Sign In
Upload
Manuals
Brands
H3C Manuals
Switch
S5810 Series
H3C S5810 Series Manuals
Manuals and User Guides for H3C S5810 Series. We have
3
H3C S5810 Series manuals available for free PDF download: Operation Manual, Quick Start Manual, Quick Start
H3C S5810 Series Operation Manual (820 pages)
Ethernet Switches
Brand:
H3C
| Category:
Switch
| Size: 9 MB
Table of Contents
Table of Contents
6
About this Manual
3
1 Obtaining the Documentation
7
H3C Website
7
Software Release Notes
7
2 Product Features
8
Introduction to Product
8
Feature Lists
8
3 Features
9
Access Volume
9
IP Services Volume
11
IP Routing Volume
12
IP Multicast Volume
12
Qos Volume
13
Security Volume
13
System Volume
14
Manual Version
29
Ethernet Interface Configuration
32
Ethernet Interface Configuration
33
General Ethernet Interface Configuration
33
Combo Port Configuration
33
Management Ethernet Interface Configuration
33
Basic Ethernet Interface Configuration
34
Configuring Flow Control on an Ethernet Interface
35
Configuring Loopback Testing on an Ethernet Interface
36
Enabling Auto Power down on an Ethernet Interface
36
Configuring a Port Group
37
Configuring Storm Suppression
37
Setting the Interval for Collecting Ethernet Interface Statistics
38
Enabling Forwarding of Jumbo Frames
39
Enabling Loopback Detection on an Ethernet Interface
39
Configuring the MDI Mode for an Ethernet Interface
40
Enabling Bridging on an Ethernet Interface
41
Testing the Cable on an Ethernet Interface
41
Configuring the Storm Constrain Function on an Ethernet Interface
42
Displaying and Maintaining an Ethernet Interface
43
Link Aggregation Configuration
45
Link Aggregation Configuration
46
Overview
46
Basic Concepts of Link Aggregation
46
Link Aggregation Modes
48
Load Sharing Mode of an Aggregation Group
50
Configuring an Aggregation Group
50
Configuring a Static Aggregation Group
51
Configuring a Dynamic Aggregation Group
51
Link Aggregation Configuration Task List
50
Configuring an Aggregate Interface
52
Configuring the Description of an Aggregate Interface
52
Enabling Linkup/Linkdown Trap Generation for an Aggregate Interface
53
Shutting down an Aggregate Interface
53
Configuring a Load Sharing Mode for Load-Sharing Link Aggregation Groups
54
Displaying and Maintaining Link Aggregation
54
Link Aggregation Configuration Examples
55
Layer-2 Static Aggregation Configuration Example
55
Layer-2 Dynamic Aggregation Configuration Example
56
Configuration Procedure
57
Port Isolation Configuration
58
Port Isolation Configuration
59
Introduction to Port Isolation
59
Configuring the Isolation Group for a Isolation-Group Device
60
Assigning a Port to the Isolation Group
60
Specifying the Uplink Port for the Isolation Group
60
Displaying and Maintaining Isolation Groups
61
Port Isolation Configuration Example
62
Logical Interface Configuration
64
Logical Interface Configuration
65
Loopback Interface
65
Introduction to Loopback Interface
65
Configuring a Loopback Interface
65
Null Interface
66
Introduction to Null Interface
66
Configuring Null 0 Interface
66
Displaying and Maintaining Logical Interfaces
67
Dldp Configuration
68
DLDP Configuration
69
Overview
69
DLDP Introduction
70
DLDP Fundamentals
70
DLDP Configuration Task List
76
Enabling DLDP
77
Setting DLDP Mode
77
Setting the Delaydown Timer
78
Setting the Interval for Sending Advertisement Packets
78
Configuring DLDP Authentication
79
Setting the Port Shutdown Mode
79
Resetting DLDP State
80
Resetting DLDP State in System View
80
Resetting DLDP State in Port View/Port Group View
80
Displaying and Maintaining DLDP
81
DLDP Configuration Example
81
Troubleshooting
83
Lldp Configuration
84
LLDP Configuration
85
Overview
85
Background
85
Basic Concepts
85
Operating Modes of LLDP
90
How LLDP Works
90
Protocols and Standards
90
LLDP Configuration Task List
90
Performing Basic LLDP Configuration
91
Enabling LLDP
91
Setting LLDP Operating Mode
92
Setting the LLDP Re-Initialization Delay
92
Enable LLDP Polling
92
Configuring the Tlvs to be Advertised
93
Configuring the Management Address and Its Encoding Format
93
Setting the TTL Multiplier
94
Configuring the Parameters Concerning LLDPDU Sending
94
Configuring the Encapsulation Format for Lldpdus
95
Configuring LLDP Trapping
95
Displaying and Maintaining LLDP
96
LLDP Configuration Examples
96
Basic LLDP Configuration Example
96
Mstp Configuration
100
Introduction to STP
102
Why STP
102
Protocol Packets of STP
102
Basic Concepts in STP
103
How STP Works
104
MSTP Configuration
102
Overview
102
Introduction to RSTP
110
Introduction to MSTP
111
Why MSTP
111
Basic Concepts in MSTP
112
How MSTP Works
115
Implementation of MSTP on Devices
116
Protocols and Standards
116
Configuration Task List
116
Configuring the Root Bridge
118
Configuring an MST Region
118
Specifying the Root Bridge or a Secondary Root Bridge
119
Configuring the Work Mode of an MSTP Device
120
Configuring the Priority of the Current Device
121
Configuring the Maximum Hops of an MST Region
121
Configuring the Network Diameter of a Switched Network
122
Configuring Timers of MSTP
123
Configuring the Timeout Factor
124
Configuring the Maximum Port Rate
125
Configuring Ports as Edge Ports
126
Setting the Link Type of a Port to P2P
127
Configuring the Mode a Port Uses to Recognize/Send MSTP Packets
128
Enabling the Output of Port State Transition Information
129
Enabling the MSTP Feature
129
Configuring Leaf Nodes
130
Configuring an MST Region
130
Configuring the Work Mode of MSTP
130
Configuring the Timeout Factor
130
Configuring the Maximum Transmission Rate of Ports
131
Configuring Ports as Edge Ports
131
Configuring Path Costs of Ports
131
Configuring Port Priority
133
Setting the Link Type of a Port to P2P
133
Configuring the Mode a Port Uses to Recognize/Send MSTP Packets
134
Enabling Output of Port State Transition Information
134
Enabling the MSTP Feature
134
Performing Mcheck
134
Configuration Prerequisites
134
Configuration Procedure
134
Configuration Example
135
Configuring the VLAN Ignore Feature
135
Configuration Procedure
135
Configuration Example
136
Configuring Digest Snooping
136
Configuration Prerequisites
137
Configuration Procedure
137
Configuration Example
137
Configuring no Agreement Check
138
Configuration Prerequisites
139
Configuration Procedure
139
Configuration Example
140
Configuring Protection Functions
140
Configuration Prerequisites
141
Enabling BPDU Guard
141
Enabling Root Guard
142
Enabling Loop Guard
143
Enabling TC-BPDU Attack Guard
143
Displaying and Maintaining MSTP
144
MSTP Configuration Example
145
Smart Link Configuration
149
Smart Link Configuration
150
Smart Link Overview
150
Terminology
151
Operating Mechanism of Smart Link
152
Smart Link Configuration Task List
152
Configuring a Smart Link Device
153
Configuration Prerequisites
153
Configuring Protected Vlans for a Smart Link Group
153
Configuring Member Ports for a Smart Link Group
154
Configuring Role Preemption for a Smart Link Group
154
Enabling the Sending of Flush Messages
155
Smart Link Device Configuration Example
155
Configuring an Associated Device
156
Enabling the Receiving of Flush Messages
156
Associated Device Configuration Example
157
Displaying and Maintaining Smart Link
157
Smart Link Configuration Examples
157
Single Smart Link Group Configuration Example
157
Multiple Smart Link Groups Load Sharing Configuration Example
159
Monitor Link Configuration
163
Monitor Link Configuration
164
Overview
164
Terminology
164
How Monitor Link Works
164
Configuring Monitor Link
165
Configuration Prerequisites
165
Configuration Procedure
165
Monitor Link Configuration Example
166
Displaying and Maintaining Monitor Link
166
VLAN Configuration
169
Introduction to VLAN
170
VLAN Overview
170
VLAN Fundamentals
171
Types of VLAN
172
VLAN Configuration
170
Configuring Basic VLAN Settings
172
Configuring Basic Settings of a VLAN Interface
173
Port-Based VLAN Configuration
174
Introduction to Port-Based VLAN
174
Assigning an Access Port to a VLAN
175
Assigning a Trunk Port to a VLAN
176
Assigning a Hybrid Port to a VLAN
177
Displaying and Maintaining VLAN
178
VLAN Configuration Example
179
Gvrp Configuration
181
GVRP Configuration
182
Introduction to GVRP
182
Garp
182
Gvrp
185
Protocols and Standards
185
Configuring GVRP Functions
185
GVRP Configuration Task List
185
Configuring GARP Timers
186
Displaying and Maintaining GVRP
188
GVRP Configuration Examples
188
Gvrp Configuration Example I
188
GVRP Configuration Example II
189
Gvrp Configuration Example III
191
# Display Dynamic VLAN Information on Device A.
193
Introduction to Port Mirroring
194
Classification of Port Mirroring
194
Implementing Port Mirroring
194
Port Mirroring Configuration
194
Configuring Local Port Mirroring
197
Configuring Remote Port Mirroring
198
Configuration Prerequisites
198
Configuring a Remote Source Mirroring Group (on the Source Device)
198
Configuring a Remote Destination Mirroring Group (on the Destination Device)
200
Displaying and Maintaining Port Mirroring
201
Port Mirroring Configuration Examples
201
Local Port Mirroring Configuration Example
201
Remote Port Mirroring Configuration Example
203
IP Addressing Configuration
208
IP Addressing Configuration
209
IP Addressing Overview
209
IP Address Classes
209
Special IP Addresses
210
Subnetting and Masking
210
Configuring IP Addresses
211
Assigning an IP Address to an Interface
211
IP Addressing Configuration Example
212
Displaying and Maintaining IP Addressing
213
IP Performance Optimization Configuration
214
Enabling Reception and Forwarding of Directed Broadcasts to a Directly Connected Network
215
Enabling Reception of Directed Broadcasts to a Directly Connected Network
215
Enabling Forwarding of Directed Broadcasts to a Directly Connected Network
216
Configuration Example
216
IP Performance Optimization Configuration
215
IP Performance Optimization Overview
215
Configuring TCP Attributes
217
Enabling the SYN Cookie Feature
217
Enabling Protection against Naptha Attacks
218
Configuring TCP Optional Parameters
219
Configuring ICMP to Send Error Packets
220
Displaying and Maintaining IP Performance Optimization
221
Arp Configuration/Arp Attack Defense Configuration
223
1 ARP Configuration
224
ARP Overview
224
ARP Function
224
ARP Message Format
224
ARP Address Resolution Process
225
ARP Table
226
Configuring ARP
226
Configuring a Static ARP Entry
226
Configuring the Maximum Number of ARP Entries for an Interface
227
Setting the Aging Time for Dynamic ARP Entries
227
Enabling the ARP Entry Check
228
ARP Configuration Example
228
Configuring Gratuitous ARP
229
Introduction to Gratuitous Arp
229
Displaying and Maintaining ARP
230
2 ARP Attack Defense Configuration
231
ARP Attack Defense Configuration Task List
231
Configuring ARP Source Suppression
232
Introduction to ARP Source Suppression
232
Configuring ARP Active Acknowledgement
232
Introduction to ARP Active Acknowledgement
232
Configuring Source MAC Address Based ARP Attack Detection
233
Introduction to Source MAC Address Based ARP Attack Detection
233
Displaying and Maintaining Source MAC Address Based ARP Attack Detection
233
Configuring ARP Packet Source MAC Address Consistency Check
234
Introduction to ARP Packet Source MAC Address Consistency Check
234
Configuring ARP Packet Rate Limit
234
Introduction to ARP Packet Rate Limit
234
Configuring the ARP Packet Rate Limit Function
234
Configuring ARP Detection
235
Introduction to ARP Detection
235
Enabling ARP Detection Based on DHCP Snooping Entries/Static IP-To-MAC Bindings
236
Configuring ARP Detection Based on Specified Objects
237
Displaying and Maintaining ARP Detection
238
ARP Detection Configuration Example
238
Table of Contents
241
1 DHCP Client Configuration
242
Introduction to DHCP Client
242
Enabling the DHCP Client on an Interface
242
Displaying and Maintaining the DHCP Client
243
DHCP Client Configuration Example
243
2 DHCP Snooping Configuration
244
DHCP Snooping Overview
244
Functions of DHCP Snooping
244
Application Environment of Trusted Ports
245
Dhcp Snooping Support for Option
246
Configuring DHCP Snooping Basic Functions
247
Prerequisites
248
Configuring Dhcp Snooping to Support Option 82
248
Displaying and Maintaining DHCP Snooping
249
DHCP Snooping Configuration Examples
250
DHCP Snooping Configuration Example
250
DHCP Snooping Option 82 Support Configuration Example
250
Enable Dhcp Snooping
251
3 BOOTP Client Configuration
252
Introduction to BOOTP Client
252
Bootp Application
252
Obtaining an IP Address Dynamically
253
Protocols and Standards
253
Configuring an Interface to Dynamically Obtain an IP Address through BOOTP
253
Displaying and Maintaining BOOTP Client Configuration
253
BOOTP Client Configuration Example
254
Ipv4 DNS Configuration
255
DNS Overview
256
Static Domain Name Resolution
256
Dynamic Domain Name Resolution
256
Ipv4 DNS Configuration
256
Configuring the Ipv4 DNS Client
258
Configuring Static Domain Name Resolution
258
Configuring Dynamic Domain Name Resolution
258
Displaying and Maintaining Ipv4 DNS
259
Ipv4 DNS Configuration Examples
259
Static Domain Name Resolution Configuration Example
259
Dynamic Domain Name Resolution Configuration Example
260
Troubleshooting Ipv4 DNS Configuration
263
Ftp Configuration/Tftp Configuration
264
1 FTP Configuration
265
FTP Overview
265
Introduction to FTP
265
Operation of FTP
265
Configuring the FTP Client
267
Establishing an FTP Connection
268
Operating the Directories on an FTP Server
268
Operating the Files on an FTP Server
269
Using Another Username to Log in to an FTP Server
269
Maintaining and Debugging an FTP Connection
270
Terminating an FTP Connection
270
FTP Client Configuration Example
271
Configuring the FTP Server
272
Configuring FTP Server Operating Parameters
272
Configuring Authentication and Authorization on the FTP Server
273
FTP Server Configuration Example
274
Displaying and Maintaining FTP
276
2 TFTP Configuration
277
TFTP Overview
277
Introduction to TFTP
277
Operation of TFTP
277
Configuring the TFTP Client
278
Displaying and Maintaining the TFTP Client
279
TFTP Client Configuration Example
280
Ip Routing Overview
284
Ip Routing and Routing Table
284
Displaying and Maintaining a Routing Table
286
Static Routing Configuration
287
Static Routing Configuration
288
Static Route
288
Default Route
288
Configuring a Static Route
289
Application Environment of Static Routing
289
Displaying and Maintaining Static Routes
290
Static Route Configuration Example
290
Basic Static Route Configuration Example
290
Multicast Overview
294
Introduction to Multicast
295
Comparison of Information Transmission Techniques
295
Features of Multicast
298
Common Notations in Multicast
299
Advantages and Applications of Multicast
299
Multicast Overview
295
Multicast Architecture
300
Multicast Addresses
301
Multicast Protocols
302
Multicast Models
300
Multicast Packet Forwarding Mechanism
304
Igmp Snooping Configuration
306
IGMP Snooping Configuration
308
IGMP Snooping Overview
308
Principle of IGMP Snooping
308
Basic Concepts in IGMP Snooping
309
How IGMP Snooping Works
310
IGMP Snooping Proxying
312
Protocols and Standards
313
IGMP Snooping Configuration Task List
314
Configuring Basic Functions of IGMP Snooping
315
Configuration Prerequisites
315
Enabling IGMP Snooping
315
Configuring the Version of IGMP Snooping
316
Configuring IGMP Snooping Port Functions
316
Configuration Prerequisites
316
Configuring Aging Timers for Dynamic Ports
317
Configuring Static Ports
317
Configuring Simulated Joining
318
Configuring Fast Leave Processing
319
Configuring IGMP Snooping Querier
320
Configuration Prerequisites
320
Enabling IGMP Snooping Querier
320
Configuring IGMP Queries and Responses
321
Configuring Source IP Address of IGMP Queries
322
Configuring IGMP Snooping Proxying
322
Configuration Prerequisites
322
Enabling IGMP Snooping Proxying
322
Configuring a Source IP Address for the IGMP Messages Sent by the Proxy
323
Configuring an IGMP Snooping Policy
323
Configuration Prerequisites
323
Configuring a Multicast Group Filter
323
Configuring the Function of Dropping Unknown Multicast Data
324
Configuring IGMP Report Suppression
325
Configuring Maximum Multicast Groups that Can be Joined on a Port
325
Configuring Multicast Group Replacement
326
Configuring 802.1P Precedence for IGMP Messages
327
Displaying and Maintaining IGMP Snooping
328
IGMP Snooping Configuration Examples
328
Group Policy and Simulated Joining Configuration Example
328
Static Port Configuration Example
331
IGMP Snooping Querier Configuration Example
334
IGMP Snooping Proxying Configuration Example
336
Troubleshooting IGMP Snooping Configuration
339
Switch Fails in Layer 2 Multicast Forwarding
339
Multicast VLAN Configuration
341
Introduction to Multicast VLAN
342
Multicast VLAN Configuration
342
Configuring Sub-VLAN-Based Multicast VLAN
344
Configuration Prerequisites
344
Multicast VLAN Configuration Task List
344
Configuring Port-Based Multicast VLAN
345
Configuration Prerequisites
345
Configuring User Port Attributes
346
Configuring Multicast VLAN Ports
346
Displaying and Maintaining Multicast VLAN
347
Multicast VLAN Configuration Examples
348
Sub-VLAN-Based Multicast VLAN Configuration
348
Port-Based Multicast VLAN Configuration
351
Table of Contents
356
1 Qos Overview
359
Introduction to Qos
359
Networks Without Qos Guarantee
359
Qos Requirements of New Applications
359
Congestion: Causes, Impacts, and Countermeasures
360
Causes
360
Impacts
360
Countermeasures
361
Qos Technology Implementations
361
End-To-End Qos
361
Traffic Classification
362
Packet Precedences
362
2 Qos Policy Configuration
366
Qos Policy Overview
366
Configuring a Qos Policy
366
Defining a Class
366
Defining a Traffic Behavior
368
Defining a Policy
370
Qos Policy Configuration Example
370
Applying the Qos Policy
371
Applying the Qos Policy to an Interface
371
Applying the Qos Policy to a VLAN
372
Applying the Qos Policy Globally
373
Support for Qos Actions in Different Directions
373
Displaying and Maintaining Qos Policies
374
3 Priority Mapping Configuration
375
Priority Mapping Overview
375
Introduction to Priority Mapping
375
Concepts
375
Introduction to Priority Mapping Tables
376
Configuration Procedure
377
Configuring a Priority Mapping Table
377
Configuration Example
378
Configuring the Priority for a Port
379
Configuration Prerequisites
379
Configuration Procedure
379
Configuration Example
379
Configuring the Trusted Precedence Type for a Port
379
Configuration Prerequisites
380
Configuration Procedure
380
Configuration Example
380
Displaying and Maintaining Priority Mapping
381
4 Traffic Policing and Traffic Shaping Configuration
382
Traffic Policing and Traffic Shaping Overview
382
Traffic Evaluation and Token Bucket
382
Traffic Policing
383
Traffic Shaping
384
Traffic Policing, GTS and Line Rate Configuration
385
Configuring Traffic Policing
386
Configuring GTS
386
Displaying and Maintaining Traffic Policing, GTS and Line Rate
388
Traffic Policing and GTS Configuration Examples
388
Traffic Policing and GTS Configuration Example
388
5 Aggregation CAR Configuration
390
Aggregation Car Overview
390
Configuring an Aggregation CAR Policy
390
Configuration Prerequisites
390
Configuration Procedure
390
Configuration Example
391
Referencing Aggregation CAR in a Traffic Behavior
391
Configuration Prerequisites
391
Configuration Procedure
391
Configuration Example
392
Displaying and Maintaining Aggregation Car
392
6 Congestion Management Configuration
393
Overview
393
Congestion Management Policies
393
Congestion Management Configuration Methods
396
Per-Queue Configuration Method
396
Configuring SP Queuing
396
Configure WRR Queuing
397
Configuring SP+WRR Queues
398
Configuring Traffic Mirroring
400
7 Traffic Mirroring Configuration
400
Traffic Mirroring Overview
400
Mirroring Traffic to an Interface
401
Mirroring Traffic to the CPU
401
Displaying and Maintaining Traffic Mirroring
401
Traffic Mirroring Configuration Examples
401
Example for Mirroring Traffic to an Interface
401
8 Port Buffer Configuration
403
Port Buffer Overview
403
Configuring the Shared Buffer
403
Configuring the Burst Function to Automatically Set the Shared Buffer
403
Configuring the Shared Buffer Manually
404
Displaying and Maintaining Port Buffer
404
Network Requirements
405
Burst Configuration Example
405
Configuration Procedure
405
Aaa Configuration
408
Aaa Configuration
410
Introduction to AAA
410
Introduction to RADIUS
411
Client/Server Model
411
Security and Authentication Mechanisms
412
Basic Message Exchange Process of RADIUS
412
RADIUS Packet Format
413
Extended Radius Attributes
416
Introduction to HWTACACS
416
Differences between HWTACACS and RADIUS
417
Basic Message Exchange Process of HWTACACS
417
AAA Configuration Task List
419
RADIUS Configuration Task List
420
HWTACACS Configuration Task List
420
Protocols and Standards
419
Configuring Aaa
421
Creating an ISP Domain
421
Configuring ISP Domain Attributes
422
Configuring AAA Authentication Methods for an ISP Domain
423
Configuring AAA Authorization Methods for an ISP Domain
424
Configuring AAA Accounting Methods for an ISP Domain
426
Configuring Local User Attributes
427
Configuring User Group Attributes
429
Configuring a NAS ID-VLAN Binding
429
Configuring Radius
430
Displaying and Maintaining AAA
430
Creating a RADIUS Scheme
430
Specifying the RADIUS Authentication/Authorization Servers
431
Specifying the RADIUS Accounting Servers and Relevant Parameters
431
Setting the Shared Key for RADIUS Packets
432
Setting the Upper Limit of RADIUS Request Retransmission Attempts
433
Setting the Supported RADIUS Server Type
433
Setting the Status of RADIUS Servers
434
Configuring Attributes Related to Data to be Sent to the RADIUS Server
435
Setting Timers Regarding RADIUS Servers
436
Configuring RADIUS Accounting-On
437
Enabling the Listening Port of the RADIUS Client
438
Displaying and Maintaining RADIUS
438
Configuring Hwtacacs
439
Creating an Hwtacacs Scheme
439
Specifying the HWTACACS Authentication Servers
439
Specifying the HWTACACS Authorization Servers
440
Specifying the HWTACACS Accounting Servers
440
Setting the Shared Key for HWTACACS Packets
441
Configuring Attributes Related to the Data Sent to HWTACACS Server
442
Setting Timers Regarding HWTACACS Servers
442
Displaying and Maintaining HWTACACS
443
AAA Configuration Examples
443
AAA for Telnet Users by an HWTACACS Server
443
AAA for Telnet Users by Separate Servers
445
AAA for SSH Users by a RADIUS Server
446
Troubleshooting Aaa
450
Troubleshooting Radius
450
Troubleshooting Hwtacacs
451
IP Source Guard Configuration
452
Configuring a Static Binding Entry
453
IP Source Guard Configuration
453
IP Source Guard Overview
453
Configuring Dynamic Binding Function
454
Displaying and Maintaining IP Source Guard
455
IP Source Guard Configuration Examples
455
Static Binding Entry Configuration Example
455
Dynamic Binding Function Configuration Example
456
Troubleshooting IP Source Guard
458
Failed to Configure Static Binding Entries and Dynamic Binding Function
458
Ssh2.0 Configuration/Sftp Service
459
1 Ssh2.0 Configuration
460
Ssh2.0 Overview
460
Introduction to SSH2.0
460
Operation of SSH
460
Configuring the Device as an SSH Server
463
SSH Server Configuration Task List
463
Generating a DSA or RSA Key Pair
463
Enabling SSH Server
464
Configuring the User Interfaces for SSH Clients
464
Configuring a Client Public Key
465
Configuring an SSH User
466
Setting the SSH Management Parameters
468
Configuring the Device as an SSH Client
468
SSH Client Configuration Task List
468
Specifying a Source IP Address/Interface for the SSH Client
469
Configuring Whether First-Time Authentication Is Supported
469
Establishing a Connection between the SSH Client and the Server
470
Displaying and Maintaining SSH
470
SSH Server Configuration Examples
471
When Switch Acts as Server for Password Authentication
471
When Switch Acts as Server for Publickey Authentication
473
SSH Client Configuration Examples
478
When Switch Acts as Client for Password Authentication
478
When Switch Acts as Client for Publickey Authentication
481
2 Sftp Service
483
Sftp Overview
483
Configuring an SFTP Server
483
Enabling the SFTP Server
483
Configuring the SFTP Connection Idle Timeout Period
484
Configuring an SFTP Client
484
Specifying a Source IP Address or Interface for the SFTP Client
484
Establishing a Connection to the Sftp Server
484
Working with the SFTP Directories
485
Working with SFTP Files
486
Displaying Help Information
486
Terminating the Connection to the Remote SFTP Server
487
SFTP Client Configuration Example
487
SFTP Server Configuration Example
491
Pki Configuration
493
Introduction to PKI
494
Pki Overview
494
Pki Terms
494
Architecture of PKI
495
Applications of PKI
496
Operation of PKI
496
Pki Configuration
494
Configuring an Entity DN
497
PKI Configuration Task List
497
Configuring a PKI Domain
499
Submitting a PKI Certificate Request
500
Submitting a Certificate Request in Auto Mode
500
Submitting a Certificate Request in Manual Mode
501
Retrieving a Certificate Manually
502
Configuring PKI Certificate Verification
503
Deleting a Certificate
504
Destroying a Local RSA Key Pair
504
Configuring an Access Control Policy
505
Displaying and Maintaining PKI
505
PKI Configuration Examples
506
Requesting a Certificate from a CA Running RSA Keon
506
Requesting a Certificate from a CA Running Windows 2003 Server
509
Configuring a Certificate Attribute-Based Access Control Policy
513
Troubleshooting Pki
514
Failed to Retrieve a Ca Certificate
514
Failed to Request a Local Certificate
515
Failed to Retrieve Crls
515
Ssl Configuration
516
Ssl Configuration
517
Ssl Overview
517
SSL Security Mechanism
517
SSL Configuration Task List
518
Ssl Protocol Stack
518
Configuring an SSL Server Policy
519
SSL Server Policy Configuration Example
520
Configuring an SSL Client Policy
522
Displaying and Maintaining SSL
522
Troubleshooting Ssl
523
SSL Handshake Failure
523
Public Key Configuration
524
Public Key Algorithm Overview
525
Key Algorithm Types
525
Asymmetric Key Algorithm Applications
525
Public Key Configuration
525
Configuring the Local Asymmetric Key Pair
526
Creating an Asymmetric Key Pair
526
Displaying or Exporting the Local RSA or DSA Host Public Key
527
Destroying an Asymmetric Key Pair
527
Configuring the Public Key of a Peer
527
Displaying and Maintaining Public Keys
528
Public Key Configuration Examples
529
Configuring the Public Key of a Peer Manually
529
Importing the Public Key of a Peer from a Public Key File
530
Table of Contents
534
1 Acl Overview
536
Introduction to Ipv4 ACL
536
Ipv4 ACL Classification
536
Ipv4 ACL Naming
537
Ipv4 ACL Match Order
537
Ipv4 ACL Step
538
Effective Period of an Ipv4 ACL
539
IP Fragments Filtering with Ipv4 ACL
539
Introduction to Ipv6 ACL
539
Ipv6 ACL Classification
539
Ipv6 ACL Naming
540
Ipv6 ACL Match Order
540
Ipv6 Acl Step
541
Effective Period of an Ipv6 Acl
541
Acl Application
541
2 Ipv4 ACL Configuration
542
Creating a Time Range
542
Configuring a Basic Ipv4 ACL
543
Configuring an Advanced Ipv4 ACL
544
Configuring an Ethernet Frame Header ACL
546
Copying an Ipv4 ACL
547
Displaying and Maintaining Ipv4 Acls
548
3 Ipv6 ACL Configuration
549
Creating a Time Range
549
Configuring a Basic Ipv6 ACL
549
Configuring an Advanced Ipv6 ACL
550
Copying an Ipv6 ACL
552
Displaying and Maintaining Ipv6 Acls
553
4 Acl Application for Packet Filtering
554
Filtering Ipv4 Packets
554
Filtering Ipv6 Packets
554
Acl Application Example
555
Table of Contents
559
1 Logging in to an Ethernet Switch
561
Introduction to User Interface
561
Supported User Interfaces
561
Users and User Interfaces
562
User Interface Number
562
Common Login in to an Ethernet Switch
562
2 Logging in through the Console Port
564
Introduction
564
Setting up the Connection to the Console Port
564
Console Port Login Configuration
566
Common Configuration
567
Console Port Login Configurations for Different Authentication Modes
567
Console Port Login Configuration with Authentication Mode Being None
568
Console Port Login Configuration with Authentication Mode Being Password
570
Console Port Login Configuration with Authentication Mode Being Scheme
572
3 Logging in through Telnet/Ssh
575
Logging in through Telnet
575
Introduction
575
Telnet Connection Establishment
576
Telnet Login Configuration Task List
579
Telnet Configuration with Authentication Mode Being None
579
Telnet Configuration with Authentication Mode Being Password
581
Telnet Configuration with Authentication Mode Being Scheme
582
Logging in through SSH
584
4 Logging in Using Modem
585
Introduction
585
Modem Connection Establishment
585
Configuration on the Administrator Side
587
Configuration on the Switch Side
588
Modem Configuration
588
Switch Configuration
588
Configuration on Switch When the Authentication Mode Is None
588
Configuration on Switch When the Authentication Mode Is Password
588
Configuration on Switch When the Authentication Mode Is Scheme
589
Introduction
590
Web Server Configuration
590
Displaying Web Users
591
6 Logging in through NMS
593
Introduction
593
Connection Establishment Using NMS
593
7 Specifying Source for Telnet Packets
594
Introduction
594
Specifying Source IP Address/Interface for Telnet Packets
594
Displaying the Source IP Address/Interface Specified for Telnet Packets
595
8 Controlling Login Users
596
Introduction
596
Controlling Telnet Users
596
Prerequisites
596
Controlling Telnet Users by Source IP Addresses
596
Controlling Telnet Users by Source and Destination IP Addresses
597
Controlling Telnet Users by Source MAC Addresses
598
Controlling Network Management Users by Source IP Addresses
599
Prerequisites
599
Controlling Web Users by Source IP Addresses
601
Prerequisites
601
Forcing Online Web Users Offline
602
Basic Configurations
603
Basic Configurations
604
Configuration Display
604
Entering System View
605
Exiting the Current View
605
Exiting to User View
605
Configuring the Device Name
606
Configuring the System Clock
606
Enabling/Disabling the Display of Copyright Information
609
Configuring a Banner
610
Configuring CLI Hotkeys
611
Configuring User Privilege Levels and Command Levels
612
Displaying and Maintaining Basic Configurations
618
Cli Features
619
Introduction to CLI
619
Online Help with Command Lines
619
Synchronous Information Output
621
Undo Form of a Command
621
Editing Features
621
Cli Display
622
Saving Commands in the History Buffer
625
Command Line Error Information
626
Table of Contents
627
Configuring the Exception Handling Method
628
Device Management Configuration Task List
628
Device Management Overview
628
Rebooting a Device
629
Configuring the Scheduled Automatic Execution Function
630
Upgrading Device Software
631
Device Software Overview
631
Upgrading the Boot ROM Program through Command Lines
632
Upgrading the Boot File through Command Lines
632
Clearing the 16-Bit Interface Indexes Not Used in the Current System
633
Configuring Temperature Alarm Thresholds for a Device
633
Identifying and Diagnosing Pluggable Transceivers
634
Introduction to Pluggable Transceivers
634
Identifying Pluggable Transceivers
634
Diagnosing Pluggable Transceivers
635
Displaying and Maintaining Device Management Configuration
635
Device Management Configuration Examples
636
Remote Scheduled Automatic Upgrade Configuration Example
636
Advertisement
H3C S5810 Series Quick Start Manual (57 pages)
Brand:
H3C
| Category:
Switch
| Size: 1.37 MB
Table of Contents
Table of Contents
5
Quick Start
1
About this Manual
3
1 Product Overview
7
Overview
7
S5810-50S
8
Front Panel
8
Rear Panel
10
S5810-50S
10
Front Panel
10
Rear Panel
11
Ports
11
Console Port
11
Management Ethernet Port
12
USB Interface
12
10/100/1000Base-T Ethernet Port
12
100/1000Base-X SFP Interface
12
SFP+ Interface
14
Leds
15
System LED
16
Power Module Status Leds
16
Seven-Segment LED
16
Port Mode LED
17
10/100/1000Base-T Auto-Sensing Ethernet Port Status LED
17
100/1000Base-X SFP Interface Status LED
18
SFP+ Interface Status LED
19
Management Ethernet Port Status LED
19
Pluggable Power Modules
19
AC Power Module
20
DC Power Module
20
Ventilation System
20
2 Installation Preparations
23
Safety Precautions
23
Installation Site
23
Temperature/Humidity
23
Cleanness
24
Electromagnetic Susceptibility
24
Laser Safety
24
Installation Tools
25
3 Installing a Switch
26
Installing the Switch into a 19-Inch Rack Using Mounting Brackets
26
Introduction to Mounting Brackets
26
Attaching the Mounting Brackets to a Switch
26
Mounting the Switch to a Rack
27
Mounting the Switch on a Workbench
28
Connecting the Ground Wire
29
Installing a Power Module
31
Verifying the Installation
31
4 Initial Power
32
Setting up the Configuration Environment
32
Connecting the Console Cable
32
Console Cable
32
Connection Procedure
32
Setting Terminal Parameters
33
Booting the Switch
36
Checking before Power
36
Powering on the Switch
36
Changing the Boot Mode
39
5 Maintenance and Troubleshooting
41
Software Loading Failure
41
Password Loss
41
User Password Loss
41
Boot ROM Password Loss
41
Power Supply Failure
42
Fan Tray Failure
42
Configuration Terminal Failure
42
H3C S5810 Series Quick Start (4 pages)
Brand:
H3C
| Category:
Switch
| Size: 0.05 MB
Advertisement
Advertisement
Related Products
H3C S5810-50S
H3C S5810-50S-DC
H3C S5800-32C
H3C S5800-56C
H3C S5830V2 series
H3C S5820V2 series
H3C S5800-32C-PWR
H3C S5820V2-48S
H3C S5830V2-24S
H3C S5820V2-52QF
H3C Categories
Switch
Network Router
Wireless Access Point
Control Unit
Gateway
More H3C Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL