3Com 4210G Series manuals
4210G Series
Table of contents
- configuration guide
- about this manual
- related documentation
- Table of Contents
- Table Of Contents
- product features
- access volume
- ip services volume
- ip routing volume
- qos volume
- security volume
- high availability volume
- system volume
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- ethernet port configuration
- basic ethernet interface configuration
- configuring loopback testing on an ethernet interface
- configuring an auto-negotiation transmission rate
- configuring storm suppression
- setting the interval for collecting ethernet interface statistics
- enabling loopback detection on an ethernet interface
- configuring the mdi mode for an ethernet interface
- testing the cable on an ethernet interface
- displaying and maintaining an ethernet interface
- link aggregation configuration
- link aggregation modes
- link aggregation configuration task list
- configuring a dynamic aggregation group
- configuring an aggregate interface
- shutting down an aggregate interface
- displaying and maintaining link aggregation
- link aggregation configuration examples
- layer 2 dynamic aggregation configuration example
- layer 2 aggregation load sharing mode configuration example
- port isolation configuration
- port isolation configuration example
- mstp configuration
- basic concepts in stp
- how stp works
- introduction to rstp
- introduction to mstp
- basic concepts in mstp
- how mstp works
- implementation of mstp on devices
- configuring mstp
- configuring the root bridge or a secondary root bridge
- configuring the work mode of an mstp device
- configuring the maximum hops of an mst region
- configuring timers of mstp
- configuring the timeout factor
- configuring the maximum port rate
- configuring path costs of ports
- configuring port priority
- configuring the link type of ports
- enabling the output of port state transition information
- enabling the mstp feature
- configuring digest snooping
- configuring no agreement check
- configuring protection functions
- enabling bpdu dropping
- displaying and maintaining mstp
- lldp configuration
- operating modes of lldp
- lldp configuration task list
- performing basic lldp configuration
- setting the lldp re-initialization delay
- setting other lldp parameters
- configuring cdp compatibility
- configuring lldp trapping
- displaying and maintaining lldp
- configuration procedure
- cdp-compatible lldp configuration example
- vlan configuration
- vlan fundamentals
- types of vlan
- configuring basic settings of a vlan interface
- port-based vlan configuration
- assigning an access port to a vlan
- assigning a trunk port to a vlan
- assigning a hybrid port to a vlan
- mac-based vlan configuration
- configuring a mac address-based vlan
- protocol-based vlan configuration
- ip subnet-based vlan configuration
- displaying and maintaining vlan
- vlan configuration example
- isolate-user-vlan configuration
- displaying and maintaining isolate-user-vlan
- voice vlan configuration
- voice vlan assignment modes
- security mode and normal mode of voice vlans
- configuring a voice vlan
- setting a port to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- manual voice vlan assignment mode configuration example
- gvrp configuration
- gvrp configuration task list
- configuring garp timers
- displaying and maintaining gvrp
- gvrp configuration examples
- gvrp configuration example ii
- gvrp configuration example iii
- qinq configuration
- qinq frame structure
- implementations of qinq
- configuring basic qinq
- configuring selective qinq based on ports
- configuring the tpid value in vlan tags
- qinq configuration examples
- selective qinq configuration example (port-based configuration)
- selective qinq configuration example (qos policy-based configuration)
- introduction to bpdu tunneling
- bpdu tunneling implementation
- configuring bpdu tunneling
- configuring destination multicast mac address for bpdus
- bpdu tunneling for pvst configuration example
- port mirroring configuration
- configuring local port mirroring
- configuring remote port mirroring
- configuring a remote destination mirroring group (on the destination device)
- displaying and maintaining port mirroring
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- ip addressing overview
- special ip addresses
- configuring ip addresses
- ip addressing configuration example
- displaying and maintaining ip addressing
- arp configuration
- arp address resolution process
- configuring arp
- configuring the maximum number of arp entries for a interface
- enabling the arp entry check
- displaying and maintaining arp
- proxy arp configuration
- enabling proxy arp
- displaying and maintaining proxy arp
- local proxy arp configuration example in case of port isolation
- local proxy arp configuration example in isolate-user-vlan
- arp attack defense configuration
- configuring arp active acknowledgement
- configuring the arp active acknowledgement function
- configuring arp packet source mac address consistency check
- configuring arp detection
- configuring arp detection based on specified objects
- displaying and maintaining arp detection
- arp detection configuration example ii
- dhcp overview
- dhcp address allocation
- dhcp message format
- dhcp options
- self-defined options
- protocols and standards
- dhcp relay agent configuration
- dhcp relay agent support for option
- dhcp relay agent configuration task list
- enabling the dhcp relay agent on an interface
- configuring the dhcp relay agent to send a dhcp-release request
- displaying and maintaining dhcp relay agent configuration
- dhcp relay agent option 82 support configuration example
- troubleshooting dhcp relay agent configuration
- dhcp client configuration
- displaying and maintaining the dhcp client
- dhcp snooping configuration
- application environment of trusted ports
- dhcp snooping support for option
- configuring dhcp snooping basic functions
- configuring dhcp snooping to support option 82
- displaying and maintaining dhcp snooping
- dhcp snooping option 82 support configuration example
- bootp client configuration
- configuring an interface to dynamically obtain an ip address through bootp
- displaying and maintaining bootp client configuration
- dns configuration
- dns proxy
- configuring the dns client
- configuring the dns proxy
- dynamic domain name resolution configuration example
- dns proxy configuration example
- troubleshooting dns configuration
- ip performance overview
- enabling forwarding of directed broadcasts to a directly connected network
- configuring tcp optional parameters
- configuring icmp to send error packets
- displaying and maintaining ip performance optimization
- udp helper configuration
- displaying and maintaining udp helper
- ipv6 overview
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- ipv6 pmtu discovery
- introduction to ipv6 dns
- ipv6 basics configuration task list
- configuring ipv6 ndp
- configuring parameters related to ra messages
- configuring pmtu discovery
- configuring ipv6 tcp properties
- enable sending of multicast echo replies
- configuring ipv6 dns client
- displaying and maintaining ipv6 basics configuration
- ipv6 configuration example
- troubleshooting ipv6 basics configuration
- dual stack overview
- sflow overview
- configuring sflow
- sflow configuration example
- troubleshooting sflow configuration
- Table of Contents
- Table Of Contents
- ip routing overview
- routing protocol overview
- static routing configuration
- configuring a static route
- detecting reachability of the static route's nexthop
- displaying and maintaining static routes
- ipv6 static routing configuration
- displaying and maintaining ipv6 static routes
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- multicast overview
- features of multicast
- multicast models
- multicast architecture
- multicast addresses
- multicast protocols
- multicast packet forwarding mechanism
- igmp snooping configuration
- basic concepts in igmp snooping
- how igmp snooping works
- igmp snooping configuration task list
- configuring basic functions of igmp snooping
- configuring igmp snooping port functions
- configuring igmp snooping querier
- configuring igmp queries and responses
- configuring an igmp snooping policy
- configuring a multicast group filter
- configuring the function of dropping unknown multicast data
- configuring igmp report suppression
- configuring multicast group replacement
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- igmp snooping querier configuration
- troubleshooting igmp snooping configuration
- multicast vlan configuration
- multicast vlan configuration task list
- configuring port-based multicast vlan
- configuring multicast vlan ports
- displaying and maintaining multicast vlan
- port-based multicast vlan configuration
- mld snooping configuration
- basic concepts in mld snooping
- how mld snooping works
- mld snooping configuration task list
- configuring basic functions of mld snooping
- configuring mld snooping port functions
- configuring mld snooping querier
- configuring mld queries and responses
- configuring source ipv6 addresses of mld queries
- configuring an mld snooping policy
- configuring ipv6 multicast source port filtering
- configuring mld report suppression
- configuring ipv6 multicast group replacement
- displaying and maintaining mld snooping
- mld snooping configuration examples
- mld snooping querier configuration
- troubleshooting mld snooping
- configured ipv6 multicast group policy fails to take effect
- introduction to ipv6 multicast vlan
- ipv6 multicast vlan configuration task list
- configuring port-based ipv6 multicast vlan
- configuring ipv6 multicast vlan ports
- displaying and maintaining ipv6 multicast vlan
- port-based multicast vlan configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- qos overview
- diffserv service model
- qos configuration approaches
- configuring a qos policy
- defining a traffic behavior
- defining a policy
- displaying and maintaining qos policies
- priority mapping overview
- priority trust mode on a port
- priority mapping configuration tasks
- configuring priority mapping
- displaying and maintaining priority mapping
- traffic policing, traffic shaping, and line rate overview
- traffic policing
- traffic shaping
- line rate
- configuring traffic policing
- configuring gts
- configuring the line rate
- congestion management configuration
- congestion management configuration approaches
- configuring congestion management
- configuring wfq queuing
- configuring sp+wrr queues
- configuration example
- displaying and maintaining congestion management
- traffic filtering configuration
- traffic filtering configuration example
- configuring priority marking
- priority marking configuration example
- traffic redirecting configuration
- configuring traffic mirroring
- displaying and maintaining traffic mirroring
- class-based accounting configuration
- displaying and maintaining traffic accounting
- user profile configuration
- creating a user profile
- enabling a user profile
- appendix a acronym
- appendix b default priority mapping tables
- appendix c introduction to packet precedences
- p priority
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- aaa configuration
- introduction to radius
- security and authentication mechanisms
- radius packet format
- extended radius attributes
- differences between hwtacacs and radius
- aaa configuration task list
- radius configuration task list
- configuring aaa
- configuring isp domain attributes
- configuring aaa authorization methods for an isp domain
- configuring aaa accounting methods for an isp domain
- configuring local user attributes
- configuring user group attributes
- tearing down user connections forcibly
- configuring radius
- setting the shared key for radius packets
- setting the upper limit of radius request retransmission attempts
- setting the status of radius servers
- configuring attributes related to data to be sent to the radius server
- setting timers regarding radius servers
- specifying a security policy server
- configuring hwtacacs
- creating a hwtacacs scheme
- specifying the hwtacacs authorization servers
- setting the shared key for hwtacacs packets
- setting timers regarding hwtacacs servers
- aaa configuration examples
- aaa for telnet users by separate servers
- aaa for ssh users by a radius server
- troubleshooting aaa
- troubleshooting hwtacacs
- x configuration
- authentication modes of 802.1x
- eap over lans
- eap over radius
- authentication process of 802.1x
- x timers
- extensions to 802.1x
- configuring 802.1x
- configuring 802.1x for a port
- configuring an 802.1x port-based guest vlan
- x configuration example
- guest vlan and vlan assignment configuration example
- acl assignment configuration example
- ead fast deployment configuration
- configuring ead fast deployment
- displaying and maintaining ead fast deployment
- ead fast deployment configuration example
- troubleshooting ead fast deployment
- introduction to habp
- configuring habp
- displaying and maintaining habp
- mac authentication configuration
- related concepts
- displaying and maintaining mac authentication
- radius-based mac authentication configuration example
- network requirements
- port security configuration
- port security features
- port security configuration task list
- enabling port security
- setting the port security mode
- configuring port security features
- configuring intrusion protection
- configuring secure mac addresses
- displaying and maintaining port security
- port security configuration examples
- configuring the userloginwithoui mode
- configuring the macaddresselseuserloginsecure mode
- troubleshooting port security
- cannot change port security mode when a user is online
- ip source guard configuration
- configuring dynamic binding function
- ip source guard configuration examples
- dynamic binding function configuration example
- troubleshooting ip source guard
- ssh2.0 configuration
- configuring the device as an ssh server
- enabling ssh server
- configuring a client public key
- configuring an ssh user
- setting the ssh management parameters
- configuring the device as an ssh client
- configuring whether first-time authentication is supported
- displaying and maintaining ssh
- ssh server configuration examples
- when switch acts as server for publickey authentication
- ssh client configuration examples
- when switch acts as client for publickey authentication
- sftp configuration
- configuring an sftp client
- working with the sftp directories
- working with sftp files
- terminating the connection to the remote sftp server
- sftp server configuration example
- pki configuration
- architecture of pki
- pki configuration task list
- configuring a pki domain
- submitting a pki certificate request
- submitting a certificate request in auto mode
- retrieving a certificate manually
- configuring pki certificate verification
- destroying a local rsa key pair
- configuring an access control policy
- pki configuration examples
- requesting a certificate from a ca running windows 2003 server
- configuring a certificate attribute-based access control policy
- troubleshooting pki
- failed to request a local certificate
- ssl configuration
- ssl configuration task list
- configuring an ssl server policy
- ssl server policy configuration example
- configuring an ssl client policy
- displaying and maintaining ssl
- public key configuration
- configuring the local asymmetric key pair
- displaying or exporting the local rsa or dsa host public key
- displaying and maintaining public keys
- public key configuration examples
- importing the public key of a peer from a public key file
- acl overview
- introduction to ipv4 acl
- ipv4 acl match order
- ipv4 acl step
- introduction to ipv6 acl
- ipv6 acl step
- ipv4 acl configuration
- configuring a basic ipv4 acl
- configuring an advanced ipv4 acl
- configuring an ethernet frame header acl
- copying an ipv4 acl
- displaying and maintaining ipv4 acls
- ipv6 acl configuration
- configuring an advanced ipv6 acl
- copying an ipv6 acl
- displaying and maintaining ipv6 acls
- acl application for packet filtering
- filtering ipv6 packets
- acl application examples
- acl application to a vlan interface
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- smart link overview
- how smart link works
- smart link configuration task list
- configuring protected vlans for a smart link group
- configuring role preemption for a smart link group
- smart link device configuration example
- associated device configuration example
- smart link configuration examples
- multiple smart link groups load sharing configuration example
- monitor link configuration
- configuring monitor link
- monitor link configuration example
- rrpp overview
- basic concepts in rrpp
- rrpp timers
- typical rrpp networking
- rrpp configuration task list
- creating an rrpp domain
- configuring control vlans
- configuring rrpp rings
- configuring rrpp nodes
- activating an rrpp domain
- configuring an rrpp ring group
- displaying and maintaining rrpp
- intersecting ring configuration example
- received packets
- intersecting-ring load balancing configuration example
- troubleshooting
- dldp configuration
- how dldp works
- dldp configuration task list
- setting dldp mode
- setting the delaydown timer
- configuring dldp authentication
- displaying and maintaining dldp
- dldp configuration example
- ethernet oam configuration
- how ethernet oam works
- standards and protocols
- configuring link monitoring
- configuring errored symbol event detection
- enabling oam remote loopback
- displaying and maintaining ethernet oam configuration
- connectivity fault detection configuration
- basic functions of cfd
- basic configuration tasks
- configuring mip generation rules
- configuring cc on meps
- configuring lt on meps
- displaying and maintaining cfd
- configuring mep and enabling cc on it
- configuring the rules for generating mips
- configuring lb on meps
- track overview
- track configuration task list
- configuring collaboration between the track module and the application modules
- displaying and maintaining track object(s)
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- logging in to an ethernet switch
- users and user interfaces
- logging in through the console port
- console port login configuration
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- logging in through telnet
- common configuration
- telnet login configuration task list
- telnet login configuration with authentication mode being none
- telnet login configuration with authentication mode being password
- telnet login configuration with authentication mode being scheme
- logging in through ssh
- user interface configuration examples
- command authorization configuration example
- command accounting configuration example
- web server configuration
- displaying web users
- connection establishment using nms
- specifying source for telnet packets
- displaying the source ip address/interface specified for telnet packets
- controlling telnet users
- controlling telnet users by source and destination ip addresses
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip addresses
- configuration display
- entering/exiting system view
- enabling/disabling the display of copyright information
- configuring a banner
- configuring cli hotkeys
- configuring command aliases
- configuring user privilege levels and command levels
- displaying and maintaining basic configurations
- cli features
- online help with command lines
- synchronous information output
- cli display
- saving history commands
- command line error information
- device management
- rebooting a device
- configuring the scheduled automatic execution function
- upgrading device software
- upgrading the boot rom program through command lines
- disabling boot rom access
- clearing the 16-bit interface indexes not used in the current system
- identifying pluggable transceivers
- displaying and maintaining device management configuration
- device management configuration examples
- remote scheduled automatic upgrade configuration example (centralized irf device)
- file system management
- directory operations
- file operations
- batch operations
- storage medium operations
- configuration file management
- configuration file overview
- saving the current configuration
- setting configuration rollback
- specifying a startup configuration file for the next system startup
- deleting the startup configuration file for the next startup
- displaying and maintaining device configuration
- ftp configuration
- configuring the ftp client
- ftp client configuration example
- configuring the ftp server
- configuring authentication and authorization on the ftp server
- ftp server configuration example
- displaying and maintaining ftp
- tftp configuration
- configuring the tftp client
- displaying and maintaining the tftp client
- tftp client configuration example
- http configuration
- configuring the port number of the http service
- https configuration
- associating the https service with an ssl server policy
- associating the https service with a certificate attribute access control policy
- associating the https service with an acl
- snmp configuration
- snmp protocol version
- configuring snmp logging
- snmp trap configuration
- configuring trap parameters
- displaying and maintaining snmp
- snmp configuration example
- snmp logging configuration example
- mib style configuration
- rmon configuration
- rmon groups
- configuring rmon
- displaying and maintaining rmon
- mac address table management configuration
- types of mac address table entries
- configuring mac address table management
- configuring the aging timer for dynamic mac address entries
- displaying and maintaining mac address table management
- mac information configuration
- enabling mac information on an interface
- system maintenance and debugging
- ping configuration example
- configuring tracert
- system debugging
- ping and tracert configuration example
- information center configuration
- system information format
- configuring information center
- outputting system information to a monitor terminal
- outputting system information to a log host
- outputting system information to the trap buffer
- outputting system information to the log buffer
- outputting system information to the snmp module
- disabling a port from generating link up/down logging information
- displaying and maintaining information center
- outputting log information to a linux log host
- outputting log information to the console
- hotfix configuration
- hotfix configuration task list
- one-step patch installation
- step-by-step patch installation
- activating patches
- one-step patch uninstallation
- displaying and maintaining hotfix
- hotfix configuration example (irf device)
- nqa configuration
- basic concepts of nqa
- nqa configuration task list
- configuring the nqa server
- configuring an nqa test group
- configuring a dhcp test
- configuring an ftp test
- configuring an http test
- configuring a udp jitter test
- configuring an snmp test
- configuring a tcp test
- configuring a udp echo test
- configuring a voice test
- configuring a dlsw test
- configuring the collaboration function
- configuring trap delivery
- configuring optional parameters common to an nqa test group
- scheduling an nqa test group
- displaying and maintaining nqa
- dhcp test configuration example
- ftp test configuration example
- http test configuration example
- udp jitter test configuration example
- snmp test configuration example
- tcp test configuration example
- udp echo test configuration example
- voice test configuration example
- dlsw test configuration example
- nqa collaboration configuration example
- ntp configuration
- how ntp works
- ntp message format
- operation modes of ntp
- ntp configuration task list
- configuring the operation modes of ntp
- configuring the ntp symmetric peers mode
- configuring optional parameters of ntp
- disabling an interface from receiving ntp messages
- configuring ntp authentication
- displaying and maintaining ntp
- ntp configuration examples
- configuring the ntp symmetric mode
- configuring ntp multicast mode
- configuring ntp client/server mode with authentication
- configuring ntp broadcast mode with authentication
- cluster management configuration
- how a cluster works
- cluster configuration task list
- configuring the management device
- configuring ndp parameters
- manually collecting topology information
- enabling the cluster function
- cluster member management
- configuring the member devices
- adding a candidate device to a cluster
- configuring advanced cluster functions
- configuring interaction for a cluster
- snmp configuration synchronization function
- configuring web user accounts in batches
- displaying and maintaining cluster management
- irf configuration
- irf working process
- topology collection
- irf management
- irf configuration task list
- configuring irf ports
- setting a member id for a device
- specifying a priority for an irf member
- enabling auto upgrade of boot files
- setting the delay time for the link layer to report a link-down event
- logging in to an irf
- displaying and maintaining irf
- configure switch
- ipc configuration
- enabling ipc performance statistics
- displaying and maintaining ipc
- poe configuration
- poe configuration task list
- configuring a poe interface through the command line
- configuring poe power management
- configuring the poe monitoring function
- upgrading pse processing software online
- enabling the pse to detect nonstandard pds
- poe configuration example
- troubleshooting poe
- automatic configuration
- how automatic configuration works
- obtaining an ip address
- obtaining the configuration file from the tftp server
- executing the configuration file
manualsdatabase
Your AI-powered manual search engine