Sign In
Upload
Manuals
Brands
H3C Manuals
Switch
H3C S3100 8C SI
H3C H3C S3100 8C SI Manuals
Manuals and User Guides for H3C H3C S3100 8C SI. We have
1
H3C H3C S3100 8C SI manual available for free PDF download: Operation Manual
H3C H3C S3100 8C SI Operation Manual (944 pages)
S3100 Series Ethernet Switches
Brand:
H3C
| Category:
Switch
| Size: 9.18 MB
Table of Contents
Table of Contents
7
About this Manual
3
Overview
9
Software Release Notes
9
Chapter 2 Correspondence between Documentation and Software
10
Manual List
10
Software Version
10
Software Features
12
Chapter 4 Network Design
16
MAN Access Solution
16
Education Network Solution
16
Multi-Service Carrier VLAN Solution
17
CLI Configuration
20
Chapter 1 Cli Configuration
21
Command Hierarchy
21
Command Level and User Privilege Level
21
Introduction to the Cli
21
Modifying the Command Level
22
Switching User Level
23
Cli Views
27
Cli Features
32
Online Help
32
Command History
33
Terminal Display
33
Error Prompts
34
Command Edit
35
Table of Contents
36
Chapter 1 Logging into an Ethernet Switch
38
Supported User Interfaces
38
Common User Interface Configuration
39
User Interface Index
39
Logging in through the Console Port
41
Introduction to the User Interface
38
Logging into an Ethernet Switch
38
Chapter 2 Logging in through the Console Port
41
Console Port Login Configuration
44
Console Port Login Configurations for Different Authentication Modes
45
Console Port Login Configuration with Authentication Mode Being None
46
Configuration Example
48
Console Port Login Configuration with Authentication Mode Being Password
49
Console Port Login Configuration with Authentication Mode Being Scheme
53
Chapter 3 Logging in through Telnet
58
Telnet Configurations for Different Authentication Modes
59
Telnet Configuration with Authentication Mode Being None
61
Telnet Configuration with Authentication Mode Being Password
63
Telnet Configuration with Authentication Mode Being Scheme
66
Telnetting to a Switch
71
Telnetting to a Switch from a Terminal
71
Telnetting to Another Switch from the Current Switch
73
Configuration on the Switch Side
75
Modem Configuration
75
Chapter 4 Logging in Using a Modem
75
Modem Connection Establishment
76
Switch Configuration
76
Establishing an Http Connection
79
Configuring the Login Banner
80
Enabling/Disabling the Web Server
82
Connection Establishment Using Nms
83
Chapter 6 Logging in through Nms
83
Controlling Telnet Users
84
Chapter 7 User Control
84
Controlling Telnet Users by Source Ip Addresses
85
Controlling Telnet Users by Source and Destination Ip Addresses
85
Controlling Telnet Users by Source Mac Addresses
86
Controlling Network Management Users by Source Ip Addresses
87
Controlling Web Users by Source Ip Address
89
Controlling Web Users by Source Ip Addresses
90
Disconnecting a Web User by Force
90
Configuration File Management
92
Chapter 1 Configuration File Management
93
Management of Configuration File
94
Saving the Current Configuration
94
Erasing the Startup Configuration File
96
Specifying a Configuration File for Next Startup
96
Displaying Device Configuration
97
Introduction to Configuration File
93
VLAN Overview/Vlan Configuration
99
Chapter 1 Vlan Overview
100
Vlan Fundamentals
101
Advantages of Vlans
101
Vlan Interface
103
Vlan Classification
104
Port-Based Vlan
104
Link Types of Ethernet Ports
104
Assigning an Ethernet Port to Specified Vlans
105
Configuring the Default Vlan ID for a Port
105
Protocol-Based Vlan
106
Introduction to Protocol-Based Vlan
106
Encapsulation Format of Ethernet Data
107
Encapsulation Formats
108
Implementation of Protocol-Based Vlan
108
Vlan Configuration
109
Vlan Overview
100
Introduction to Vlan
100
Chapter 2 Vlan Configuration
109
Vlan Configuration Task List
109
Basic Vlan Configuration
109
Basic Vlan Interface Configuration
110
Displaying Vlan Configuration
111
Configuring a Port-Based Vlan
111
Configuring an Access-Port-Based Vlan
111
Configuring a Hybrid-Port-Based Vlan
112
Configuring a Trunk-Port-Based Vlan
113
Displaying and Maintaining Port-Based Vlan
114
Port-Based Vlan Configuration Example
114
Configuring a Protocol-Based Vlan
116
Configuring a Protocol Template for a Protocol-Based Vlan
116
Protocol-Based Vlan Configuration Task List
116
Associating a Port with a Protocol-Based Vlan
117
Displaying Protocol-Based Vlan Configuration
118
Protocol-Based Vlan Configuration Example
118
Management VLAN Configuration
121
Chapter 1 Management Vlan Configuration
122
Introduction to Management Vlan
122
Default Route
123
Management Vlan
122
Static Route
122
Management Vlan Configuration
123
Configuring the Management Vlan
123
Displaying and Maintaining Management Vlan Configuration
126
IP Addressing Configuration/Ip Performance Configuration
127
Chapter 1 Ip Addressing Configuration
128
Ip Address Classes
128
Special Case Ip Addresses
129
Subnetting and Masking
129
Configuring Ip Addresses
130
Displaying Ip Addressing Configuration
131
Ip Address Configuration Examples
132
Ip Address Configuration Example I
132
Ip Performance Overview
133
Configuring Ip Performance
133
Ip Addressing Overview
128
Chapter 2 Ip Performance Configuration
133
Introduction to Ip Performance Configuration
133
Introduction to Fib
133
Introduction to Ip Performance Configuration Tasks
133
Configuring Tcp Attributes
133
Disabling Icmp to Send Error Packets
134
Displaying and Maintaining Ip Performance Configuration
135
Voice VLAN Configuration
137
Chapter 1 Voice Vlan Configuration
138
How an Ip Phone Works
138
How S3100 Series Switches Identify Voice Traffic
140
Setting the Voice Traffic Transmission Priority
141
Configuring Voice Vlan Assignment Mode of a Port
141
Support for Voice Vlan on Various Ports
142
Voice Vlan Overview
138
Voice Vlan Configuration
144
Security Mode of Voice Vlan
144
Configuring the Voice Vlan to Operate in Automatic Voice Vlan Assignment Mode
145
Configuring the Voice Vlan to Operate in Manual Voice Vlan Assignment Mode
146
Displaying and Maintaining Voice Vlan
148
Voice Vlan Configuration Example (Automatic Voice Vlan Assignment Mode)
149
Voice Vlan Configuration Example (Manual Voice Vlan Assignment Mode)
150
Gvrp Configuration
153
Chapter 1 Gvrp Configuration
154
Introduction to Gvrp
154
Protocol Specifications
158
Gvrp Configuration
158
Enabling Gvrp
158
Gvrp Configuration Tasks
158
Configuring Gvrp Timers
159
Configuring Gvrp Port Registration Mode
160
Displaying and Maintaining Gvrp
161
Port Basic Configuration
165
Chapter 1 Port Basic Configuration
166
Initially Configuring a Port
166
Limiting Traffic on Individual Ports
167
Enabling Flow Control on a Port
168
Duplicating the Configuration of a Port to Other Ports
168
Configuring Loopback Detection for an Ethernet Port
169
Configuring Loopback Detection for Ethernet Port(S)
170
Configuring a Port Group
172
Enabling Loopback Test
172
Enabling the System to Test Connected Cable
173
Configuring the Interval to Perform Statistical Analysis on Port Traffic
174
Disabling Up/Down Log Output on a Port
174
Ethernet Port Configuration
166
Ethernet Port Configuration Example
176
Displaying and Maintaining Basic Port Configuration
176
Troubleshooting Ethernet Port Configuration
177
Link Aggregation Configuration
178
Chapter 1 Link Aggregation Configuration
179
Requirements on Ports for Link Aggregation
179
Introduction to Lacp
179
Introduction to Link Aggregation
179
Link Aggregation Classification
180
Manual Aggregation Group
180
Static Lacp Aggregation Group
181
Dynamic Lacp Aggregation Group
182
Aggregation Group Categories
183
Link Aggregation Configuration
185
Configuring a Manual Aggregation Group
185
Configuring a Static Lacp Aggregation Group
186
Configuring a Dynamic Lacp Aggregation Group
187
Configuring a Description for an Aggregation Group
188
Displaying and Maintaining Link Aggregation Configuration
189
Link Aggregation Configuration Example
190
Ethernet Port Aggregation Configuration Example
190
Port Isolation Configuration
192
Chapter 1 Port Isolation Configuration
193
Displaying Port Isolation Configuration
194
Port Isolation Configuration Example
194
Port Isolation Configuration
193
Port Isolation Overview
193
Port Security Configuration/Port Binding Configuration
196
Chapter 1 Port Security Configuration
197
Port Security Modes
198
Port Security Configuration Task List
201
Enabling Port Security
201
Setting the Maximum Number of Mac Addresses Allowed on a Port
202
Setting the Port Security Mode
203
Configuring Port Security Features
204
Configuring Security Mac Addresses
206
Ignoring the Authorization Information from the Radius Server
206
Displaying and Maintaining Port Security Configuration
207
Port Security Configuration Example
208
Port Binding Overview
210
Configuring Port Binding
210
Port Security Overview
197
Port Security Features
197
Chapter 2 Port Binding Configuration
210
Displaying and Maintaining Port Binding Configuration
211
Dldp Configuration
213
Chapter 1 Dldp Configuration
214
Dldp Fundamentals
215
Dldp Implementation
215
Dldp Status
219
Dldp Timers
220
Dldp Operating Mode
221
Dldp Neighbor State
221
Link Auto-Recovery Mechanism
222
Dldp Configuration
223
Performing Basic Dldp Configuration
223
Resetting Dldp State
224
Displaying and Maintaining Dldp
225
Dldp Configuration Example
225
Mac Address Table Management
228
Chapter 1 Mac Address Table Management
229
Introduction to Mac Address Learning
230
Managing Mac Address Table
232
Introduction to Mac Address Table
229
Configuring Mac Address Table Management
233
Mac Address Table Management Configuration Task List
233
Configuring a Mac Address Entry
234
Setting the Mac Address Aging Timer
235
Setting the Maximum Number of Mac Addresses a Port Can Learn
235
Disabling Mac Address Learning for a Vlan
236
Assigning Mac Addresses for Ethernet Ports
237
Displaying Mac Address Table Information
238
Adding a Static Mac Address Entry Manually
239
Mstp Configuration
240
Chapter 1 Mstp Configuration
242
Stp Overview
242
Mstp Overview
251
Background of Mstp
251
Basic Mstp Terminologies
252
Principle of Mstp
257
Mstp Implementation on Switches
258
Configuring Root Bridge
259
Stp-Related Standards
259
Configuring an Mst Region
261
Specifying the Current Switch as a Root Bridge/Secondary Root Bridge
263
Configuring the Bridge Priority of the Current Switch
264
Configuring the Mode a Port Recognizes and Sends Mstp Packets
265
Configuring the Maximum Hop Count of an Mst Region
267
Configuring the Mstp Operation Mode
267
Configuring the Network Diameter of the Switched Network
268
Configuring the Mstp Time-Related Parameters
269
Configuring the Timeout Time Factor
270
Configuring the Maximum Transmitting Speed on the Current Port
271
Configuring the Current Port as an Edge Port
272
Specifying Whether the Link Connected to a Port Is Point-To-Point Link
274
Enabling Mstp
275
Configuring Leaf Nodes
276
Configuring the Mst Region
278
Configuring a Port as an Edge Port
278
Configuring the Path Cost for a Port
278
Configuring Port Priority
281
Specifying Whether the Link Connected to a Port Is a Point-To-Point Link
282
Performing Mcheck Operation
283
Configuring Guard Functions
284
Introduction
284
Configuration Prerequisites
286
Configuring BPDU Guard
286
Configuring Root Guard
287
Configuring Loop Guard
288
Configuring TC-BPDU Attack Guard
288
Configuring BPDU Dropping
289
Configuring Digest Snooping
289
Introduction
289
Configuring Digest Snooping
290
Configuring Rapid Transition
291
Introduction
291
Configuring Rapid Transition
293
Configuring VLAN-VPN Tunnel
294
Introduction
294
Configuring VLAN-VPN Tunnel
295
STP Maintenance Configuration
296
Introduction
296
Enabling Log/Trap Output for Ports of MSTP Instance
296
Configuration Example
296
Displaying and Maintaining MSTP
297
Enabling Trap Messages Conforming to 802.1D Standard
297
MSTP Configuration Example
298
VLAN-VPN Tunnel Configuration Example
300
Multicast Overview/Igmp Snooping Configuration
303
Chapter 1 Multicast Overview
305
Multicast Overview
305
Information Transmission in the Unicast Mode
305
Information Transmission in the Broadcast Mode
306
Information Transmission in the Multicast Mode
307
Advantages and Applications of Multicast
308
Roles in Multicast
308
Multicast Models
309
Multicast Architecture
310
Multicast Address
310
Multicast Protocols
314
Multicast Packet Forwarding Mechanism
316
Implementation of the RPF Mechanism
316
RPF Check
317
Chapter 2 IGMP Snooping Configuration
319
IGMP Snooping Overview
319
Principle of IGMP Snooping
319
Basic Concepts in IGMP Snooping
320
Work Mechanism of IGMP Snooping
321
IGMP Snooping Configuration
323
Enabling IGMP Snooping
323
Configuring the Version of IGMP Snooping
324
Configuring Fast Leave Processing
325
Configuring Timers
325
Configuring a Multicast Group Filter
327
Configuring the Maximum Number of Multicast Groups on a Port
328
Configuring IGMP Snooping Querier
329
Configuring Static Member Port for a Multicast Group
330
Configuring a Port as a Simulated Group Member
331
Configuring a Static Router Port
331
Configuring a VLAN Tag for Query Messages
333
Configuring Multicast VLAN
333
Displaying and Maintaining IGMP Snooping
335
IGMP Snooping Configuration Examples
336
Configuring IGMP Snooping
336
Configuring Multicast VLAN
338
Troubleshooting IGMP Snooping
341
Chapter 3 Common Multicast Configuration
342
Common Multicast Configuration
342
Configuring Suppression on the Multicast Source Port
342
Configuring a Multicast MAC Address Entry
343
Configuring Dropping Unknown Multicast Packets
344
Displaying Common Multicast Configuration
344
Table of Contents
346
Chapter 1 802.1X Configuration
348
Architecture of 802.1X Authentication
348
Introduction to 802.1X
348
Encapsulation of Eapol Messages
350
The Mechanism of an 802.1X Authentication System
350
Authentication Procedure
353
Timers Used in 802.1X
356
Implementation on an S3100 Series Switch
357
Introduction to 802.1X Configuration
361
Basic 802.1X Configuration
362
Configuration Prerequisites
362
Configuring Basic 802.1X Functions
362
Timer and Maximum User Number Configuration
364
Advanced 802.1X Configuration
365
Configuring Proxy Checking
365
Configuring Client Version Checking
366
Configuring Guest VLAN
367
Enabling DHCP-Triggered Authentication
367
Configuring 802.1X Re-Authentication
368
Configuring the 802.1X Re-Authentication Timer
368
Displaying and Debugging 802.1X
369
Configuration Example
370
Chapter 2 Quick EAD Deployment Configuration
373
Introduction to Quick EAD Deployment
373
Operation of Quick EAD Deployment
373
Quick EAD Deployment Overview
373
Configuration Prerequisites
374
Configuration Procedure
374
Configuring Quick EAD Deployment
374
Displaying and Maintaining Quick EAD Deployment
376
Quick EAD Deployment Configuration Examples
376
Troubleshooting
377
Chapter 3 HABP Configuration
379
HABP Server Configuration
379
Introduction to HABP
379
Displaying HABP
380
HABP Client Configuration
380
Chapter 4 System-Guard Configuration (for S3100-EI)
381
Configuring the System-Guard Feature
381
System-Guard Overview
381
Displaying and Maintaining System-Guard
382
Chapter 5 System-Guard Configuration (for S3100-SI)
383
System-Guard Overview
383
System-Guard Configuration
383
Enabling the System-Guard Function
383
Configuring System-Guard-Related Parameters
384
Enabling System-Guard on Ports
384
Displaying and Maintaining the System-Guard Function
385
Aaa Overview/Aaa Configuration
386
Chapter 1 AAA Overview
388
Introduction to AAA
388
Authentication
388
Authorization
388
Accounting
389
Introduction to ISP Domain
389
Introduction to AAA Services
389
Introduction to RADIUS
389
Introduction to HWTACACS
395
Chapter 2 AAA Configuration
398
AAA Configuration Task List
398
Configuration Introduction
398
Creating an ISP Domain and Configuring Its Attributes
399
Configuring an AAA Scheme for an ISP Domain
401
Configuring Dynamic VLAN Assignment
404
Configuring the Attributes of a Local User
405
Cutting down User Connections Forcibly
407
RADIUS Configuration Task List
408
Configuring RADIUS Authentication/Authorization Servers
410
Creating a RADIUS Scheme
410
Configuring RADIUS Accounting Servers
411
Configuring Shared Keys for RADIUS Messages
413
Configuring the Maximum Number of RADIUS Request Transmission Attempts
414
Configuring the Status of RADIUS Servers
415
Configuring the Type of RADIUS Servers to be Supported
415
Configuring the Attributes of Data to be Sent to RADIUS Servers
416
Configuring the Local RADIUS Authentication Server Function
417
Configuring Timers for RADIUS Servers
418
Enabling Sending Trap Message When a RADIUS Server Goes down
420
Enabling the User Re-Authentication at Restart Function
420
HWTACACS Configuration Task List
422
Creating a HWTACACS Scheme
422
Configuring TACACS Authentication Servers
423
Configuring TACACS Authorization Servers
423
Configuring TACACS Accounting Servers
424
Configuring Shared Keys for HWTACACS Messages
425
Configuring the Attributes of Data to be Sent to TACACS Servers
426
Configuring the Timers Regarding TACACS Servers
427
Displaying and Maintaining AAA
427
AAA Configuration Examples
429
Remote RADIUS Authentication of Telnet/Ssh Users
429
Local Authentication of Ftp/Telnet Users
431
HWTACACS Authentication and Authorization of Telnet Users
432
Troubleshooting AAA
433
Troubleshooting RADIUS Configuration
433
Troubleshooting HWTACACS Configuration
434
Chapter 3 EAD Configuration
435
Introduction to EAD
435
Typical Network Application of EAD
435
EAD Configuration
436
EAD Configuration Example
437
Mac Authentication Configuration
439
Chapter 1 MAC Authentication Configuration
440
MAC Authentication Overview
440
Performing MAC Authentication on a RADIUS Server
440
Performing MAC Authentication Locally
440
Related Concepts
441
MAC Authentication Timers
441
Quiet MAC Address
441
Configuring Basic MAC Authentication Functions
442
MAC Address Authentication Enhanced Function Configuration
443
MAC Address Authentication Enhanced Function Configuration Tasks
443
Configuring a Guest VLAN
444
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port
446
Configuring the Quiet MAC Function on a Port
447
Displaying and Debugging MAC Authentication
447
MAC Authentication Configuration Example
448
Arp Configuration
450
Chapter 1 ARP Configuration
451
Introduction to ARP
451
Arp Function
451
ARP Message Format
451
ARP Table
453
ARP Process
454
Introduction to ARP Source MAC Address Consistency Check
454
Introduction to ARP Attack Detection
455
Introduction to ARP Packet Rate Limit
456
Introduction to Gratuitous ARP
457
ARP Configuration
457
Configuring ARP Basic Functions
457
Configuring ARP Source MAC Address Consistency Check
458
Configuring ARP Attack Detection
458
Configuring the ARP Packet Rate Limit Function
460
Displaying and Debugging ARP
461
Gratuitous ARP Packet Configuration
461
ARP Configuration Example
462
ARP Basic Configuration Example
462
ARP Attack Detection and Packet Rate Limit Configuration Example
463
Table of Contents
465
Chapter 1 DHCP Overview
467
Introduction to DHCP
467
DHCP IP Address Assignment
467
IP Address Assignment Policy
467
Obtaining IP Addresses Dynamically
468
Updating IP Address Lease
469
DHCP Packet Format
469
Protocol Specification
470
Chapter 2 DHCP Snooping Configuration
471
Introduction
471
Introduction to DHCP Snooping
471
Introduction to DHCP Snooping Trusted/Untrusted Ports
472
Introduction to Unauthorized DHCP Server Detection
472
Overview of DHCP-Snooping Option 82
473
Overview of IP Filtering
476
DHCP Snooping Configuration
477
Configuring DHCP Snooping
477
Configuring DHCP Snooping Trusted/Untrusted Ports
477
Configuring Unauthorized DHCP Server Detection
478
Configuring DHCP Snooping to Support Option 82
479
Configuring IP Filtering
483
Displaying DHCP Snooping Configuration
484
DHCP Snooping Configuration Example
485
DHCP-Snooping Option 82 Support Configuration Example
485
Unauthorized DHCP Server Detection Configuration Example
487
IP Filtering Configuration Example
488
Chapter 3 DHCP Packet Rate Limit Configuration
491
Introduction to DHCP Packet Rate Limit
491
Configuring DHCP Packet Rate Limit
492
Configuring Port State Auto Recovery
492
Rate Limit Configuration Example
493
Chapter 4 DHCP/BOOTP Client Configuration
495
Introduction to DHCP Client
495
Introduction to BOOTP Client
495
Configuring a DHCP/BOOTP Client
496
DHCP Client Configuration Example
496
Acl Configuration
498
Acl Overview
499
Chapter 1 ACL Configuration
499
ACL Matching Order
499
Ways to Apply an ACL on a Switch
500
Types of Acls Supported by S3100 Series Ethernet Switches
501
ACL Configuration
502
Configuring Time Range
502
Configuring Basic ACL
503
Configuring Advanced ACL
505
Configuring Layer 2 ACL
506
ACL Assignment
508
Assigning an ACL Globally
508
Assigning an ACL to a VLAN
509
Assigning an ACL to a Port Group
510
Assigning an ACL to a Port
510
Displaying ACL Configuration
511
Example for Upper-Layer Software Referencing Acls
512
Example for Controlling Telnet Login Users by Source IP
512
Example for Controlling Web Login Users by Source IP
512
Example for Applying Acls to Hardware
513
Basic ACL Configuration Example
513
Advanced ACL Configuration Example
514
Layer 2 ACL Configuration Example
515
Example for Applying an ACL to a Port Group
516
Qos Configuration/Qos Profile Configuration
518
Chapter 1 Qos Configuration
520
Overview
520
Introduction to Qos
520
New Applications and New Requirements
520
Traditional Packet Forwarding Service
520
Major Traffic Control Techniques
521
Qos Supported by the S3100 Series Ethernet Switches
522
Introduction to Qos Features
523
Traffic Classification
523
Priority Trust Mode
524
Priority Marking
529
Traffic Policing and Traffic Shaping
529
Port Rate Limiting
532
Traffic Redirecting
532
Queue Scheduling
533
Burst
534
Flow-Based Traffic Accounting
534
Traffic Mirroring
535
Qos Configuration
535
Configuring Priority Trust Mode
535
Configuring Priority Mapping
538
Marking Packet Priority
540
Configuring Traffic Policing
542
Configuring Port Rate Limiting
545
Configuring Traffic Shaping
545
Configuring Traffic Redirecting
546
Configuring Queue Scheduling
548
Configuring Traffic Accounting
549
Enabling the Burst Function
551
Configuring Traffic Mirroring
552
Displaying Qos
555
Qos Configuration Example
556
Configuration Example of Traffic Policing
556
Chapter 2 Qos Profile Configuration
558
Overview
558
Introduction to Qos Profile
558
Qos Profile Application Mode
558
Qos Profile Configuration
559
Configuring a Qos Profile
559
Applying a Qos Profile
560
Displaying Qos Profile Configuration
561
Configuration Example
562
Qos Profile Configuration Example
562
Mirroring Configuration
564
Chapter 1 Mirroring Configuration
565
Local Port Mirroring
565
Remote Port Mirroring
566
Mirroring Overview
565
Mirroring Configuration
567
Configuring Local Port Mirroring
568
Configuring Remote Port Mirroring
569
Displaying Port Mirroring
572
Mirroring Configuration Example
573
Local Port Mirroring Configuration Example
573
Remote Port Mirroring Configuration Example
574
Stack/Cluster
578
Chapter 1 Stack
579
Stack Function Overview
579
Creating a Stack
579
The Main Switch of a Stack
579
The Slave Switches of a Stack
579
Main Switch Configuration
580
Configuring the IP Address Pool and Creating the Stack
580
Maintaining Slave Switches
581
Stack-Port Function Configuration
581
Slave Switch Configuration
582
Displaying and Debugging a Stack
582
Stack Configuration Example
583
Chapter 2 Cluster
586
Cluster Overview
586
Introduction to HGMP
586
Roles in a Cluster
587
How a Cluster Works
589
Cluster Configuration Tasks
595
Configuring the Management Device
595
Configuring Member Devices
600
Managing a Cluster through the Management Device
602
Configuring the Enhanced Cluster Features
603
Displaying and Maintaining Cluster Configuration
606
Cluster Configuration Example
607
Basic Cluster Configuration Example
607
Enhanced Cluster Feature Configuration Example
611
Poe Configuration/Poe Profile Configuration
613
Chapter 1 Poe Configuration
614
Introduction to Poe
614
Poe Features Supported by S3100
614
Poe Configuration Tasks
616
Enabling the Poe Feature on a Port
616
Setting the Maximum Output Power on a Port
617
Setting Poe Management Mode and Poe Priority of a Port
617
Setting the Poe Mode on a Port
618
Configuring the PD Compatibility Detection Function
619
Configuring Poe Over-Temperature Protection on the Switch
619
Upgrading the PSE Processing Software Online
620
Displaying Poe Configuration
620
Poe Configuration Example
621
Poe Overview
614
Chapter 2 Poe Profile Configuration
624
Introduction to Poe Profile
624
Poe Profile Configuration
624
Configuring Poe Profile
624
Displaying Poe Profile Configuration
625
Poe Profile Configuration Example
626
Poe Profile Application Example
626
Snmp Configuration/Rmon Configuration
629
Chapter 1 SNMP Configuration
630
SNMP Operation Mechanism
630
SNMP Versions
630
Supported Mibs
631
Configuring Basic SNMP Functions
632
Configuring Trap Parameters
635
Configuring Basic Trap
635
Configuring Extended Trap
636
Enabling Logging for Network Management
637
Displaying Snmp
637
SNMP Configuration Examples
638
Snmp Overview
630
Chapter 2 RMON Configuration
641
Introduction to RMON
641
Working Mechanism of RMON
641
Commonly Used RMON Groups
642
RMON Configuration
643
Displaying RMON
644
RMON Configuration Examples
645
Ntp Configuration
647
Chapter 1 NTP Configuration
648
Introduction to NTP
648
Applications of NTP
648
Implementation Principle of NTP
649
NTP Implementation Modes
651
NTP Configuration Tasks
653
Configuring NTP Implementation Modes
654
Configuring NTP Server/Client Mode
654
Configuring the NTP Symmetric Peer Mode
655
Configuring NTP Broadcast Mode
656
Configuring NTP Multicast Mode
657
Configuring Access Control Right
658
Configuration Prerequisites
659
Configuring NTP Authentication
659
Configuration Prerequisites
660
Configuration Procedure
661
Configuring Optional NTP Parameters
662
Configuring an Interface on the Local Switch to Send NTP Messages
663
Configuring the Number of Dynamic Sessions Allowed on the Local Switch
663
Disabling an Interface from Receiving NTP Messages
664
Displaying NTP Configuration
664
Configuring NTP Server/Client Mode
664
Configuring NTP Symmetric Peer Mode
666
Configuring NTP Broadcast Mode
667
Configuring NTP Multicast Mode
669
Configuring NTP Server/Client Mode with Authentication
671
Ssh Configuration
674
Chapter 1 SSH Configuration
675
SSH Overview
675
Introduction to SSH
675
Algorithm and Key
675
Asymmetric Key Algorithm
676
SSH Operating Process
676
Configuring the SSH Server
679
Configuring the User Interfaces for SSH Clients
681
Configuring the SSH Management Functions
681
Configuring the SSH Server to be Compatible with SSH1 Clients
682
Generating/Destroying Key Pairs
683
Creating an SSH User and Specifying an Authentication Type
684
Specifying a Service Type for an SSH User
685
Configuring the Public Key of a Client on the Server
686
Assigning a Public Key to an SSH User
687
Exporting the RSA or DSA Public Key
687
SSH Server and Client Configuration Task List
679
Configuring the SSH Client
688
SSH Client Configuration Task List
688
Configuring an SSH Client that Runs SSH Client Software
689
Configuring an SSH Client Assumed by an SSH2-Capable Switch
696
Comparison of SSH Commands with the same Functions
699
Displaying and Maintaining SSH Configuration
699
SSH Configuration Examples
700
When Switch Acts as Server for Local Password Authentication
700
When Switch Acts as Server for Password and RADIUS Authentication
703
When Switch Acts as Server for Password and HWTACACS Authentication
708
When Switch Acts as Server for Publickey Authentication
711
When Switch Acts as Client for Password Authentication
718
When Switch Acts as Client for Publickey Authentication
720
When Switch Acts as Client and First-Time Authentication Is Not Supported
723
File System Management Configuration
726
Chapter 1 File System Management Configuration
727
File System Configuration
727
Introduction to File System
727
File System Configuration Tasks
727
Directory Operations
727
File Operations
728
Flash Memory Operations
729
Prompt Mode Configuration
730
File System Configuration Example
730
File Attribute Configuration
731
Introduction to File Attributes
731
Booting with the Startup File
732
Configuring File Attributes
733
Ftp and Sftp Configuration/Tftp Configuration
735
Chapter 1 FTP and SFTP Configuration
736
Introduction to FTP and SFTP
736
Introduction to FTP
736
Introduction to SFTP
736
FTP Configuration
737
FTP Configuration: a Switch Operating as an FTP Server
737
FTP Configuration: a Switch Operating as an FTP Client
741
Configuration Example: a Switch Operating as an FTP Server
742
FTP Banner Display Configuration Example
745
FTP Configuration: a Switch Operating as an FTP Client
746
SFTP Configuration
748
SFTP Configuration: a Switch Operating as an SFTP Server
748
SFTP Configuration: a Switch Operating as an SFTP Client
750
SFTP Configuration Example
752
Chapter 2 TFTP Configuration
756
Introduction to TFTP
756
TFTP Configuration
757
TFTP Configuration Example
757
TFTP Configuration: a Switch Operating as a TFTP Client
757
Information Center
760
Chapter 1 Information Center
761
Information Center Overview
761
Introduction to Information Center
761
System Information Format
764
Information Center Configuration
768
Introduction to the Information Center Configuration Tasks
768
Configuring Synchronous Information Output
768
Configuring to Display the Time Stamp with the UTC Time Zone
769
Setting to Output System Information to the Console
770
Setting to Output System Information to a Monitor Terminal
772
Setting to Output System Information to a Log Host
774
Setting to Output System Information to the Trap Buffer
775
Setting to Output System Information to the Log Buffer
775
Setting to Output System Information to the SNMP NMS
776
Displaying and Maintaining Information Center
777
Information Center Configuration Examples
777
Log Output to a UNIX Log Host
777
Log Output to a Linux Log Host
779
Log Output to the Console
781
Configuration Example
782
Table of Contents
783
Chapter 1 Boot ROM and Host Software Loading
784
Introduction to Loading Approaches
784
Local Boot ROM and Software Loading
784
Boot Menu
785
Loading by Xmodem through Console Port
786
Loading by TFTP through Ethernet Port
791
Loading by FTP through Ethernet Port
793
Remote Boot ROM and Software Loading
795
Remote Loading Using FTP
795
Remote Loading Using TFTP
800
Chapter 2 Basic System Configuration and Debugging
801
Basic System Configuration
801
Displaying the System Status
802
Debugging the System
802
Enabling/Disabling System Debugging
802
Displaying Debugging Status
804
Displaying Operating Information about Modules in System
804
Chapter 3 Network Connectivity Test
805
Network Connectivity Test
805
Ping
805
Tracert
805
Chapter 4 Device Management
807
Introduction to Device Management
807
Device Management Configuration
807
Device Management Configuration Tasks
807
Rebooting the Ethernet Switch
807
Configuring Real-Time Monitoring of the Running Status of the System
808
Scheduling a Reboot on the Switch
808
Identifying and Diagnosing Pluggable Transceivers
809
Specifying the APP to be Used at Reboot
809
Upgrading the Boot ROM
809
Displaying the Device Management Configuration
811
Remote Switch APP Upgrade Configuration Example
812
Table of Contents
815
Chapter 1 VLAN-VPN Configuration
817
VLAN-VPN Overview
817
Introduction to VLAN-VPN
817
Configuring the TPID for VLAN-VPN Packets
818
Implementation of VLAN-VPN
818
VLAN-VPN Configuration
819
Enabling the VLAN-VPN Feature for a Port
819
VLAN-VPN Configuration Task List
819
Configuring the TPID Value for VLAN-VPN Packets
820
Displaying and Maintaining VLAN-VPN Configuration
821
VLAN-VPN Configuration Example
821
Transmitting User Packets through a Tunnel in the Public Network by Using VLAN-VPN
821
Chapter 2 Selective Qinq Configuration
825
Selective Qinq Overview
825
Selective Qinq Configuration
826
Selective Qinq Configuration Task List
826
Configuring Global Tag Mapping Rules for Selective Qinq
827
Enabling the Selective Qinq Feature for a Port
827
Selective Qinq Configuration Example
828
Processing Private Network Packets by Their Types
828
Chapter 3 VLAN Mapping Configuration
832
VLAN Mapping Overview
832
Introduction to VLAN Mapping
832
VLAN Mapping Implementation
833
Configuring VLAN Mapping
833
Enabling the VLAN Mapping Function Based on a Global VLAN Mapping Rule
833
VLAN Mapping Configuration Task List
833
Enabling the VLAN Mapping Function Based on a Port-Level VLAN Mapping Rule
834
VLAN Mapping Configuration Example
835
Replacing the Private Network VLAN Tag through VLAN Mapping
835
Chapter 4 BPDU Tunnel Configuration
839
BPDU Tunnel Overview
839
BPDU Tunnel Fundamental
839
Introduction to the BPDU Tunnel Feature
839
BPDU Tunnel Configuration
841
Configuring a Bpdu Tunnel
842
Bpdu Tunnel Configuration Example
843
Displaying and Maintaining Bpdu Tunnel Configuration
843
Transmitting Stp Packets through a Tunnel
843
Hwping Configuration
846
Chapter 1 Hwping Configuration
847
Hwping Overview
847
Introduction to Hwping
847
Test Types Supported by Hwping
848
Hwping Test Parameters
848
Hwping Configuration
851
Configuration on a Hwping Server
851
Hwping Client Configuration
852
Displaying Hwping Configuration
866
Hwping Configuration Example
866
ICMP Test
866
DHCP Test
868
FTP Test
870
HTTP Test
872
Jitter Test
874
SNMP Test
876
TCP Test (Tcpprivate Test) on the Specified Ports
879
UDP Test (Udpprivate Test) on the Specified Ports
880
DNS Test
882
Ipv6 Configuration/Ipv6 Application Configuration
885
Chapter 1 Ipv6 Configuration
886
Ipv6 Overview
886
Ipv6 Features
886
Introduction to Ipv6 Address
888
Introduction to Ipv6 Neighbor Discovery Protocol
892
Introduction to Ipv6 DNS
894
Protocols and Standards
895
Ipv6 Configuration Task List
895
Configuring an Ipv6 Unicast Address
895
Configuring Ipv6 NDP
897
Configuring a Static Ipv6 Route
900
Configuring Ipv6 TCP Properties
900
Configuring the Hop Limit of Icmpv6 Reply Packets
901
Configuring the Maximum Number of Ipv6 ICMP Error Packets Sent Within a Specified Time
901
Configuring Ipv6 DNS
902
Displaying and Maintaining Ipv6
903
Ipv6 Configuration Example
904
Ipv6 Unicast Address Configuration
904
Chapter 2 Ipv6 Application Configuration
908
Introduction to Ipv6 Application
908
Ipv6 Application Configuration
908
Ipv6 Ping
908
Ipv6 TFTP
909
Ipv6 Traceroute
909
Ipv6 Telnet
910
Ipv6 Application Configuration Example
911
Ipv6 Applications
911
Troubleshooting Ipv6 Application
913
Unable to Ping a Remote Destination
913
Unable to Run Telnet
914
Unable to Run TFTP
914
Unable to Run Traceroute
914
Chapter 1 DNS Configuration
916
DNS Overview
916
Dynamic Domain Name Resolution
916
Static Domain Name Resolution
916
Configuring Domain Name Resolution
918
Configuring Dynamic Domain Name Resolution
918
Configuring Static Domain Name Resolution
918
Displaying and Maintaining DNS
919
DNS Configuration Example
919
Static Domain Name Resolution Configuration Example
919
Dynamic Domain Name Resolution Configuration Example
920
Troubleshooting DNS
922
Smart Link Configuration/Monitor Link Configuration
923
Chapter 1 Smart Link Configuration
924
Smart Link Overview
924
Basic Concepts in Smart Link
924
Operating Mechanism of Smart Link
926
Configuring Smart Link
927
Configuration Tasks
927
Configuring a Smart Link Device
927
Configuring Associated Devices
928
Precautions
929
Displaying and Debugging Smart Link
930
Smart Link Configuration Example
930
Implementing Link Redundancy Backup
930
Chapter 2 Monitor Link Configuration
933
Introduction to Monitor Link
933
How Monitor Link Works
934
Configuring Monitor Link
935
Configuration Tasks
935
Creating a Monitor Link Group
935
Configuring a Downlink Port
936
Configuring the Uplink Port
936
Displaying Monitor Link Configuration
937
Monitor Link Configuration Example
938
Implementing Collaboration between Smart Link and Monitor Link
938
Advertisement
Advertisement
Related Products
H3C S3100-8C-SI
H3C S3100-8T-SI
H3C S3100-8TP-EI
H3C S3100-8TP-PWR-EI
H3C S3100-8C-EPON-EI
H3C S3100-8T P-EI-W
H3C S3100-8C-Sl
H3C S3100-8TP-EI-W
H3C S3100-8TP-SI
H3C S3100V3-52TP-SI
H3C Categories
Switch
Network Router
Wireless Access Point
Control Unit
Gateway
More H3C Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL