displaying and Maintaining Device Configuration
60
Vlan
60
VLAN Overview/Vlan Configuration
61
1 VLAN Overview
62
Introduction to VLAN
62
Advantages of Vlans
63
How VLAN Works
63
VLAN Interface
65
VLAN Classification
65
Port-Based VLAN
65
Protocol-Based VLAN
66
Encapsulation Format of Ethernet Data
66
Introduction to Protocol-Based VLAN
66
Encapsulation Formats
68
Implementation of Protocol-Based VLAN
68
Procedure for the Switch to Judge Packet Protocol
68
2 VLAN Configuration
70
Configuration Task List
70
Basic VLAN Configuration
70
Basic VLAN Interface Configuration
71
Displaying and Maintaining VLAN
71
Configuring a Port-Based VLAN
72
Protocol-Based VLAN Configuration Example
72
Configuring a Protocol-Based VLAN
74
Configuration Task List
74
Configuring a Protocol Template for a Protocol-Based VLAN
74
Associating a Port with a Protocol-Based VLAN
75
Displaying and Maintaining Protocol-Based VLAN
76
Protocol-Based VLAN Configuration Example
76
Auto Detect Configuration
79
Auto Detect Configuration
80
Introduction to the Auto Detect Function
80
Auto Detect Configuration
81
Auto Detect Basic Configuration
81
Auto Detect Implementation in Static Routing
82
Auto Detect Implementation in VLAN Interface Backup
82
Auto Detect Configuration Examples
83
Configuration Example for Auto Detect Implementation in Static Routing
83
Configuration Example for Auto Detect Implementation in VLAN Interface Backup
84
Voice VLAN
85
Voice VLAN Configuration
86
Voice VLAN Overview
86
How an IP Phone Works
86
How the Device Identifies Voice Traffic
88
Configuring Operation Mode for Voice VLAN
88
Support for Voice VLAN on Various Ports
89
Security Mode of Voice VLAN
90
Voice VLAN Configuration
91
Configuration Prerequisites
91
Configuring a Voice VLAN to Operate in Automatic Mode
91
Configuring a Voice VLAN to Operate in Manual Mode
92
Displaying and Maintaining Voice VLAN
94
Voice VLAN Configuration Example
94
Voice VLAN Configuration Example (Automatic Mode)
94
Voice VLAN Configuration Example (Manual Mode)
95
Gvrp Configuration
97
Gvrp Configuration
98
Introduction to GVRP
98
Garp
98
Gvrp
101
Protocol Specifications
101
GVRP Configuration
101
Configuration Task List
101
Enabling GVRP
101
Configuring GVRP Timers
102
Configuring GVRP Port Registration Mode
103
Displaying and Maintaining GVRP
103
GVRP Configuration Example
104
Basic Port Configuration
107
Basic Port Configuration
108
Ethernet Port Overview
108
Types and Numbers of Ethernet Ports
108
Combo Ports Mapping Relations
108
Link Types of Ethernet Ports
109
Configuring the Default VLAN ID for an Ethernet Port
109
Adding an Ethernet Port to Specified Vlans
110
Configuring Ethernet Ports
110
Making Basic Port Configuration
110
Configuring Port Auto-Negotiation Speed
111
Setting the Ethernet Port Broadcast Suppression Ratio
112
Enabling Flow Control on a Port
112
Configuring Access Port Attribute
113
Configuring Hybrid Port Attribute
113
Configuring Trunk Port Attribute
113
Disabling Up/Down Log Output on a Port
114
Copying Port Configuration to Other Ports
115
Configuring a Port Group
115
Setting Loopback Detection for an Ethernet Port
116
Link Aggregation
117
Configuring the Ethernet Port to Run Loopback Test
117
Enabling the System to Test Connected Cable
118
Configuring the Interval to Perform Statistical Analysis on Port Traffic
118
Displaying and Maintaining Ethernet Ports
119
Ethernet Port Configuration Example
119
Troubleshooting Ethernet Port Configuration
120
Link Aggregation Configuration
121
Link Aggregation Configuration
122
Overview
122
Introduction to Link Aggregation
122
Introduction to LACP
122
Operation Key
123
Manual Aggregation Group
123
Static LACP Aggregation Group
124
Dynamic LACP Aggregation Group
125
Aggregation Group Categories
126
Link Aggregation Configuration
127
Configuring a Manual Aggregation Group
127
Configuring a Static LACP Aggregation Group
128
Configuring a Dynamic LACP Aggregation Group
129
Displaying and Maintaining Link Aggregation
130
Link Aggregation Configuration Example
130
Link Aggregation
131
Port Isolation
133
Port Isolation Configuration
134
Port Isolation Overview
134
Introduction to Port Isolation
134
Displaying and Maintaining Port Isolation
135
Port Isolation Configuration Example
135
Port Security Configuration/Port Binding Configuration
137
1 Port Security Configuration
138
Port Security Overview
138
Introduction
138
Port Security Features
138
Port Security Modes
139
Port Security Configuration
141
Enabling Port Security
141
Setting the Maximum Number of MAC Addresses Allowed on a Port
142
Setting the Port Security Mode
142
Configuring Port Security Features
143
Configuring Security MAC Addresses
145
Ignoring the Authorization Information from the RADIUS Server
145
Displaying and Maintaining Port Security Configuration
146
Port Security Configuration Example
146
2 Port Binding Configuration
148
Port Binding Overview
148
Configuring Port Binding
148
Introduction
148
Displaying and Maintaining Port Binding Configuration
148
Port Binding Configuration Example
149
Dldp
150
DLDP Configuration
151
DLDP Overview
151
DLDP Fundamentals
152
Precautions During DLDP Configuration
156
DLDP Configuration
156
DLDP Configuration Tasks
156
Resetting DLDP Status
157
DLDP Network Example
158
Mac Address Table Management
160
MAC Address Table Management
161
Overview
161
Introduction to MAC Address Table
161
Introduction to MAC Address Learning
161
Managing MAC Address Table
163
Configuring MAC Address Table Management
164
Configuration Task List
164
Configuring a MAC Address Entry
165
Setting the Aging Time of MAC Address Entries
166
Setting the Maximum Number of MAC Addresses a Port Can Learn
166
Disabling MAC Address Learning for a VLAN
167
Configuration Example
168
Adding a Static MAC Address Entry Manually
168
Displaying and Maintaining MAC Address Table
168
Mstp Configuration
169
MSTP Configuration
171
STP Overview
171
MSTP Overview
179
Background of MSTP
179
Basic MSTP Terminologies
180
Principle of MSTP
183
MSTP Implementation on the Device
184
STP-Related Standards
185
Configuring Root Bridge
185
Configuring an MST Region
185
Specifying the Current Device as a Root Bridge/Secondary Root Bridge
187
Configuring the Bridge Priority of the Current Device
189
Configuring the Mode a Port Recognizes and Sends MSTP Packets
190
Configuring the MSTP Operation Mode
191
Configuring the Maximum Hop Count of an MST Region
192
Configuring the Network Diameter of the Switched Network
192
Configuring the MSTP Time-Related Parameters
193
Configuring the Timeout Time Factor
194
Configuring the Maximum Transmitting Speed on the Current Port
195
Configuring the Current Port as an Edge Port
196
Specifying Whether the Link Connected to a Port Is Point-To-Point Link
197
Enabling Mstp
198
Configuring Leaf Nodes
199
Configuration Prerequisites
200
Configuring the MST Region
200
Configuring the Mode a Port Recognizes and Sends MSTP Packets
200
Configuring the Timeout Time Factor
200
Configuring the Maximum Transmitting Speed on the Current Port
200
Configuring a Port as an Edge Port
200
Configuring the Path Cost for a Port
200
Configuring Port Priority
203
Specifying Whether the Link Connected to a Port Is a Point-To-Point Link
204
Enabling MSTP
204
Performing Mcheck Operation
204
Configuration Prerequisites
204
Configuration Procedure
204
Configuration Example
205
Configuring Guard Functions
205
Introduction
205
Configuration Prerequisites
207
Configuring BPDU Guard
207
Configuring Root Guard
207
Configuring Loop Guard
208
Configuring TC-BPDU Attack Guard
208
Configuring BPDU Dropping
209
Configuring Digest Snooping
209
Introduction
209
Configuring Digest Snooping
210
Configuring Rapid Transition
211
Introduction
211
Configuring Rapid Transition
213
Configuring VLAN-VPN Tunnel
214
Introduction
214
STP Maintenance Configuration
215
Introduction
215
Enabling Log/Trap Output for Ports of MSTP Instance
215
Configuration Example
215
Displaying and Maintaining MSTP
216
Enabling Trap Messages Conforming to 802.1D Standard
216
MSTP Configuration Example
217
VLAN-VPN Tunnel Configuration Example
219
Table of Contents
221
X Configuration
222
Introduction to 802.1X
222
Architecture of 802.1X Authentication
222
Encapsulation of Eapol Messages
224
The Mechanism of an 802.1X Authentication System
224
802.1X Authentication Procedure
226
Timers Used in 802.1X
229
Additional 802.1X Features Implemented
230
Introduction to 802.1X Configuration
232
Basic 802.1X Configuration
233
Configuration Prerequisites
233
Configuring Basic 802.1X Functions
233
Timer and Maximum User Number Configuration
235
Advanced 802.1X Configuration
236
Configuring Proxy Checking
236
Configuring Client Version Checking
237
Configuring Guest VLAN
238
Enabling DHCP-Triggered Authentication
238
Configuring 802.1X Re-Authentication
239
Configuring the 802.1X Re-Authentication Timer
239
Displaying and Maintaining 802.1X
240
Configuration Example
240
2 Quick EAD Deployment Configuration
243
Introduction to Quick EAD Deployment
243
Operation of Quick EAD Deployment
243
Quick EAD Deployment Overview
243
Configuring Quick EAD Deployment
243
Configuration Prerequisites
243
Configuration Procedure
244
Displaying and Maintaining Quick EAD Deployment
245
Quick EAD Deployment Configuration Example
245
Troubleshooting
246
3 System-Guard Configuration
247
System-Guard Overview
247
Configuring the System-Guard Feature
247
Displaying and Maintaining System-Guard
248
Aaa Overview/Aaa Configuration
249
1 Aaa Overview
251
Introduction to AAA
251
Authentication
251
Authorization
251
Accounting
252
Introduction to ISP Domain
252
Introduction to AAA Services
252
Introduction to RADIUS
252
Introduction to HWTACACS
256
2 AAA Configuration
260
AAA Configuration Task List
260
Configuration Introduction
260
Creating an ISP Domain and Configuring Its Attributes
261
Configuring an AAA Scheme for an ISP Domain
262
Configuring Dynamic VLAN Assignment
264
Configuring the Attributes of a Local User
265
MAC Address Authentication
267
Cutting down User Connections Forcibly
267
RADIUS Configuration Task List
267
Configuring RADIUS Authentication/Authorization Servers
269
Creating a RADIUS Scheme
269
Configuring RADIUS Accounting Servers
270
Configuring Shared Keys for RADIUS Messages
271
Configuring the Maximum Number of RADIUS Request Transmission Attempts
272
Configuring the Type of RADIUS Servers to be Supported
272
Configuring the Status of RADIUS Servers
273
Configuring the Attributes of Data to be Sent to RADIUS Servers
274
Configuring the Local RADIUS Authentication Server Function
275
Configuring Timers for RADIUS Servers
276
Enabling Sending Trap Message When a RADIUS Server Goes down
277
Enabling the User Re-Authentication at Restart Function
277
HWTACACS Configuration Task List
278
Configuring TACACS Authentication Servers
279
Creating a HWTACACS Scheme
279
Configuring TACACS Authorization Servers
280
Configuring Shared Keys for HWTACACS Messages
281
Configuring TACACS Accounting Servers
281
Configuring the Attributes of Data to be Sent to TACACS Servers
282
Configuring the Timers Regarding TACACS Servers
283
Displaying and Maintaining AAA
284
AAA Configuration Examples
285
Remote RADIUS Authentication of Telnet/Ssh Users
285
Local Authentication of Ftp/Telnet Users
287
HWTACACS Authentication and Authorization of Telnet Users
288
Troubleshooting Aaa
289
Troubleshooting Hwtacacs Configuration
289
Troubleshooting Radius Configuration
289
3 Ead Configuration
290
Introduction to Ead
290
Typical Network Application of Ead
290
Ead Configuration Example
291
Mac Authentication Configuration
293
MAC Authentication Configuration
294
MAC Authentication Overview
294
Performing MAC Authentication on a RADIUS Server
294
Performing MAC Authentication Locally
294
Configuring Basic MAC Authentication Functions
295
Related Concepts
295
MAC Authentication Timers
295
Quiet MAC Address
295
MAC Address Authentication Enhanced Function Configuration
297
MAC Address Authentication Enhanced Function Configuration Tasks
297
Configuring a Guest VLAN
297
Port
299
Displaying and Maintaining MAC Authentication
300
MAC Authentication Configuration Example
300
IP Addressing Configuration/Ip Performance Configuration
302
1 IP Addressing Configuration
303
IP Addressing Overview
303
IP Address Classes
303
Special Case IP Addresses
304
Subnetting and Masking
304
Dhcp
305
Configuring IP Addresses
305
Displaying and Maintaining IP Addressing
306
IP Address Configuration Examples
306
Ip Address Configuration Example I
306
IP Address Configuration Example II
307
2 IP Performance Configuration
309
IP Performance Overview
309
Introduction to FIB
309
Introduction to IP Performance Configuration
309
Configuring IP Performance
309
Configuration Task List
309
Configuring TCP Attributes
309
Disabling Sending of ICMP Error Packets
310
Displaying and Maintaining IP Performance Configuration
311
Table of Contents
312
1 DHCP Overview
313
Introduction to DHCP
313
DHCP IP Address Assignment
313
IP Address Assignment Policy
313
Obtaining IP Addresses Dynamically
314
Updating IP Address Lease
315
DHCP Packet Format
315
Protocols and Standards
316
2 DHCP Relay Agent Configuration
317
Introduction to DHCP Relay Agent
317
DHCP Relay Agent Fundamentals
317
Usage of DHCP Relay Agent
317
Dhcp Relay Agent Support for Option
318
Configuring the DHCP Relay Agent
320
Correlating a DHCP Server Group with a Relay Agent Interface
320
DHCP Relay Agent Configuration Task List
320
Configuring DHCP Relay Agent Security Functions
321
Configuring the Dhcp Relay Agent to Support Option
323
Displaying and Maintaining DHCP Relay Agent Configuration
324
DHCP Relay Agent Configuration Example
324
Troubleshooting DHCP Relay Agent Configuration
325
3 DHCP Snooping Configuration
327
DHCP Snooping Overview
327
Function of DHCP Snooping
327
Overview of Dhcp Snooping Option
328
Overview of IP Filtering
330
DHCP Snooping Configuration
331
Configuring DHCP Snooping
331
Configuring Dhcp Snooping to Support Option
332
Configuring IP Filtering
335
DHCP Snooping Configuration Example
336
DHCP-Snooping Option 82 Support Configuration Example
336
IP Filtering Configuration Example
337
Displaying and Maintaining DHCP Snooping Configuration
339
4 DHCP/BOOTP Client Configuration
340
Introduction to DHCP Client
340
Introduction to BOOTP Client
340
Configuring a DHCP/BOOTP Client
340
DHCP Client Configuration Example
341
Displaying and Maintaining DHCP/BOOTP Client Configuration
342
Acl Configuration
343
Acl Configuration
344
ACL Overview
344
ACL Matching Order
344
Ways to Apply an ACL on a Device
345
Types of Acls Supported by Devices
346
ACL Configuration
346
Configuring Time Range
346
Configuring Basic ACL
348
Configuring Advanced ACL
349
Configuring Layer 2 ACL
350
ACL Assignment
351
Assigning an ACL Globally
352
Assigning an ACL to a VLAN
352
Assigning an ACL to a Port Group
353
Assigning an ACL to a Port
354
Displaying and Maintaining ACL
354
Examples for Upper-Layer Software Referencing Acls
355
Example for Controlling Telnet Login Users by Source IP
355
Example for Controlling Web Login Users by Source IP
355
Examples for Applying Acls to Hardware
356
Basic ACL Configuration Example
356
Advanced ACL Configuration Example
356
Layer 2 ACL Configuration Example
357
Example for Applying an Acl to a Vlan
358
# Apply Acl 3000 to VLAN 10.
360
1 Qos Configuration
362
Overview
362
Introduction to Qos
362
New Applications and New Requirements
362
Traditional Packet Forwarding Service
362
Major Traffic Control Techniques
363
Qos Supported by Devices
363
Traffic Classification
363
Precedence
364
Priority Trust Mode
366
Priority Marking
369
Protocol Priority
369
Traffic Policing and Traffic Shaping
369
Queue Scheduling
371
Traffic Redirecting
371
VLAN Mapping
371
Burst
374
Flow-Based Traffic Accounting
374
Traffic Mirroring
374
Qos Configuration
374
Qos Configuration Task List
374
Configuring Priority Trust Mode
375
Configuring Priority Mapping
376
Setting the Priority of Protocol Packets
379
Marking Packet Priority
380
Configuring Traffic Policing
381
Configuring Traffic Shaping
383
Configuring Traffic Redirecting
384
Configuring Queue Scheduling
386
Configuring Vlan Mapping
386
Collecting/Clearing Traffic Statistics
388
Configuring Traffic Mirroring
390
Enabling the Burst Function
390
Displaying and Maintaining Qos
393
Qos Configuration Example
394
Configuration Example of Traffic Policing
394
2 Qos Profile Configuration
396
Overview
396
Introduction to Qos Profile
396
Qos Profile Application Mode
396
Qos Profile Configuration
397
Applying a Qos Profile
397
Configuring a Qos Profile
397
Qos Profile Configuration Task List
397
Displaying and Maintaining Qos Profile
398
Configuration Example
399
Qos Profile Configuration Example
399
Mirroring Configuration
401
Mirroring Configuration
402
Mirroring Overview
402
Local Port Mirroring
403
Remote Port Mirroring
403
MAC-Based Mirroring
404
VLAN-Based Mirroring
404
Configuring Local Port Mirroring
405
Configuring Remote Port Mirroring
406
Configuring MAC-Based Mirroring
408
Configuring VLAN-Based Mirroring
409
Displaying and Maintaining Port Mirroring
410
Mirroring Configuration Example
410
Local Port Mirroring Configuration Example
410
Remote Port Mirroring Configuration Example
411
Arp Configuration
415
Arp Configuration
416
Introduction to ARP
416
Arp Function
416
ARP Message Format
416
Arp Table
418
Arp Process
418
Introduction to ARP Attack Detection
419
Introduction to Gratuitous ARP
420
Configuring ARP Basic Functions
420
Configuring ARP Attack Detection
421
Configuring Gratuitous ARP
422
ARP Configuration Example
423
ARP Basic Configuration Example
423
ARP Attack Detection Configuration Example
423
Displaying and Maintaining ARP
423
Snmp Configuration/Rmon Configuration
425
1 Snmp Configuration
426
Snmp Overview
426
SNMP Operation Mechanism
426
Snmp Versions
426
Supported Mibs
427
Configuring Basic SNMP Functions
428
Configuring Trap Parameters
430
Configuring Basic Trap
430
Configuring Extended Trap
431
Enabling Logging for Network Management
432
Displaying and Maintaining SNMP
432
SNMP Configuration Examples
432
2 Rmon Configuration
435
Introduction to RMON
435
Working Mechanism of RMON
435
Commonly Used RMON Groups
436
Displaying and Maintaining RMON
438
RMON Configuration Examples
438
Table of Contents
440
1 Multicast Overview
441
Information Transmission in the Unicast Mode
441
Information Transmission in the Broadcast Mode
442
Information Transmission in the Multicast Mode
443
Roles in Multicast
444
Multicast Models
445
Advantages and Applications of Multicast
445
Multicast Architecture
446
Multicast Protocols
449
Multicast Packet Forwarding Mechanism
451
Implementation of the RPF Mechanism
451
Rpf Check
452
2 IGMP Snooping Configuration
454
IGMP Snooping Overview
454
Basic Concepts in IGMP Snooping
454
Principle of IGMP Snooping
454
Work Mechanism of IGMP Snooping
455
IGMP Snooping Configuration
457
IGMP Snooping Configuration Task List
457
Configuring the Version of IGMP Snooping
458
Enabling IGMP Snooping
458
Configuring Fast Leave Processing
459
Configuring Timers
459
Configuring a Multicast Group Filter
460
Configuring the Maximum Number of Multicast Groups on a Port
461
Configuring IGMP Querier
462
Configuring Static Member Port for a Multicast Group
463
Suppressing Flooding of Unknown Multicast Traffic in a VLAN
463
Configuring a Static Router Port
464
Configuring a Port as a Simulated Group Member
465
Qos-Qos Profile
466
Configuring a VLAN Tag for Query Messages
466
Configuring Multicast VLAN
466
Displaying and Maintaining IGMP Snooping
468
IGMP Snooping Configuration Examples
468
Configuring IGMP Snooping
468
Troubleshooting IGMP Snooping
472
3 Common Multicast Configuration
473
Configuring a Multicast MAC Address Entry
473
Configuring Dropping Unknown Multicast Packets
474
Displaying and Maintaining Common Multicast Configuration
474
Ntp Configuration
475
Introduction to NTP
476
Applications of NTP
476
Implementation Principle of NTP
477
NTP Implementation Modes
478
Ntp Configuration
476
Configuring NTP Implementation Modes
481
Configuring NTP Server/Client Mode
481
Configuring the NTP Symmetric Peer Mode
482
Configuring NTP Broadcast Mode
483
Configuring NTP Multicast Mode
484
NTP Configuration Task List
481
Configuring Access Control Right
485
Configuring NTP Authentication
485
Configuring Optional NTP Parameters
488
Configuring an Interface on the Local Device to Send NTP Messages
488
Configuring the Number of Dynamic Sessions Allowed on the Local Device
489
Disabling an Interface from Receiving NTP Messages
489
Displaying and Maintaining NTP Configuration
489
NTP Configuration Examples
489
Configuring NTP Server/Client Mode
489
Configuring Ntp Symmetric Peer Mode
491
Configuring NTP Broadcast Mode
492
Configuring NTP Multicast Mode
494
Configuring Ntp Server/Client Mode with Authentication
495
Ssh Configuration
497
Ssh Configuration
498
Ssh Overview
498
Introduction to SSH
498
Algorithm and Key
498
Asymmetric Key Algorithm
499
SSH Operating Process
499
Configuring the SSH Server
501
SSH Server Configuration Tasks
502
Configuring the Protocol Support for the User Interface
502
Generating/Destroying a RSA or DSA Key Pair
503
Exporting the RSA or DSA Public Key
504
Creating an SSH User and Specify an Authentication Type
504
Specifying a Service Type for an SSH User
505
Configuring SSH Management
505
Configuring the Client Public Key on the Server
506
Assigning a Public Key to an SSH User
508
Specifying a Source IP Address/Interface for the SSH Server
508
Configuring the SSH Client
509
SSH Client Configuration Tasks
509
Configuring the SSH Client Using an SSH Client Software
509
Configuring the SSH Client on an SSH2-Capable Device
516
Specifying a Source IP Address/Interface for the SSH Client
518
Displaying and Maintaining SSH Configuration
518
SSH Configuration Examples
519
When the Device Acts as the SSH Server and the Authentication Type Is Password
519
When the Device Acts as an SSH Server and the Authentication Type Is Publickey
521
When the Switch Acts as an SSH Client and the Authentication Type Is Password
527
When the Device Acts as an SSH Client and the Authentication Type Is Publickey
528
When the Device Acts as an SSH Client and First-Time Authentication Is Not Supported
530
File System Management Configuration
533
File System Configuration
534
Introduction to File System
534
File System Configuration Tasks
534
File Operations
535
Flash Memory Operations
536
Prompt Mode Configuration
536
File System Configuration Example
537
File System Management Configuration
534
File Attribute Configuration
538
Introduction to File Attributes
538
Configuring File Attributes
539
Ftp and Sftp Configuration/Tftp Configuration
540
1 Ftp and Sftp Configuration
541
Introduction to FTP
541
Introduction to FTP and SFTP
541
FTP Configuration: the Device Operating as an FTP Server
542
Introduction to SFTP
542
FTP Configuration: the Device Operating as an FTP Client
546
Configuration Example: the Device Operating as an FTP Server
548
FTP Banner Display Configuration Example
550
FTP Configuration: the Device Operating as an FTP Client
551
SFTP Configuration: the Device Operating as an SFTP Server
553
SFTP Configuration: the Device Operating as an SFTP Client
554
SFTP Configuration Example
556
2 Tftp Configuration
560
Introduction to TFTP
560
TFTP Configuration: the Device Operating as a TFTP Client
561
TFTP Configuration Example
562
Table of Contents
564
Information Center Overview
565
Introduction to Information Center
565
System Information Format
568
Information Center Configuration
570
Introduction to the Information Center Configuration Tasks
570
Configuring Synchronous Information Output
571
Configuring to Display the Time Stamp with the UTC Time Zone
571
Setting to Output System Information to the Console
572
Setting to Output System Information to a Monitor Terminal
574
Setting to Output System Information to a Log Host
575
Setting to Output System Information to the Trap Buffer
576
Setting to Output System Information to the Log Buffer
576
Setting to Output System Information to the SNMP NMS
577
Displaying and Maintaining Information Center
578
Information Center Configuration Examples
578
Log Output to a UNIX Log Host
578
Log Output to a Linux Log Host
580
Log Output to the Console
581
Table of Contents
583
1 Host Configuration File Loading
584
Introduction to Loading Approaches
584
Remote Loading Using FTP
584
Remote Loading Using TFTP
588
2 Basic System Configuration and Debugging
589
Basic System Configuration
589
Displaying the System Status
590
Debugging the System
590
Enabling/Disabling System Debugging
590
Displaying Debugging Status
591
Displaying Operating Information about Modules in System
591
3 Network Connectivity Test
592
Ping
592
Tracert
592
Introduction to Device Management
593
Device Management Configuration
593
Device Management Configuration Tasks
593
Rebooting the Device
593
Configuring Real-Time Monitoring of the Running Status of the System
594
Scheduling a Reboot on the Device
594
Specifying the Main Configuration File to be Used at Next Reboot
594
Identifying and Diagnosing Pluggable Transceivers
595
Displaying and Maintaining the Device Management Configuration
596
Vlan-Vpn Configuration/Selective Qinq Configuration
597
1 VLAN-VPN Configuration
598
VLAN-VPN Overview
598
Introduction to VLAN-VPN
598
Adjusting the TPID Values of VLAN-VPN Packets
599
Implementation of VLAN-VPN
599
VLAN-VPN Configuration
600
Configuration Task List
600
Enabling the VLAN-VPN Feature for a Port
600
TPID Adjusting Configuration
601
Displaying and Maintaining VLAN-VPN
601
Vlan-Vpn Configuration Example
602
Transmitting User Packets through a Tunnel in the Public Network by Using Vlan-Vpn
602
2 Selective Qinq Configuration
605
Selective Qinq Overview
605
Inner-To-Outer Tag Priority Mapping
606
Selective Qinq Configuration
606
Configuration Task List
606
Enabling the Selective Qinq Feature for a Port
606
Configuring the Inner-To-Outer Tag Priority Mapping Feature
607
Selective Qinq Configuration Example
607
Processing Private Network Packets by Their Types
607
Advertisement
3COM WX3024 Installation Manual (99 pages)
WX3000 Series Unified Switches
Brand:
3COM
| Category:
Switch
| Size: 3.33 MB
Table of Contents
About this Manual
3
Related Documentation
4
Table of Contents
6
1 Overview
9
Introduction
9
Appearance
9
Front Panel
10
Rear Panel
11
System Specifications
12
Processor and Memory
12
Dimensions and Weight
12
Fixed Interfaces and Slots
12
Power Input System
13
Poe Power Supply
13
Components
14
Leds
14
Fixed Interfaces
16
Transceiver Modules
18
Rps
19
DC Power Cables
19
Fans
19
Interface Numbering
20
Interface Numbering for the WX3024
20
Interface Numbering for the WX3010
20
Interface Numbering for the WX3008
20
2 Preparing for Installation
21
Safety Precautions
21
Installation Site Checking
21
Temperature and Humidity
21
Cleanliness
22
ESD Prevention
22
EMI Prevention
23
Laser Safety
24
Installation Tools
24
3 Installing the Device
25
Installing the Device in a 19-Inch Rack
25
Introduction to Mounting Brackets
26
Introduction to Slide Rails
27
Installing the Device Using Front Mounting Brackets
27
Installing the Device Using Front and Rear Mounting Brackets
28
Installing the Device Using Front Mounting Brackets and a Tray
32
Installing the Device Using Front Mounting Brackets and Slide Rails
33
Installing the Device on a Workbench
35
Wall Mounting
35
Magnet Mounting
37
Connecting the Ground Cable
39
Connecting the Power Cables
42
Connecting AC Power Cable
42
Connecting the RPS Cable
43
Connecting the Interface Cables
44
Connecting the Console Cable
44
Connecting the Ethernet Cables
45
Installing and Removing Optional Interface Modules
46
XFP Interface Modules
46
XENPAK Module
47
Installation Verification
49
4 Starting and Configuring the Device
50
Setting up a Configuration Environment
50
Connecting the Device to a Configuration Terminal
50
Setting Terminal Parameters
50
Powering on the Device
53
Verifying before Power-On
53
Boot Process
53
5 Maintaining Software
56
Introduction
56
Files Managed by the Device
56
Bootware Program File
56
Application Files
57
Configuration Files
57
Web Files
58
Approaches for Software Maintenance
58
Software Update Flow
59
Bootware Menus
59
Bootware Main Menu
59
Bootware Submenus
61
Updating Software through a Serial Connection
62
Introduction to XMODEM
62
Modifying Serial Communication Parameters
63
Updating Bootware through a Serial Connection
65
Updating Applications through a Serial Connection
67
Updating Applications Using TFTP
68
Updating an Application Using TFTP through the Bootware Menu
68
Updating and Backing up an Application Using TFTP through the CLI
70
Updating Applications Using FTP
72
Updating an Application Using FTP through the Bootware Menu
73
Updating and Backing up an Application Using FTP through the CLI
73
Ping Command
74
Updating Web Files on the Switching Engine
76
Maintaining the Application and Configuration Files
77
Displaying All Files
77
Setting the Application File Type
77
Deleting a File
78
Dealing with Password Loss
79
Bootware Password Loss
79
User Password Loss
79
Super Password Loss
80
Backing up and Restoring Bootware
81
Backing up and Restoring Bootware through the Bootware Menu
81
Backing up and Restoring Bootware through the CLI
81
3Com WX3024 Datasheet (9 pages)
WIRELESS ACCESS CONTROLLERS
Brand:
3Com
| Category:
Switch
| Size: 0.39 MB
Advertisement
Advertisement
Related Products
3Com WX3010
3COM WX3008 AC POE 8GET
3COM WX3010 AC POE 8GET 2SFP
3COM WX3024,4SFPCOMBO SLOT POEPLUS
3Com WX3000 Series
3Com WX3008
3Com OfficeConnect WX2200
3Com OfficeConnect WX1200
3Com OfficeConnect WX4400
3Com OfficeConnect WXR100
3Com Categories
Switch
Network Router
Wireless Access Point
Modem
Network Card
More 3Com Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL