Sign In
Upload
Manuals
Brands
Ruijie Manuals
Switch
RG-CS83-PD Series
Ruijie RG-CS83-PD Series Manuals
Manuals and User Guides for Ruijie RG-CS83-PD Series. We have
2
Ruijie RG-CS83-PD Series manuals available for free PDF download: Configuration Manual, Hardware Installation And Reference Manual
Ruijie RG-CS83-PD Series Configuration Manual (2841 pages)
Brand:
Ruijie
| Category:
Switch
| Size: 39 MB
Table of Contents
Table of Contents
2100
Overview
2101
Restrictions and Guidelines
2109
Configuration Tasks
2109
Configuring the Cos-To-Queue Mappings
2115
Configuring the Scheduling Policy and Round Robin Weights for Output Queues
2116
Configuring Bandwidth for a Queue
2117
Enabling ECN for a Queue
2118
Configuring Congestion Avoidance
2118
Overview
2118
Configuration Tasks
2118
Enabling the WRED Function
2118
Configuring Higher and Lower Threshold Values
2119
Configuring the Maximum Discarding Probability
2119
Configuring the Cos-To-Threshold Mappings
2120
Configuring the Qos Global Policy
2121
Overview
2121
Procedure
2121
Monitoring
2121
Configuration Examples
2122
Configuring the Interface Rate Limit and Priority Re-Marking
2122
Configuring MMU
2127
Introduction
2127
Overview
2127
Principles
2127
Configuration Task Summary
2130
Configuring Buffer Adjustment
2130
Overview
2130
Restrictions and Guidelines
2130
Configuration Tasks
2130
Configuring the Global Buffer Mode
2131
Configuring a Guaranteed Buffer for a Queue
2131
Configuring a Shared Buffer for a Queue
2131
Configuring a Flow Control Threshold for a Port
2132
Configuring Status Monitoring
2133
Overview
2133
Restrictions and Guidelines
2133
Procedure
2133
Monitoring
2133
Configuring AAA
2138
Introduction
2138
Overview
2138
Principles
2138
Restrictions and Guidelines
2143
Configuration Task Summary
2144
Configuring an AAA Server Group
2144
Overview
2144
Restrictions and Guidelines
2145
Procedure
2145
Configuring Basic Features of AAA Authentication
2145
Overview
2145
Configuration Tasks
2146
Configuring Login Authentication
2146
Configuring Enable Authentication
2147
Configuring IEEE 802.1X Authentication
2148
Configuring 2Nd-Generation Web Authentication
2148
Configuring FTP Authentication
2150
Configuring a General Authentication Method
2150
Overview
2150
Restrictions and Guidelines
2150
Procedure
2150
Configuring AAA Authentication Logging
2151
Overview
2151
Procedure
2151
Configuring Basic Features of AAA Authorization
2151
Restrictions and Guidelines
2151
Procedure
2152
Configuring the Function of Caching Command Authorization Results
2153
Overview
2153
Restrictions and Guidelines
2153
Procedure
2153
Configuring the Default Role for AAA Users
2153
Configuring the Function of Allowing Users to Log in to the Slave Device
2154
Overview
2154
Restrictions and Guidelines
2154
Procedure
2154
Configuring Basic Features of AAA Accounting
2154
Procedure
2155
Configuring a Policy for User Accounting Start Failures
2156
Overview
2156
Procedure
2156
Configuring Domain-Based AAA Services
2156
Restrictions and Guidelines
2156
Monitoring
2157
Configuration Examples
2158
Configuring Local Login Authentication and Local EXEC Authorization
2158
Configuring Enable Authentication
2160
Configuring Command Authorization
2162
Configuring Network Authorization
2163
Configuring an AAA Server Group
2164
Configuring Domain-Based AAA Services
2166
Common Errors
2167
Configuring RADIUS
2170
Introduction
2170
Overview
2170
Principles
2170
Protocols and Standards
2177
Configuration Task Summary
2177
Configuring RADIUS Basic Features
2177
Overview
2177
Restrictions and Guidelines
2177
Procedure
2178
Configuring a RADIUS Server Group
2179
Overview
2179
Restrictions and Guidelines
2179
Procedure
2179
Configuring RADIUS Attributes
2180
Overview
2180
Configuration Tasks
2180
Configure the Attribute Format
2180
Configuring Ruijie Private Attributes
2181
Configuring Compatibility with Devices of Other Vendors
2181
Configuring RADIUS Reachability Detection
2182
Overview
2182
Restrictions and Guidelines
2183
Procedure
2183
Configuring the Units of Data Flows and Packets to be Sent to a RADIUS Server
2184
Overview
2184
Procedure
2184
Configuring the Accounting-On Function
2184
Monitoring
2185
Configuration Examples
2186
Configuring RADIUS Authentication, Authorization, and Accounting
2186
Configuring RADIUS Reachability Detection
2187
Configuring TACACS
2191
Introduction
2191
Overview
2191
Principles
2191
Protocols and Standards
2194
Configuration Task Summary
2194
Configuring TACACS+ Basic Features
2195
Overview
2196
Restrictions and Guidelines
2196
Procedure
2196
Configuring TACACS+ Reachability Detection
2196
Overview
2197
Restrictions and Guidelines
2197
Procedure
2199
Configuring Separated Authentication, Authorization and Accounting by Using
2200
Tacacs
2200
Configuring IEEE 802.1X
2208
Overview
2208
Principles
2208
Protocols and Standards
2214
Configuring IEEE 802.1X Basic Features
2216
Overview
2216
Restrictions and Guidelines
2216
Prerequisites
2216
Procedure
2216
Configuring IEEE 802.1X Parameters
2218
Overview
2218
Configuration Tasks
2218
Configuring Re-Authentication
2218
Configuring Packet Retransmission Parameters
2219
Configuring the Server Timeout Duration
2219
Configuring the Quiet Period after an Authentication Failure
2220
Configuring the Authentication Mode
2220
Configuring Ruijie Client Detection
2220
Configuring Authorization
2221
Overview
2221
Configuring Web Authentication
2261
Introduction
2261
Overview
2261
Principles
2261
Protocols and Standards
2268
Restrictions and Guidelines
2269
Configuration Task Summary
2269
Configuring Ruijie First-Generation Web Authentication
2270
Overview
2270
Restrictions and Guidelines
2270
Prerequisites
2271
Procedure
2271
Configuring Ruijie Second-Generation Web Authentication
2272
Overview
2272
Restrictions and Guidelines
2273
Prerequisites
2273
Procedure
2275
Configuring App-Based Authentication
2275
Overview
2275
Restrictions and Guidelines
2275
Procedure
2276
Configuring an Authentication Method List
2276
Overview
2276
Restrictions and Guidelines
2277
Procedure
2277
Configuring an Accounting Method List
2277
Overview
2277
Restrictions and Guidelines
2278
Procedure
2278
Configuring the Binding Mode
2278
Overview
2278
Configuring the Redirection HTTP Port
2279
Overview
2279
Restrictions and Guidelines
2279
Procedure
2279
Configuring the Redirection Connection Timeout Time
2279
Procedure
2280
Configuring Portal Detection
2280
Overview
2280
Restrictions and Guidelines
2280
Configuring Portal Escape
2281
Overview
2281
Restrictions and Guidelines
2281
Procedure
2281
Configuring the Portal Communication Source Port
2281
Disabling Portal Specification Extension
2282
Overview
2282
Restrictions and Guidelines
2282
Procedure
2282
Configuring Transparent Transmission of RADIUS Private Attributes
2282
Configuring the Authentication-Free Network Resource Range
2283
Overview
2283
Restrictions and Guidelines
2283
Procedure
2283
Configuring a Straight-Through ARP Resource Range
2283
Procedure
2284
Configuring an Authentication-Exempted User Range
2284
Overview
2284
Restrictions and Guidelines
2284
Configuring Logging of the Web Authentication Module
2285
Overview
2285
Restrictions and Guidelines
2285
Procedure
2285
Configuring the Maximum Number of HTTP Sessions for Unauthenticated Users
2285
Procedure
2286
Configuring the Interval for Updating Online User Information
2286
Overview
2286
Restrictions and Guidelines
2286
Enabling DHCP Address Check
2286
Procedure
2287
Configuring an Address Whitelist
2287
Overview
2287
Restrictions and Guidelines
2287
Configuring VLAN-Based Authentication on a Port
2288
Overview
2288
Restrictions and Guidelines
2288
Procedure
2288
Configuring the Authenticated User Logout Delay on a Port
2288
Enabling RADIUS Server Escape
2289
Overview
2289
Restrictions and Guidelines
2289
Procedure
2289
Configuring DHCP Server Detection
2289
Procedure
2290
Configuring Uniqueness Check of Portal Authentication Accounts
2290
Overview
2290
Enabling Automatic Adding of Domain Information after Usernames
2290
Restrictions and Guidelines
2290
Configuring HTTPS Certificate Import
2291
Overview
2291
Procedure
2291
Enabling Adding the Authentication Page to Favorite
2291
Procedure
2297
Overview
2301
Configuring Password Policies
2307
Introduction
2307
Overview
2307
Restrictions and Guidelines
2307
Configuration Task Summary
2307
Configuring the Minimum Password Length
2307
Procedure
2307
Enabling Strong Password Detection
2308
Overview
2308
Procedure
2308
Enabling Forcible Weak Password Change
2308
Configuring a Password Lifecycle
2309
Overview
2309
Procedure
2309
Configuring Repeated Password Use Prevention
2309
Configuring Encrypted Password Storage
2310
Overview
2310
Procedure
2329
Restrictions and Guidelines
2340
Configuring IP Source Guard
2353
Introduction
2353
Overview
2353
Principles
2353
Restrictions and Guidelines
2354
Configuration Task Summary
2354
Enabling IP Source Guard on an Interface
2354
Prerequisites
2354
Procedure
2354
Enabling IP Source Guard on a VLAN
2355
Overview
2355
Prerequisites
2355
Procedure
2355
Enabling the Sole Role of the IP Source Address Binding Database as the Source of DAI
2356
Binding Entries
2356
Overview
2356
Procedure (Interface Configuration Mode)
2356
Procedure (VLAN Configuration Mode)
2357
Monitoring
2357
Common Errors
2357
Configuring Ipv6 Source Guard
2360
Introduction
2360
Overview
2360
Principles
2360
Restrictions and Guidelines
2361
Configuration Task Summary
2361
Enabling Ipv6 Source Guard on an Interface
2361
Prerequisites
2361
Procedure
2361
Enabling Ipv6 Source Guard on a VLAN
2362
Configuration Tasks
2362
Configuring a Trusted Interface
2363
Configuring an Untrusted Interface
2363
Configuring SAVI
2367
Monitoring
2368
Configuration Examples
2369
Configuring SAVI in an SLAAC-Only Scenario
2369
Configuring SAVI in a Dhcpv6-Only Scenario
2370
Configuring SAVI in an SLAAC and Dhcpv6 Deployment Scenario
2371
Common Errors
2373
Configuring ARP Check
2375
Introduction
2375
Overview
2375
Principles
2375
Protocols and Standards
2375
Restrictions and Guidelines
2375
Monitoring
2376
Configuring ARP Check
2376
Configuring DAI
2378
Introduction
2378
Overview
2378
Principles
2378
Protocols and Standards
2378
Configuring DAI
2379
Restrictions and Guidelines
2379
Procedure
2379
Monitoring
2379
Configuration Examples
2380
Requirements
2380
Topology
2380
Notes
2380
Procedure
2380
Verification
2381
Configuration Files
2381
Common Errors
2382
Configuring ARP Spoofing Prevention
2384
Introduction
2384
Overview
2384
Principles
2384
Protocols and Standards
2384
Configuring ARP Spoofing Prevention
2385
Monitoring
2385
Configuration Examples
2385
Requirements
2385
Topology
2386
Notes
2386
Procedure
2386
Verification
2386
Configuration Files
2386
Configuring CPP
2389
Introduction
2389
Overview
2389
Basic Concepts
2389
Processing Process
2390
Configuration Task Summary
2391
Configuring Basic Attributes of CPP
2391
Overview
2391
Restrictions and Guidelines
2392
Procedure
2392
Monitoring
2393
Configuration Examples
2394
Configuring Basic Functions of CPP
2394
Configuring NFPP
2401
Introduction
2401
Overview
2401
Basic Concepts
2401
Rate Limiting Threshold and Attack Identification for Hosts
2403
Rate Limiting and Attack Identification for Ports
2403
Hardware Isolation
2404
Monitoring Time
2404
Trust Host
2404
Configuration Task Summary
2404
Configuring ARP Guard
2405
Overview
2405
Restrictions and Guidelines
2405
Procedure (Global Configuration)
2406
Procedure (Interface Configuration)
2407
Configuring IP Guard
2408
Overview
2408
Restrictions and Guidelines
2409
Procedure (Global Configuration)
2410
Procedure (Interface Configuration)
2410
Configuring TCP-SYN Guard
2411
Overview
2411
Restrictions and Guidelines
2412
Procedure (Global Configuration)
2412
Procedure (Interface Configuration)
2413
Configuring ICMP Guard
2414
Overview
2414
Restrictions and Guidelines
2414
Procedure (Global Configuration)
2415
Procedure (Interface Configuration)
2416
Configuring DHCP Guard
2416
Overview
2416
Restrictions and Guidelines
2417
Procedure (Global Configuration)
2417
Procedure (Interface Configuration)
2418
Configuring Dhcpv6 Guard
2419
Overview
2419
Overview
2422
Procedure (Interface Configuration)
2422
Disabling Guard
2426
Overview
2426
Restrictions and Guidelines
2426
Procedure
2426
Configuring NFPP Logs
2427
Overview
2427
Restrictions and Guidelines
2427
Procedure
2427
Monitoring
2428
Configuration Examples
2429
Configuring CPU Guard
2429
Configuring Storm Control
2436
Introduction
2436
Overview
2436
Principles
2436
Monitoring
2437
Configuration Examples
2437
Configuring Urpf
2441
Introduction
2441
Overview
2441
Principles
2441
Protocols and Standards
2442
Restrictions and Guidelines
2442
Configuration Task Summary
2443
Enabling Urpf on an Interface
2443
Overview
2443
Restrictions and Guidelines
2443
Procedure
2443
Monitoring
2444
Configuration Examples
2444
Configuring the Urpf Strict Mode
2444
Configuring the Urpf Loose Mode
2447
Configuring the Function of Denying SYN Flood Packets
2454
Procedure
2454
Configuring Attack Packet Statistics
2454
Overview
2454
Restrictions and Guidelines
2455
Procedure
2455
Monitoring
2457
Configuring Security Log Auditing
2460
Introduction
2460
Overview
2460
Principles
2460
Enabling Security Log Auditing
2460
Configuring the Local Storage Time for Security Logs
2462
Configuring the Handling Time of Aged Security Logs
2462
Configuring the Local Storage Capacity for Security Logs
2462
Enabling the Function of Sending Security Logs to the Syslog Server
2463
Monitoring
2463
Configuration Examples
2464
Configuring Security Log Auditing
2464
Configuring Network Connectivity Test
2469
Introduction
2469
Overview
2469
Principles
2469
Protocols and Standards
2470
Restrictions and Guidelines
2470
Configuration Task Summary
2470
Configuring a Ping Connectivity Test
2471
Overview
2471
Procedure
2471
Configuring a Traceroute Connectivity Test
2471
Configuring Tech-Support
2477
Introduction
2477
Overview
2477
Principles
2477
Enabling the Tech-Support Function
2477
Restrictions and Guidelines
2478
Procedure
2479
Monitoring
2479
Configuring SPAN
2482
Introduction
2482
Overview
2482
Basic Concepts
2482
Principles
2483
Restrictions and Guidelines
2486
Configuration Task Summary
2487
Configuring SPAN
2487
Overview
2488
Restrictions and Guidelines
2488
Procedure
2488
Configuring ERSPAN
2490
Configuration Tasks
2490
Configuring Basic Functions of ERSPAN
2490
Configuring ERSPAN Attributes
2491
Monitoring
2491
Configuration Examples
2492
Configuring SPAN
2492
Configuring Sflow
2503
Introduction
2503
Overview
2503
Principles
2503
Protocols and Standards
2505
Configuration Task Summary
2506
Configuring Sflow
2506
Configuring Basic Functions of Sflow
2506
Configuring Optional Parameters of Sflow
2507
Monitoring
2509
Configuration Examples
2509
Configuring Basic Functions of Sflow
2509
Configuring NTP
2517
Introduction
2517
Overview
2517
Principles
2517
Protocols and Standards
2520
Restrictions and Guidelines
2520
Configuration Task Summary
2520
Configuring NTP Security Authentication
2521
Overview
2521
Restrictions and Guidelines
2521
Procedure
2521
Configuring Basic Functions of NTP
2522
Restrictions and Guidelines
2522
Configuring NTP in Client/Server Mode
2522
Configuring NTP in Peer Mode
2523
Configuring NTP in Broadcast Mode
2524
Configuring NTP-Related Parameters
2524
Procedure
2524
Configuring NTP Access Control
2525
Overview
2525
Restrictions and Guidelines
2525
Procedure
2526
Monitoring
2526
Configuration Examples
2527
Configuring the Local Clock Reference Mode of NTP
2527
Configuring the External Clock Reference Mode of NTP
2528
Configuring NTP Security Authentication
2531
Configuring NTP Access Control Rights
2533
Configuring the NTP Broadcast Mode
2535
Configuring the NTP Peer Mode
2536
Configuring SNTP
2540
Introduction
2540
Overview
2540
Principles
2540
Protocols and Standards
2541
Restrictions and Guidelines
2541
Configuring SNTP
2541
Overview
2541
Procedure
2541
Monitoring
2542
Configuration Examples
2542
Configuring Basic Functions of SNTP
2542
Advertisement
Ruijie RG-CS83-PD Series Hardware Installation And Reference Manual (50 pages)
Brand:
Ruijie
| Category:
Switch
| Size: 2 MB
Table of Contents
Product Overview
5
Back Panel
8
Product Information Label
8
Power Supply
8
Front Panel
12
Power Supply Module
15
Specifications
15
Preparing for Installation
18
Safety Precautions
18
Installation Environment Requirements
19
Cleanliness Requirements
20
Anti-Interference Requirements
20
Installing the Switch
23
Installing Procedure
24
Before You Begin
25
Mounting the Switch in a Rack
25
Installing the Switch on a Workbench
27
Installing and Removing a Power Supply Module
27
Removing the AC Power Supply Module
27
Grounding the Switch
29
Connecting Cables
29
Verifying Installation
30
Setting up Configuration Environment
31
Setting Parameters
31
Powering on Switch
33
Monitoring and Maintenance
34
Cooling System Maintenance
34
Power Supply Module Maintenance
34
Replacing Lithium Battery
35
Troubleshooting Flowchart
36
Fiber Connection
40
Sfp Modules
41
Lightening Protection
44
Site Selection
48
Advertisement
Related Products
Ruijie RG-CS83-24GT4XS-PD
Ruijie RG-CS83-48GT4XS-PD
Ruijie RG-CS83 Series
Ruijie RG-CS83-12GT4XS-P
Ruijie RG-CS83-24GT4XS
Ruijie RG-CS83-24GT4XS-P
Ruijie RG-CS83-48GT4XS
Ruijie RG-CS83-48GT4XS-P
Ruijie RG-CS88-08 Series
Ruijie RG-CS85-8GT4XS-HPD
Ruijie Categories
Switch
Wireless Access Point
Network Router
Network Hardware
Controller
More Ruijie Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL