Sign In
Upload
Manuals
Brands
H3C Manuals
Switch
H3C S5100-SI
H3C H3C S5100-SI Manuals
Manuals and User Guides for H3C H3C S5100-SI. We have
4
H3C H3C S5100-SI manuals available for free PDF download: Operation Manual, Installation Manual, Quick Start Manual
H3C H3C S5100-SI Operation Manual (934 pages)
Brand:
H3C
| Category:
Switch
| Size: 9.17 MB
Table of Contents
About this Manual
3
Table of Contents
3
Product Overview
7
Chapter 1 Obtaining the Documentation
8
H3C Website
8
Software Release Notes
9
Manual List
10
Software Version
10
Chapter 3 Product Overview
11
System Features of the S5100 Series
13
System Features of the S5100-Si Series
13
System Features of the S5100-Ei Series
14
Chapter 4 Networking Applications
17
Convergence Layer Devices
17
Access Layer Devices
18
Data Center Access
18
Login
19
Table of Contents
20
Chapter 1 Logging in to an Ethernet Switch
22
Introduction to the User Interface
22
Logging in to an Ethernet Switch
22
Supported User Interfaces
22
Relationship between a User and a User Interface
23
User Interface Index
23
Common User Interface Configuration
24
Chapter 2 Logging in through the Console Port
26
Setting up a Login Environment for Login through the Console Port
26
Common Configuration
29
Console Port Login Configuration
29
Console Port Login Configurations for Different Authentication Modes
31
Console Port Login Configuration with Authentication Mode Being None
32
Console Port Login Configuration with Authentication Mode Being Password
34
Console Port Login Configuration with Authentication Mode Being Scheme
36
Configuration Example
38
Chapter 3 Logging in through Telnet
40
Common Configuration to Control Telnet Access
41
Telnet Configuration with Authentication Mode Being None
43
Telnet Configurations for Different Authentication Modes
43
Telnet Configuration with Authentication Mode Being Password
45
Telnet Configuration with Authentication Mode Being Scheme
47
Telnetting to a Switch
49
Telnetting to a Switch from a Terminal
49
Telnetting to Another Switch from the Current Switch
52
Chapter 4 Logging in Using a Modem
53
Switch Configuration
54
Modem Connection Establishment
55
Introduction to the Cli
58
Command Hierarchy
58
Configuration on the Switch Side
53
Modem Configuration
53
Chapter 5 Cli Configuration
58
Command Level and User Privilege Level
58
Configuration File
59
Modifying the Command Level
59
Switching User Level
60
Cli Views
62
Management VLAN
63
Cli Features
66
Online Help
66
Terminal Display
67
Command History
68
Command Edit
69
Error Prompts
69
Chapter 6 Logging in through the Web-Based Network Management Interface
71
Establishing an Http Connection
71
Configuring the Login Banner
72
Enabling/Disabling the Web Server
74
Chapter 7 Logging in through Nms
75
Chapter 8 Configuring Source IP Address for Telnet Service Packets
76
Configuring Source Ip Address for Telnet Service Packets
76
Displaying Source Ip Address Configuration
77
Connection Establishment Using Nms
75
Chapter 9 User Control
78
Controlling Telnet Users
79
Controlling Telnet Users by Acl
79
Controlling Network Management Users by Source Ip Addresses
81
Controlling Web Users by Source Ip Address
83
Logging out a Web User
84
Configuration File Management
86
Chapter 1 Configuration File Management
87
Introduction to Configuration File
87
Configuration Task List
88
Saving the Current Configuration
88
Erasing the Startup Configuration File
90
Specifying a Configuration File for Next Startup
91
Displaying Switch Configuration
92
VLAN Overview/Vlan Configuration
93
Chapter 1 Vlan Overview
94
Vlan Fundamentals
95
Advantages of Vlans
95
Vlan Interface
97
Vlan Classification
98
Port-Based Vlan
98
Link Types of Ethernet Ports
98
Assigning an Ethernet Port to Specified Vlans
99
Configuring the Default Vlan ID for a Port
99
Protocol-Based Vlan
100
Introduction to Protocol-Based Vlan
100
Encapsulation Format of Ethernet Data
101
Procedure for the Switch to Judge Packet Protocol
103
Encapsulation Formats
103
Implementation of Protocol-Based Vlan
104
Vlan Configuration
105
Introduction to Vlan
94
Vlan Overview
94
Chapter 2 Vlan Configuration
105
Vlan Configuration Task List
105
Basic Vlan Configuration
105
Basic Vlan Interface Configuration
106
Displaying Vlan Configuration
107
Configuring a Port-Based Vlan
107
Port-Based Vlan Configuration Task List
107
Configuring the Link Type of an Ethernet Port
108
Assigning an Ethernet Port to a Vlan
108
Configuring the Default Vlan for a Port
109
Displaying and Maintaining Port-Based Vlan
110
Port-Based Vlan Configuration Example
110
Configuring a Protocol-Based Vlan
112
Protocol-Based Vlan Configuration Task List
112
Configuring a Protocol Template for a Protocol-Based Vlan
112
Associating a Port with a Protocol-Based Vlan
113
Displaying Protocol-Based Vlan Configuration
114
Protocol-Based Vlan Configuration Example
114
Management VLAN Configuration
117
Chapter 1 Management Vlan Configuration
118
Introduction to Management Vlan
118
Default Route
119
Management Vlan
118
Static Route
118
Management Vlan Configuration
119
Configuring the Management Vlan
119
Displaying and Maintaining Management Vlan Configuration
122
Voice VLAN
123
Chapter 1 Voice Vlan Configuration
124
How an Ip Phone Works
124
Voice Vlan Overview
124
How S5100-Ei Series Switches Identify Voice Traffic
126
Configuring Voice Vlan Assignment Mode of a Port
127
Setting the Voice Traffic Transmission Priority
127
Support for Voice Vlan on Various Ports
128
Security Mode of Voice Vlan
130
Voice Vlan Configuration
130
Configuring the Voice Vlan to Operate in Automatic Voice Vlan Assignment Mode
131
Configuring the Voice Vlan to Operate in Manual Voice Vlan Assignment Mode
132
Displaying and Maintaining Voice Vlan
134
Voice Vlan Configuration Example (Automatic Mode)
135
Voice Vlan Configuration Example (Manual Mode)
136
Gvrp
139
Chapter 1 Gvrp Configuration
140
Introduction to Gvrp
140
Enabling Gvrp
144
Gvrp Configuration
144
Gvrp Configuration Tasks
144
Protocol Specifications
144
Configuring Gvrp Timers
145
Configuring Gvrp Port Registration Mode
146
Displaying and Maintaining Gvrp
147
Gvrp Configuration Example
147
Port Basic Configuration
151
Chapter 1 Port Basic Configuration
152
Combo Port Configuration
152
Ethernet Port Configuration
152
Initially Configuring a Port
153
Configuring Port Auto-Negotiation Speed
154
Enabling Flow Control on a Port
155
Limiting Traffic on Individual Ports
155
Duplicating the Configuration of a Port to Other Ports
156
Configuring Loopback Detection for an Ethernet Port
157
Enabling Loopback Test
158
Link Aggregation
158
Configuring the Interval to Perform Statistical Analysis on Port Traffic
159
Enabling the System to Test Connected Cable
159
Disabling Up/Down Log Output on a Port
160
Configuring a Port Group
161
Displaying and Maintaining Basic Port Configuration
162
Link Aggregation Configuration
163
Chapter 1 Link Aggregation Configuration
164
Introduction to Lacp
164
Introduction to Link Aggregation
164
Link Aggregation Classification
165
Consistency Considerations for the Ports in Aggregation
165
Manual Aggregation Group
166
Static Lacp Aggregation Group
166
Dynamic Lacp Aggregation Group
167
Aggregation Group Categories
169
Configuring a Manual Aggregation Group
170
Link Aggregation Configuration
170
Configuring a Static Lacp Aggregation Group
171
Configuring a Dynamic Lacp Aggregation Group
172
Configuring a Description for an Aggregation Group
173
Displaying and Maintaining Link Aggregation Configuration
174
Link Aggregation Configuration Example
174
Ethernet Port Aggregation Configuration Example
174
Port Isolation
177
Chapter 1 Port Isolation Configuration
178
Port Isolation Configuration
178
Port Isolation Overview
178
Displaying and Maintaining Port Isolation Configuration
179
Port Isolation Configuration Example
179
Port Security-Port Binding
181
Chapter 1 Port Security Configuration
182
Port Security Features
182
Port Security Overview
182
Port Security Modes
183
Enabling Port Security
186
Port Security Configuration Task List
186
Setting the Maximum Number of Mac Addresses Allowed on a Port
187
Setting the Port Security Mode
188
Configuring Port Security Features
189
Configuring Security Mac Addresses
191
Ignoring the Authorization Information from the Radius Server
191
Displaying and Maintaining Port Security Configuration
192
Port Security Configuration Example
193
Chapter 2 Port Binding Configuration
195
Configuring Port Binding
195
Port Binding Overview
195
Displaying and Maintaining Port Binding Configuration
196
Port Binding Configuration Example
196
Dldp
198
Chapter 1 Dldp Configuration
199
Dldp Fundamentals
200
Dldp Configuration
205
Performing Basic Dldp Configuration
205
Resetting Dldp State
206
Displaying and Maintaining Dldp
207
Dldp Configuration Example
207
MAC Address Table
210
Chapter 1 Mac Address Table Management
211
Introduction to Mac Address Learning
211
Introduction to Mac Address Table
211
Managing Mac Address Table
214
Configuring a Mac Address Entry
215
Configuring Mac Address Table Management
215
Setting the Aging Time of Mac Address Entries
217
Setting the Maximum Number of Mac Addresses a Port Can Learn
217
Disabling Mac Address Learning for a Vlan
218
Adding a Static Mac Address Entry Manually
219
Displaying Mac Address Table Information
219
Mstp
220
Table of Contents
221
Chapter 1 Mstp Configuration
222
Stp Overview
222
Background of Mstp
232
Mstp Overview
232
Basic Mstp Terminologies
233
Principle of Mstp
237
Configuring Root Bridge
239
Mstp Implementation on Switches
239
Stp-Related Standards
239
Configuring an Mst Region
240
Specifying the Current Switch as a Root Bridge/Secondary Root Bridge
242
Configuring the Bridge Priority of the Current Switch
244
Configuring the Maximum Hop Count of an Mst Region
247
Configuring the Mstp Operation Mode
247
Configuring the Network Diameter of the Switched Network
248
Configuring the Mstp Time-Related Parameters
249
Configuring the Timeout Time Factor
250
Configuring the Current Port as an Edge Port
252
Specifying Whether the Link Connected to a Port Is Point-To-Point Link
254
Enabling Mstp
255
Configuring Leaf Nodes
256
Configuring the Mst Region
257
Configuring a Port as an Edge Port
258
Configuring the Path Cost for a Port
258
Configuring Port Priority
261
Performing Mcheck Operation
262
Specifying Whether the Link Connected to a Port Is a Point-To-Point Link
262
Configuring Guard Functions
263
Introduction
263
Configuration Prerequisites
265
Configuring BPDU Guard
265
Configuring Root Guard
266
Configuring Loop Guard
267
Configuring TC-BPDU Attack Guard
267
Configuring BPDU Dropping
268
Configuring Digest Snooping
268
Introduction
268
Configuring Digest Snooping
269
Configuring Rapid Transition
270
Introduction
270
Configuring Rapid Transition
272
Configuring VLAN-VPN Tunnel
273
Introduction
273
Configuring VLAN-VPN Tunnel
274
Enabling Trap Messages Conforming to 802.1D Standard
275
STP Maintenance Configuration
275
Introduction
275
Enabling Log/Trap Output for Ports of MSTP Instance
275
Configuration Example
275
Displaying and Maintaining MSTP
276
MSTP Configuration Example
277
VLAN-VPN Tunnel Configuration Example
279
Table of Contents
282
Chapter 1 802.1X Configuration
284
Introduction to 802.1X
284
Architecture of 802.1X Authentication
284
The Mechanism of an 802.1X Authentication System
286
Encapsulation of Eapol Messages
287
Authentication Procedure
289
Timers Used in 802.1X
293
Implementation on an S5100-SI/EI Series Switch
294
Introduction to 802.1X Configuration
298
Basic 802.1X Configuration
299
Configuration Prerequisites
299
Configuring Basic 802.1X Functions
299
MAC Address
301
Timer and Maximum User Number Configuration
301
Advanced 802.1X Configuration
302
Configuring Proxy Checking
303
Configuring Client Version Checking
304
Enabling DHCP-Triggered Authentication
304
Configuring Guest VLAN
305
Configuring 802.1X Re-Authentication
306
Configuring the 802.1X Re-Authentication Timer
306
Displaying and Maintaining 802.1X Configuration
307
Configuration Example
307
Chapter 2 Quick EAD Deployment Configuration
311
Introduction to Quick EAD Deployment
311
Quick EAD Deployment Overview
311
Operation of Quick EAD Deployment
311
Configuring Quick EAD Deployment
312
Configuration Prerequisites
312
Configuration Procedure
312
Displaying and Maintaining Quick EAD Deployment
314
Quick EAD Deployment Configuration Example
314
Troubleshooting
315
Chapter 3 HABP Configuration
317
Introduction to HABP
317
HABP Server Configuration
317
HABP Client Configuration
318
Displaying and Maintaining HABP Configuration
318
Chapter 4 System-Guard Configuration
319
System-Guard Overview
319
Configuring the System-Guard Feature
319
Displaying and Maintaining System-Guard
320
Aaa Overview/Aaa Configuration
321
Chapter 1 AAA Overview
323
Introduction to AAA
323
Authentication
323
Authorization
323
Accounting
324
Introduction to ISP Domain
324
Introduction to AAA Services
324
Introduction to RADIUS
324
Introduction to HWTACACS
330
Chapter 2 AAA Configuration
334
AAA Configuration Task List
334
Creating an ISP Domain and Configuring Its Attributes
335
Configuring an AAA Scheme for an ISP Domain
337
Configuring Dynamic VLAN Assignment
340
Configuring the Attributes of a Local User
341
Cutting down User Connections Forcibly
343
RADIUS Configuration Task List
344
IP Address and
345
Creating a RADIUS Scheme
346
Configuring RADIUS Authentication/Authorization Servers
346
Configuring RADIUS Accounting Servers
347
Configuring Shared Keys for RADIUS Messages
349
Configuring the Maximum Number of RADIUS Request Transmission Attempts
350
Configuring the Type of RADIUS Servers to be Supported
350
Configuring the Status of RADIUS Servers
351
Configuring the Attributes of Data to be Sent to RADIUS Servers
352
Configuring the Local RADIUS Server
354
Configuring Timers for RADIUS Servers
355
Enabling Sending Trap Message When a RADIUS Server Goes down
357
Enabling the User Re-Authentication at Restart Function
357
HWTACACS Configuration Task List
359
Creating a HWTACACS Scheme
359
Configuring TACACS Authentication Servers
360
Configuring TACACS Authorization Servers
360
Configuring TACACS Accounting Servers
361
Configuring Shared Keys for HWTACACS Messages
362
Configuring the Attributes of Data to be Sent to TACACS Servers
363
Configuring the Timers Regarding TACACS Servers
363
Displaying and Maintaining AAA Configuration
365
Displaying and Maintaining RADIUS Protocol Configuration
365
Displaying and Maintaining HWTACACS Protocol Configuration
366
AAA Configuration Examples
366
Remote RADIUS Authentication of Telnet/Ssh Users
366
Local Authentication of Ftp/Telnet Users
368
HWTACACS Authentication and Authorization of Telnet Users
369
Troubleshooting AAA
370
Troubleshooting RADIUS Configuration
370
Troubleshooting HWTACACS Configuration
371
Chapter 3 EAD Configuration
372
Introduction to EAD
372
Typical Network Application of EAD
372
EAD Configuration
373
EAD Configuration Example
374
Mac Address Authentication Configuration
376
Chapter 1 MAC Address Authentication Configuration
377
MAC Address Authentication Overview
377
Performing MAC Address Authentication on a RADIUS Server
377
Performing MAC Address Authentication Locally
378
Related Concepts
378
MAC Address Authentication Timers
378
Quiet MAC Address
378
Configuring Basic MAC Address Authentication Functions
379
MAC Address Authentication Enhanced Function Configuration
381
MAC Address Authentication Enhanced Function Configuration Task List
381
Configuring a Guest VLAN
381
Configuring the Maximum Number of MAC Address Authentication Users Allowed to Access a Port
383
Displaying and Maintaining MAC Address Authentication Configuration
384
MAC Address Authentication Configuration Examples
384
Advertisement
H3C H3C S5100-SI Operation Manual (830 pages)
Ethernet Switches
Brand:
H3C
| Category:
Switch
| Size: 9.89 MB
Table of Contents
About this Manual
3
Table of Contents
3
Obtaining Documentation
5
Related Documentation
5
Documentation Feedback
7
1 Obtaining the Documentation
8
CD-Rom
8
H3C Website
8
Software Release Notes
8
2 Correspondence between Documentation and Software
9
Manual List
9
Software Version
9
3 Product Overview
11
4 Networking Applications
13
Convergence Layer Devices
13
Access Layer Devices
13
Data Center Access
14
Login
15
1 Logging in to an Ethernet Switch
17
Introduction to the User Interface
17
Supported User Interfaces
17
Common User Interface Configuration
18
Relationship between a User and a User Interface
18
User Interface Index
18
2 Logging in through the Console Port
20
Introduction
20
Setting up a Login Environment for Login through the Console Port
20
Console Port Login Configuration
23
Common Configuration
23
Console Port Login Configurations for Different Authentication Modes
25
Console Port Login Configuration with Authentication Mode Being None
26
Configuration Example
26
Configuration Procedure
26
Console Port Login Configuration with Authentication Mode Being Password
27
Configuration Procedure
27
Configuration Example
28
Console Port Login Configuration with Authentication Mode Being Scheme
29
Configuration Procedure
29
Configuration Example
30
3 Logging in through Telnet
33
Introduction
33
Common Configuration to Control Telnet Access
33
Telnet Configurations for Different Authentication Modes
35
Telnet Configuration with Authentication Mode Being None
36
Configuration Example
36
Configuration Procedure
36
Telnet Configuration with Authentication Mode Being Password
37
Configuration Procedure
37
Configuration Example
38
Telnet Configuration with Authentication Mode Being Scheme
39
Configuration Procedure
39
Configuration Example
40
Telnetting to a Switch
41
Telnetting to a Switch from a Terminal
41
Telnetting to Another Switch from the Current Switch
43
4 Logging in Using a Modem
44
Introduction
44
Configuration on the Switch Side
44
Modem Configuration
44
Switch Configuration
45
Modem Connection Establishment
45
151 CLI Configuration
49
Introduction to the CLI
49
Command Hierarchy
49
Command Level and User Privilege Level
49
Modifying the Command Level
50
Switching User Level
51
CLI Views
52
CLI Features
55
Online Help
55
Command History
57
Error Prompts
57
Terminal Display
57
Command Edit
58
Introduction
59
Management Interface
59
Establishing an HTTP Connection
59
Configuring the Login Banner
60
Configuration Procedure
60
Configuration Example
61
Enabling/Disabling the WEB Server
61
7 Logging in through NMS
63
Introduction
63
Connection Establishment Using NMS
63
8 Configuring Source IP Address for Telnet Service Packets
64
Overview
64
Displaying Source IP Address Configuration
65
9 User Control
66
Introduction
66
Controlling Telnet Users
66
Controlling Telnet Users by ACL
67
Configuration Example
68
Controlling Network Management Users by Source IP Addresses
68
Configuration Example
69
Controlling Network Management Users by Source IP Addresses
69
Prerequisites
69
Controlling Web Users by Source IP Address
70
Controlling Web Users by Source IP Addresses
70
Prerequisites
70
Configuration Example
71
Logging out a Web User
71
Configuration File Management
73
Configuration File Management
74
Introduction to Configuration File
74
Configuration Task List
75
Saving the Current Configuration
75
Erasing the Startup Configuration File
76
Specifying a Configuration File for Next Startup
77
Displaying Switch Configuration
78
Vlan
78
VLAN Overview/Vlan Configuration
79
1 VLAN Overview
80
Introduction to VLAN
80
Advantages of Vlans
81
VLAN Fundamentals
81
Management VLAN
83
Port-Based VLAN
83
Assigning an Ethernet Port to Specified Vlans
84
Configuring the Default VLAN ID for a Port
84
Link Types of Ethernet Ports
84
VLAN Classification
83
VLAN Interface
83
Protocol-Based VLAN
85
Introduction to Protocol-Based VLAN
85
Encapsulation Format of Ethernet Data
86
Encapsulation Formats
88
Procedure for the Switch to Judge Packet Protocol
88
Implementation of Protocol-Based VLAN
89
2 VLAN Configuration
90
VLAN Configuration Task List
90
Basic VLAN Configuration
90
Basic VLAN Interface Configuration
91
Displaying VLAN Configuration
92
Configuring a Port-Based VLAN
92
Configuring the Link Type of an Ethernet Port
92
Port-Based Vlan Configuration Task List
92
Assigning an Ethernet Port to a VLAN
93
Configuring the Default VLAN for a Port
94
Displaying and Maintaining Port-Based VLAN
94
Port-Based VLAN Configuration Example
94
Configuring a Protocol-Based VLAN
96
Configuring a Protocol Template for a Protocol-Based VLAN
96
Protocol-Based VLAN Configuration Task List
96
Associating a Port with a Protocol-Based VLAN
97
Displaying Protocol-Based VLAN Configuration
98
Protocol-Based VLAN Configuration Example
98
Management VLAN Configuration
101
Introduction to Management VLAN
102
Management VLAN
102
Static Route
102
Default Route
102
Management VLAN Configuration
102
Management VLAN Configuration
103
Prerequisites
103
Configuring the Management Vlan
103
Configuration Example
104
Displaying and Maintaining Management VLAN Configuration
105
Voice VLAN Configuration
106
Voice VLAN Configuration
107
Voice VLAN Overview
107
How an IP Phone Works
107
How S5100-EI Series Switches Identify Voice Traffic
109
Setting the Voice Traffic Transmission Priority
110
Configuring Voice VLAN Assignment Mode of a Port
110
Support for Voice VLAN on Various Ports
110
Security Mode of Voice VLAN
112
Voice VLAN Configuration
112
Configuration Prerequisites
112
Configuring the Voice VLAN to Operate in Automatic Voice VLAN Assignment Mode
112
Configuring the Voice VLAN to Operate in Manual Voice VLAN Assignment Mode
114
Displaying and Maintaining Voice VLAN
115
Voice VLAN Configuration Example
116
Voice VLAN Configuration Example (Automatic Mode)
116
Voice VLAN Configuration Example (Manual Mode)
117
Gvrp Configuration
119
GVRP Configuration
120
Introduction to GVRP
120
Garp
120
Gvrp
123
Protocol Specifications
123
GVRP Configuration
123
GVRP Configuration Tasks
123
Enabling GVRP
123
Configuring GVRP Timers
124
Configuring GVRP Port Registration Mode
125
Displaying and Maintaining GVRP
125
GVRP Configuration Example
126
Port Basic Configuration
130
Combo Port Configuration
131
Ethernet Port Configuration
131
Port Basic Configuration
131
Configuring Port Auto-Negotiation Speed
132
Initially Configuring a Port
132
Limiting Traffic on Individual Ports
133
Duplicating the Configuration of a Port to Other Ports
134
Link Aggregation
135
Enabling Flow Control on a Port
134
Configuring Loopback Detection for an Ethernet Port
135
Enabling Loopback Test
136
Enabling the System to Test Connected Cable
136
Configuring the Interval to Perform Statistical Analysis on Port Traffic
137
Disabling Up/Down Log Output on a Port
137
Configuring a Port Group
138
Displaying and Maintaining Basic Port Configuration
139
Link Aggregation Configuration
140
Link Aggregation Configuration
141
Overview
141
Introduction to Link Aggregation
141
Introduction to LACP
141
Consistency Considerations for the Ports in Aggregation
141
Link Aggregation Classification
142
Manual Aggregation Group
142
Static LACP Aggregation Group
143
Dynamic LACP Aggregation Group
144
Aggregation Group Categories
145
Link Aggregation Configuration
146
Configuring a Manual Aggregation Group
146
Configuring a Static LACP Aggregation Group
147
Configuring a Dynamic LACP Aggregation Group
148
Configuring a Description for an Aggregation Group
148
Displaying and Maintaining Link Aggregation Configuration
149
Link Aggregation Configuration Example
149
Ethernet Port Aggregation Configuration Example
149
Port Isolation
152
Port Isolation Configuration
153
Port Isolation Overview
153
Port Isolation Configuration Example
154
Displaying and Maintaining Port Isolation Configuration
154
Port Security Configuration/Port Binding Configuration
156
1 Port Security Configuration
157
Port Security Overview
157
Introduction
157
Port Security Features
157
Port Security Modes
157
Port Security Configuration Task List
160
Enabling Port Security
160
Setting the Maximum Number of MAC Addresses Allowed on a Port
161
Setting the Port Security Mode
162
Configuring Port Security Features
163
Configuring Security MAC Addresses
164
Ignoring the Authorization Information from the RADIUS Server
164
Displaying and Maintaining Port Security Configuration
165
Port Security Configuration Example
166
2 Port Binding Configuration
167
Port Binding Overview
167
Configuring Port Binding
167
Introduction
167
Displaying and Maintaining Port Binding Configuration
167
Port Binding Configuration Example
168
Dldp Configuration
169
DLDP Configuration
170
Overview
170
DLDP Fundamentals
171
DLDP Packets
171
DLDP Status
173
DLDP Timers
173
DLDP Operating Mode
174
DLDP Implementation
175
DLDP Neighbor State
176
Link Auto-Recovery Mechanism
176
DLDP Configuration
177
Performing Basic DLDP Configuration
177
Resetting DLDP State
178
Displaying and Maintaining DLDP
179
DLDP Configuration Example
179
Mac Address Table Management
181
MAC Address Table Management
182
Overview
182
Introduction to MAC Address Table
182
Introduction to MAC Address Learning
182
Managing MAC Address Table
184
Configuring MAC Address Table Management
185
Configuration Task List
185
Configuring a MAC Address Entry
186
Setting the Aging Time of MAC Address Entries
187
Setting the Maximum Number of MAC Addresses a Port Can Learn
187
Disabling MAC Address Learning for a VLAN
188
Displaying MAC Address Table Information
188
Adding a Static Mac Address Entry Manually
189
Mstp Configuration
190
MSTP Configuration
192
Overview
192
Spanning Tree Protocol Overview
192
Rapid Spanning Tree Protocol Overview
201
Multiple Spanning Tree Protocol Overview
201
MSTP Implementation on Switches
205
MSTP Configuration Task List
206
Configuring Root Bridge
208
Configuring an MST Region
208
Specifying the Current Switch as a Root Bridge/Secondary Root Bridge
209
Configuring the Bridge Priority of the Current Switch
211
Configuring How a Port Recognizes and Sends MSTP Packets
211
Configuring the MSTP Operation Mode
212
Configuring the Maximum Hop Count of an MST Region
213
Configuring the Network Diameter of the Switched Network
214
Configuring the MSTP Time-Related Parameters
214
Configuring the Timeout Time Factor
216
Configuring the Maximum Transmitting Rate on the Current Port
216
Configuring the Current Port as an Edge Port
217
Setting the Link Type of a Port to P2P
218
Enabling MSTP
219
Configuring Leaf Nodes
220
Configuring the MST Region
220
Configuring How a Port Recognizes and Sends MSTP Packets
221
Configuring the Timeout Time Factor
221
Configuring the Maximum Transmitting Rate on the Current Port
221
Configuring a Port as an Edge Port
221
Configuring the Path Cost for a Port
221
Configuring Port Priority
223
Setting the Link Type of a Port to P2P
224
Enabling MSTP
224
Performing Mcheck Operation
224
Configuration Prerequisites
225
Configuration Procedure
225
Configuration Example
225
Configuring Guard Functions
225
Configuring Bpdu Guard
225
Configuring Root Guard
226
Configuring Loop Guard
227
Configuring TC-BPDU Attack Guard
228
Configuring BPDU Dropping
229
Configuring Digest Snooping
230
Introduction
230
Configuring Rapid Transition
232
Introduction
232
Configuring Rapid Transition
234
Configuring VLAN-VPN Tunnel
235
Introduction
235
MSTP Maintenance Configuration
236
Introduction
236
Enabling Log/Trap Output for Ports of MSTP Instance
236
Configuration Example
236
Displaying and Maintaining MSTP
237
Enabling Trap Messages Conforming to 802.1D Standard
237
MSTP Configuration Example
238
VLAN-VPN Tunnel Configuration Example
240
Table of Contents
242
802.1X Configuration
244
Introduction to 802.1X
244
Architecture of 802.1X Authentication
244
The Mechanism of an 802.1X Authentication System
246
Encapsulation of Eapol Messages
247
802.1X Authentication Procedure
249
Timers Used in 802.1X
252
802.1X Implementation on an S5100-SI/EI Series Switch
253
Introduction to 802.1X Configuration
256
Basic 802.1X Configuration
257
Configuration Prerequisites
257
Configuring Basic 802.1X Functions
257
Timer and Maximum User Number Configuration
259
Advanced 802.1X Configuration
260
Configuring Proxy Checking
260
Configuring Client Version Checking
261
Configuring Guest VLAN
262
Enabling DHCP-Triggered Authentication
262
Configuring 802.1X Re-Authentication
263
Configuring the 802.1X Re-Authentication Timer
263
Displaying and Maintaining 802.1X Configuration
264
X Configuration Example
264
2 Quick EAD Deployment Configuration
267
Introduction to Quick EAD Deployment
267
Operation of Quick EAD Deployment
267
Quick EAD Deployment Overview
267
Configuring Quick EAD Deployment
268
Configuration Prerequisites
268
Configuration Procedure
268
Displaying and Maintaining Quick EAD Deployment
270
Quick EAD Deployment Configuration Example
270
Troubleshooting
271
3 HABP Configuration
272
Introduction to HABP
272
HABP Server Configuration
272
HABP Client Configuration
273
Displaying and Maintaining HABP Configuration
273
4 System-Guard Configuration
274
System-Guard Overview
274
Aaa Overview/Aaa Configuration
276
1 Aaa Overview
278
Introduction to AAA
278
Authentication
278
Authorization
278
Accounting
279
Introduction to ISP Domain
279
Introduction to AAA Services
279
Introduction to RADIUS
279
Introduction to HWTACACS
284
2 AAA Configuration
287
AAA Configuration Task List
287
Creating an ISP Domain and Configuring Its Attributes
288
Configuring an AAA Scheme for an ISP Domain
289
Configuring Dynamic VLAN Assignment
292
Configuring the Attributes of a Local User
293
MAC Address Authentication
294
Cutting down User Connections Forcibly
294
RADIUS Configuration Task List
294
Creating a RADIUS Scheme
296
Configuring Ignorance of Assigned RADIUS Authorization Attributes
297
Configuring RADIUS Authentication/Authorization Servers
297
Configuring RADIUS Accounting Servers
298
Configuring Shared Keys for RADIUS Messages
300
Configuring the Maximum Number of RADIUS Request Transmission Attempts
300
Configuring the Status of RADIUS Servers
301
Configuring the Type of RADIUS Servers to be Supported
301
Configuring the Attributes of Data to be Sent to RADIUS Servers
302
Configuring the Local RADIUS Server
303
Configuring Timers for RADIUS Servers
304
Enabling Sending Trap Message When a RADIUS Server Goes down
305
Enabling the User Re-Authentication at Restart Function
305
Configuring Tacacs Authentication Servers
307
Creating a HWTACACS Scheme
307
HWTACACS Configuration Task List
307
Configuring TACACS Authorization Servers
308
Configuring Shared Keys for HWTACACS Messages
309
Configuring TACACS Accounting Servers
309
Configuring the Attributes of Data to be Sent to TACACS Servers
310
Configuring the Timers Regarding TACACS Servers
311
Displaying and Maintaining AAA Configuration
312
Displaying and Maintaining HWTACACS Protocol Configuration
312
Displaying and Maintaining RADIUS Protocol Configuration
312
AAA Configuration Examples
313
Remote RADIUS Authentication of Telnet/Ssh Users
313
Local Authentication of Ftp/Telnet Users
314
HWTACACS Authentication and Authorization of Telnet Users
316
Troubleshooting AAA
317
Troubleshooting HWTACACS Configuration
317
Troubleshooting RADIUS Configuration
317
3 EAD Configuration
318
Introduction to EAD
318
Typical Network Application of EAD
318
EAD Configuration
319
EAD Configuration Example
320
H3C H3C S5100-SI Installation Manual (104 pages)
Brand:
H3C
| Category:
Switch
| Size: 1.98 MB
Table of Contents
About this Manual
3
Table of Contents
5
Chapter 1 Product Overview
8
Preface
8
S5100-SI Series Ethernet Switches
9
S5100-8P-SI Ethernet Switch
9
Chapter 1 Product Overview
9
S5100-16P-SI Ethernet Switch
11
S5100-24P-SI Ethernet Switch
13
S5100-48P-SI Ethernet Switch
14
S5100-EI Series Ethernet Switches
15
S5100-8P-EI Ethernet Switch
15
S5100-16P-EI Ethernet Switch
16
S5100-24P-EI Ethernet Switch
17
S5100-24P-EI Ethernet Switch
18
S5100-48P-EI Ethernet Switch
19
S5100-26C-EI Ethernet Switch
20
S5100-26C-EI Ethernet Switch
21
S5100-50C-EI Ethernet Switch
22
S5100-8P-PWR-EI Ethernet Switch
23
S5100-8P-PWR-EI Ethernet Switch
24
S5100-16P-PWR-EI Ethernet Switch
25
S5100-26C-PWR-EI Ethernet Switch
27
S5100-50C-PWR-EI Ethernet Switch
28
S5100-50C-PWR-EI Ethernet Switch
29
Leds
30
Power LED (PWR)
30
DC Power Supply LED (RPS)
31
Mode LED
31
Gigabit Autosensing Ethernet Port Status Leds
32
Gigabit SFP Port Status LED
33
Module LED
34
Gigabit SFP Port Status LED
34
7-Segment Digitron Display
35
System Features of the S5100 Series
37
System Features of the S5100-SI Series
37
System Features of the S5100-EI Series
38
Ordering SFP/XFP/XENPAK Interface Modules
41
Ordering 10 G Stack Interface Modules
42
Ordering Stack Cables
43
Ordering DC Power Cords
43
Chapter 2 Preparing for Installation
44
Safety Precautions
44
Installation Site
44
Temperature/Humidity
44
Cleanness
45
Electromagnetic Susceptibility
45
Safety in Use of Laser
46
Installation Tools
46
Advertisement
H3C H3C S5100-SI Quick Start Manual (78 pages)
Brand:
H3C
| Category:
Network Router
| Size: 1.41 MB
Table of Contents
About this Manual
3
Table of Contents
6
Chapter 1 Product Overview
8
Leds
11
System Features of the S5100 Series
15
System Features of the S5100-EI Series
16
Ordering SFP Interface Modules
23
Ordering 10 G Stack Interface Modules
25
Ordering DC Power Cords
26
Chapter 2 Preparing for Installation
27
Temperature/Humidity
28
Cleanness
29
Electromagnetic Susceptibility
30
Installation Tools
31
Chapter 3 Installing the Switch
32
Introduction to Mounting Ear
34
Introduction to Guide Rail
37
Use Front Mounting Ears and a Tray
39
Use Front and Rear Mounting Ears
40
Use Front Mounting Ears and Guide Rails
44
Desk Mounting
47
Wall Mounting
48
Magnet Mounting
51
Connecting Power Cord and Grounding Wire
54
Connecting AC Power Cord
54
Connecting DC Power Cord
56
Connecting Grounding Wire
58
Connecting Console Cable
63
Console Cable
63
Connecting Console Cable
64
Installing and Removing Optional Interface Modules
66
XFP Interface Module
66
Stack Module
69
XENPAK Optical Module
70
Installing and Removing Dedicated Stack Cables
73
Introduction
73
Installation
74
Removal
74
Verifying the Installation
75
Chapter 4 Lightning Protection of the Switch
76
Installation of Lightning Arrester for AC Power (Socket Strip with Lightning Protection)
76
Advertisement
Related Products
H3C H3C S5100-EI
H3C S5100-8P-SI
H3C S5100-48P-SI
H3C S5100-8P-EI
H3C S5100-50C-EI
H3C S5100-16P-PWR-EI
H3C S5100-26C-PWR-EI
H3C S5100-50C-PWR-EI
H3C S5100-8P-PWR-EI
H3C S5100-48P-EI
H3C Categories
Switch
Network Router
Wireless Access Point
Control Unit
Gateway
More H3C Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL