HP 4500G Family Manuals

Manuals and User Guides for HP 4500G Family. We have 1 HP 4500G Family manual available for free PDF download: Configuration Manual

HP 4500G Family Configuration Manual

HP 4500G Family Configuration Manual (1207 pages)

Switch 4500G Family  
Brand: HP | Category: Switch | Size: 13.18 MB
Table of contents
Configuration Guide1................................................................................................................................................................
About This Manual3................................................................................................................................................................
Table Of Contents6................................................................................................................................................................
Product Features9................................................................................................................................................................
Introduction To Product9................................................................................................................................................................
Feature Lists9................................................................................................................................................................
Access Volume11................................................................................................................................................................
Ip Services Volume13................................................................................................................................................................
Ip Routing Volume14................................................................................................................................................................
Qos Volume15................................................................................................................................................................
Multicast Volume15................................................................................................................................................................
Security Volume16................................................................................................................................................................
High Availability Volume17................................................................................................................................................................
System Volume18................................................................................................................................................................
Manual Version34................................................................................................................................................................
Ethernet Port Configuration38................................................................................................................................................................
Configuring An Auto-negotiation Transmission Rate39................................................................................................................................................................
Configuring Flow Control On An Ethernet Port40................................................................................................................................................................
Configuring The Suppression Time Of Physical-link-state Change On An Ethernet Port41................................................................................................................................................................
Configuring Loopback Testing On An Ethernet Port41................................................................................................................................................................
Configuring A Port Group42................................................................................................................................................................
Configuring Storm Suppression42................................................................................................................................................................
Setting The Interval For Collecting Ethernet Port Statistics43................................................................................................................................................................
Enabling Forwarding Of Jumbo Frames44................................................................................................................................................................
Enabling Loopback Detection On An Ethernet Port44................................................................................................................................................................
Configuring The Mdi Mode For An Ethernet Port45................................................................................................................................................................
Testing The Cable On An Ethernet Port46................................................................................................................................................................
Configuring The Storm Constrain Function On An Ethernet Port46................................................................................................................................................................
Displaying And Maintaining An Ethernet Port48................................................................................................................................................................
Ethernet Link Aggregation Configuration51................................................................................................................................................................
Aggregating Links In Static Mode55................................................................................................................................................................
Aggregating Links In Dynamic Mode57................................................................................................................................................................
Load Sharing Criteria For Link Aggregation Groups58................................................................................................................................................................
Ethernet Link Aggregation Configuration Task List59................................................................................................................................................................
Configuring An Aggregation Group59................................................................................................................................................................
Configuration Guidelines59................................................................................................................................................................
Configuring A Static Aggregation Group60................................................................................................................................................................
Configuring A Dynamic Aggregation Group60................................................................................................................................................................
Configuring An Aggregate Interface61................................................................................................................................................................
Configuring The Description Of An Aggregate Interface61................................................................................................................................................................
Enabling Link State Trapping For An Aggregate Interface62................................................................................................................................................................
Shutting Down An Aggregate Interface62................................................................................................................................................................
Configuring Load Sharing For Link Aggregation Groups62................................................................................................................................................................
Configuring Load Sharing Criteria For Link Aggregation Groups62................................................................................................................................................................
Displaying And Maintaining Ethernet Link Aggregation64................................................................................................................................................................
Ethernet Link Aggregation Configuration Examples64................................................................................................................................................................
Static Aggregation Configuration Example65................................................................................................................................................................
Dynamic Aggregation Configuration Example67................................................................................................................................................................
Aggregation Load Sharing Configuration Example69................................................................................................................................................................
Port Isolation Configuration73................................................................................................................................................................
Introduction To Port Isolation73................................................................................................................................................................
Configuring The Isolation Group73................................................................................................................................................................
Assigning A Port To The Isolation Group73................................................................................................................................................................
Port Isolation Configuration Example74................................................................................................................................................................
Displaying And Maintaining Isolation Groups74................................................................................................................................................................
Mstp Configuration77................................................................................................................................................................
Introduction To Stp77................................................................................................................................................................
Why Stp77................................................................................................................................................................
Protocol Packets Of Stp78................................................................................................................................................................
Basic Concepts In Stp78................................................................................................................................................................
How Stp Works79................................................................................................................................................................
Introduction To Rstp85................................................................................................................................................................
Introduction To Mstp86................................................................................................................................................................
Why Mstp86................................................................................................................................................................
Basic Concepts In Mstp87................................................................................................................................................................
How Mstp Works90................................................................................................................................................................
Implementation Of Mstp On Devices91................................................................................................................................................................
Mstp Configuration Task List91................................................................................................................................................................
Configuring Mstp93................................................................................................................................................................
Configuring An Mst Region93................................................................................................................................................................
Configuring The Root Bridge Or A Secondary Root Bridge94................................................................................................................................................................
Configuring The Work Mode Of An Mstp Device95................................................................................................................................................................
Configuring The Priority Of A Device95................................................................................................................................................................
Configuring The Maximum Hops Of An Mst Region96................................................................................................................................................................
Configuring The Network Diameter Of A Switched Network96................................................................................................................................................................
Configuring Timers Of Mstp97................................................................................................................................................................
Configuring The Timeout Factor98................................................................................................................................................................
Configuring The Maximum Port Rate99................................................................................................................................................................
Configuring Ports As Edge Ports99................................................................................................................................................................
Configuring Path Costs Of Ports100................................................................................................................................................................
Configuring Port Priority102................................................................................................................................................................
Configuring The Link Type Of Ports103................................................................................................................................................................
Configuring The Mode A Port Uses To Recognize/send Mstp Packets103................................................................................................................................................................
Enabling The Output Of Port State Transition Information104................................................................................................................................................................
Enabling The Mstp Feature105................................................................................................................................................................
Performing Mcheck105................................................................................................................................................................
Configuring Digest Snooping106................................................................................................................................................................
Configuring No Agreement Check108................................................................................................................................................................
Configuring Protection Functions110................................................................................................................................................................
Displaying And Maintaining Mstp114................................................................................................................................................................
Mstp Configuration Example114................................................................................................................................................................
Lldp Configuration120................................................................................................................................................................
How Lldp Works124................................................................................................................................................................
Lldp Configuration Task List125................................................................................................................................................................
Performing Basic Lldp Configuration126................................................................................................................................................................
Enabling Lldp126................................................................................................................................................................
Setting Lldp Operating Mode126................................................................................................................................................................
Setting The Lldp Re-initialization Delay127................................................................................................................................................................
Enabling Lldp Polling127................................................................................................................................................................
Configuring The Tlvs To Be Advertised127................................................................................................................................................................
Configuring The Management Address And Its Encoding Format128................................................................................................................................................................
Setting Other Lldp Parameters129................................................................................................................................................................
Setting An Encapsulation Format For Lldpdus129................................................................................................................................................................
Configuring Cdp Compatibility130................................................................................................................................................................
Configuring Lldp Trapping131................................................................................................................................................................
Displaying And Maintaining Lldp132................................................................................................................................................................
Lldp Configuration Examples132................................................................................................................................................................
Basic Lldp Configuration Example132................................................................................................................................................................
Configuration Procedure133................................................................................................................................................................
Cdp-compatible Lldp Configuration Example135................................................................................................................................................................
Vlan Configuration138................................................................................................................................................................
Introduction To Vlan138................................................................................................................................................................
Vlan Overview138................................................................................................................................................................
Vlan Fundamentals139................................................................................................................................................................
Types Of Vlan140................................................................................................................................................................
Configuring Basic Vlan Settings140................................................................................................................................................................
Configuring Basic Settings Of A Vlan Interface141................................................................................................................................................................
Port-based Vlan Configuration142................................................................................................................................................................
Introduction To Port-based Vlan142................................................................................................................................................................
Assigning An Access Port To A Vlan144................................................................................................................................................................
Assigning A Trunk Port To A Vlan145................................................................................................................................................................
Assigning A Hybrid Port To A Vlan146................................................................................................................................................................
Mac-based Vlan Configuration148................................................................................................................................................................
Introduction To Mac-based Vlan148................................................................................................................................................................
Configuring A Mac Address-based Vlan148................................................................................................................................................................
Protocol-based Vlan Configuration149................................................................................................................................................................
Introduction To Protocol-based Vlan149................................................................................................................................................................
Configuring A Protocol-based Vlan150................................................................................................................................................................
Ip Subnet-based Vlan Configuration152................................................................................................................................................................
Configuring An Ip Subnet-based Vlan152................................................................................................................................................................
Displaying And Maintaining Vlan153................................................................................................................................................................
Vlan Configuration Example153................................................................................................................................................................
Isolate-user-vlan Configuration156................................................................................................................................................................
Configuring Isolate-user-vlan156................................................................................................................................................................
Displaying And Maintaining Isolate-user-vlan158................................................................................................................................................................
Isolate-user-vlan Configuration Example158................................................................................................................................................................
Voice Vlan Configuration161................................................................................................................................................................
Oui Addresses161................................................................................................................................................................
Voice Vlan Assignment Modes162................................................................................................................................................................
Security Mode And Normal Mode Of Voice Vlans164................................................................................................................................................................
Configuring A Voice Vlan165................................................................................................................................................................
Setting A Port To Operate In Automatic Voice Vlan Assignment Mode165................................................................................................................................................................
Setting A Port To Operate In Manual Voice Vlan Assignment Mode166................................................................................................................................................................
Displaying And Maintaining Voice Vlan167................................................................................................................................................................
Voice Vlan Configuration Examples167................................................................................................................................................................
Automatic Voice Vlan Mode Configuration Example167................................................................................................................................................................
Manual Voice Vlan Assignment Mode Configuration Example169................................................................................................................................................................
Gvrp Configuration173................................................................................................................................................................
Introduction To Gvrp173................................................................................................................................................................
Gvrp Configuration Task List176................................................................................................................................................................
Configuring Gvrp Functions176................................................................................................................................................................
Configuring Garp Timers177................................................................................................................................................................
Displaying And Maintaining Gvrp178................................................................................................................................................................
Gvrp Configuration Examples179................................................................................................................................................................
Gvrp Configuration Example I179................................................................................................................................................................
Gvrp Configuration Example Ii180................................................................................................................................................................
Gvrp Configuration Example Iii181................................................................................................................................................................
Qinq Configuration184................................................................................................................................................................
Introduction To Qinq184................................................................................................................................................................
Background And Benefits184................................................................................................................................................................
How Qinq Works185................................................................................................................................................................
Qinq Frame Structure185................................................................................................................................................................
Implementations Of Qinq186................................................................................................................................................................
Modifying The Tpid In A Vlan Tag186................................................................................................................................................................
Configuring Basic Qinq188................................................................................................................................................................
Configuring Selective Qinq188................................................................................................................................................................
Qinq Configuration Task List188................................................................................................................................................................
Enabling Basic Qinq188................................................................................................................................................................
Configuring An Outer Vlan Tagging Policy188................................................................................................................................................................
Configuring The Tpid Value In Vlan Tags189................................................................................................................................................................
Qinq Configuration Examples189................................................................................................................................................................
Basic Qinq Configuration Example189................................................................................................................................................................
Comprehensive Selective Qinq Configuration Example192................................................................................................................................................................
Introduction To Bpdu Tunneling196................................................................................................................................................................
Bpdu Tunneling Configuration196................................................................................................................................................................
Bpdu Tunneling Implementation197................................................................................................................................................................
Configuring Bpdu Tunneling199................................................................................................................................................................
Enabling Bpdu Tunneling199................................................................................................................................................................
Configuring Destination Multicast Mac Address For Bpdus200................................................................................................................................................................
Bpdu Tunneling Configuration Examples200................................................................................................................................................................
Bpdu Tunneling For Stp Configuration Example200................................................................................................................................................................
Bpdu Tunneling For Pvst Configuration Example201................................................................................................................................................................
Port Mirroring Configuration204................................................................................................................................................................
Introduction To Port Mirroring204................................................................................................................................................................
Classification Of Port Mirroring204................................................................................................................................................................
Implementing Port Mirroring204................................................................................................................................................................
Configuring Local Port Mirroring206................................................................................................................................................................
Configuring Remote Port Mirroring207................................................................................................................................................................
Configuring A Remote Source Mirroring Group (on The Source Device)207................................................................................................................................................................
Configuring A Remote Destination Mirroring Group (on The Destination Device)209................................................................................................................................................................
Displaying And Maintaining Port Mirroring210................................................................................................................................................................
Port Mirroring Configuration Examples210................................................................................................................................................................
Local Port Mirroring Configuration Example210................................................................................................................................................................
Remote Port Mirroring Configuration Example211................................................................................................................................................................
Configuring Traffic Mirroring214................................................................................................................................................................
Traffic Mirroring Configuration214................................................................................................................................................................
Traffic Mirroring Overview214................................................................................................................................................................
Mirroring Traffic To An Interface214................................................................................................................................................................
Mirroring Traffic To The Cpu215................................................................................................................................................................
Applying A Qos Policy216................................................................................................................................................................
Displaying And Maintaining Traffic Mirroring217................................................................................................................................................................
Traffic Mirroring Configuration Examples217................................................................................................................................................................
Ip Addressing Overview222................................................................................................................................................................
Ip Addressing Configuration222................................................................................................................................................................
Ip Address Classes222................................................................................................................................................................
Special Ip Addresses223................................................................................................................................................................
Subnetting And Masking223................................................................................................................................................................
Configuring Ip Addresses224................................................................................................................................................................
Assigning An Ip Address To An Interface224................................................................................................................................................................
Ip Addressing Configuration Example225................................................................................................................................................................
Displaying And Maintaining Ip Addressing226................................................................................................................................................................
Arp Configuration228................................................................................................................................................................
Arp Overview228................................................................................................................................................................
Arp Function228................................................................................................................................................................
Arp Message Format229................................................................................................................................................................
Arp Address Resolution Process229................................................................................................................................................................
Arp Table230................................................................................................................................................................
Configuring Arp231................................................................................................................................................................
Configuring A Static Arp Entry231................................................................................................................................................................
Configuring The Maximum Number Of Arp Entries For An Interface231................................................................................................................................................................
Enabling The Arp Entry Check232................................................................................................................................................................
Setting The Aging Time For Dynamic Arp Entries232................................................................................................................................................................
Configuring Arp Quick Notify232................................................................................................................................................................
Arp Configuration Example233................................................................................................................................................................
Configuring Gratuitous Arp234................................................................................................................................................................
Displaying And Maintaining Arp234................................................................................................................................................................
Introduction To Gratuitous Arp234................................................................................................................................................................
Proxy Arp Configuration236................................................................................................................................................................
Proxy Arp Overview236................................................................................................................................................................
Proxy Arp236................................................................................................................................................................
Enabling Proxy Arp237................................................................................................................................................................
Local Proxy Arp237................................................................................................................................................................
Displaying And Maintaining Proxy Arp238................................................................................................................................................................
Proxy Arp Configuration Examples238................................................................................................................................................................
Proxy Arp Configuration Example238................................................................................................................................................................
Local Proxy Arp Configuration Example In Case Of Port Isolation239................................................................................................................................................................
Local Proxy Arp Configuration Example In Isolate-user-vlan240................................................................................................................................................................
Dhcp Overview244................................................................................................................................................................
Introduction To Dhcp244................................................................................................................................................................
Dhcp Address Allocation245................................................................................................................................................................
Allocation Mechanisms245................................................................................................................................................................
Dynamic Ip Address Allocation Process245................................................................................................................................................................
Ip Address Lease Extension246................................................................................................................................................................
Dhcp Message Format246................................................................................................................................................................
Dhcp Options247................................................................................................................................................................
Dhcp Options Overview247................................................................................................................................................................
Introduction To Dhcp Options247................................................................................................................................................................
Self-defined Options248................................................................................................................................................................
Protocols And Standards251................................................................................................................................................................
Dhcp Relay Agent Configuration252................................................................................................................................................................
Introduction To Dhcp Relay Agent252................................................................................................................................................................
Dhcp Relay Agent Support For Option253................................................................................................................................................................
Dhcp Relay Agent Configuration Task List254................................................................................................................................................................
Configuring The Dhcp Relay Agent254................................................................................................................................................................
Enabling Dhcp254................................................................................................................................................................
Enabling The Dhcp Relay Agent On An Interface255................................................................................................................................................................
Correlating A Dhcp Server Group With A Relay Agent Interface255................................................................................................................................................................
Configuring The Dhcp Relay Agent Security Functions256................................................................................................................................................................
Configuring The Dhcp Relay Agent To Send A Dhcp-release Request258................................................................................................................................................................
Configuring The Dhcp Relay Agent To Support Option258................................................................................................................................................................
Displaying And Maintaining Dhcp Relay Agent Configuration260................................................................................................................................................................
Dhcp Relay Agent Configuration Examples260................................................................................................................................................................
Dhcp Relay Agent Configuration Example260................................................................................................................................................................
Dhcp Relay Agent Option 82 Support Configuration Example261................................................................................................................................................................
Troubleshooting Dhcp Relay Agent Configuration262................................................................................................................................................................
Dhcp Client Configuration263................................................................................................................................................................
Introduction To Dhcp Client263................................................................................................................................................................
Enabling The Dhcp Client On An Interface263................................................................................................................................................................
Displaying And Maintaining The Dhcp Client264................................................................................................................................................................
Dhcp Client Configuration Example264................................................................................................................................................................
Dhcp Snooping Configuration266................................................................................................................................................................
Dhcp Snooping Overview266................................................................................................................................................................
Function Of Dhcp Snooping266................................................................................................................................................................
Application Environment Of Trusted Ports267................................................................................................................................................................
Dhcp Snooping Support For Option268................................................................................................................................................................
Configuring Dhcp Snooping Basic Functions269................................................................................................................................................................
Configuring Dhcp Snooping To Support Option 82270................................................................................................................................................................
Displaying And Maintaining Dhcp Snooping272................................................................................................................................................................
Dhcp Snooping Configuration Examples272................................................................................................................................................................
Dhcp Snooping Configuration Example272................................................................................................................................................................
Dhcp Snooping Option 82 Support Configuration Example273................................................................................................................................................................
Bootp Client Configuration274................................................................................................................................................................
Introduction To Bootp Client274................................................................................................................................................................
Bootp Application274................................................................................................................................................................
Configuring An Interface To Dynamically Obtain An Ip Address Through Bootp275................................................................................................................................................................
Obtaining An Ip Address Dynamically275................................................................................................................................................................
Displaying And Maintaining Bootp Client Configuration276................................................................................................................................................................
Bootp Client Configuration Example276................................................................................................................................................................
Dns Configuration278................................................................................................................................................................
Dns Overview278................................................................................................................................................................
Static Domain Name Resolution278................................................................................................................................................................
Dynamic Domain Name Resolution278................................................................................................................................................................
Dns Proxy280................................................................................................................................................................
Configuring The Dns Client281................................................................................................................................................................
Configuring Static Domain Name Resolution281................................................................................................................................................................
Configuring Dynamic Domain Name Resolution281................................................................................................................................................................
Configuring The Dns Proxy282................................................................................................................................................................
Displaying And Maintaining Dns282................................................................................................................................................................
Dns Configuration Examples282................................................................................................................................................................
Static Domain Name Resolution Configuration Example282................................................................................................................................................................
Dynamic Domain Name Resolution Configuration Example283................................................................................................................................................................
Dns Proxy Configuration Example286................................................................................................................................................................
Troubleshooting Dns Configuration287................................................................................................................................................................
Ip Performance Overview289................................................................................................................................................................
Enabling Reception And Forwarding Of Directed Broadcasts To A Directly Connected Network289................................................................................................................................................................
Ip Performance Optimization Configuration289................................................................................................................................................................
Enabling Forwarding Of Directed Broadcasts To A Directly Connected Network290................................................................................................................................................................
Configuring Tcp Optional Parameters291................................................................................................................................................................
Configuring Icmp To Send Error Packets292................................................................................................................................................................
Displaying And Maintaining Ip Performance Optimization294................................................................................................................................................................
Udp Helper Configuration296................................................................................................................................................................
Introduction To Udp Helper296................................................................................................................................................................
Configuring Udp Helper296................................................................................................................................................................
Displaying And Maintaining Udp Helper297................................................................................................................................................................
Udp Helper Configuration Examples297................................................................................................................................................................
Udp Helper Configuration Example297................................................................................................................................................................
Ipv6 Overview300................................................................................................................................................................
Ipv6 Basics Configuration300................................................................................................................................................................
Ipv6 Features300................................................................................................................................................................
Introduction To Ipv6 Address302................................................................................................................................................................
Introduction To Ipv6 Neighbor Discovery Protocol304................................................................................................................................................................
Ipv6 Pmtu Discovery307................................................................................................................................................................
Ipv6 Basics Configuration Task List308................................................................................................................................................................
Introduction To Ipv6 Dns308................................................................................................................................................................
Configuring Basic Ipv6 Functions309................................................................................................................................................................
Enabling Ipv309................................................................................................................................................................
Configuring An Ipv6 Unicast Address309................................................................................................................................................................
Configuring Ipv6 Ndp310................................................................................................................................................................
Configuring A Static Neighbor Entry310................................................................................................................................................................
Configuring The Maximum Number Of Neighbors Dynamically Learned311................................................................................................................................................................
Configuring Parameters Related To Ra Messages311................................................................................................................................................................
Configuring Pmtu Discovery314................................................................................................................................................................
Configuring The Maximum Number Of Attempts To Send An Ns Message For Dad314................................................................................................................................................................
Configuring A Static Pmtu For A Specified Ipv6 Address314................................................................................................................................................................
Configuring The Aging Time For Dynamic Pmtus314................................................................................................................................................................
Configuring Ipv6 Tcp Properties315................................................................................................................................................................
Configuring Icmpv6 Packet Sending315................................................................................................................................................................
Configuring The Maximum Icmpv6 Error Packets Sent In An Interval315................................................................................................................................................................
Enable Sending Of Multicast Echo Replies316................................................................................................................................................................
Enabling Sending Of Icmpv6 Time Exceeded Packets316................................................................................................................................................................
Configuring Ipv6 Dns Client317................................................................................................................................................................
Configuring Static Ipv6 Domain Name Resolution317................................................................................................................................................................
Configuring Dynamic Ipv6 Domain Name Resolution317................................................................................................................................................................
Displaying And Maintaining Ipv6 Basics Configuration318................................................................................................................................................................
Ipv6 Configuration Example319................................................................................................................................................................
Troubleshooting Ipv6 Basics Configuration324................................................................................................................................................................
Dual Stack Overview326................................................................................................................................................................
Configuring Dual Stack326................................................................................................................................................................
Dual Stack Configuration326................................................................................................................................................................
Sflow Configuration329................................................................................................................................................................
Sflow Overview329................................................................................................................................................................
Introduction To Sflow329................................................................................................................................................................
Operation Of Sflow329................................................................................................................................................................
Configuring Sflow330................................................................................................................................................................
Displaying And Maintaining Sflow330................................................................................................................................................................
Sflow Configuration Example331................................................................................................................................................................
Troubleshooting Sflow Configuration332................................................................................................................................................................
The Remote Sflow Collector Cannot Receive Sflow Packets332................................................................................................................................................................
Ip Routing Overview335................................................................................................................................................................
Routing Protocol Overview337................................................................................................................................................................
Static Routing And Dynamic Routing337................................................................................................................................................................
Routing Protocols And Routing Priority337................................................................................................................................................................
Displaying And Maintaining A Routing Table338................................................................................................................................................................
Static Routing Configuration341................................................................................................................................................................
Static Route341................................................................................................................................................................
Default Route341................................................................................................................................................................
Configuring A Static Route342................................................................................................................................................................
Application Environment Of Static Routing342................................................................................................................................................................
Detecting Reachability Of The Static Route's Nexthop343................................................................................................................................................................
Detecting Nexthop Reachability Through Track343................................................................................................................................................................
Displaying And Maintaining Static Routes344................................................................................................................................................................
Static Route Configuration Example345................................................................................................................................................................
Basic Static Route Configuration Example345................................................................................................................................................................
Rip Configuration349................................................................................................................................................................
Rip Overview349................................................................................................................................................................
Operation Of Rip349................................................................................................................................................................
Rip Version350................................................................................................................................................................
Rip Message Format351................................................................................................................................................................
Configuring Rip Basic Functions353................................................................................................................................................................
Supported Rip Features353................................................................................................................................................................
Configuring Rip Route Control355................................................................................................................................................................
Configuring Ripv2 Route Summarization356................................................................................................................................................................
Disabling Host Route Reception357................................................................................................................................................................
Configuring Inbound/outbound Route Filtering358................................................................................................................................................................
Configuring Rip Network Optimization359................................................................................................................................................................
Configuring A Priority For Rip359................................................................................................................................................................
Configuring Rip Timers360................................................................................................................................................................
Enabling Zero Field Check On Incoming Ripv1 Messages361................................................................................................................................................................
Enabling Source Ip Address Check On Incoming Rip Updates361................................................................................................................................................................
Configuring Ripv2 Message Authentication362................................................................................................................................................................
Specifying A Rip Neighbor362................................................................................................................................................................
Displaying And Maintaining Rip363................................................................................................................................................................
Configuring Rip-to-mib Binding363................................................................................................................................................................
Configuring The Rip Packet Sending Rate363................................................................................................................................................................
Rip Configuration Examples364................................................................................................................................................................
Configuring Rip Version364................................................................................................................................................................
Configuring An Additional Metric For A Rip Interface368................................................................................................................................................................
Troubleshooting Rip369................................................................................................................................................................
Route Oscillation Occurred370................................................................................................................................................................
Ipv6 Static Routing Configuration372................................................................................................................................................................
Introduction To Ipv6 Static Routing372................................................................................................................................................................
Configuring An Ipv6 Static Route372................................................................................................................................................................
Displaying And Maintaining Ipv6 Static Routes373................................................................................................................................................................
Ipv6 Static Routing Configuration Example373................................................................................................................................................................
Ripng Configuration377................................................................................................................................................................
Introduction To Ripng377................................................................................................................................................................
Ripng Working Mechanism377................................................................................................................................................................
Ripng Packet Format378................................................................................................................................................................
Configuring Ripng Basic Functions379................................................................................................................................................................
Ripng Packet Processing Procedure379................................................................................................................................................................
Configuring Ripng Route Control380................................................................................................................................................................
Configuring Ripng Route Summarization381................................................................................................................................................................
Configuring A Ripng Route Filtering Policy382................................................................................................................................................................
Configuring A Priority For Ripng382................................................................................................................................................................
Configuring Ripng Route Redistribution382................................................................................................................................................................
Tuning And Optimizing The Ripng Network383................................................................................................................................................................
Configuring Ripng Timers383................................................................................................................................................................
Configuring Zero Field Check On Ripng Packets384................................................................................................................................................................
Displaying And Maintaining Ripng385................................................................................................................................................................
Ripng Configuration Example385................................................................................................................................................................
Configure Ripng Basic Functions385................................................................................................................................................................
Route Policy Configuration389................................................................................................................................................................
Introduction To Route Policy389................................................................................................................................................................
Route Policy Application389................................................................................................................................................................
Route Policy Implementation389................................................................................................................................................................
Route Policy Configuration Task List390................................................................................................................................................................
Defining Filters391................................................................................................................................................................
Defining An Ip-prefix List391................................................................................................................................................................
Configuring A Route Policy392................................................................................................................................................................
Creating A Route Policy393................................................................................................................................................................
Defining If-match Clauses393................................................................................................................................................................
Defining Apply Clauses394................................................................................................................................................................
Displaying And Maintaining The Route Policy395................................................................................................................................................................
Route Policy Configuration Example395................................................................................................................................................................
Applying A Route Policy To Ipv4 Route Redistribution395................................................................................................................................................................
Applying A Route Policy To Ipv6 Route Redistribution397................................................................................................................................................................
Troubleshooting Route Policy Configuration398................................................................................................................................................................
Ipv4 Routing Information Filtering Failure398................................................................................................................................................................
Ipv6 Routing Information Filtering Failure399................................................................................................................................................................
Multicast Overview402................................................................................................................................................................
Introduction To Multicast402................................................................................................................................................................
Features Of Multicast405................................................................................................................................................................
Multicast Models406................................................................................................................................................................
Common Notations In Multicast406................................................................................................................................................................
Advantages And Applications Of Multicast406................................................................................................................................................................
Multicast Architecture407................................................................................................................................................................
Multicast Addresses408................................................................................................................................................................
Multicast Protocols412................................................................................................................................................................
Multicast Packet Forwarding Mechanism414................................................................................................................................................................
Igmp Snooping Configuration416................................................................................................................................................................
Igmp Snooping Overview416................................................................................................................................................................
Principle Of Igmp Snooping416................................................................................................................................................................
Basic Concepts In Igmp Snooping417................................................................................................................................................................
How Igmp Snooping Works418................................................................................................................................................................
Igmp Snooping Configuration Task List420................................................................................................................................................................
Configuring Basic Functions Of Igmp Snooping421................................................................................................................................................................
Enabling Igmp Snooping421................................................................................................................................................................
Configuring Igmp Snooping Port Functions422................................................................................................................................................................
Configuring The Version Of Igmp Snooping422................................................................................................................................................................
Configuring Simulated Joining424................................................................................................................................................................
Configuring Igmp Snooping Querier426................................................................................................................................................................
Enabling Igmp Snooping Querier426................................................................................................................................................................
Configuring Igmp Queries And Responses427................................................................................................................................................................
Configuring An Igmp Snooping Policy428................................................................................................................................................................
Configuring Source Ip Address Of Igmp Queries428................................................................................................................................................................
Configuring A Multicast Group Filter429................................................................................................................................................................
Configuring Multicast Source Port Filtering429................................................................................................................................................................
Configuring The Function Of Dropping Unknown Multicast Data430................................................................................................................................................................
Configuring Igmp Report Suppression431................................................................................................................................................................
Configuring Multicast Group Replacement432................................................................................................................................................................
Displaying And Maintaining Igmp Snooping433................................................................................................................................................................
Igmp Snooping Configuration Examples434................................................................................................................................................................
Configuring Group Policy And Simulated Joining434................................................................................................................................................................
Network Diagram437................................................................................................................................................................
Igmp Snooping Querier Configuration440................................................................................................................................................................
Troubleshooting Igmp Snooping Configuration442................................................................................................................................................................
Multicast Vlan Configuration444................................................................................................................................................................
Introduction To Multicast Vlan444................................................................................................................................................................
Multicast Vlan Configuration Task List446................................................................................................................................................................
Configuring Port-based Multicast Vlan447................................................................................................................................................................
Configuring Multicast Vlan Ports448................................................................................................................................................................
Displaying And Maintaining Multicast Vlan449................................................................................................................................................................
Multicast Vlan Configuration Examples449................................................................................................................................................................
Sub-vlan-based Multicast Vlan Configuration449................................................................................................................................................................
Port-based Multicast Vlan Configuration453................................................................................................................................................................
Mld Snooping Configuration457................................................................................................................................................................
Mld Snooping Overview457................................................................................................................................................................
Introduction To Mld Snooping457................................................................................................................................................................
Basic Concepts In Mld Snooping458................................................................................................................................................................
How Mld Snooping Works459................................................................................................................................................................
Mld Snooping Configuration Task List461................................................................................................................................................................
Configuring Basic Functions Of Mld Snooping462................................................................................................................................................................
Enabling Mld Snooping462................................................................................................................................................................
Configuring Mld Snooping Port Functions463................................................................................................................................................................
Configuring The Version Of Mld Snooping463................................................................................................................................................................
Configuring Mld Snooping Querier467................................................................................................................................................................
Enabling Mld Snooping Querier467................................................................................................................................................................
Configuring Mld Queries And Responses468................................................................................................................................................................
Configuring Source Ipv6 Addresses Of Mld Queries469................................................................................................................................................................
Configuring An Mld Snooping Policy470................................................................................................................................................................
Configuring An Ipv6 Multicast Group Filter470................................................................................................................................................................
Configuring Ipv6 Multicast Source Port Filtering471................................................................................................................................................................
Configuring Mld Report Suppression472................................................................................................................................................................
Configuring Ipv6 Multicast Group Replacement473................................................................................................................................................................
Displaying And Maintaining Mld Snooping474................................................................................................................................................................
Mld Snooping Configuration Examples475................................................................................................................................................................
Configuring Ipv6 Group Policy And Simulated Joining475................................................................................................................................................................
Mld Snooping Querier Configuration481................................................................................................................................................................
Troubleshooting Mld Snooping482................................................................................................................................................................
Configured Ipv6 Multicast Group Policy Fails To Take Effect483................................................................................................................................................................
Introduction To Ipv6 Multicast Vlan485................................................................................................................................................................
Ipv6 Multicast Vlan Configuration485................................................................................................................................................................
Ipv6 Multicast Vlan Configuration Task List487................................................................................................................................................................
Configuring Ipv6 Sub-vlan-based Ipv6 Multicast Vlan487................................................................................................................................................................
Configuring Sub-vlan-based Ipv6 Multicast Vlan487................................................................................................................................................................
Configuring Port-based Ipv6 Multicast Vlan488................................................................................................................................................................
Configuring Ipv6 Multicast Vlan Ports489................................................................................................................................................................
Displaying And Maintaining Ipv6 Multicast Vlan490................................................................................................................................................................
Ipv6 Multicast Vlan Configuration Examples490................................................................................................................................................................
Sub-vlan-based Multicast Vlan Configuration Example490................................................................................................................................................................
Port-based Multicast Vlan Configuration Example493................................................................................................................................................................
Qos Overview500................................................................................................................................................................
Introduction To Qos500................................................................................................................................................................
Introduction To Qos Service Models500................................................................................................................................................................
Best-effort Service Model500................................................................................................................................................................
Intserv Service Model500................................................................................................................................................................
Diffserv Service Model501................................................................................................................................................................
Qos Techniques Overview501................................................................................................................................................................
Positions Of The Qos Techniques In A Network501................................................................................................................................................................
Qos Configuration Approaches503................................................................................................................................................................
Qos Configuration Approach Overview503................................................................................................................................................................
Non Policy-based Configuration503................................................................................................................................................................
Policy-based Configuration503................................................................................................................................................................
Configuring A Qos Policy504................................................................................................................................................................
Defining A Class504................................................................................................................................................................
Defining A Traffic Behavior506................................................................................................................................................................
Defining A Policy506................................................................................................................................................................
Applying The Qos Policy507................................................................................................................................................................
Displaying And Maintaining Qos Policies510................................................................................................................................................................
Priority Mapping Overview511................................................................................................................................................................
Priority Mapping Configuration511................................................................................................................................................................
Introduction To Priority Mapping511................................................................................................................................................................
Priority Mapping Tables511................................................................................................................................................................
Priority Trust Mode On A Port512................................................................................................................................................................
Priority Mapping Procedure512................................................................................................................................................................
Priority Mapping Configuration Tasks513................................................................................................................................................................
Configuring Priority Mapping514................................................................................................................................................................
Configuring A Priority Mapping Table514................................................................................................................................................................
Configuring The Priority Trust Mode On A Port514................................................................................................................................................................
Displaying And Maintaining Priority Mapping515................................................................................................................................................................
Configuring The Port Priority Of A Port515................................................................................................................................................................
Priority Mapping Configuration Examples515................................................................................................................................................................
Priority Mapping Table And Priority Marking Configuration Example515................................................................................................................................................................
Traffic Policing And Line Rate Configuration519................................................................................................................................................................
Traffic Policing And Line Rate Overview519................................................................................................................................................................
Traffic Evaluation And Token Buckets519................................................................................................................................................................
Traffic Policing520................................................................................................................................................................
Line Rate521................................................................................................................................................................
Configuring Traffic Policing521................................................................................................................................................................
Configuration Example522................................................................................................................................................................
Configuring The Line Rate523................................................................................................................................................................
Displaying And Maintaining Traffic Policing, Gts, And Line Rate523................................................................................................................................................................
Congestion Management Configuration524................................................................................................................................................................
Congestion Management Overview524................................................................................................................................................................
Causes, Impacts, And Countermeasures Of Congestion524................................................................................................................................................................
Congestion Management Policies524................................................................................................................................................................
Congestion Management Configuration Approaches527................................................................................................................................................................
Configuring Congestion Management528................................................................................................................................................................
Configuring Sp Queuing528................................................................................................................................................................
Configure Wrr Queuing528................................................................................................................................................................
Configuring Wfq Queuing529................................................................................................................................................................
Configuring Sp+wrr Queues530................................................................................................................................................................
Displaying And Maintaining Congestion Management532................................................................................................................................................................
Traffic Filtering Configuration533................................................................................................................................................................
Traffic Filtering Overview533................................................................................................................................................................
Configuring Traffic Filtering533................................................................................................................................................................
Traffic Filtering Configuration Example534................................................................................................................................................................
Configuring Priority Marking536................................................................................................................................................................
Priority Marking Configuration536................................................................................................................................................................
Priority Marking Overview536................................................................................................................................................................
Priority Marking Configuration Example537................................................................................................................................................................
Traffic Redirecting Configuration540................................................................................................................................................................
Traffic Redirecting Overview540................................................................................................................................................................
Traffic Redirecting540................................................................................................................................................................
Configuring Traffic Redirecting540................................................................................................................................................................
Class-based Accounting Configuration542................................................................................................................................................................
Class-based Accounting Overview542................................................................................................................................................................
Configuring Class-based Accounting542................................................................................................................................................................
Displaying And Maintaining Traffic Accounting543................................................................................................................................................................
Appendix A Acronym545................................................................................................................................................................
Appendix B Default Priority Mapping Tables546................................................................................................................................................................
Uncolored Priority Mapping Tables546................................................................................................................................................................
Appendix C Introduction To Packet Precedences547................................................................................................................................................................
Ip Precedence And Dscp Values547................................................................................................................................................................
P Priority549................................................................................................................................................................
User Profile Configuration551................................................................................................................................................................
User Profile Overview551................................................................................................................................................................
Creating A User Profile552................................................................................................................................................................
Applying A Qos Policy To User Profile552................................................................................................................................................................
Enabling A User Profile553................................................................................................................................................................
Displaying And Maintaining User Profile553................................................................................................................................................................
Aaa Configuration558................................................................................................................................................................
Introduction To Aaa558................................................................................................................................................................
Introduction To Radius559................................................................................................................................................................
Client/server Model559................................................................................................................................................................
Security And Authentication Mechanisms560................................................................................................................................................................
Basic Message Exchange Process Of Radius560................................................................................................................................................................
Radius Packet Format561................................................................................................................................................................
Extended Radius Attributes564................................................................................................................................................................
Introduction To Hwtacacs565................................................................................................................................................................
Differences Between Hwtacacs And Radius565................................................................................................................................................................
Basic Message Exchange Process Of Hwtacacs565................................................................................................................................................................
Aaa Configuration Task List567................................................................................................................................................................
Radius Configuration Task List568................................................................................................................................................................
Configuring Aaa569................................................................................................................................................................
Hwtacacs Configuration Task List569................................................................................................................................................................
Creating An Isp Domain569................................................................................................................................................................
Configuring Isp Domain Attributes570................................................................................................................................................................
Configuring Aaa Authentication Methods For An Isp Domain571................................................................................................................................................................
Configuring Aaa Authorization Methods For An Isp Domain572................................................................................................................................................................
Configuring Aaa Accounting Methods For An Isp Domain574................................................................................................................................................................
Configuring Local User Attributes575................................................................................................................................................................
Displaying And Maintaining Aaa578................................................................................................................................................................
Configuring User Group Attributes578................................................................................................................................................................
Tearing Down User Connections Forcibly578................................................................................................................................................................
Configuring Radius579................................................................................................................................................................
Creating A Radius Scheme579................................................................................................................................................................
Specifying The Radius Authentication/authorization Servers580................................................................................................................................................................
Specifying The Radius Accounting Servers And Relevant Parameters580................................................................................................................................................................
Setting The Shared Key For Radius Packets581................................................................................................................................................................
Setting The Upper Limit Of Radius Request Retransmission Attempts582................................................................................................................................................................
Setting The Supported Radius Server Type582................................................................................................................................................................
Setting The Status Of Radius Servers583................................................................................................................................................................
Configuring Attributes Related To Data To Be Sent To The Radius Server584................................................................................................................................................................
Setting Timers Regarding Radius Servers585................................................................................................................................................................
Configuring Radius Accounting-on586................................................................................................................................................................
Specifying A Security Policy Server587................................................................................................................................................................
Enabling The Listening Port Of The Radius Client587................................................................................................................................................................
Configuring Hwtacacs588................................................................................................................................................................
Displaying And Maintaining Radius588................................................................................................................................................................
Creating A Hwtacacs Scheme588................................................................................................................................................................
Specifying The Hwtacacs Authentication Servers589................................................................................................................................................................
Specifying The Hwtacacs Authorization Servers589................................................................................................................................................................
Specifying The Hwtacacs Accounting Servers590................................................................................................................................................................
Setting The Shared Key For Hwtacacs Packets591................................................................................................................................................................
Configuring Attributes Related To The Data Sent To Hwtacacs Server591................................................................................................................................................................
Setting Timers Regarding Hwtacacs Servers592................................................................................................................................................................
Aaa Configuration Examples593................................................................................................................................................................
Displaying And Maintaining Hwtacacs593................................................................................................................................................................
Aaa For Telnet Users By A Hwtacacs Server593................................................................................................................................................................
Aaa For Telnet Users By Separate Servers595................................................................................................................................................................
Aaa For Ssh Users By A Radius Server596................................................................................................................................................................
Troubleshooting Aaa599................................................................................................................................................................
Troubleshooting Radius599................................................................................................................................................................
Troubleshooting Hwtacacs600................................................................................................................................................................
X Configuration602................................................................................................................................................................
X Overview602................................................................................................................................................................
Architecture Of 802.1x603................................................................................................................................................................
Authentication Modes Of 802.1x603................................................................................................................................................................
Basic Concepts Of 802.1x603................................................................................................................................................................
Eap Over Lans604................................................................................................................................................................
Eap Over Radius606................................................................................................................................................................
X Authentication Triggering606................................................................................................................................................................
Authentication Process Of 802.1x607................................................................................................................................................................
X Timers609................................................................................................................................................................
Extensions To 802.1x610................................................................................................................................................................
Features Working Together With 802.1x610................................................................................................................................................................
Configuring 802.1x612................................................................................................................................................................
Configuring 802.1x Globally612................................................................................................................................................................
Configuring 802.1x For A Port613................................................................................................................................................................
Configuring An 802.1x Guest Vlan615................................................................................................................................................................
X Configuration Example616................................................................................................................................................................
Displaying And Maintaining 802.1x616................................................................................................................................................................
Guest Vlan And Vlan Assignment Configuration Example618................................................................................................................................................................
Acl Assignment Configuration Example620................................................................................................................................................................
X-based Ead Fast Deployment Configuration623................................................................................................................................................................
Ead Fast Deployment Overview623................................................................................................................................................................
Ead Fast Deployment Implementation623................................................................................................................................................................
Configuring Ead Fast Deployment624................................................................................................................................................................
Displaying And Maintaining Ead Fast Deployment625................................................................................................................................................................
Ead Fast Deployment Configuration Example625................................................................................................................................................................
Troubleshooting Ead Fast Deployment627................................................................................................................................................................
Users Cannot Be Redirected Correctly627................................................................................................................................................................
Introduction To Habp629................................................................................................................................................................
Habp Configuration629................................................................................................................................................................
Configuring Habp630................................................................................................................................................................
Configuring The Habp Server630................................................................................................................................................................
Configuring An Habp Client630................................................................................................................................................................
Displaying And Maintaining Habp631................................................................................................................................................................
Habp Configuration Example631................................................................................................................................................................
Mac Authentication Configuration634................................................................................................................................................................
Mac Authentication Overview634................................................................................................................................................................
Radius-based Mac Authentication634................................................................................................................................................................
Related Concepts635................................................................................................................................................................
Local Mac Authentication635................................................................................................................................................................
Mac Authentication Timers635................................................................................................................................................................
Quiet Mac Address635................................................................................................................................................................
Vlan Assigning635................................................................................................................................................................
Guest Vlan Of Mac Authentication635................................................................................................................................................................
Configuring Mac Authentication636................................................................................................................................................................
Acl Assigning636................................................................................................................................................................
Configuring A Guest Vlan637................................................................................................................................................................
Displaying And Maintaining Mac Authentication638................................................................................................................................................................
Mac Authentication Configuration Examples638................................................................................................................................................................
Local Mac Authentication Configuration Example638................................................................................................................................................................
Radius-based Mac Authentication Configuration Example640................................................................................................................................................................
Port Security Configuration645................................................................................................................................................................
Introduction To Port Security645................................................................................................................................................................
Port Security Overview645................................................................................................................................................................
Port Security Features645................................................................................................................................................................
Port Security Modes646................................................................................................................................................................
Port Security Configuration Task List649................................................................................................................................................................
Enabling Port Security649................................................................................................................................................................
Support For Guest Vlan649................................................................................................................................................................
Setting The Maximum Number Of Secure Mac Addresses650................................................................................................................................................................
Setting The Port Security Mode651................................................................................................................................................................
Configuring Port Security Features652................................................................................................................................................................
Configuring Ntk652................................................................................................................................................................
Configuring Intrusion Protection653................................................................................................................................................................
Configuring Trapping653................................................................................................................................................................
Configuring Secure Mac Addresses654................................................................................................................................................................
Ignoring Authorization Information From The Server654................................................................................................................................................................
Displaying And Maintaining Port Security655................................................................................................................................................................
Port Security Configuration Examples655................................................................................................................................................................
Configuring The Autolearn Mode655................................................................................................................................................................
Configuring The Userloginwithoui Mode657................................................................................................................................................................
Configuring The Macaddresselseuserloginsecure Mode661................................................................................................................................................................
Configuration Information662................................................................................................................................................................
Troubleshooting Port Security663................................................................................................................................................................
Cannot Set The Port Security Mode663................................................................................................................................................................
Cannot Change Port Security Mode When A User Is Online664................................................................................................................................................................
Ip Source Guard Configuration666................................................................................................................................................................
Ip Source Guard Overview666................................................................................................................................................................
Configuring A Static Binding Entry667................................................................................................................................................................
Configuring Dynamic Binding Function667................................................................................................................................................................
Ip Source Guard Configuration Examples668................................................................................................................................................................
Displaying And Maintaining Ip Source Guard668................................................................................................................................................................
Static Binding Entry Configuration Example668................................................................................................................................................................
Dynamic Binding Function Configuration Example669................................................................................................................................................................
Troubleshooting Ip Source Guard671................................................................................................................................................................
Failed To Configure Static Binding Entries And Dynamic Binding Function671................................................................................................................................................................
Ssh2.0 Configuration673................................................................................................................................................................
Ssh2.0 Overview673................................................................................................................................................................
Introduction To Ssh673................................................................................................................................................................
Operation Of Ssh673................................................................................................................................................................
Configuring The Device As An Ssh Server676................................................................................................................................................................
Ssh Server Configuration Task List676................................................................................................................................................................
Generating A Dsa Or Rsa Key Pair676................................................................................................................................................................
Enabling Ssh Server677................................................................................................................................................................
Configuring The User Interfaces For Ssh Clients677................................................................................................................................................................
Configuring A Client Public Key678................................................................................................................................................................
Configuring An Ssh User679................................................................................................................................................................
Setting The Ssh Management Parameters680................................................................................................................................................................
Configuring The Device As An Ssh Client681................................................................................................................................................................
Ssh Client Configuration Task List681................................................................................................................................................................
Specifying A Source Ip Address/interface For The Ssh Client681................................................................................................................................................................
Configuring Whether First-time Authentication Is Supported682................................................................................................................................................................
Establishing A Connection Between The Ssh Client And The Server682................................................................................................................................................................
Displaying And Maintaining Ssh683................................................................................................................................................................
Ssh Server Configuration Examples683................................................................................................................................................................
When Switch Acts As Server For Password Authentication683................................................................................................................................................................
When Switch Acts As Server For Publickey Authentication685................................................................................................................................................................
Ssh Client Configuration Examples690................................................................................................................................................................
When Switch Acts As Client For Password Authentication690................................................................................................................................................................
When Switch Acts As Client For Publickey Authentication692................................................................................................................................................................
Sftp Service695................................................................................................................................................................
Sftp Overview695................................................................................................................................................................
Configuring An Sftp Server695................................................................................................................................................................
Enabling The Sftp Server695................................................................................................................................................................
Configuring An Sftp Client696................................................................................................................................................................
Configuring The Sftp Connection Idle Timeout Period696................................................................................................................................................................
Specifying A Source Ip Address Or Interface For The Sftp Client696................................................................................................................................................................
Establishing A Connection To The Sftp Server696................................................................................................................................................................
Working With The Sftp Directories697................................................................................................................................................................
Working With Sftp Files698................................................................................................................................................................
Displaying Help Information698................................................................................................................................................................
Terminating The Connection To The Remote Sftp Server699................................................................................................................................................................
Sftp Client Configuration Example699................................................................................................................................................................
Sftp Server Configuration Example702................................................................................................................................................................
Pki Configuration705................................................................................................................................................................
Introduction To Pki705................................................................................................................................................................
Pki Overview705................................................................................................................................................................
Pki Terms705................................................................................................................................................................
Architecture Of Pki706................................................................................................................................................................
Pki Configuration Task List707................................................................................................................................................................
Applications Of Pki707................................................................................................................................................................
Operation Of Pki707................................................................................................................................................................
Configuring An Entity Dn708................................................................................................................................................................
Configuring A Pki Domain709................................................................................................................................................................
Submitting A Pki Certificate Request711................................................................................................................................................................
Submitting A Certificate Request In Auto Mode711................................................................................................................................................................
Submitting A Certificate Request In Manual Mode711................................................................................................................................................................
Retrieving A Certificate Manually712................................................................................................................................................................
Configuring Pki Certificate Verification713................................................................................................................................................................
Destroying A Local Rsa Key Pair714................................................................................................................................................................
Deleting A Certificate715................................................................................................................................................................
Configuring An Access Control Policy715................................................................................................................................................................
Displaying And Maintaining Pki715................................................................................................................................................................
Pki Configuration Examples716................................................................................................................................................................
Requesting A Certificate From A Ca Running Rsa Keon716................................................................................................................................................................
Requesting A Certificate From A Ca Running Windows 2003 Server719................................................................................................................................................................
Configuring A Certificate Attribute-based Access Control Policy722................................................................................................................................................................
Troubleshooting Pki724................................................................................................................................................................
Failed To Retrieve A Ca Certificate724................................................................................................................................................................
Failed To Request A Local Certificate724................................................................................................................................................................
Failed To Retrieve Crls725................................................................................................................................................................
Ssl Configuration727................................................................................................................................................................
Ssl Overview727................................................................................................................................................................
Ssl Security Mechanism727................................................................................................................................................................
Ssl Configuration Task List728................................................................................................................................................................
Ssl Protocol Stack728................................................................................................................................................................
Configuring An Ssl Server Policy729................................................................................................................................................................
Ssl Server Policy Configuration Example730................................................................................................................................................................
Configuring An Ssl Client Policy732................................................................................................................................................................
Displaying And Maintaining Ssl732................................................................................................................................................................
Troubleshooting Ssl733................................................................................................................................................................
Ssl Handshake Failure733................................................................................................................................................................
Public Key Configuration735................................................................................................................................................................
Asymmetric Key Algorithm Overview735................................................................................................................................................................
Key Algorithm Types735................................................................................................................................................................
Asymmetric Key Algorithm Applications735................................................................................................................................................................
Configuring The Local Asymmetric Key Pair736................................................................................................................................................................
Creating An Asymmetric Key Pair736................................................................................................................................................................
Displaying Or Exporting The Local Rsa Or Dsa Host Public Key737................................................................................................................................................................
Destroying An Asymmetric Key Pair737................................................................................................................................................................
Configuring The Public Key Of A Peer737................................................................................................................................................................
Displaying And Maintaining Public Keys738................................................................................................................................................................
Public Key Configuration Examples739................................................................................................................................................................
Configuring The Public Key Of A Peer Manually739................................................................................................................................................................
Importing The Public Key Of A Peer From A Public Key File740................................................................................................................................................................
Acl Overview745................................................................................................................................................................
Introduction To Acl745................................................................................................................................................................
Application Of Acls On The Switch745................................................................................................................................................................
Introduction To Ipv4 Acl746................................................................................................................................................................
Ipv4 Acl Classification746................................................................................................................................................................
Ipv4 Acl Naming747................................................................................................................................................................
Ipv4 Acl Match Order747................................................................................................................................................................
Ipv4 Acl Step748................................................................................................................................................................
Effective Period Of An Ipv4 Acl748................................................................................................................................................................
Ip Fragments Filtering With Ipv4 Acl748................................................................................................................................................................
Introduction To Ipv6 Acl749................................................................................................................................................................
Ipv6 Acl Classification749................................................................................................................................................................
Ipv6 Acl Naming749................................................................................................................................................................
Ipv6 Acl Match Order749................................................................................................................................................................
Ipv6 Acl Step750................................................................................................................................................................
Effective Period Of An Ipv6 Acl750................................................................................................................................................................
Ipv4 Acl Configuration751................................................................................................................................................................
Configuring A Basic Ipv4 Acl752................................................................................................................................................................
Configuring An Advanced Ipv4 Acl754................................................................................................................................................................
Configuring An Ethernet Frame Header Acl756................................................................................................................................................................
Copying An Ipv4 Acl757................................................................................................................................................................
Displaying And Maintaining Ipv4 Acls758................................................................................................................................................................
Ipv4 Acl Configuration Example758................................................................................................................................................................
Ipv6 Acl Configuration761................................................................................................................................................................
Configuring A Basic Ipv6 Acl761................................................................................................................................................................
Configuring An Advanced Ipv6 Acl763................................................................................................................................................................
Copying An Ipv6 Acl764................................................................................................................................................................
Displaying And Maintaining Ipv6 Acls765................................................................................................................................................................
Ipv6 Acl Configuration Example765................................................................................................................................................................
Acl Application For Packet Filtering767................................................................................................................................................................
Filtering Ipv4 Packets767................................................................................................................................................................
Filtering Ipv6 Packets768................................................................................................................................................................
Acl Application Example769................................................................................................................................................................
Applying An Acl To An Ethernet Interface769................................................................................................................................................................
Applying An Acl To A Vlan Interface770................................................................................................................................................................
Arp Attack Protection Configuration772................................................................................................................................................................
Arp Attack Protection Overview772................................................................................................................................................................
Arp Attack Protection Configuration Task List772................................................................................................................................................................
Configuring Arp Defense Against Ip Packet Attacks773................................................................................................................................................................
Configuring Arp Source Suppression773................................................................................................................................................................
Enabling Arp Black Hole Routing774................................................................................................................................................................
Displaying And Maintaining Arp Source Suppression774................................................................................................................................................................
Configuring Arp Packet Rate Limit774................................................................................................................................................................
Configuring Source Mac Address Based Arp Attack Detection775................................................................................................................................................................
Configuring Arp Packet Source Mac Address Consistency Check776................................................................................................................................................................
Configuring Arp Active Acknowledgement776................................................................................................................................................................
Displaying And Maintaining Source Mac Address Based Arp Attack Detection776................................................................................................................................................................
Configuring The Arp Active Acknowledgement Function776................................................................................................................................................................
Configuring Arp Detection777................................................................................................................................................................
Introduction To Arp Detection777................................................................................................................................................................
Configuring Arp Detection Based On Specified Objects780................................................................................................................................................................
Displaying And Maintaining Arp Detection780................................................................................................................................................................
Arp Detection Configuration Example I781................................................................................................................................................................
Arp Detection Configuration Example Ii782................................................................................................................................................................
Smart Link Overview787................................................................................................................................................................
Smart Link Configuration787................................................................................................................................................................
How Smart Link Works789................................................................................................................................................................
Smart Link Configuration Task List790................................................................................................................................................................
Configuring A Smart Link Device790................................................................................................................................................................
Configuring Protected Vlans For A Smart Link Group791................................................................................................................................................................
Configuring Member Ports For A Smart Link Group791................................................................................................................................................................
Configuring Role Preemption For A Smart Link Group792................................................................................................................................................................
Enabling The Sending Of Flush Messages792................................................................................................................................................................
Smart Link Device Configuration Example793................................................................................................................................................................
Configuring An Associated Device794................................................................................................................................................................
Enabling The Receiving Of Flush Messages794................................................................................................................................................................
Associated Device Configuration Example794................................................................................................................................................................
Displaying And Maintaining Smart Link795................................................................................................................................................................
Smart Link Configuration Examples795................................................................................................................................................................
Single Smart Link Group Configuration Example795................................................................................................................................................................
Multiple Smart Link Groups Load Sharing Configuration Example799................................................................................................................................................................
Monitor Link Configuration804................................................................................................................................................................
Configuring Monitor Link805................................................................................................................................................................
How Monitor Link Works805................................................................................................................................................................
Creating A Monitor Link Group805................................................................................................................................................................
Configuring Monitor Link Group Member Ports806................................................................................................................................................................
Displaying And Maintaining Monitor Link806................................................................................................................................................................
Monitor Link Configuration Example807................................................................................................................................................................
Rrpp Overview812................................................................................................................................................................
Rrpp Configuration812................................................................................................................................................................
Basic Concepts In Rrpp813................................................................................................................................................................
Rrpp Timers816................................................................................................................................................................
How Rrpp Works816................................................................................................................................................................
Typical Rrpp Networking818................................................................................................................................................................
Rrpp Configuration Task List820................................................................................................................................................................
Creating An Rrpp Domain821................................................................................................................................................................
Configuring Control Vlans822................................................................................................................................................................
Configuring Protected Vlans822................................................................................................................................................................
Configuring Rrpp Rings823................................................................................................................................................................
Configuring Rrpp Ports823................................................................................................................................................................
Configuring Rrpp Nodes824................................................................................................................................................................
Activating An Rrpp Domain826................................................................................................................................................................
Configuring Rrpp Timers826................................................................................................................................................................
Configuring An Rrpp Ring Group827................................................................................................................................................................
Displaying And Maintaining Rrpp828................................................................................................................................................................
Rrpp Configuration Examples828................................................................................................................................................................
Single Ring Configuration Example828................................................................................................................................................................
Intersecting Ring Configuration Example830................................................................................................................................................................
Intersecting-ring Load Balancing Configuration Example835................................................................................................................................................................
Troubleshooting844................................................................................................................................................................
Dldp Configuration846................................................................................................................................................................
How Dldp Works847................................................................................................................................................................
Dldp Configuration Task List853................................................................................................................................................................
Enabling Dldp854................................................................................................................................................................
Setting Dldp Mode854................................................................................................................................................................
Setting The Interval For Sending Advertisement Packets855................................................................................................................................................................
Setting The Delaydown Timer855................................................................................................................................................................
Setting The Port Shutdown Mode856................................................................................................................................................................
Configuring Dldp Authentication857................................................................................................................................................................
Resetting Dldp State857................................................................................................................................................................
Displaying And Maintaining Dldp858................................................................................................................................................................
Dldp Configuration Example858................................................................................................................................................................
Ethernet Oam Configuration863................................................................................................................................................................
Ethernet Oam Overview863................................................................................................................................................................
Major Functions Of Ethernet Oam863................................................................................................................................................................
Ethernet Oampdus863................................................................................................................................................................
How Ethernet Oam Works865................................................................................................................................................................
Standards And Protocols868................................................................................................................................................................
Ethernet Oam Configuration Task List868................................................................................................................................................................
Configuring Basic Ethernet Oam Functions868................................................................................................................................................................
Configuring Link Monitoring869................................................................................................................................................................
Configuring Errored Symbol Event Detection869................................................................................................................................................................
Configuring Errored Frame Event Detection869................................................................................................................................................................
Configuring Errored Frame Period Event Detection869................................................................................................................................................................
Configuring Errored Frame Seconds Event Detection870................................................................................................................................................................
Enabling Oam Remote Loopback870................................................................................................................................................................
Displaying And Maintaining Ethernet Oam Configuration871................................................................................................................................................................
Ethernet Oam Configuration Example872................................................................................................................................................................
Cfd Configuration875................................................................................................................................................................
Basic Concepts In Cfd875................................................................................................................................................................
Cfd Functions878................................................................................................................................................................
Cfd Configuration Task List878................................................................................................................................................................
Basic Configuration Tasks879................................................................................................................................................................
Configuring Mep880................................................................................................................................................................
Configuring Mip Generation Rules880................................................................................................................................................................
Configuring Cc On Meps881................................................................................................................................................................
Configuring Lb On Meps882................................................................................................................................................................
Configuring Lt On Meps882................................................................................................................................................................
Finding The Path Between A Source Mep And A Target Mep883................................................................................................................................................................
Enabling Automatic Lt Messages Sending883................................................................................................................................................................
Displaying And Maintaining Cfd883................................................................................................................................................................
Cfd Configuration Examples884................................................................................................................................................................
Configuring Mep And Enabling Cc On It885................................................................................................................................................................
Configuring The Rules For Generating Mips887................................................................................................................................................................
Track Overview890................................................................................................................................................................
Track Configuration890................................................................................................................................................................
Collaboration Between The Track Module And The Detection Modules890................................................................................................................................................................
Track Configuration Task List891................................................................................................................................................................
Configuring Collaboration Between The Track Module And The Detection Modules891................................................................................................................................................................
Configuring Collaboration Between The Track Module And The Application Modules892................................................................................................................................................................
Configuring Track-static Routing Collaboration892................................................................................................................................................................
Displaying And Maintaining Track Object(s)893................................................................................................................................................................
Track Configuration Examples893................................................................................................................................................................
Static Routing-track-nqa Collaboration Configuration Example893................................................................................................................................................................
Logging In To An Ethernet Switch902................................................................................................................................................................
Introduction To User Interface902................................................................................................................................................................
Users And User Interfaces903................................................................................................................................................................
User Interface Number903................................................................................................................................................................
Common User Interface Configuration903................................................................................................................................................................
Logging In Through The Console Port905................................................................................................................................................................
Setting Up The Connection To The Console Port905................................................................................................................................................................
Console Port Login Configuration907................................................................................................................................................................
Console Port Login Configuration With Authentication Mode Being None909................................................................................................................................................................
Console Port Login Configurations For Different Authentication Modes909................................................................................................................................................................
Console Port Login Configuration With Authentication Mode Being Password911................................................................................................................................................................
Console Port Login Configuration With Authentication Mode Being Scheme913................................................................................................................................................................
Logging In Through Telnet917................................................................................................................................................................
Logging In Through Telnet/ssh917................................................................................................................................................................
Telnet Connection Establishment917................................................................................................................................................................
Telnet Login Configuration Task List921................................................................................................................................................................
Telnet Login Configuration With Authentication Mode Being None921................................................................................................................................................................
Telnet Login Configuration With Authentication Mode Being Password922................................................................................................................................................................
Telnet Login Configuration With Authentication Mode Being Scheme924................................................................................................................................................................
Logging In Through Ssh926................................................................................................................................................................
User Interface Configuration Examples928................................................................................................................................................................
User Authentication Configuration Example928................................................................................................................................................................
Command Authorization Configuration Example929................................................................................................................................................................
Command Accounting Configuration Example931................................................................................................................................................................
Web Server Configuration933................................................................................................................................................................
Displaying Web Users934................................................................................................................................................................
Connection Establishment Using Nms936................................................................................................................................................................
Logging In Through Nms936................................................................................................................................................................
Specifying Source For Telnet Packets937................................................................................................................................................................
Specifying Source Ip Address/interface For Telnet Packets937................................................................................................................................................................
Displaying The Source Ip Address/interface Specified For Telnet Packets938................................................................................................................................................................
Controlling Telnet Users939................................................................................................................................................................
Controlling Login Users939................................................................................................................................................................
Controlling Telnet Users By Source Ip Addresses939................................................................................................................................................................
Controlling Telnet Users By Source And Destination Ip Addresses940................................................................................................................................................................
Controlling Telnet Users By Source Mac Addresses941................................................................................................................................................................
Controlling Network Management Users By Source Ip Addresses942................................................................................................................................................................
Controlling Web Users By Source Ip Addresses944................................................................................................................................................................
Forcing Online Web Users Offline944................................................................................................................................................................
Basic Configurations947................................................................................................................................................................
Configuration Display947................................................................................................................................................................
Entering System View948................................................................................................................................................................
Exiting The Current View948................................................................................................................................................................
Configuring The System Clock949................................................................................................................................................................
Exiting To User View949................................................................................................................................................................
Configuring The Device Name949................................................................................................................................................................
Displaying The System Clock950................................................................................................................................................................
Enabling/disabling The Display Of Copyright Information952................................................................................................................................................................
Configuring A Banner953................................................................................................................................................................
Configuring Cli Hotkeys954................................................................................................................................................................
Configuring Command Alias955................................................................................................................................................................
Configuring User Privilege Levels And Command Levels956................................................................................................................................................................
Configuring User Privilege Level957................................................................................................................................................................
Switching User Privilege Level961................................................................................................................................................................
Modifying Command Level962................................................................................................................................................................
Displaying And Maintaining Basic Configurations962................................................................................................................................................................
Cli Features964................................................................................................................................................................
Introduction To Cli964................................................................................................................................................................
Online Help With Command Lines964................................................................................................................................................................
Synchronous Information Output965................................................................................................................................................................
Editing Features966................................................................................................................................................................
Undo Form Of A Command966................................................................................................................................................................
Cli Display967................................................................................................................................................................
Filtering The Output Information967................................................................................................................................................................
Display Functions969................................................................................................................................................................
Multiple-screen Output969................................................................................................................................................................
Saving History Commands970................................................................................................................................................................
Command Line Error Information970................................................................................................................................................................
Device Management973................................................................................................................................................................
Device Management Overview973................................................................................................................................................................
Device Management Configuration Task List973................................................................................................................................................................
Configuring The Exception Handling Method973................................................................................................................................................................
Rebooting A Device974................................................................................................................................................................
Configuring The Scheduled Automatic Execution Function975................................................................................................................................................................
Upgrading Device Software976................................................................................................................................................................
Device Software Overview976................................................................................................................................................................
Upgrading The Boot Rom Program Through Command Lines976................................................................................................................................................................
Upgrading The Boot File Through Command Lines977................................................................................................................................................................
Disabling Boot Rom Access977................................................................................................................................................................
Configuring A Detection Interval978................................................................................................................................................................
Clearing The 16-bit Interface Indexes Not Used In The Current System978................................................................................................................................................................
Identifying And Diagnosing Pluggable Transceivers979................................................................................................................................................................
Introduction To Pluggable Transceivers979................................................................................................................................................................
Identifying Pluggable Transceivers979................................................................................................................................................................
Displaying And Maintaining Device Management Configuration980................................................................................................................................................................
Diagnosing Pluggable Transceivers980................................................................................................................................................................
Device Management Configuration Examples981................................................................................................................................................................
Remote Scheduled Automatic Upgrade Configuration Example981................................................................................................................................................................
File System Management985................................................................................................................................................................
File System Management Configuration985................................................................................................................................................................
File System Overview985................................................................................................................................................................
Filename Formats985................................................................................................................................................................
Directory Operations986................................................................................................................................................................
File Operations987................................................................................................................................................................
Batch Operations989................................................................................................................................................................
Storage Medium Operations989................................................................................................................................................................
Setting File System Prompt Modes990................................................................................................................................................................
File System Operations Example990................................................................................................................................................................
Configuration File Management991................................................................................................................................................................
Configuration File Overview991................................................................................................................................................................
Saving The Current Configuration992................................................................................................................................................................
Specifying A Startup Configuration File For The Next System Startup993................................................................................................................................................................
Backing Up The Startup Configuration File994................................................................................................................................................................
Deleting The Startup Configuration File For The Next Startup994................................................................................................................................................................
Displaying And Maintaining Device Configuration995................................................................................................................................................................
Restoring The Startup Configuration File995................................................................................................................................................................
Ftp Configuration997................................................................................................................................................................
Ftp Overview997................................................................................................................................................................
Introduction To Ftp997................................................................................................................................................................
Operation Of Ftp997................................................................................................................................................................
Configuring The Ftp Client999................................................................................................................................................................
Establishing An Ftp Connection999................................................................................................................................................................
Ftp Client Configuration Example1002................................................................................................................................................................
Configuring The Ftp Server1003................................................................................................................................................................
Configuring Ftp Server Operating Parameters1003................................................................................................................................................................
Configuring Authentication And Authorization On The Ftp Server1004................................................................................................................................................................
Ftp Server Configuration Example1005................................................................................................................................................................
Displaying And Maintaining Ftp1007................................................................................................................................................................
Tftp Configuration1008................................................................................................................................................................
Tftp Overview1008................................................................................................................................................................
Introduction To Tftp1008................................................................................................................................................................
Operation Of Tftp1008................................................................................................................................................................
Configuring The Tftp Client1009................................................................................................................................................................
Displaying And Maintaining The Tftp Client1010................................................................................................................................................................
Tftp Client Configuration Example1010................................................................................................................................................................
Http Configuration1013................................................................................................................................................................
Http Overview1013................................................................................................................................................................
How Http Works1013................................................................................................................................................................
Logging In To The Device Through Http1013................................................................................................................................................................
Enabling The Http Service1013................................................................................................................................................................
Configuring The Port Number Of The Http Service1014................................................................................................................................................................
Associating The Http Service With An Acl1014................................................................................................................................................................
Displaying And Maintaining Http1015................................................................................................................................................................
Http Configuration Example1015................................................................................................................................................................
Https Configuration1017................................................................................................................................................................
Https Overview1017................................................................................................................................................................
Https Configuration Task List1017................................................................................................................................................................
Associating The Https Service With An Ssl Server Policy1018................................................................................................................................................................
Enabling The Https Service1018................................................................................................................................................................
Associating The Https Service With A Certificate Attribute Access Control Policy1019................................................................................................................................................................
Configuring The Port Number Of The Https Service1019................................................................................................................................................................
Associating The Https Service With An Acl1020................................................................................................................................................................
Displaying And Maintaining Https1020................................................................................................................................................................
Https Configuration Example1020................................................................................................................................................................
Snmp Configuration1024................................................................................................................................................................
Snmp Overview1024................................................................................................................................................................
Snmp Protocol Version1025................................................................................................................................................................
Mib Overview1025................................................................................................................................................................
Configuring Snmp Logging1028................................................................................................................................................................
Introduction To Snmp Logging1028................................................................................................................................................................
Enabling Snmp Logging1028................................................................................................................................................................
Snmp Trap Configuration1029................................................................................................................................................................
Enabling The Trap Function1029................................................................................................................................................................
Configuring Trap Parameters1030................................................................................................................................................................
Displaying And Maintaining Snmp1031................................................................................................................................................................
Snmp Configuration Example1032................................................................................................................................................................
Snmp Logging Configuration Example1033................................................................................................................................................................
Mib Style Configuration1035................................................................................................................................................................
Setting The Mib Style1035................................................................................................................................................................
Displaying And Maintaining Mib1035................................................................................................................................................................
Rmon Configuration1037................................................................................................................................................................
Rmon Overview1037................................................................................................................................................................
Working Mechanism1037................................................................................................................................................................
Rmon Groups1038................................................................................................................................................................
Configuring Rmon1039................................................................................................................................................................
Displaying And Maintaining Rmon1041................................................................................................................................................................
Rmon Configuration Example1041................................................................................................................................................................
Mac Address Table Configuration1044................................................................................................................................................................
Introduction To Mac Address Table1044................................................................................................................................................................
How A Mac Address Table Entry Is Generated1044................................................................................................................................................................
Types Of Mac Address Table Entries1045................................................................................................................................................................
Mac Address Table-based Frame Forwarding1045................................................................................................................................................................
Configuring Mac Address Table1046................................................................................................................................................................
Configuring Mac Address Table Entries1046................................................................................................................................................................
Configuring The Aging Timer For Dynamic Mac Address Entries1047................................................................................................................................................................
Configuring The Mac Learning Limit1047................................................................................................................................................................
Mac Address Table Configuration Example1048................................................................................................................................................................
Displaying And Maintaining Mac Address Table1048................................................................................................................................................................
Mac Information Configuration1050................................................................................................................................................................
Configuring Mac Information1050................................................................................................................................................................
Enabling Mac Information On An Interface1051................................................................................................................................................................
Configuring Mac Information Mode1051................................................................................................................................................................
Configuring The Interval For Sending Syslog Or Trap Messages1051................................................................................................................................................................
Configuring The Mac Information Queue Length1051................................................................................................................................................................
System Maintaining And Debugging1055................................................................................................................................................................
System Maintaining And Debugging Overview1055................................................................................................................................................................
Introduction To System Debugging1056................................................................................................................................................................
System Maintaining1057................................................................................................................................................................
System Debugging1057................................................................................................................................................................
System Maintaining Example1058................................................................................................................................................................
Information Center Configuration1060................................................................................................................................................................
Information Center Overview1060................................................................................................................................................................
System Information Format1063................................................................................................................................................................
Configuring Information Center1065................................................................................................................................................................
Information Center Configuration Task List1065................................................................................................................................................................
Outputting System Information To The Console1065................................................................................................................................................................
Outputting System Information To A Monitor Terminal1066................................................................................................................................................................
Outputting System Information To A Log Host1067................................................................................................................................................................
Outputting System Information To The Trap Buffer1068................................................................................................................................................................
Outputting System Information To The Log Buffer1069................................................................................................................................................................
Outputting System Information To The Snmp Module1070................................................................................................................................................................
Configuring Synchronous Information Output1070................................................................................................................................................................
Disabling A Port From Generating Link Up/down Logging Information1071................................................................................................................................................................
Displaying And Maintaining Information Center1072................................................................................................................................................................
Information Center Configuration Examples1072................................................................................................................................................................
Outputting Log Information To A Unix Log Host1072................................................................................................................................................................
Outputting Log Information To A Linux Log Host1074................................................................................................................................................................
Outputting Log Information To The Console1076................................................................................................................................................................
Poe Configuration1079................................................................................................................................................................
Poe Overview1079................................................................................................................................................................
Introduction To Poe1079................................................................................................................................................................
Poe Configuration Task List1080................................................................................................................................................................
Configuring The Poe Interface1080................................................................................................................................................................
Protocol Specification1080................................................................................................................................................................
Configuring A Poe Interface Through The Command Line1081................................................................................................................................................................
Configuring Poe Interfaces Through A Poe Configuration File1081................................................................................................................................................................
Configuring Poe Power Management1083................................................................................................................................................................
Configuring Pd Power Management1083................................................................................................................................................................
Upgrading Pse Processing Software Online1084................................................................................................................................................................
Configuring The Poe Monitoring Function1084................................................................................................................................................................
Configuring Pse Power Monitoring1084................................................................................................................................................................
Monitoring Pd1084................................................................................................................................................................
Configuring A Pd Disconnection Detection Mode1085................................................................................................................................................................
Enabling The Pse To Detect Nonstandard Pds1085................................................................................................................................................................
Displaying And Maintaining Poe1086................................................................................................................................................................
Poe Configuration Example1086................................................................................................................................................................
Troubleshooting Poe1087................................................................................................................................................................
Hotfix Configuration1090................................................................................................................................................................
Hotfix Overview1090................................................................................................................................................................
Basic Concepts In Hotfix1090................................................................................................................................................................
Patch Status1090................................................................................................................................................................
Hotfix Configuration Task List1093................................................................................................................................................................
One-step Patch Installation1094................................................................................................................................................................
Step-by-step Patch Installation1095................................................................................................................................................................
Step-by-step Patch Installation Task List1095................................................................................................................................................................
Configuring The Patch File Location1095................................................................................................................................................................
Loading A Patch File1095................................................................................................................................................................
Activating Patches1096................................................................................................................................................................
Confirming Running Patches1096................................................................................................................................................................
One-step Patch Uninstallation1096................................................................................................................................................................
Step-by-step Patch Uninstallation1097................................................................................................................................................................
Step-by-step Patch Uninstallation Task List1097................................................................................................................................................................
Stop Running Patches1097................................................................................................................................................................
Deleting Patches1097................................................................................................................................................................
Displaying And Maintaining Hotfix1098................................................................................................................................................................
Hotfix Configuration Examples1098................................................................................................................................................................
Hotfix Configuration Example1098................................................................................................................................................................
Nqa Configuration1101................................................................................................................................................................
Nqa Overview1101................................................................................................................................................................
Introduction To Nqa1101................................................................................................................................................................
Features Of Nqa1101................................................................................................................................................................
Basic Concepts Of Nqa1103................................................................................................................................................................
Nqa Configuration Task List1104................................................................................................................................................................
Nqa Test Operation1104................................................................................................................................................................
Configuring The Nqa Server1105................................................................................................................................................................
Enabling The Nqa Client1105................................................................................................................................................................
Creating An Nqa Test Group1105................................................................................................................................................................
Configuring An Nqa Test Group1106................................................................................................................................................................
Configuring An Icmp Echo Test1106................................................................................................................................................................
Configuring A Dhcp Test1107................................................................................................................................................................
Configuring An Ftp Test1108................................................................................................................................................................
Configuring An Http Test1109................................................................................................................................................................
Configuring A Udp Jitter Test1110................................................................................................................................................................
Configuring An Snmp Test1112................................................................................................................................................................
Configuring A Tcp Test1113................................................................................................................................................................
Configuring A Udp Echo Test1114................................................................................................................................................................
Configuring A Voice Test1115................................................................................................................................................................
Configuring A Dlsw Test1117................................................................................................................................................................
Configuring The Collaboration Function1118................................................................................................................................................................
Configuring Trap Delivery1119................................................................................................................................................................
Configuring Optional Parameters Common To An Nqa Test Group1120................................................................................................................................................................
Configuring The Nqa Statistics Function1120................................................................................................................................................................
Scheduling An Nqa Test Group1122................................................................................................................................................................
Displaying And Maintaining Nqa1123................................................................................................................................................................
Nqa Configuration Examples1123................................................................................................................................................................
Icmp Echo Test Configuration Example1123................................................................................................................................................................
Dhcp Test Configuration Example1124................................................................................................................................................................
Network Requirements1124................................................................................................................................................................
Ftp Test Configuration Example1125................................................................................................................................................................
Http Test Configuration Example1126................................................................................................................................................................
Udp Jitter Test Configuration Example1128................................................................................................................................................................
Snmp Test Configuration Example1130................................................................................................................................................................
Tcp Test Configuration Example1131................................................................................................................................................................
Udp Echo Test Configuration Example1133................................................................................................................................................................
Voice Test Configuration Example1134................................................................................................................................................................
Dlsw Test Configuration Example1137................................................................................................................................................................
Nqa Collaboration Configuration Example1138................................................................................................................................................................
Ntp Configuration1142................................................................................................................................................................
Ntp Overview1142................................................................................................................................................................
Applications Of Ntp1142................................................................................................................................................................
Advantages Of Ntp1144................................................................................................................................................................
How Ntp Works1144................................................................................................................................................................
Ntp Message Format1145................................................................................................................................................................
Operation Modes Of Ntp1146................................................................................................................................................................
Ntp Configuration Task List1148................................................................................................................................................................
Configuring The Operation Modes Of Ntp1149................................................................................................................................................................
Configuring The Ntp Symmetric Peers Mode1150................................................................................................................................................................
Configuring Optional Parameters Of Ntp1152................................................................................................................................................................
Specifying The Source Interface For Ntp Messages1152................................................................................................................................................................
Disabling An Interface From Receiving Ntp Messages1153................................................................................................................................................................
Configuring The Maximum Number Of Dynamic Sessions Allowed1153................................................................................................................................................................
Configuring Access-control Rights1154................................................................................................................................................................
Configuring Ntp Authentication1155................................................................................................................................................................
Displaying And Maintaining Ntp1157................................................................................................................................................................
Ntp Configuration Examples1157................................................................................................................................................................
Configuring The Ntp Symmetric Mode1158................................................................................................................................................................
Configuring Ntp Broadcast Mode1160................................................................................................................................................................
Configuring Ntp Client/server Mode With Authentication1165................................................................................................................................................................
Configuring Ntp Broadcast Mode With Authentication1166................................................................................................................................................................
Cluster Management Configuration1170................................................................................................................................................................
Cluster Management Overview1170................................................................................................................................................................
Cluster Management Definition1170................................................................................................................................................................
Roles In A Cluster1170................................................................................................................................................................
How A Cluster Works1171................................................................................................................................................................
Cluster Configuration Task List1174................................................................................................................................................................
Configuring The Management Device1176................................................................................................................................................................
Enabling Ndp Globally And For Specific Ports1176................................................................................................................................................................
Configuring Ndp Parameters1177................................................................................................................................................................
Enabling Ntdp Globally And For Specific Ports1177................................................................................................................................................................
Configuring Ntdp Parameters1177................................................................................................................................................................
Manually Collecting Topology Information1178................................................................................................................................................................
Enabling The Cluster Function1179................................................................................................................................................................
Establishing A Cluster1179................................................................................................................................................................
Enabling Management Vlan Auto-negotiation1180................................................................................................................................................................
Configuring Cluster Management Protocol Packets1180................................................................................................................................................................
Cluster Member Management1181................................................................................................................................................................
Configuring The Member Devices1182................................................................................................................................................................
Configuring Access Between The Management Device And Its Member Devices1182................................................................................................................................................................
Adding A Candidate Device To A Cluster1183................................................................................................................................................................
Configuring Advanced Cluster Functions1184................................................................................................................................................................
Configuring Topology Management1184................................................................................................................................................................
Configuring Interaction For A Cluster1185................................................................................................................................................................
Snmp Configuration Synchronization Function1186................................................................................................................................................................
Configuring Web User Accounts In Batches1187................................................................................................................................................................
Displaying And Maintaining Cluster Management1188................................................................................................................................................................
Cluster Management Configuration Example1188................................................................................................................................................................
Stack Configuration1193................................................................................................................................................................
Stack Configuration Overview1193................................................................................................................................................................
Introduction To Stack1193................................................................................................................................................................
Establishing A Stack1194................................................................................................................................................................
Stack Configuration Task List1194................................................................................................................................................................
Configuring The Master Device Of A Stack1195................................................................................................................................................................
Configuring A Private Ip Address Pool For A Stack1195................................................................................................................................................................
Configuring Stack Ports1195................................................................................................................................................................
Creating A Stack1195................................................................................................................................................................
Configuring Stack Ports Of A Slave Device1196................................................................................................................................................................
Logging In To The Cli Of A Slave From The Master1196................................................................................................................................................................
Displaying And Maintaining Stack Configuration1197................................................................................................................................................................
Automatic Configuration1200................................................................................................................................................................
Introduction To Automatic Configuration1200................................................................................................................................................................
Typical Networking Of Automatic Configuration1200................................................................................................................................................................
How Automatic Configuration Works1201................................................................................................................................................................
Work Flow Of Automatic Configuration1201................................................................................................................................................................
Obtaining An Ip Address1202................................................................................................................................................................
Configuration File1202................................................................................................................................................................
Obtaining The Ip Address Of An Interface And Related Information Through Dhcp1202................................................................................................................................................................
Obtaining The Configuration File From The Tftp Server1204................................................................................................................................................................
Executing The Configuration File1206................................................................................................................................................................

Advertising

Share and save

Advertising