Sign In
Upload
Manuals
Brands
H3C Manuals
Switch
S5100-48P-SI
H3C S5100-48P-SI Manuals
Manuals and User Guides for H3C S5100-48P-SI. We have
2
H3C S5100-48P-SI manuals available for free PDF download: Operation Manual, Installation Manual
H3C S5100-48P-SI Operation Manual (934 pages)
Brand:
H3C
| Category:
Switch
| Size: 9.17 MB
Table of Contents
About this Manual
3
Table of Contents
3
Product Overview
7
Chapter 1 Obtaining the Documentation
8
H3C Website
8
Software Release Notes
9
Manual List
10
Software Version
10
Chapter 3 Product Overview
11
System Features of the S5100 Series
13
System Features of the S5100-Si Series
13
System Features of the S5100-Ei Series
14
Chapter 4 Networking Applications
17
Convergence Layer Devices
17
Access Layer Devices
18
Data Center Access
18
Login
19
Table of Contents
20
Chapter 1 Logging in to an Ethernet Switch
22
Introduction to the User Interface
22
Logging in to an Ethernet Switch
22
Supported User Interfaces
22
Relationship between a User and a User Interface
23
User Interface Index
23
Common User Interface Configuration
24
Chapter 2 Logging in through the Console Port
26
Setting up a Login Environment for Login through the Console Port
26
Common Configuration
29
Console Port Login Configuration
29
Console Port Login Configurations for Different Authentication Modes
31
Console Port Login Configuration with Authentication Mode Being None
32
Console Port Login Configuration with Authentication Mode Being Password
34
Console Port Login Configuration with Authentication Mode Being Scheme
36
Configuration Example
38
Chapter 3 Logging in through Telnet
40
Common Configuration to Control Telnet Access
41
Telnet Configuration with Authentication Mode Being None
43
Telnet Configurations for Different Authentication Modes
43
Telnet Configuration with Authentication Mode Being Password
45
Telnet Configuration with Authentication Mode Being Scheme
47
Telnetting to a Switch
49
Telnetting to a Switch from a Terminal
49
Telnetting to Another Switch from the Current Switch
52
Chapter 4 Logging in Using a Modem
53
Switch Configuration
54
Modem Connection Establishment
55
Introduction to the Cli
58
Command Hierarchy
58
Configuration on the Switch Side
53
Modem Configuration
53
Chapter 5 Cli Configuration
58
Command Level and User Privilege Level
58
Configuration File
59
Modifying the Command Level
59
Switching User Level
60
Cli Views
62
Management VLAN
63
Cli Features
66
Online Help
66
Terminal Display
67
Command History
68
Command Edit
69
Error Prompts
69
Chapter 6 Logging in through the Web-Based Network Management Interface
71
Establishing an Http Connection
71
Configuring the Login Banner
72
Enabling/Disabling the Web Server
74
Chapter 7 Logging in through Nms
75
Chapter 8 Configuring Source IP Address for Telnet Service Packets
76
Configuring Source Ip Address for Telnet Service Packets
76
Displaying Source Ip Address Configuration
77
Connection Establishment Using Nms
75
Chapter 9 User Control
78
Controlling Telnet Users
79
Controlling Telnet Users by Acl
79
Controlling Network Management Users by Source Ip Addresses
81
Controlling Web Users by Source Ip Address
83
Logging out a Web User
84
Configuration File Management
86
Chapter 1 Configuration File Management
87
Introduction to Configuration File
87
Configuration Task List
88
Saving the Current Configuration
88
Erasing the Startup Configuration File
90
Specifying a Configuration File for Next Startup
91
Displaying Switch Configuration
92
VLAN Overview/Vlan Configuration
93
Chapter 1 Vlan Overview
94
Vlan Fundamentals
95
Advantages of Vlans
95
Vlan Interface
97
Vlan Classification
98
Port-Based Vlan
98
Link Types of Ethernet Ports
98
Assigning an Ethernet Port to Specified Vlans
99
Configuring the Default Vlan ID for a Port
99
Protocol-Based Vlan
100
Introduction to Protocol-Based Vlan
100
Encapsulation Format of Ethernet Data
101
Procedure for the Switch to Judge Packet Protocol
103
Encapsulation Formats
103
Implementation of Protocol-Based Vlan
104
Vlan Configuration
105
Introduction to Vlan
94
Vlan Overview
94
Chapter 2 Vlan Configuration
105
Vlan Configuration Task List
105
Basic Vlan Configuration
105
Basic Vlan Interface Configuration
106
Displaying Vlan Configuration
107
Configuring a Port-Based Vlan
107
Port-Based Vlan Configuration Task List
107
Configuring the Link Type of an Ethernet Port
108
Assigning an Ethernet Port to a Vlan
108
Configuring the Default Vlan for a Port
109
Displaying and Maintaining Port-Based Vlan
110
Port-Based Vlan Configuration Example
110
Configuring a Protocol-Based Vlan
112
Protocol-Based Vlan Configuration Task List
112
Configuring a Protocol Template for a Protocol-Based Vlan
112
Associating a Port with a Protocol-Based Vlan
113
Displaying Protocol-Based Vlan Configuration
114
Protocol-Based Vlan Configuration Example
114
Management VLAN Configuration
117
Chapter 1 Management Vlan Configuration
118
Introduction to Management Vlan
118
Default Route
119
Management Vlan
118
Static Route
118
Management Vlan Configuration
119
Configuring the Management Vlan
119
Displaying and Maintaining Management Vlan Configuration
122
Voice VLAN
123
Chapter 1 Voice Vlan Configuration
124
How an Ip Phone Works
124
Voice Vlan Overview
124
How S5100-Ei Series Switches Identify Voice Traffic
126
Configuring Voice Vlan Assignment Mode of a Port
127
Setting the Voice Traffic Transmission Priority
127
Support for Voice Vlan on Various Ports
128
Security Mode of Voice Vlan
130
Voice Vlan Configuration
130
Configuring the Voice Vlan to Operate in Automatic Voice Vlan Assignment Mode
131
Configuring the Voice Vlan to Operate in Manual Voice Vlan Assignment Mode
132
Displaying and Maintaining Voice Vlan
134
Voice Vlan Configuration Example (Automatic Mode)
135
Voice Vlan Configuration Example (Manual Mode)
136
Gvrp
139
Chapter 1 Gvrp Configuration
140
Introduction to Gvrp
140
Enabling Gvrp
144
Gvrp Configuration
144
Gvrp Configuration Tasks
144
Protocol Specifications
144
Configuring Gvrp Timers
145
Configuring Gvrp Port Registration Mode
146
Displaying and Maintaining Gvrp
147
Gvrp Configuration Example
147
Port Basic Configuration
151
Chapter 1 Port Basic Configuration
152
Combo Port Configuration
152
Ethernet Port Configuration
152
Initially Configuring a Port
153
Configuring Port Auto-Negotiation Speed
154
Enabling Flow Control on a Port
155
Limiting Traffic on Individual Ports
155
Duplicating the Configuration of a Port to Other Ports
156
Configuring Loopback Detection for an Ethernet Port
157
Enabling Loopback Test
158
Link Aggregation
158
Configuring the Interval to Perform Statistical Analysis on Port Traffic
159
Enabling the System to Test Connected Cable
159
Disabling Up/Down Log Output on a Port
160
Configuring a Port Group
161
Displaying and Maintaining Basic Port Configuration
162
Link Aggregation Configuration
163
Chapter 1 Link Aggregation Configuration
164
Introduction to Lacp
164
Introduction to Link Aggregation
164
Link Aggregation Classification
165
Consistency Considerations for the Ports in Aggregation
165
Manual Aggregation Group
166
Static Lacp Aggregation Group
166
Dynamic Lacp Aggregation Group
167
Aggregation Group Categories
169
Configuring a Manual Aggregation Group
170
Link Aggregation Configuration
170
Configuring a Static Lacp Aggregation Group
171
Configuring a Dynamic Lacp Aggregation Group
172
Configuring a Description for an Aggregation Group
173
Displaying and Maintaining Link Aggregation Configuration
174
Link Aggregation Configuration Example
174
Ethernet Port Aggregation Configuration Example
174
Port Isolation
177
Chapter 1 Port Isolation Configuration
178
Port Isolation Configuration
178
Port Isolation Overview
178
Displaying and Maintaining Port Isolation Configuration
179
Port Isolation Configuration Example
179
Port Security-Port Binding
181
Chapter 1 Port Security Configuration
182
Port Security Features
182
Port Security Overview
182
Port Security Modes
183
Enabling Port Security
186
Port Security Configuration Task List
186
Setting the Maximum Number of Mac Addresses Allowed on a Port
187
Setting the Port Security Mode
188
Configuring Port Security Features
189
Configuring Security Mac Addresses
191
Ignoring the Authorization Information from the Radius Server
191
Displaying and Maintaining Port Security Configuration
192
Port Security Configuration Example
193
Chapter 2 Port Binding Configuration
195
Configuring Port Binding
195
Port Binding Overview
195
Displaying and Maintaining Port Binding Configuration
196
Port Binding Configuration Example
196
Dldp
198
Chapter 1 Dldp Configuration
199
Dldp Fundamentals
200
Dldp Configuration
205
Performing Basic Dldp Configuration
205
Resetting Dldp State
206
Displaying and Maintaining Dldp
207
Dldp Configuration Example
207
MAC Address Table
210
Chapter 1 Mac Address Table Management
211
Introduction to Mac Address Learning
211
Introduction to Mac Address Table
211
Managing Mac Address Table
214
Configuring a Mac Address Entry
215
Configuring Mac Address Table Management
215
Setting the Aging Time of Mac Address Entries
217
Setting the Maximum Number of Mac Addresses a Port Can Learn
217
Disabling Mac Address Learning for a Vlan
218
Adding a Static Mac Address Entry Manually
219
Displaying Mac Address Table Information
219
Mstp
220
Table of Contents
221
Chapter 1 Mstp Configuration
222
Stp Overview
222
Background of Mstp
232
Mstp Overview
232
Basic Mstp Terminologies
233
Principle of Mstp
237
Configuring Root Bridge
239
Mstp Implementation on Switches
239
Stp-Related Standards
239
Configuring an Mst Region
240
Specifying the Current Switch as a Root Bridge/Secondary Root Bridge
242
Configuring the Bridge Priority of the Current Switch
244
Configuring the Maximum Hop Count of an Mst Region
247
Configuring the Mstp Operation Mode
247
Configuring the Network Diameter of the Switched Network
248
Configuring the Mstp Time-Related Parameters
249
Configuring the Timeout Time Factor
250
Configuring the Current Port as an Edge Port
252
Specifying Whether the Link Connected to a Port Is Point-To-Point Link
254
Enabling Mstp
255
Configuring Leaf Nodes
256
Configuring the Mst Region
257
Configuring a Port as an Edge Port
258
Configuring the Path Cost for a Port
258
Configuring Port Priority
261
Performing Mcheck Operation
262
Specifying Whether the Link Connected to a Port Is a Point-To-Point Link
262
Configuring Guard Functions
263
Introduction
263
Configuration Prerequisites
265
Configuring BPDU Guard
265
Configuring Root Guard
266
Configuring Loop Guard
267
Configuring TC-BPDU Attack Guard
267
Configuring BPDU Dropping
268
Configuring Digest Snooping
268
Introduction
268
Configuring Digest Snooping
269
Configuring Rapid Transition
270
Introduction
270
Configuring Rapid Transition
272
Configuring VLAN-VPN Tunnel
273
Introduction
273
Configuring VLAN-VPN Tunnel
274
Enabling Trap Messages Conforming to 802.1D Standard
275
STP Maintenance Configuration
275
Introduction
275
Enabling Log/Trap Output for Ports of MSTP Instance
275
Configuration Example
275
Displaying and Maintaining MSTP
276
MSTP Configuration Example
277
VLAN-VPN Tunnel Configuration Example
279
Table of Contents
282
Chapter 1 802.1X Configuration
284
Introduction to 802.1X
284
Architecture of 802.1X Authentication
284
The Mechanism of an 802.1X Authentication System
286
Encapsulation of Eapol Messages
287
Authentication Procedure
289
Timers Used in 802.1X
293
Implementation on an S5100-SI/EI Series Switch
294
Introduction to 802.1X Configuration
298
Basic 802.1X Configuration
299
Configuration Prerequisites
299
Configuring Basic 802.1X Functions
299
MAC Address
301
Timer and Maximum User Number Configuration
301
Advanced 802.1X Configuration
302
Configuring Proxy Checking
303
Configuring Client Version Checking
304
Enabling DHCP-Triggered Authentication
304
Configuring Guest VLAN
305
Configuring 802.1X Re-Authentication
306
Configuring the 802.1X Re-Authentication Timer
306
Displaying and Maintaining 802.1X Configuration
307
Configuration Example
307
Chapter 2 Quick EAD Deployment Configuration
311
Introduction to Quick EAD Deployment
311
Quick EAD Deployment Overview
311
Operation of Quick EAD Deployment
311
Configuring Quick EAD Deployment
312
Configuration Prerequisites
312
Configuration Procedure
312
Displaying and Maintaining Quick EAD Deployment
314
Quick EAD Deployment Configuration Example
314
Troubleshooting
315
Chapter 3 HABP Configuration
317
Introduction to HABP
317
HABP Server Configuration
317
HABP Client Configuration
318
Displaying and Maintaining HABP Configuration
318
Chapter 4 System-Guard Configuration
319
System-Guard Overview
319
Configuring the System-Guard Feature
319
Displaying and Maintaining System-Guard
320
Aaa Overview/Aaa Configuration
321
Chapter 1 AAA Overview
323
Introduction to AAA
323
Authentication
323
Authorization
323
Accounting
324
Introduction to ISP Domain
324
Introduction to AAA Services
324
Introduction to RADIUS
324
Introduction to HWTACACS
330
Chapter 2 AAA Configuration
334
AAA Configuration Task List
334
Creating an ISP Domain and Configuring Its Attributes
335
Configuring an AAA Scheme for an ISP Domain
337
Configuring Dynamic VLAN Assignment
340
Configuring the Attributes of a Local User
341
Cutting down User Connections Forcibly
343
RADIUS Configuration Task List
344
IP Address and
345
Creating a RADIUS Scheme
346
Configuring RADIUS Authentication/Authorization Servers
346
Configuring RADIUS Accounting Servers
347
Configuring Shared Keys for RADIUS Messages
349
Configuring the Maximum Number of RADIUS Request Transmission Attempts
350
Configuring the Type of RADIUS Servers to be Supported
350
Configuring the Status of RADIUS Servers
351
Configuring the Attributes of Data to be Sent to RADIUS Servers
352
Configuring the Local RADIUS Server
354
Configuring Timers for RADIUS Servers
355
Enabling Sending Trap Message When a RADIUS Server Goes down
357
Enabling the User Re-Authentication at Restart Function
357
HWTACACS Configuration Task List
359
Creating a HWTACACS Scheme
359
Configuring TACACS Authentication Servers
360
Configuring TACACS Authorization Servers
360
Configuring TACACS Accounting Servers
361
Configuring Shared Keys for HWTACACS Messages
362
Configuring the Attributes of Data to be Sent to TACACS Servers
363
Configuring the Timers Regarding TACACS Servers
363
Displaying and Maintaining AAA Configuration
365
Displaying and Maintaining RADIUS Protocol Configuration
365
Displaying and Maintaining HWTACACS Protocol Configuration
366
AAA Configuration Examples
366
Remote RADIUS Authentication of Telnet/Ssh Users
366
Local Authentication of Ftp/Telnet Users
368
HWTACACS Authentication and Authorization of Telnet Users
369
Troubleshooting AAA
370
Troubleshooting RADIUS Configuration
370
Troubleshooting HWTACACS Configuration
371
Chapter 3 EAD Configuration
372
Introduction to EAD
372
Typical Network Application of EAD
372
EAD Configuration
373
EAD Configuration Example
374
Mac Address Authentication Configuration
376
Chapter 1 MAC Address Authentication Configuration
377
MAC Address Authentication Overview
377
Performing MAC Address Authentication on a RADIUS Server
377
Performing MAC Address Authentication Locally
378
Related Concepts
378
MAC Address Authentication Timers
378
Quiet MAC Address
378
Configuring Basic MAC Address Authentication Functions
379
MAC Address Authentication Enhanced Function Configuration
381
MAC Address Authentication Enhanced Function Configuration Task List
381
Configuring a Guest VLAN
381
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port
383
Displaying and Maintaining MAC Address Authentication Configuration
384
MAC Address Authentication Configuration Examples
384
IP Addressing Configuration/Ip Performance Optimization Configuration
386
Chapter 1 IP Addressing Configuration
387
IP Addressing Overview
387
IP Address Classes
387
Special IP Addresses
388
Subnetting and Masking
389
Protocols and Standards
389
Dhcp
390
Configuring IP Addresses
390
Displaying IP Addressing Configuration
391
VLAN Interface IP Address Configuration Examples
391
IP Address Configuration Example I
391
IP Address Configuration Example II
392
Chapter 2 IP Performance Optimization Configuration
394
IP Performance Overview
394
Introduction to IP Performance Configuration
394
Introduction to FIB
394
Protocols and Standards
394
Configuring IP Performance Optimization
394
IP Performance Optimization Configuration Task List
394
Configuring TCP Attributes
395
Disabling Sending of ICMP Error Packets
395
Displaying and Maintaining IP Performance Optimization Configuration
397
Table of Contents
399
Chapter 1 DHCP Overview
400
Introduction to DHCP
400
DHCP IP Address Assignment
401
IP Address Assignment Policy
401
Obtaining IP Addresses Dynamically
401
Updating IP Address Lease
402
DHCP Packet Format
402
Protocol Specification
404
Chapter 2 DHCP Snooping Configuration
405
DHCP Snooping Overview
405
Introduction to DHCP Snooping
405
Introduction to DHCP-Snooping Option 82
406
Introduction to IP Filtering
409
Configuring DHCP Snooping
410
Configuring Dhcp Snooping to Support Option
411
Configuring IP Filtering
415
Displaying DHCP Snooping Configuration
416
DHCP Snooping Configuration Examples
416
DHCP-Snooping Option 82 Support Configuration Example
416
IP Filtering Configuration Example
418
Chapter 3 DHCP/BOOTP Client Configuration
420
Introduction to DHCP Client
420
Introduction to BOOTP Client
420
Configuring a DHCP/BOOTP Client
421
Displaying DHCP/BOOTP Client Configuration
422
DHCP/BOOTP Client Configuration Example
422
DHCP Client Configuration Example
422
BOOTP Client Configuration Example
423
Acl Configuration
424
ACL Overview
425
ACL Matching Order
425
Ways to Apply an ACL on a Switch
426
Types of Acls Supported by S5100 Series Ethernet Switches
427
Chapter 1 ACL Configuration
425
ACL Configuration
428
Configuring Time Range
428
Configuring Basic ACL
429
Configuring Advanced ACL
431
Configuring Layer 2 ACL
432
ACL Assignment
434
Assigning an ACL Globally
434
Assigning an ACL to a VLAN
435
Assigning an ACL to a Port Group
436
Assigning an ACL to a Port
436
Displaying ACL Configuration
437
Example for Upper-Layer Software Referencing Acls
438
Example for Controlling Telnet Login Users by Source IP
438
Example for Controlling Web Login Users by Source IP
438
Example for Applying Acls to Hardware
439
Basic ACL Configuration Example
439
Advanced ACL Configuration Example
440
Layer 2 ACL Configuration Example
441
Example for Applying an ACL to a VLAN
442
Qos Configuration
443
Chapter 1 Qos Configuration
445
Overview
445
Introduction to Qos
445
Traditional Packet Forwarding Services
445
New Requirements from Emerging Applications
445
Major Traffic Control Technologies
446
Qos Features Supported by the S5100 Series Ethernet Switches
447
Introduction to Qos Features
448
Traffic Classification
448
Priority Trust Mode
449
Protocol Priority
457
Priority Marking
457
Traffic Policing and Traffic Shaping
457
Line Rate
460
Traffic Redirecting
460
VLAN Mapping
460
Queue Scheduling
460
Flow-Based Traffic Accounting
463
Burst
463
Traffic Mirroring
463
Qos Configuration
464
Qos Configuration Task List
464
Configuring Priority Trust Mode
464
Configuring Priority Mapping
466
Setting the Priority of Protocol Packets
469
Configuring Priority Marking
470
Configuring Traffic Policing
473
Configuring Traffic Shaping
475
Configuring Line Rate
476
Configuring Traffic Redirecting
477
Configuring VLAN Mapping
479
Configuring Queue Scheduling
480
Configuring Traffic Accounting
482
Enabling the Burst Function
485
Configuring Traffic Mirroring
485
Displaying and Maintaining Qos
488
Qos Configuration Examples
490
Traffic Policing Configuration Example
490
Priority Marking and Queue Scheduling Configuration Example
491
VLAN Mapping Configuration Example
493
Vlan Tag
495
Traffic Mirroring and Traffic Redirecting Configuration Example
496
Chapter 2 Qos Profile Configuration
499
Overview
499
Introduction to Qos Profile
499
Qos Profile Application Mode
499
Qos Profile Configuration
500
Configuring a Qos Profile
500
Applying a Qos Profile
501
Displaying and Maintaining Qos Profile Configuration
502
Configuration Example
503
Qos Profile Configuration Example
503
Mirroring Configuration
505
Chapter 1 Mirroring Configuration
506
Mirroring Overview
506
Local Port Mirroring
507
Remote Port Mirroring
507
Mirroring Configuration
509
Configuring Local Port Mirroring
510
Configuring Remote Port Mirroring
511
Configuring MAC-Based Mirroring
514
Configuring VLAN-Based Mirroring
515
Qos-Qos Profile
509
MAC-Based Mirroring
509
VLAN-Based Mirroring
509
Traffic Mirroring
509
Displaying Port Mirroring
516
Mirroring Configuration Examples
517
Local Port Mirroring Configuration Example
517
Remote Port Mirroring Configuration Example
518
Arp Configuration
522
Chapter 1 ARP Configuration
523
Introduction to ARP
523
ARP Function
523
ARP Message Format
523
ARP Table
525
ARP Process
526
Introduction to ARP Attack Detection
526
Introduction to Gratuitous ARP
528
Configuring ARP
528
Configuring ARP Basic Functions
528
Configuring ARP Attack Detection
529
Configuring Gratuitous ARP
530
Displaying and Debugging ARP
531
ARP Configuration Examples
532
ARP Basic Configuration Example
532
ARP Attack Detection Configuration Example
532
Stack-Cluster
534
Chapter 1 Stack
535
Stack Function Overview
535
The Main Switch of a Stack
535
The Slave Switches of a Stack
535
Creating a Stack
536
Main Switch Configuration
536
Configuring the IP Address Pool and Creating the Stack
536
Switching to Slave Switch View
537
Slave Switch Configuration
538
Displaying and Debugging a Stack
538
Stack Configuration Example
539
Chapter 2 Cluster
541
Cluster Overview
541
Introduction to HGMP
541
Roles in a Cluster
542
How a Cluster Works
543
Cluster Configuration Tasks
550
Configuring the Management Device
550
Configuring Member Devices
555
Managing a Cluster through the Management Device
557
Configuring the Enhanced Cluster Features
558
Displaying and Maintaining Cluster Configuration
561
Cluster Configuration Example
562
Basic Cluster Configuration Example
562
Enhanced Cluster Feature Configuration Example
565
Snmp-Rmon
567
Chapter 1 SNMP Configuration
568
SNMP Overview
568
SNMP Operation Mechanism
568
SNMP Versions
569
Supported Mibs
569
Configuring Basic SNMP Functions
570
Configuring Trap-Related Functions
573
Configuring Basic Trap Functions
573
Configuring Extended Trap Function
574
Enabling Logging for Network Management
574
Displaying SNMP
575
SNMP Configuration Example
575
Chapter 2 RMON Configuration
578
Introduction to RMON
578
Working Mechanism of RMON
578
Commonly Used RMON Groups
579
Multicast
580
RMON Configuration
580
Displaying RMON
582
RMON Configuration Example
582
Multicast Overview/Igmp Snooping Configuration
584
Chapter 1 Multicast Overview
586
Multicast Overview
586
Information Transmission in the Unicast Mode
586
Information Transmission in the Broadcast Mode
587
Information Transmission in the Multicast Mode
587
Roles in Multicast
589
Advantages and Applications of Multicast
589
Multicast Models
590
Multicast Architecture
591
Multicast Protocols
595
Multicast Packet Forwarding Mechanism
597
Implementation of the RPF Mechanism
597
RPF Check
598
Chapter 2 IGMP Snooping Configuration
600
IGMP Snooping Overview
600
Principle of IGMP Snooping
600
Basic Concepts in IGMP Snooping
601
Work Mechanism of IGMP Snooping
602
IGMP Snooping Configuration
604
Enabling IGMP Snooping
605
Configuring the Version of IGMP Snooping
605
Configuring Timers
606
Configuring Fast Leave Processing
606
Configuring a Multicast Group Filter
608
Configuring the Maximum Number of Multicast Groups on a Port
609
Configuring IGMP Querier
610
Suppressing Flooding of Unknown Multicast Traffic in a VLAN
611
Configuring Static Member Port for a Multicast Group
611
Configuring a Static Router Port
612
Configuring a Port as a Simulated Group Member
613
Configuring a VLAN Tag for Query Messages
614
Configuring Multicast VLAN
615
Displaying and Maintaining IGMP Snooping
617
IGMP Snooping Configuration Examples
618
Configuring IGMP Snooping
618
Configuring Multicast VLAN
620
Troubleshooting IGMP Snooping
622
Chapter 3 Common Multicast Configuration
624
Common Multicast Configuration
624
Configuring a Multicast MAC Address Entry
624
Configuring Dropping Unknown Multicast Packets
625
Displaying Common Multicast Configuration
625
Ntp Configuration
627
Chapter 1 NTP Configuration
628
Introduction to NTP
628
Applications of NTP
628
Implementation Principle of NTP
629
NTP Implementation Modes
631
NTP Configuration Task List
633
Configuring NTP Implementation Modes
634
Configuring NTP Server/Client Mode
634
Configuring the NTP Symmetric Peer Mode
635
Configuring NTP Broadcast Mode
636
Configuring NTP Multicast Mode
637
Configuring Access Control Right
638
Configuration Prerequisites
639
Configuring NTP Authentication
639
Configuration Prerequisites
640
Configuration Procedure
641
Configuring Optional NTP Parameters
643
Configuring an Interface on the Local Switch to Send NTP Messages
643
Configuring the Number of Dynamic Sessions Allowed on the Local Switch
643
Disabling an Interface from Receiving NTP Messages
644
Displaying NTP Configuration
644
Configuration Examples
645
Configuring NTP Server/Client Mode
645
Configuring NTP Symmetric Peer Mode
646
Configuring NTP Broadcast Mode
648
Configuring NTP Multicast Mode
650
Configuring NTP Server/Client Mode with Authentication
652
Ssh Configuration
654
Chapter 1 SSH Configuration
655
SSH Overview
655
Introduction to SSH
655
Algorithm and Key
655
SSH Operating Process
656
SSH Server and Client
659
Configuring the SSH Server
661
Configuring the User Interfaces for SSH Clients
662
Configuring the SSH Management Functions
663
Configuring the SSH Server to be Compatible with SSH1 Clients
664
Configuring Key Pairs
664
Creating an SSH User and Specifying an Authentication Type
665
Specifying a Service Type for an SSH User on the Server
667
Configuring the Public Key of a Client on the Server
668
Assigning a Public Key to an SSH User
669
Exporting the Host Public Key to a File
670
Configuring the SSH Client
671
SSH Client Configuration Task List
671
Configuring an SSH Client that Runs SSH Client Software
671
Configuring an SSH Client Assumed by an SSH2-Capable Switch
679
Comparison of SSH Commands with the same Functions
683
Displaying and Maintaining SSH Configuration
683
SSH Configuration Examples
685
When Switch Acts as Server for Local Password Authentication
685
When Switch Acts as Server for Password and RADIUS Authentication
687
When Switch Acts as Server for Password and HWTACACS Authentication
692
When Switch Acts as Server for Publickey Authentication
695
When Switch Acts as Client for Password Authentication
702
When Switch Acts as Client for Publickey Authentication
704
When Switch Acts as Client and First-Time Authentication Is Not Supported
707
File System Management
710
Chapter 1 File System Management Configuration
711
File System Configuration
711
Introduction to File System
711
File System Configuration Tasks
711
Directory Operations
711
File Operations
712
Flash Memory Operations
713
Prompt Mode Configuration
714
File System Configuration Example
714
File Attribute Configuration
715
Introduction to File Attributes
715
Configuring File Attributes
716
Ftp-Sftp-Tftp
718
Chapter 1 FTP and SFTP Configuration
719
Introduction to FTP and SFTP
719
Introduction to FTP
719
Introduction to SFTP
720
FTP Configuration
720
FTP Configuration: a Switch Operating as an FTP Server
721
FTP Configuration: a Switch Operating as an FTP Client
725
Configuration Example: a Switch Operating as an FTP Server
728
FTP Banner Display Configuration Example
731
FTP Configuration: a Switch Operating as an FTP Client
732
SFTP Configuration
734
SFTP Configuration: a Switch Operating as an SFTP Server
735
SFTP Configuration: a Switch Operating as an SFTP Client
736
SFTP Configuration Example
738
Chapter 2 TFTP Configuration
743
Introduction to TFTP
743
TFTP Configuration
744
TFTP Configuration: a Switch Operating as a TFTP Client
744
TFTP Configuration Example
746
Information Center
749
Chapter 1 Information Center
750
Information Center Overview
750
Introduction to Information Center
750
System Information Format
753
System Maintenance and
756
Information Center Configuration
757
Information Center Configuration Task List
757
Configuring Synchronous Information Output
757
Configuring to Display the Time Stamp with the UTC Time Zone
758
Setting to Output System Information to the Console
758
Setting to Output System Information to a Monitor Terminal
761
Setting to Output System Information to a Log Host
762
Setting to Output System Information to the Trap Buffer
763
Setting to Output System Information to the Log Buffer
764
Setting to Output System Information to the SNMP NMS
765
Displaying and Maintaining Information Center
766
Information Center Configuration Examples
766
Log Output to a UNIX Log Host
766
Log Output to a Linux Log Host
768
Log Output to the Console
770
Configuration Example
771
Table of Contents
772
Chapter 1 Boot ROM and Host Software Loading
773
Introduction to Loading Approaches
773
Local Boot ROM and Software Loading
773
Boot Menu
774
Loading by Xmodem through Console Port
775
Loading by TFTP through Ethernet Port
780
Loading by FTP through Ethernet Port
782
Remote Boot ROM and Software Loading
784
Remote Loading Using FTP
784
Remote Loading Using TFTP
789
Chapter 2 Basic System Configuration and Debugging
790
Basic System Configuration
790
Displaying the System Status
791
Debugging the System
791
Enabling/Disabling System Debugging
791
Displaying Debugging Status
793
Displaying Operating Information about Modules in System
793
Chapter 3 Network Connectivity Test
794
Network Connectivity Test
794
Ping
794
Tracert
794
Chapter 4 Device Management
796
Introduction to Device Management
796
Device Management Configuration
796
Device Management Configuration Task List
796
Rebooting the Ethernet Switch
796
Scheduling a Reboot on the Switch
797
Configuring Real-Time Monitoring of the Running Status of the System
797
Specifying the APP to be Used at Reboot
798
Upgrading the Boot ROM
798
Identifying and Diagnosing Pluggable Transceivers
799
Displaying the Device Management Configuration
801
Remote Switch APP Upgrade Configuration Example
801
Advertisement
H3C S5100-48P-SI Installation Manual (104 pages)
Brand:
H3C
| Category:
Switch
| Size: 1.98 MB
Table of Contents
About this Manual
3
Table of Contents
5
Chapter 1 Product Overview
8
Preface
8
S5100-SI Series Ethernet Switches
9
S5100-8P-SI Ethernet Switch
9
Chapter 1 Product Overview
9
S5100-16P-SI Ethernet Switch
11
S5100-24P-SI Ethernet Switch
13
S5100-48P-SI Ethernet Switch
14
S5100-EI Series Ethernet Switches
15
S5100-8P-EI Ethernet Switch
15
S5100-16P-EI Ethernet Switch
16
S5100-24P-EI Ethernet Switch
17
S5100-24P-EI Ethernet Switch
18
S5100-48P-EI Ethernet Switch
19
S5100-26C-EI Ethernet Switch
20
S5100-26C-EI Ethernet Switch
21
S5100-50C-EI Ethernet Switch
22
S5100-8P-PWR-EI Ethernet Switch
23
S5100-8P-PWR-EI Ethernet Switch
24
S5100-16P-PWR-EI Ethernet Switch
25
S5100-26C-PWR-EI Ethernet Switch
27
S5100-50C-PWR-EI Ethernet Switch
28
S5100-50C-PWR-EI Ethernet Switch
29
Leds
30
Power LED (PWR)
30
DC Power Supply LED (RPS)
31
Mode LED
31
Gigabit Autosensing Ethernet Port Status Leds
32
Gigabit SFP Port Status LED
33
Module LED
34
Gigabit SFP Port Status LED
34
7-Segment Digitron Display
35
System Features of the S5100 Series
37
System Features of the S5100-SI Series
37
System Features of the S5100-EI Series
38
Ordering SFP/XFP/XENPAK Interface Modules
41
Ordering 10 G Stack Interface Modules
42
Ordering Stack Cables
43
Ordering DC Power Cords
43
Chapter 2 Preparing for Installation
44
Safety Precautions
44
Installation Site
44
Temperature/Humidity
44
Cleanness
45
Electromagnetic Susceptibility
45
Safety in Use of Laser
46
Installation Tools
46
Chapter 3 Installing the Switch
47
Rack-Mounting the Switch
47
Introduction to Mounting Ear
48
S5100-48P-Ei 50
49
S5100-50C-Ei 51
49
Introduction to Guide Rail
50
Using Front Mounting Ears to Install a Switch
50
Use Front Mounting Ears and a Tray
51
Use Front and Rear Mounting Ears
52
Use Front Mounting Ears and Guide Rails
55
Desk Mounting
58
Wall Mounting
58
Magnet Mounting
59
Connecting Power Cord and Grounding Wire
62
Connecting AC Power Cord
62
Connecting DC Power Cord
63
Connecting Grounding Wire
65
Connecting Console Cable
67
Console Cable
67
Connecting Console Cable
68
Installing and Removing Optional Interface Modules
69
XFP Interface Module
69
Stack Module
71
XENPAK Optical Module
72
Installing and Removing Dedicated Stack Cables
74
Introduction
74
Installation
74
Removal
74
Verifying the Installation
75
Chapter 4 Powering on the Switch for the First Time
76
Set up the Configuration Environment
76
Connecting the Console Cable
76
Setting Terminal Parameters
76
Booting the Switch
79
Checking before Powering on the Switch
79
Powering on the Switch
79
Changing the Startup Mode
81
Advertisement
Related Products
H3C S5100-48P-EI
H3C H3C S5100-SI
H3C H3C S5100-EI
H3C S5100-8P-SI
H3C S5100-16P-SI
H3C S5100-24P-SI
H3C S5100-16P-EI
H3C S5100-24P-EI
H3C S5100-26C-EI
H3C S5100-8P-PWR-EI
H3C Categories
Switch
Network Router
Wireless Access Point
Control Unit
Gateway
More H3C Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL