HP H3C S5100-SI Manuals

Manuals and User Guides for HP H3C S5100-SI. We have 1 HP H3C S5100-SI manual available for free PDF download: Operation Manual

HP H3C S5100-SI Operation Manual

HP H3C S5100-SI Operation Manual (830 pages)

Ethernet Switches  
Brand: HP | Category: Switch | Size: 9.89 MB
Table of contents
Table Of Contents3................................................................................................................................................................
Related Documentation5................................................................................................................................................................
Obtaining Documentation5................................................................................................................................................................
Product Overview7................................................................................................................................................................
Software Release Notes8................................................................................................................................................................
Obtaining The Documentation8................................................................................................................................................................
H3c Website8................................................................................................................................................................
Manual List9................................................................................................................................................................
Software Version9................................................................................................................................................................
Networking Applications13................................................................................................................................................................
Convergence Layer Devices13................................................................................................................................................................
Access Layer Devices13................................................................................................................................................................
Data Center Access14................................................................................................................................................................
Login15................................................................................................................................................................
Logging In To An Ethernet Switch17................................................................................................................................................................
Introduction To The User Interface17................................................................................................................................................................
Supported User Interfaces17................................................................................................................................................................
Relationship Between A User And A User Interface18................................................................................................................................................................
User Interface Index18................................................................................................................................................................
Common User Interface Configuration18................................................................................................................................................................
Logging In Through The Console Port20................................................................................................................................................................
Setting Up A Login Environment For Login Through The Console Port20................................................................................................................................................................
Console Port Login Configuration23................................................................................................................................................................
Common Configuration23................................................................................................................................................................
Console Port Login Configurations For Different Authentication Modes25................................................................................................................................................................
Console Port Login Configuration With Authentication Mode Being None26................................................................................................................................................................
Console Port Login Configuration With Authentication Mode Being Password27................................................................................................................................................................
Configuration Example28................................................................................................................................................................
Console Port Login Configuration With Authentication Mode Being Scheme29................................................................................................................................................................
Logging In Through Telnet33................................................................................................................................................................
Common Configuration To Control Telnet Access33................................................................................................................................................................
Telnet Configurations For Different Authentication Modes35................................................................................................................................................................
Telnet Configuration With Authentication Mode Being None36................................................................................................................................................................
Telnet Configuration With Authentication Mode Being Password37................................................................................................................................................................
Telnet Configuration With Authentication Mode Being Scheme39................................................................................................................................................................
Telnetting To A Switch41................................................................................................................................................................
Telnetting To A Switch From A Terminal41................................................................................................................................................................
Telnetting To Another Switch From The Current Switch43................................................................................................................................................................
Logging In Using A Modem44................................................................................................................................................................
Configuration On The Switch Side44................................................................................................................................................................
Modem Configuration44................................................................................................................................................................
Modem Connection Establishment45................................................................................................................................................................
Switch Configuration45................................................................................................................................................................
Cli Configuration49................................................................................................................................................................
Introduction To The Cli49................................................................................................................................................................
Command Hierarchy49................................................................................................................................................................
Command Level And User Privilege Level49................................................................................................................................................................
Modifying The Command Level50................................................................................................................................................................
Switching User Level51................................................................................................................................................................
Cli Views52................................................................................................................................................................
Cli Features55................................................................................................................................................................
Online Help55................................................................................................................................................................
Terminal Display57................................................................................................................................................................
Command History57................................................................................................................................................................
Error Prompts57................................................................................................................................................................
Command Edit58................................................................................................................................................................
Management Interface59................................................................................................................................................................
Establishing An Http Connection59................................................................................................................................................................
Configuring The Login Banner60................................................................................................................................................................
Enabling/disabling The Web Server61................................................................................................................................................................
Connection Establishment Using Nms63................................................................................................................................................................
Logging In Through Nms63................................................................................................................................................................
Configuring Source Ip Address For Telnet Service Packets64................................................................................................................................................................
Displaying Source Ip Address Configuration65................................................................................................................................................................
User Control66................................................................................................................................................................
Controlling Telnet Users66................................................................................................................................................................
Controlling Telnet Users By Acl67................................................................................................................................................................
Controlling Network Management Users By Source Ip Addresses68................................................................................................................................................................
Controlling Web Users By Source Ip Address70................................................................................................................................................................
Controlling Web Users By Source Ip Addresses70................................................................................................................................................................
Logging Out A Web User71................................................................................................................................................................
Configuration File Management73................................................................................................................................................................
Introduction To Configuration File74................................................................................................................................................................
Configuration Task List75................................................................................................................................................................
Saving The Current Configuration75................................................................................................................................................................
Erasing The Startup Configuration File76................................................................................................................................................................
Specifying A Configuration File For Next Startup77................................................................................................................................................................
Vlan78................................................................................................................................................................
Displaying Switch Configuration78................................................................................................................................................................
Vlan Overview80................................................................................................................................................................
Advantages Of Vlans81................................................................................................................................................................
Vlan Fundamentals81................................................................................................................................................................
Management Vlan83................................................................................................................................................................
Vlan Interface83................................................................................................................................................................
Vlan Classification83................................................................................................................................................................
Port-based Vlan83................................................................................................................................................................
Link Types Of Ethernet Ports84................................................................................................................................................................
Assigning An Ethernet Port To Specified Vlans84................................................................................................................................................................
Configuring The Default Vlan Id For A Port84................................................................................................................................................................
Protocol-based Vlan85................................................................................................................................................................
Introduction To Protocol-based Vlan85................................................................................................................................................................
Encapsulation Format Of Ethernet Data86................................................................................................................................................................
Procedure For The Switch To Judge Packet Protocol88................................................................................................................................................................
Encapsulation Formats88................................................................................................................................................................
Implementation Of Protocol-based Vlan89................................................................................................................................................................
Vlan Configuration90................................................................................................................................................................
Basic Vlan Interface Configuration91................................................................................................................................................................
Displaying Vlan Configuration92................................................................................................................................................................
Configuring A Port-based Vlan92................................................................................................................................................................
Port-based Vlan Configuration Task List92................................................................................................................................................................
Configuring The Link Type Of An Ethernet Port92................................................................................................................................................................
Assigning An Ethernet Port To A Vlan93................................................................................................................................................................
Configuring The Default Vlan For A Port94................................................................................................................................................................
Displaying And Maintaining Port-based Vlan94................................................................................................................................................................
Port-based Vlan Configuration Example94................................................................................................................................................................
Configuring A Protocol-based Vlan96................................................................................................................................................................
Protocol-based Vlan Configuration Task List96................................................................................................................................................................
Configuring A Protocol Template For A Protocol-based Vlan96................................................................................................................................................................
Associating A Port With A Protocol-based Vlan97................................................................................................................................................................
Displaying Protocol-based Vlan Configuration98................................................................................................................................................................
Protocol-based Vlan Configuration Example98................................................................................................................................................................
Management Vlan Configuration102................................................................................................................................................................
Introduction To Management Vlan102................................................................................................................................................................
Static Route102................................................................................................................................................................
Default Route102................................................................................................................................................................
Configuring The Management Vlan103................................................................................................................................................................
Displaying And Maintaining Management Vlan Configuration105................................................................................................................................................................
Voice Vlan106................................................................................................................................................................
Voice Vlan Configuration107................................................................................................................................................................
Voice Vlan Overview107................................................................................................................................................................
How S5100-ei Series Switches Identify Voice Traffic109................................................................................................................................................................
Setting The Voice Traffic Transmission Priority110................................................................................................................................................................
Configuring Voice Vlan Assignment Mode Of A Port110................................................................................................................................................................
Support For Voice Vlan On Various Ports110................................................................................................................................................................
Security Mode Of Voice Vlan112................................................................................................................................................................
Configuring The Voice Vlan To Operate In Automatic Voice Vlan Assignment Mode112................................................................................................................................................................
Configuring The Voice Vlan To Operate In Manual Voice Vlan Assignment Mode114................................................................................................................................................................
Displaying And Maintaining Voice Vlan115................................................................................................................................................................
Voice Vlan Configuration Example116................................................................................................................................................................
Voice Vlan Configuration Example (automatic Mode)116................................................................................................................................................................
Voice Vlan Configuration Example (manual Mode)117................................................................................................................................................................
Gvrp119................................................................................................................................................................
Gvrp Configuration120................................................................................................................................................................
Introduction To Gvrp120................................................................................................................................................................
Protocol Specifications123................................................................................................................................................................
Gvrp Configuration Tasks123................................................................................................................................................................
Enabling Gvrp123................................................................................................................................................................
Configuring Gvrp Timers124................................................................................................................................................................
Displaying And Maintaining Gvrp125................................................................................................................................................................
Configuring Gvrp Port Registration Mode125................................................................................................................................................................
Gvrp Configuration Example126................................................................................................................................................................
Port Basic Configuration130................................................................................................................................................................
Ethernet Port Configuration131................................................................................................................................................................
Combo Port Configuration131................................................................................................................................................................
Initially Configuring A Port132................................................................................................................................................................
Configuring Port Auto-negotiation Speed132................................................................................................................................................................
Limiting Traffic On Individual Ports133................................................................................................................................................................
Enabling Flow Control On A Port134................................................................................................................................................................
Duplicating The Configuration Of A Port To Other Ports134................................................................................................................................................................
Link Aggregation135................................................................................................................................................................
Configuring Loopback Detection For An Ethernet Port135................................................................................................................................................................
Enabling Loopback Test136................................................................................................................................................................
Enabling The System To Test Connected Cable136................................................................................................................................................................
Configuring The Interval To Perform Statistical Analysis On Port Traffic137................................................................................................................................................................
Disabling Up/down Log Output On A Port137................................................................................................................................................................
Configuring A Port Group138................................................................................................................................................................
Displaying And Maintaining Basic Port Configuration139................................................................................................................................................................
Link Aggregation Configuration141................................................................................................................................................................
Link Aggregation Classification142................................................................................................................................................................
Manual Aggregation Group142................................................................................................................................................................
Static Lacp Aggregation Group143................................................................................................................................................................
Dynamic Lacp Aggregation Group144................................................................................................................................................................
Aggregation Group Categories145................................................................................................................................................................
Configuring A Manual Aggregation Group146................................................................................................................................................................
Configuring A Static Lacp Aggregation Group147................................................................................................................................................................
Configuring A Dynamic Lacp Aggregation Group148................................................................................................................................................................
Configuring A Description For An Aggregation Group148................................................................................................................................................................
Displaying And Maintaining Link Aggregation Configuration149................................................................................................................................................................
Link Aggregation Configuration Example149................................................................................................................................................................
Ethernet Port Aggregation Configuration Example149................................................................................................................................................................
Port Isolation152................................................................................................................................................................
Port Isolation Configuration153................................................................................................................................................................
Port Isolation Overview153................................................................................................................................................................
Port Isolation Configuration Example154................................................................................................................................................................
Displaying And Maintaining Port Isolation Configuration154................................................................................................................................................................
Configuration Procedure155................................................................................................................................................................
Port Security Configuration157................................................................................................................................................................
Port Security Overview157................................................................................................................................................................
Port Security Features157................................................................................................................................................................
Port Security Modes157................................................................................................................................................................
Port Security Configuration Task List160................................................................................................................................................................
Enabling Port Security160................................................................................................................................................................
Setting The Maximum Number Of Mac Addresses Allowed On A Port161................................................................................................................................................................
Setting The Port Security Mode162................................................................................................................................................................
Configuring Port Security Features163................................................................................................................................................................
Ignoring The Authorization Information From The Radius Server164................................................................................................................................................................
Configuring Security Mac Addresses164................................................................................................................................................................
Displaying And Maintaining Port Security Configuration165................................................................................................................................................................
Port Security Configuration Example166................................................................................................................................................................
Port Binding Overview167................................................................................................................................................................
Port Binding Configuration167................................................................................................................................................................
Displaying And Maintaining Port Binding Configuration167................................................................................................................................................................
Port Binding Configuration Example168................................................................................................................................................................
Dldp169................................................................................................................................................................
Dldp Configuration170................................................................................................................................................................
Dldp Fundamentals171................................................................................................................................................................
Dldp Packets171................................................................................................................................................................
Dldp Status173................................................................................................................................................................
Dldp Timers173................................................................................................................................................................
Dldp Operating Mode174................................................................................................................................................................
Dldp Implementation175................................................................................................................................................................
Dldp Neighbor State176................................................................................................................................................................
Link Auto-recovery Mechanism176................................................................................................................................................................
Performing Basic Dldp Configuration177................................................................................................................................................................
Resetting Dldp State178................................................................................................................................................................
Dldp Configuration Example179................................................................................................................................................................
Displaying And Maintaining Dldp179................................................................................................................................................................
Mac Address Table181................................................................................................................................................................
Mac Address Table Management182................................................................................................................................................................
Introduction To Mac Address Table182................................................................................................................................................................
Introduction To Mac Address Learning182................................................................................................................................................................
Managing Mac Address Table184................................................................................................................................................................
Configuring Mac Address Table Management185................................................................................................................................................................
Configuring A Mac Address Entry186................................................................................................................................................................
Setting The Aging Time Of Mac Address Entries187................................................................................................................................................................
Setting The Maximum Number Of Mac Addresses A Port Can Learn187................................................................................................................................................................
Displaying Mac Address Table Information188................................................................................................................................................................
Disabling Mac Address Learning For A Vlan188................................................................................................................................................................
Adding A Static Mac Address Entry Manually189................................................................................................................................................................
Mstp190................................................................................................................................................................
Mstp Configuration192................................................................................................................................................................
Spanning Tree Protocol Overview192................................................................................................................................................................
Rapid Spanning Tree Protocol Overview201................................................................................................................................................................
Multiple Spanning Tree Protocol Overview201................................................................................................................................................................
Mstp Implementation On Switches205................................................................................................................................................................
Mstp Configuration Task List206................................................................................................................................................................
Configuring Root Bridge208................................................................................................................................................................
Configuring An Mst Region208................................................................................................................................................................
Specifying The Current Switch As A Root Bridge/secondary Root Bridge209................................................................................................................................................................
Configuring The Bridge Priority Of The Current Switch211................................................................................................................................................................
Configuring The Mstp Operation Mode212................................................................................................................................................................
Configuring The Maximum Hop Count Of An Mst Region213................................................................................................................................................................
Configuring The Network Diameter Of The Switched Network214................................................................................................................................................................
Configuring The Mstp Time-related Parameters214................................................................................................................................................................
Configuring The Current Port As An Edge Port217................................................................................................................................................................
Enabling Mstp219................................................................................................................................................................
Configuring Leaf Nodes220................................................................................................................................................................
Configuring The Mst Region220................................................................................................................................................................
Configuring A Port As An Edge Port221................................................................................................................................................................
Configuring The Path Cost For A Port221................................................................................................................................................................
Configuring Port Priority223................................................................................................................................................................
Performing Mcheck Operation224................................................................................................................................................................
Configuring Guard Functions225................................................................................................................................................................
Configuring Bpdu Guard225................................................................................................................................................................
Configuring Root Guard226................................................................................................................................................................
Configuring Loop Guard227................................................................................................................................................................
Configuring Tc-bpdu Attack Guard228................................................................................................................................................................
Configuring Bpdu Dropping229................................................................................................................................................................
Configuring Digest Snooping230................................................................................................................................................................
Configuring Rapid Transition232................................................................................................................................................................
Configuring Vlan-vpn Tunnel235................................................................................................................................................................
Mstp Maintenance Configuration236................................................................................................................................................................
Enabling Log/trap Output For Ports Of Mstp Instance236................................................................................................................................................................
Displaying And Maintaining Mstp237................................................................................................................................................................
Enabling Trap Messages Conforming To 802.1d Standard237................................................................................................................................................................
Mstp Configuration Example238................................................................................................................................................................
Vlan-vpn Tunnel Configuration Example240................................................................................................................................................................
X Configuration244................................................................................................................................................................
Introduction To 802.1x244................................................................................................................................................................
Architecture Of 802.1x Authentication244................................................................................................................................................................
The Mechanism Of An 802.1x Authentication System246................................................................................................................................................................
Encapsulation Of Eapol Messages247................................................................................................................................................................
X Authentication Procedure249................................................................................................................................................................
Timers Used In 802.1x252................................................................................................................................................................
X Implementation On An S5100-si/ei Series Switch253................................................................................................................................................................
Introduction To 802.1x Configuration256................................................................................................................................................................
Basic 802.1x Configuration257................................................................................................................................................................
Configuring Basic 802.1x Functions257................................................................................................................................................................
Timer And Maximum User Number Configuration259................................................................................................................................................................
Advanced 802.1x Configuration260................................................................................................................................................................
Configuring Proxy Checking260................................................................................................................................................................
Configuring Client Version Checking261................................................................................................................................................................
Enabling Dhcp-triggered Authentication262................................................................................................................................................................
Configuring Guest Vlan262................................................................................................................................................................
Configuring 802.1x Re-authentication263................................................................................................................................................................
Configuring The 802.1x Re-authentication Timer263................................................................................................................................................................
Displaying And Maintaining 802.1x Configuration264................................................................................................................................................................
X Configuration Example264................................................................................................................................................................
Quick Ead Deployment Configuration267................................................................................................................................................................
Introduction To Quick Ead Deployment267................................................................................................................................................................
Quick Ead Deployment Overview267................................................................................................................................................................
Operation Of Quick Ead Deployment267................................................................................................................................................................
Configuration Prerequisites268................................................................................................................................................................
Configuring Quick Ead Deployment268................................................................................................................................................................
Displaying And Maintaining Quick Ead Deployment270................................................................................................................................................................
Quick Ead Deployment Configuration Example270................................................................................................................................................................
Troubleshooting271................................................................................................................................................................
Introduction To Habp272................................................................................................................................................................
Habp Server Configuration272................................................................................................................................................................
Habp Configuration272................................................................................................................................................................
Habp Client Configuration273................................................................................................................................................................
Displaying And Maintaining Habp Configuration273................................................................................................................................................................
System-guard Configuration274................................................................................................................................................................
System-guard Overview274................................................................................................................................................................
Aaa Overview278................................................................................................................................................................
Introduction To Aaa278................................................................................................................................................................
Introduction To Aaa Services279................................................................................................................................................................
Introduction To Isp Domain279................................................................................................................................................................
Introduction To Radius279................................................................................................................................................................
Introduction To Hwtacacs284................................................................................................................................................................
Aaa Configuration287................................................................................................................................................................
Aaa Configuration Task List287................................................................................................................................................................
Creating An Isp Domain And Configuring Its Attributes288................................................................................................................................................................
Configuring An Aaa Scheme For An Isp Domain289................................................................................................................................................................
Configuring Dynamic Vlan Assignment292................................................................................................................................................................
Configuring The Attributes Of A Local User293................................................................................................................................................................
Mac Address Authentication294................................................................................................................................................................
Cutting Down User Connections Forcibly294................................................................................................................................................................
Radius Configuration Task List294................................................................................................................................................................
Creating A Radius Scheme296................................................................................................................................................................
Configuring Radius Authentication/authorization Servers297................................................................................................................................................................
Configuring Ignorance Of Assigned Radius Authorization Attributes297................................................................................................................................................................
Configuring Radius Accounting Servers298................................................................................................................................................................
Configuring Shared Keys For Radius Messages300................................................................................................................................................................
Configuring The Maximum Number Of Radius Request Transmission Attempts300................................................................................................................................................................
Configuring The Type Of Radius Servers To Be Supported301................................................................................................................................................................
Configuring The Status Of Radius Servers301................................................................................................................................................................
Configuring The Attributes Of Data To Be Sent To Radius Servers302................................................................................................................................................................
Configuring The Local Radius Server303................................................................................................................................................................
Configuring Timers For Radius Servers304................................................................................................................................................................
Enabling Sending Trap Message When A Radius Server Goes Down305................................................................................................................................................................
Enabling The User Re-authentication At Restart Function305................................................................................................................................................................
Hwtacacs Configuration Task List307................................................................................................................................................................
Creating A Hwtacacs Scheme307................................................................................................................................................................
Configuring Tacacs Authentication Servers307................................................................................................................................................................
Configuring Tacacs Authorization Servers308................................................................................................................................................................
Configuring Tacacs Accounting Servers309................................................................................................................................................................
Configuring Shared Keys For Hwtacacs Messages309................................................................................................................................................................
Configuring The Attributes Of Data To Be Sent To Tacacs Servers310................................................................................................................................................................
Configuring The Timers Regarding Tacacs Servers311................................................................................................................................................................
Aaa Configuration Examples313................................................................................................................................................................
Remote Radius Authentication Of Telnet/ssh Users313................................................................................................................................................................
Local Authentication Of Ftp/telnet Users314................................................................................................................................................................
Hwtacacs Authentication And Authorization Of Telnet Users316................................................................................................................................................................
Troubleshooting Aaa317................................................................................................................................................................
Troubleshooting Radius Configuration317................................................................................................................................................................
Troubleshooting Hwtacacs Configuration317................................................................................................................................................................
Ead Configuration318................................................................................................................................................................
Introduction To Ead318................................................................................................................................................................
Typical Network Application Of Ead318................................................................................................................................................................
Ead Configuration Example320................................................................................................................................................................
Mac Address Authentication Configuration323................................................................................................................................................................
Mac Address Authentication Overview323................................................................................................................................................................
Performing Mac Address Authentication On A Radius Server323................................................................................................................................................................
Performing Mac Address Authentication Locally323................................................................................................................................................................
Related Concepts324................................................................................................................................................................
Mac Address Authentication Timers324................................................................................................................................................................
Quiet Mac Address324................................................................................................................................................................
Configuring Basic Mac Address Authentication Functions324................................................................................................................................................................
Mac Address Authentication Enhanced Function Configuration326................................................................................................................................................................
Mac Address Authentication Enhanced Function Configuration Task List326................................................................................................................................................................
Configuring A Guest Vlan326................................................................................................................................................................
Configuring The Maximum Number Of Mac Address Authentication Users Allowed To Access A Port328................................................................................................................................................................
Displaying And Maintaining Mac Address Authentication Configuration329................................................................................................................................................................
Mac Address Authentication Configuration Examples329................................................................................................................................................................
Ip Addressing Overview332................................................................................................................................................................
Ip Addressing Configuration332................................................................................................................................................................
Ip Address Classes332................................................................................................................................................................
Special Ip Addresses333................................................................................................................................................................
Subnetting And Masking333................................................................................................................................................................
Dhcp334................................................................................................................................................................
Configuring Ip Addresses334................................................................................................................................................................
Displaying Ip Addressing Configuration335................................................................................................................................................................
Vlan Interface Ip Address Configuration Examples335................................................................................................................................................................
Ip Address Configuration Example I335................................................................................................................................................................
Ip Address Configuration Example Ii336................................................................................................................................................................
Ip Performance Overview338................................................................................................................................................................
Ip Performance Optimization Configuration338................................................................................................................................................................
Configuring Ip Performance Optimization338................................................................................................................................................................
Disabling Sending Of Icmp Error Packets339................................................................................................................................................................
Displaying And Maintaining Ip Performance Optimization Configuration340................................................................................................................................................................
Dhcp Overview343................................................................................................................................................................
Introduction To Dhcp343................................................................................................................................................................
Dhcp Ip Address Assignment343................................................................................................................................................................
Ip Address Assignment Policy343................................................................................................................................................................
Obtaining Ip Addresses Dynamically344................................................................................................................................................................
Updating Ip Address Lease344................................................................................................................................................................
Dhcp Packet Format345................................................................................................................................................................
Protocol Specification346................................................................................................................................................................
Dhcp Relay Agent Configuration347................................................................................................................................................................
Introduction To Dhcp Relay Agent347................................................................................................................................................................
Usage Of Dhcp Relay Agent347................................................................................................................................................................
Dhcp Relay Agent Fundamentals347................................................................................................................................................................
Option 82 Support On Dhcp Relay Agent348................................................................................................................................................................
Configuring The Dhcp Relay Agent349................................................................................................................................................................
Dhcp Relay Agent Configuration Task List349................................................................................................................................................................
Correlating A Dhcp Server Group With A Relay Agent Interface350................................................................................................................................................................
Configuring Dhcp Relay Agent Security Functions350................................................................................................................................................................
Configuring The Dhcp Relay Agent To Support Option352................................................................................................................................................................
Displaying And Maintaining Dhcp Relay Agent Configuration353................................................................................................................................................................
Dhcp Relay Agent Configuration Example353................................................................................................................................................................
Troubleshooting Dhcp Relay Agent Configuration354................................................................................................................................................................
Dhcp Snooping Configuration355................................................................................................................................................................
Dhcp Snooping Overview355................................................................................................................................................................
Introduction To Dhcp Snooping355................................................................................................................................................................
Introduction To Dhcp-snooping Option356................................................................................................................................................................
Configuring Dhcp Snooping359................................................................................................................................................................
Introduction To Ip Filtering359................................................................................................................................................................
Configuring Dhcp Snooping To Support Option360................................................................................................................................................................
Displaying Dhcp Snooping Configuration364................................................................................................................................................................
Configuring Ip Filtering364................................................................................................................................................................
Dhcp Snooping Configuration Examples365................................................................................................................................................................
Dhcp-snooping Option 82 Support Configuration Example365................................................................................................................................................................
Ip Filtering Configuration Example366................................................................................................................................................................
Introduction To Dhcp Client368................................................................................................................................................................
Introduction To Bootp Client368................................................................................................................................................................
Dhcp/bootp Client Configuration368................................................................................................................................................................
Configuring A Dhcp/bootp Client368................................................................................................................................................................
Displaying Dhcp/bootp Client Configuration369................................................................................................................................................................
Dhcp Client Configuration Example370................................................................................................................................................................
Bootp Client Configuration Example370................................................................................................................................................................
Dhcp/bootp Client Configuration Example370................................................................................................................................................................
Acl Configuration372................................................................................................................................................................
Acl Overview372................................................................................................................................................................
Ways To Apply An Acl On A Switch373................................................................................................................................................................
Types Of Acls Supported By S5100 Series Ethernet Switches374................................................................................................................................................................
Configuring Time Range374................................................................................................................................................................
Configuring Basic Acl376................................................................................................................................................................
Configuring Advanced Acl377................................................................................................................................................................
Configuring Layer 2 Acl378................................................................................................................................................................
Acl Assignment379................................................................................................................................................................
Assigning An Acl Globally380................................................................................................................................................................
Assigning An Acl To A Vlan380................................................................................................................................................................
Assigning An Acl To A Port Group381................................................................................................................................................................
Assigning An Acl To A Port382................................................................................................................................................................
Displaying Acl Configuration383................................................................................................................................................................
Example For Upper-layer Software Referencing Acls383................................................................................................................................................................
Example For Controlling Telnet Login Users By Source Ip383................................................................................................................................................................
Basic Acl Configuration Example384................................................................................................................................................................
Example For Controlling Web Login Users By Source Ip384................................................................................................................................................................
Example For Applying Acls To Hardware384................................................................................................................................................................
Advanced Acl Configuration Example385................................................................................................................................................................
Layer 2 Acl Configuration Example386................................................................................................................................................................
Example For Applying An Acl To A Vlan386................................................................................................................................................................
Qos Configuration390................................................................................................................................................................
Introduction To Qos390................................................................................................................................................................
Major Traffic Control Technologies391................................................................................................................................................................
Qos Features Supported By The S5100 Series Ethernet Switches392................................................................................................................................................................
Traffic Classification393................................................................................................................................................................
Introduction To Qos Features393................................................................................................................................................................
Priority Trust Mode393................................................................................................................................................................
Priority Marking401................................................................................................................................................................
Protocol Priority401................................................................................................................................................................
Traffic Policing And Traffic Shaping401................................................................................................................................................................
Line Rate404................................................................................................................................................................
Vlan Mapping404................................................................................................................................................................
Queue Scheduling404................................................................................................................................................................
Traffic Redirecting404................................................................................................................................................................
Flow-based Traffic Accounting407................................................................................................................................................................
Qos Configuration Task List407................................................................................................................................................................
Configuring Priority Trust Mode408................................................................................................................................................................
Configuring Priority Mapping409................................................................................................................................................................
Setting The Priority Of Protocol Packets413................................................................................................................................................................
Configuring Priority Marking414................................................................................................................................................................
Configuring Traffic Policing416................................................................................................................................................................
Configuring Traffic Shaping419................................................................................................................................................................
Configuring Line Rate420................................................................................................................................................................
Configuring Traffic Redirecting421................................................................................................................................................................
Configuring Vlan Mapping423................................................................................................................................................................
Configuring Queue Scheduling424................................................................................................................................................................
Configuring Traffic Accounting426................................................................................................................................................................
Enabling The Burst Function428................................................................................................................................................................
Configuring Traffic Mirroring429................................................................................................................................................................
Displaying And Maintaining Qos432................................................................................................................................................................
Qos Configuration Examples433................................................................................................................................................................
Traffic Policing Configuration Example433................................................................................................................................................................
Priority Marking And Queue Scheduling Configuration Example435................................................................................................................................................................
Vlan Mapping Configuration Example436................................................................................................................................................................
Traffic Mirroring And Traffic Redirecting Configuration Example439................................................................................................................................................................
Qos Profile Configuration441................................................................................................................................................................
Introduction To Qos Profile441................................................................................................................................................................
Qos Profile Application Mode441................................................................................................................................................................
Configuring A Qos Profile442................................................................................................................................................................
Applying A Qos Profile443................................................................................................................................................................
Displaying And Maintaining Qos Profile Configuration444................................................................................................................................................................
Qos Profile Configuration Example445................................................................................................................................................................
Mirroring Configuration448................................................................................................................................................................
Mirroring Overview448................................................................................................................................................................
Local Port Mirroring449................................................................................................................................................................
Remote Port Mirroring449................................................................................................................................................................
Mac-based Mirroring450................................................................................................................................................................
Qos-qos Profile451................................................................................................................................................................
Mirroring451................................................................................................................................................................
Vlan-based Mirroring451................................................................................................................................................................
Configuring Local Port Mirroring451................................................................................................................................................................
Configuring Remote Port Mirroring452................................................................................................................................................................
Configuring Mac-based Mirroring455................................................................................................................................................................
Configuring Vlan-based Mirroring456................................................................................................................................................................
Displaying Port Mirroring457................................................................................................................................................................
Mirroring Configuration Examples458................................................................................................................................................................
Local Port Mirroring Configuration Example458................................................................................................................................................................
Remote Port Mirroring Configuration Example459................................................................................................................................................................
Network Diagram460................................................................................................................................................................
Arp Configuration464................................................................................................................................................................
Introduction To Arp464................................................................................................................................................................
Arp Function464................................................................................................................................................................
Arp Message Format464................................................................................................................................................................
Arp Table466................................................................................................................................................................
Arp Process466................................................................................................................................................................
Introduction To Arp Attack Detection467................................................................................................................................................................
Configuring Arp468................................................................................................................................................................
Introduction To Gratuitous Arp468................................................................................................................................................................
Configuring Arp Basic Functions468................................................................................................................................................................
Configuring Arp Attack Detection469................................................................................................................................................................
Configuring Gratuitous Arp470................................................................................................................................................................
Displaying And Debugging Arp470................................................................................................................................................................
Arp Configuration Examples471................................................................................................................................................................
Arp Basic Configuration Example471................................................................................................................................................................
Arp Attack Detection Configuration Example471................................................................................................................................................................
Stack Function Overview474................................................................................................................................................................
The Main Switch Of A Stack474................................................................................................................................................................
The Slave Switches Of A Stack474................................................................................................................................................................
Creating A Stack474................................................................................................................................................................
Main Switch Configuration475................................................................................................................................................................
Configuring The Ip Address Pool And Creating The Stack475................................................................................................................................................................
Switching To Slave Switch View476................................................................................................................................................................
Slave Switch Configuration476................................................................................................................................................................
Displaying And Debugging A Stack476................................................................................................................................................................
Stack Configuration Example477................................................................................................................................................................
Cluster Overview480................................................................................................................................................................
Introduction To Hgmp480................................................................................................................................................................
Roles In A Cluster481................................................................................................................................................................
How A Cluster Works482................................................................................................................................................................
Cluster Configuration Tasks487................................................................................................................................................................
Configuring The Management Device488................................................................................................................................................................
Configuring Member Devices492................................................................................................................................................................
Managing A Cluster Through The Management Device494................................................................................................................................................................
Configuring The Enhanced Cluster Features495................................................................................................................................................................
Snmp-rmon497................................................................................................................................................................
Configuring The Cluster Synchronization Function497................................................................................................................................................................
Displaying And Maintaining Cluster Configuration501................................................................................................................................................................
Cluster Configuration Example502................................................................................................................................................................
Basic Cluster Configuration Example502................................................................................................................................................................
Enhanced Cluster Feature Configuration Example505................................................................................................................................................................
Snmp Configuration508................................................................................................................................................................
Snmp Overview508................................................................................................................................................................
Configuring Basic Snmp Functions509................................................................................................................................................................
Configuring Trap-related Functions511................................................................................................................................................................
Configuring Basic Trap Functions511................................................................................................................................................................
Enabling Logging For Network Management512................................................................................................................................................................
Configuring Extended Trap Function512................................................................................................................................................................
Displaying Snmp513................................................................................................................................................................
Snmp Configuration Example513................................................................................................................................................................
Rmon Configuration516................................................................................................................................................................
Introduction To Rmon516................................................................................................................................................................
Displaying Rmon519................................................................................................................................................................
Rmon Configuration Example519................................................................................................................................................................
Multicast Overview523................................................................................................................................................................
Information Transmission In The Broadcast Mode524................................................................................................................................................................
Information Transmission In The Multicast Mode524................................................................................................................................................................
Roles In Multicast525................................................................................................................................................................
Common Notations In Multicast526................................................................................................................................................................
Advantages And Applications Of Multicast526................................................................................................................................................................
Multicast Models527................................................................................................................................................................
Multicast Architecture527................................................................................................................................................................
Multicast Protocols531................................................................................................................................................................
Multicast Packet Forwarding Mechanism532................................................................................................................................................................
Implementation Of The Rpf Mechanism533................................................................................................................................................................
Rpf Check533................................................................................................................................................................
Igmp Snooping Configuration535................................................................................................................................................................
Igmp Snooping Overview535................................................................................................................................................................
Work Mechanism Of Igmp Snooping536................................................................................................................................................................
Enabling Igmp Snooping539................................................................................................................................................................
Configuring The Version Of Igmp Snooping539................................................................................................................................................................
Configuring Timers540................................................................................................................................................................
Configuring Fast Leave Processing540................................................................................................................................................................
Configuring A Multicast Group Filter541................................................................................................................................................................
Configuring The Maximum Number Of Multicast Groups On A Port542................................................................................................................................................................
Configuring Igmp Querier543................................................................................................................................................................
Suppressing Flooding Of Unknown Multicast Traffic In A Vlan544................................................................................................................................................................
Configuring Static Member Port For A Multicast Group544................................................................................................................................................................
Configuring A Static Router Port545................................................................................................................................................................
Configuring A Port As A Simulated Group Member545................................................................................................................................................................
Configuring A Vlan Tag For Query Messages546................................................................................................................................................................
Displaying And Maintaining Igmp Snooping549................................................................................................................................................................
Igmp Snooping Configuration Examples549................................................................................................................................................................
Configuring Igmp Snooping549................................................................................................................................................................
Configuring Multicast Vlan551................................................................................................................................................................
Troubleshooting Igmp Snooping554................................................................................................................................................................
Common Multicast Configuration555................................................................................................................................................................
Displaying Common Multicast Configuration556................................................................................................................................................................
Configuring Dropping Unknown Multicast Packets556................................................................................................................................................................
Ntp Configuration558................................................................................................................................................................
Introduction To Ntp558................................................................................................................................................................
Applications Of Ntp558................................................................................................................................................................
Implementation Principle Of Ntp559................................................................................................................................................................
Ntp Implementation Modes561................................................................................................................................................................
Ntp Configuration Task List563................................................................................................................................................................
Configuring Ntp Implementation Modes563................................................................................................................................................................
Configuring Access Control Right567................................................................................................................................................................
Configuring Ntp Authentication568................................................................................................................................................................
Configuring Optional Ntp Parameters571................................................................................................................................................................
Configuring An Interface On The Local Switch To Send Ntp Messages571................................................................................................................................................................
Configuring The Number Of Dynamic Sessions Allowed On The Local Switch571................................................................................................................................................................
Displaying Ntp Configuration572................................................................................................................................................................
Disabling An Interface From Receiving Ntp Messages572................................................................................................................................................................
Configuration Examples573................................................................................................................................................................
Configuring Ntp Symmetric Peer Mode574................................................................................................................................................................
Configuring Ntp Broadcast Mode575................................................................................................................................................................
Configuring Ntp Multicast Mode577................................................................................................................................................................
Configuring Ntp Server/client Mode With Authentication578................................................................................................................................................................
Ssh Configuration582................................................................................................................................................................
Ssh Overview582................................................................................................................................................................
Introduction To Ssh582................................................................................................................................................................
Algorithm And Key582................................................................................................................................................................
Ssh Operating Process583................................................................................................................................................................
Ssh Server And Client585................................................................................................................................................................
Configuring The Ssh Server586................................................................................................................................................................
Configuring The User Interfaces For Ssh Clients587................................................................................................................................................................
Configuring The Ssh Management Functions588................................................................................................................................................................
Configuring The Ssh Server To Be Compatible With Ssh1 Clients589................................................................................................................................................................
Configuring Key Pairs589................................................................................................................................................................
Creating An Ssh User And Specifying An Authentication Type590................................................................................................................................................................
Specifying A Service Type For An Ssh User On The Server592................................................................................................................................................................
Configuring The Public Key Of A Client On The Server593................................................................................................................................................................
Assigning A Public Key To An Ssh User593................................................................................................................................................................
Exporting The Host Public Key To A File594................................................................................................................................................................
Configuring The Ssh Client595................................................................................................................................................................
Ssh Client Configuration Task List595................................................................................................................................................................
Configuring An Ssh Client That Runs Ssh Client Software595................................................................................................................................................................
Configuring An Ssh Client Assumed By An Ssh2-capable Switch601................................................................................................................................................................
Displaying And Maintaining Ssh Configuration604................................................................................................................................................................
Comparison Of Ssh Commands With The Same Functions604................................................................................................................................................................
Ssh Configuration Examples605................................................................................................................................................................
When Switch Acts As Server For Local Password Authentication605................................................................................................................................................................
When Switch Acts As Server For Password And Radius Authentication608................................................................................................................................................................
When Switch Acts As Server For Password And Hwtacacs Authentication613................................................................................................................................................................
When Switch Acts As Server For Publickey Authentication615................................................................................................................................................................
When Switch Acts As Client For Password Authentication621................................................................................................................................................................
When Switch Acts As Client For Publickey Authentication622................................................................................................................................................................
When Switch Acts As Client And First-time Authentication Is Not Supported625................................................................................................................................................................
File System Configuration629................................................................................................................................................................
File System Management Configuration629................................................................................................................................................................
Introduction To File System629................................................................................................................................................................
File System Configuration Tasks629................................................................................................................................................................
Directory Operations629................................................................................................................................................................
File Operations630................................................................................................................................................................
Flash Memory Operations631................................................................................................................................................................
Prompt Mode Configuration631................................................................................................................................................................
File System Configuration Example632................................................................................................................................................................
File Attribute Configuration633................................................................................................................................................................
Introduction To File Attributes633................................................................................................................................................................
Configuring File Attributes634................................................................................................................................................................
Introduction To Ftp And Sftp637................................................................................................................................................................
Ftp And Sftp Configuration637................................................................................................................................................................
Ftp Configuration638................................................................................................................................................................
Introduction To Sftp638................................................................................................................................................................
Ftp Configuration: A Switch Operating As An Ftp Server638................................................................................................................................................................
Configuration Example: A Switch Operating As An Ftp Server645................................................................................................................................................................
Ftp Banner Display Configuration Example647................................................................................................................................................................
Sftp Configuration650................................................................................................................................................................
Sftp Configuration: A Switch Operating As An Sftp Server650................................................................................................................................................................
Sftp Configuration: A Switch Operating As An Sftp Client651................................................................................................................................................................
Sftp Configuration Example653................................................................................................................................................................
Tftp Configuration657................................................................................................................................................................
Introduction To Tftp657................................................................................................................................................................
Tftp Configuration: A Switch Operating As A Tftp Client658................................................................................................................................................................
Tftp Configuration Example659................................................................................................................................................................
Information Center662................................................................................................................................................................
Information Center Overview662................................................................................................................................................................
System Information Format665................................................................................................................................................................
Information Center Configuration668................................................................................................................................................................
Information Center Configuration Task List668................................................................................................................................................................
Configuring Synchronous Information Output668................................................................................................................................................................
Configuring To Display The Time Stamp With The Utc Time Zone669................................................................................................................................................................
Setting To Output System Information To The Console669................................................................................................................................................................
Setting To Output System Information To A Monitor Terminal671................................................................................................................................................................
Setting To Output System Information To A Log Host672................................................................................................................................................................
Setting To Output System Information To The Trap Buffer673................................................................................................................................................................
Setting To Output System Information To The Log Buffer674................................................................................................................................................................
Setting To Output System Information To The Snmp Nms674................................................................................................................................................................
Displaying And Maintaining Information Center675................................................................................................................................................................
Information Center Configuration Examples676................................................................................................................................................................
Log Output To A Unix Log Host676................................................................................................................................................................
Log Output To A Linux Log Host677................................................................................................................................................................
Log Output To The Console679................................................................................................................................................................
Introduction To Loading Approaches682................................................................................................................................................................
Local Boot Rom And Software Loading682................................................................................................................................................................
Boot Rom And Host Software Loading682................................................................................................................................................................
Boot Menu683................................................................................................................................................................
Loading By Xmodem Through Console Port684................................................................................................................................................................
Loading By Tftp Through Ethernet Port688................................................................................................................................................................
Loading By Ftp Through Ethernet Port690................................................................................................................................................................
Remote Boot Rom And Software Loading692................................................................................................................................................................
Remote Loading Using Ftp692................................................................................................................................................................
Remote Loading Using Tftp696................................................................................................................................................................
Basic System Configuration697................................................................................................................................................................
Basic System Configuration And Debugging697................................................................................................................................................................
Displaying The System Status698................................................................................................................................................................
Debugging The System698................................................................................................................................................................
Enabling/disabling System Debugging698................................................................................................................................................................
Displaying Debugging Status699................................................................................................................................................................
Displaying Operating Information About Modules In System699................................................................................................................................................................
Network Connectivity Test700................................................................................................................................................................
Device Management702................................................................................................................................................................
Introduction To Device Management702................................................................................................................................................................
Device Management Configuration702................................................................................................................................................................
Scheduling A Reboot On The Switch703................................................................................................................................................................
Configuring Real-time Monitoring Of The Running Status Of The System703................................................................................................................................................................
Specifying The App To Be Used At Reboot704................................................................................................................................................................
Upgrading The Boot Rom704................................................................................................................................................................
Identifying And Diagnosing Pluggable Transceivers704................................................................................................................................................................
Displaying The Device Management Configuration706................................................................................................................................................................
Remote Switch App Upgrade Configuration Example706................................................................................................................................................................
Implementation Of Vlan-vpn711................................................................................................................................................................
Adjusting The Tpid Values Of Vlan-vpn Packets711................................................................................................................................................................
Enabling The Vlan-vpn Feature For A Port712................................................................................................................................................................
Tpid Adjusting Configuration712................................................................................................................................................................
Displaying Vlan-vpn Configuration713................................................................................................................................................................
Vlan-vpn Configuration Example713................................................................................................................................................................
Transmitting User Packets Through A Tunnel In The Public Network By Using Vlan-vpn713................................................................................................................................................................
Selective Qinq Configuration717................................................................................................................................................................
Selective Qinq Overview717................................................................................................................................................................
Inner-to-outer Tag Priority Mapping718................................................................................................................................................................
Enabling The Selective Qinq Feature For A Port718................................................................................................................................................................
Selective Qinq Configuration Example719................................................................................................................................................................
Configuring The Inner-to-outer Tag Priority Mapping Feature719................................................................................................................................................................
Processing Private Network Packets By Their Types719................................................................................................................................................................
Hwping Configuration724................................................................................................................................................................
Hwping Overview724................................................................................................................................................................
Test Types Supported By Hwping725................................................................................................................................................................
Hwping Test Parameters725................................................................................................................................................................
Hwping Server Configuration727................................................................................................................................................................
Hwping Client Configuration727................................................................................................................................................................
Displaying Hwping Configuration738................................................................................................................................................................
Hwping Configuration Examples738................................................................................................................................................................
Icmp Test738................................................................................................................................................................
Dhcp Test740................................................................................................................................................................
Ftp Test741................................................................................................................................................................
Http Test743................................................................................................................................................................
Jitter Test745................................................................................................................................................................
Network Requirements745................................................................................................................................................................
Snmp Test747................................................................................................................................................................
Tcp Test (tcpprivate Test) On The Specified Ports749................................................................................................................................................................
Udp Test (udpprivate Test) On The Specified Ports751................................................................................................................................................................
Dns Test752................................................................................................................................................................
Dns Configuration756................................................................................................................................................................
Dns Overview756................................................................................................................................................................
Static Domain Name Resolution756................................................................................................................................................................
Dynamic Domain Name Resolution756................................................................................................................................................................
Configuring Domain Name Resolution757................................................................................................................................................................
Configuring Static Domain Name Resolution757................................................................................................................................................................
Displaying And Maintaining Dns758................................................................................................................................................................
Configuring Dynamic Domain Name Resolution758................................................................................................................................................................
Dns Configuration Examples759................................................................................................................................................................
Static Domain Name Resolution Configuration Example759................................................................................................................................................................
Dynamic Domain Name Resolution Configuration Example759................................................................................................................................................................
Troubleshooting Dns761................................................................................................................................................................
Smart Link Overview763................................................................................................................................................................
Smart Link Configuration763................................................................................................................................................................
Basic Concepts In Smart Link763................................................................................................................................................................
Configuring Smart Link765................................................................................................................................................................
Operating Mechanism Of Smart Link765................................................................................................................................................................
Configuring A Smart Link Device766................................................................................................................................................................
Configuring Associated Devices767................................................................................................................................................................
Smart Link Configuration Example768................................................................................................................................................................
Displaying And Maintaining Smart Link768................................................................................................................................................................
Implementing Link Redundancy Backup768................................................................................................................................................................
Introduction To Monitor Link771................................................................................................................................................................
Monitor Link Configuration771................................................................................................................................................................
How Monitor Link Works772................................................................................................................................................................
Configuring Monitor Link773................................................................................................................................................................
Creating A Monitor Link Group773................................................................................................................................................................
Configuring The Uplink Port773................................................................................................................................................................
Configuring A Downlink Port774................................................................................................................................................................
Displaying Monitor Link Configuration775................................................................................................................................................................
Monitor Link Configuration Example775................................................................................................................................................................
Implementing Collaboration Between Smart Link And Monitor Link775................................................................................................................................................................
Ipv6 Configuration778................................................................................................................................................................
Ipv6 Overview778................................................................................................................................................................
Ipv6 Features778................................................................................................................................................................
Introduction To Ipv6 Address780................................................................................................................................................................
Introduction To Ipv6 Neighbor Discovery Protocol783................................................................................................................................................................
Introduction To Ipv6 Dns785................................................................................................................................................................
Ipv6 Configuration Task List786................................................................................................................................................................
Configuring An Ipv6 Unicast Address786................................................................................................................................................................
Configuring Ipv6 Ndp788................................................................................................................................................................
Configuring A Static Ipv6 Route789................................................................................................................................................................
Configuring Ipv6 Tcp Properties790................................................................................................................................................................
Configuring The Maximum Number Of Ipv6 Icmp Error Packets Sent Within A Specified Time790................................................................................................................................................................
Configuring The Hop Limit Of Icmpv6 Reply Packets791................................................................................................................................................................
Configuring Ipv6 Dns791................................................................................................................................................................
Displaying And Maintaining Ipv792................................................................................................................................................................
Ipv6 Configuration Example794................................................................................................................................................................
Ipv6 Unicast Address Configuration794................................................................................................................................................................
Ipv6 Application Configuration798................................................................................................................................................................
Introduction To Ipv6 Application798................................................................................................................................................................
Configuring Ipv6 Application798................................................................................................................................................................
Ipv6 Traceroute799................................................................................................................................................................
Ipv6 Tftp799................................................................................................................................................................
Ipv6 Telnet800................................................................................................................................................................
Ipv6 Application Configuration Example801................................................................................................................................................................
Ipv6 Applications801................................................................................................................................................................
Troubleshooting Ipv6 Application802................................................................................................................................................................
Unable To Ping A Remote Destination802................................................................................................................................................................
Unable To Run Traceroute803................................................................................................................................................................
Unable To Run Tftp803................................................................................................................................................................
Unable To Run Telnet803................................................................................................................................................................
Poe Configuration805................................................................................................................................................................
Poe Overview805................................................................................................................................................................
Poe Configuration Tasks807................................................................................................................................................................
Enabling The Poe Feature On A Port807................................................................................................................................................................
Setting The Maximum Output Power On A Port808................................................................................................................................................................
Setting Poe Management Mode And Poe Priority Of A Port808................................................................................................................................................................
Setting The Poe Mode On A Port809................................................................................................................................................................
Configuring The Pd Compatibility Detection Function809................................................................................................................................................................
Configuring Poe Over-temperature Protection On The Switch810................................................................................................................................................................
Upgrading The Pse Processing Software Online810................................................................................................................................................................
Displaying Poe Configuration810................................................................................................................................................................
Poe Configuration Example811................................................................................................................................................................
Poe Profile Configuration813................................................................................................................................................................
Introduction To Poe Profile813................................................................................................................................................................
Displaying Poe Profile Configuration814................................................................................................................................................................
Poe Profile Configuration Example814................................................................................................................................................................
Poe Profile Application Example814................................................................................................................................................................
Udp Helper Configuration818................................................................................................................................................................
Introduction To Udp Helper818................................................................................................................................................................
Configuring Udp Helper819................................................................................................................................................................
Displaying And Maintaining Udp Helper820................................................................................................................................................................
Udp Helper Configuration Example820................................................................................................................................................................
Cross-network Computer Search Through Udp Helper820................................................................................................................................................................
Access Management Configuration822................................................................................................................................................................
Access Management Overview822................................................................................................................................................................
Configuring Access Management823................................................................................................................................................................
Access Management Configuration Examples823................................................................................................................................................................
Access Management Configuration Example823................................................................................................................................................................
Combining Access Management With Port Isolation824................................................................................................................................................................

Advertising

Share and save

Advertising