3Com 4500G 24-Port manuals
4500G 24-Port
Table of contents
- configuration guide
- about this manual
- Table of Contents
- Table Of Contents
- product features
- access volume
- ip services volume
- ip routing volume
- qos volume
- security volume
- high availability volume
- system volume
- manual version
- Table of Contents
- Table Of Contents
- ethernet port configuration
- configuring an auto-negotiation transmission rate
- configuring flow control on an ethernet port
- configuring the suppression time of physical-link-state change on an ethernet port
- configuring a port group
- setting the interval for collecting ethernet port statistics
- enabling forwarding of jumbo frames
- configuring the mdi mode for an ethernet port
- testing the cable on an ethernet port
- displaying and maintaining an ethernet port
- Table of Contents
- Table Of Contents
- ethernet link aggregation configuration
- aggregating links in static mode
- aggregating links in dynamic mode
- load sharing criteria for link aggregation groups
- ethernet link aggregation configuration task list
- configuring a static aggregation group
- configuring an aggregate interface
- enabling link state trapping for an aggregate interface
- displaying and maintaining ethernet link aggregation
- static aggregation configuration example
- dynamic aggregation configuration example
- aggregation load sharing configuration example
- Table of Contents
- Table Of Contents
- port isolation configuration
- port isolation configuration example
- Table Of Contents
- mstp configuration
- protocol packets of stp
- how stp works
- introduction to rstp
- introduction to mstp
- basic concepts in mstp
- how mstp works
- implementation of mstp on devices
- configuring mstp
- configuring the root bridge or a secondary root bridge
- configuring the work mode of an mstp device
- configuring the maximum hops of an mst region
- configuring timers of mstp
- configuring the timeout factor
- configuring the maximum port rate
- configuring path costs of ports
- configuring port priority
- configuring the link type of ports
- enabling the output of port state transition information
- enabling the mstp feature
- configuring digest snooping
- configuring no agreement check
- configuring protection functions
- displaying and maintaining mstp
- Table of Contents
- Table Of Contents
- lldp configuration
- how lldp works
- lldp configuration task list
- performing basic lldp configuration
- setting the lldp re-initialization delay
- configuring the management address and its encoding format
- setting other lldp parameters
- configuring cdp compatibility
- configuring lldp trapping
- displaying and maintaining lldp
- configuration procedure
- cdp-compatible lldp configuration example
- Table of Contents
- Table Of Contents
- vlan configuration
- vlan fundamentals
- types of vlan
- configuring basic settings of a vlan interface
- port-based vlan configuration
- assigning an access port to a vlan
- assigning a trunk port to a vlan
- assigning a hybrid port to a vlan
- mac-based vlan configuration
- protocol-based vlan configuration
- configuring a protocol-based vlan
- ip subnet-based vlan configuration
- displaying and maintaining vlan
- isolate-user-vlan configuration
- displaying and maintaining isolate-user-vlan
- voice vlan configuration
- voice vlan assignment modes
- security mode and normal mode of voice vlans
- configuring a voice vlan
- setting a port to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- manual voice vlan assignment mode configuration example
- gvrp configuration
- gvrp configuration task list
- configuring garp timers
- displaying and maintaining gvrp
- gvrp configuration examples
- gvrp configuration example ii
- gvrp configuration example iii
- Table of Contents
- Table Of Contents
- qinq configuration
- how qinq works
- implementations of qinq
- configuring basic qinq
- configuring the tpid value in vlan tags
- comprehensive selective qinq configuration example
- Table of Contents
- Table Of Contents
- introduction to bpdu tunneling
- bpdu tunneling implementation
- configuring bpdu tunneling
- configuring destination multicast mac address for bpdus
- bpdu tunneling for pvst configuration example
- Table of Contents
- Table Of Contents
- port mirroring configuration
- configuring local port mirroring
- configuring remote port mirroring
- configuring a remote destination mirroring group (on the destination device)
- displaying and maintaining port mirroring
- remote port mirroring configuration example
- configuring traffic mirroring
- mirroring traffic to the cpu
- applying a qos policy
- displaying and maintaining traffic mirroring
- Table of Contents
- Table Of Contents
- ip addressing overview
- special ip addresses
- configuring ip addresses
- ip addressing configuration example
- displaying and maintaining ip addressing
- Table of Contents
- Table Of Contents
- arp configuration
- arp message format
- arp table
- configuring arp
- enabling the arp entry check
- arp configuration example
- configuring gratuitous arp
- proxy arp configuration
- enabling proxy arp
- displaying and maintaining proxy arp
- local proxy arp configuration example in case of port isolation
- local proxy arp configuration example in isolate-user-vlan
- Table of Contents
- Table Of Contents
- Table Of Contents
- dhcp overview
- dhcp address allocation
- ip address lease extension
- dhcp options
- self-defined options
- protocols and standards
- dhcp relay agent configuration
- dhcp relay agent support for option
- dhcp relay agent configuration task list
- enabling the dhcp relay agent on an interface
- configuring the dhcp relay agent security functions
- configuring the dhcp relay agent to send a dhcp-release request
- displaying and maintaining dhcp relay agent configuration
- dhcp relay agent option 82 support configuration example
- troubleshooting dhcp relay agent configuration
- dhcp client configuration
- displaying and maintaining the dhcp client
- dhcp snooping configuration
- application environment of trusted ports
- dhcp snooping support for option
- configuring dhcp snooping basic functions
- configuring dhcp snooping to support option 82
- displaying and maintaining dhcp snooping
- dhcp snooping option 82 support configuration example
- bootp client configuration
- configuring an interface to dynamically obtain an ip address through bootp
- displaying and maintaining bootp client configuration
- Table of Contents
- Table Of Contents
- dns configuration
- dns proxy
- configuring the dns client
- configuring the dns proxy
- dynamic domain name resolution configuration example
- dns proxy configuration example
- troubleshooting dns configuration
- Table of Contents
- Table Of Contents
- ip performance overview
- enabling forwarding of directed broadcasts to a directly connected network
- configuring tcp optional parameters
- configuring icmp to send error packets
- displaying and maintaining ip performance optimization
- Table of Contents
- Table Of Contents
- udp helper configuration
- displaying and maintaining udp helper
- Table Of Contents
- ipv6 overview
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- ipv6 pmtu discovery
- ipv6 basics configuration task list
- configuring basic ipv6 functions
- configuring ipv6 ndp
- configuring the maximum number of neighbors dynamically learned
- configuring pmtu discovery
- configuring ipv6 tcp properties
- enable sending of multicast echo replies
- configuring ipv6 dns client
- displaying and maintaining ipv6 basics configuration
- ipv6 configuration example
- troubleshooting ipv6 basics configuration
- Table Of Contents
- dual stack overview
- Table Of Contents
- sflow configuration
- configuring sflow
- sflow configuration example
- troubleshooting sflow configuration
- ip routing overview
- routing protocol overview
- displaying and maintaining a routing table
- Table of Contents
- Table Of Contents
- static routing configuration
- configuring a static route
- detecting reachability of the static route's nexthop
- displaying and maintaining static routes
- static route configuration example
- Table of Contents
- Table Of Contents
- rip configuration
- rip version
- rip message format
- configuring rip basic functions
- configuring rip route control
- configuring ripv2 route summarization
- disabling host route reception
- configuring inbound/outbound route filtering
- configuring rip network optimization
- configuring rip timers
- enabling zero field check on incoming ripv1 messages
- configuring ripv2 message authentication
- displaying and maintaining rip
- rip configuration examples
- configuring an additional metric for a rip interface
- troubleshooting rip
- route oscillation occurred
- ipv6 static routing configuration
- displaying and maintaining ipv6 static routes
- Table of Contents
- Table Of Contents
- ripng configuration
- ripng packet format
- configuring ripng basic functions
- configuring ripng route control
- configuring ripng route summarization
- configuring a ripng route filtering policy
- tuning and optimizing the ripng network
- configuring zero field check on ripng packets
- displaying and maintaining ripng
- Table of Contents
- Table Of Contents
- route policy configuration
- route policy configuration task list
- defining filters
- configuring a route policy
- creating a route policy
- defining apply clauses
- displaying and maintaining the route policy
- applying a route policy to ipv6 route redistribution
- troubleshooting route policy configuration
- ipv6 routing information filtering failure
- Table of Contents
- Table Of Contents
- multicast overview
- features of multicast
- multicast models
- multicast architecture
- multicast addresses
- multicast protocols
- multicast packet forwarding mechanism
- Table of Contents
- Table Of Contents
- igmp snooping configuration
- basic concepts in igmp snooping
- how igmp snooping works
- igmp snooping configuration task list
- configuring basic functions of igmp snooping
- configuring igmp snooping port functions
- configuring simulated joining
- configuring igmp snooping querier
- configuring igmp queries and responses
- configuring an igmp snooping policy
- configuring a multicast group filter
- configuring the function of dropping unknown multicast data
- configuring igmp report suppression
- configuring multicast group replacement
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- network diagram
- igmp snooping querier configuration
- troubleshooting igmp snooping configuration
- Table of Contents
- Table Of Contents
- multicast vlan configuration
- multicast vlan configuration task list
- configuring port-based multicast vlan
- configuring multicast vlan ports
- displaying and maintaining multicast vlan
- port-based multicast vlan configuration
- Table of Contents
- Table Of Contents
- mld snooping configuration
- basic concepts in mld snooping
- how mld snooping works
- mld snooping configuration task list
- configuring basic functions of mld snooping
- configuring mld snooping port functions
- configuring mld snooping querier
- configuring mld queries and responses
- configuring source ipv6 addresses of mld queries
- configuring an mld snooping policy
- configuring ipv6 multicast source port filtering
- configuring mld report suppression
- configuring ipv6 multicast group replacement
- displaying and maintaining mld snooping
- mld snooping configuration examples
- mld snooping querier configuration
- troubleshooting mld snooping
- configured ipv6 multicast group policy fails to take effect
- Table of Contents
- Table Of Contents
- introduction to ipv6 multicast vlan
- ipv6 multicast vlan configuration task list
- configuring port-based ipv6 multicast vlan
- configuring ipv6 multicast vlan ports
- displaying and maintaining ipv6 multicast vlan
- port-based multicast vlan configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- qos overview
- diffserv service model
- qos configuration approaches
- configuring a qos policy
- defining a traffic behavior
- applying the qos policy
- displaying and maintaining qos policies
- priority mapping overview
- priority trust mode on a port
- priority mapping configuration tasks
- configuring priority mapping
- displaying and maintaining priority mapping
- traffic policing and line rate configuration
- traffic policing
- line rate
- configuration example
- configuring the line rate
- congestion management configuration
- congestion management configuration approaches
- configuring congestion management
- configuring wfq queuing
- configuring sp+wrr queues
- displaying and maintaining congestion management
- traffic filtering configuration
- traffic filtering configuration example
- configuring priority marking
- priority marking configuration example
- traffic redirecting configuration
- class-based accounting configuration
- displaying and maintaining traffic accounting
- appendix a acronym
- appendix b default priority mapping tables
- appendix c introduction to packet precedences
- p priority
- Table of Contents
- Table Of Contents
- user profile configuration
- creating a user profile
- enabling a user profile
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa configuration
- introduction to radius
- security and authentication mechanisms
- radius packet format
- extended radius attributes
- introduction to hwtacacs
- aaa configuration task list
- radius configuration task list
- configuring aaa
- configuring isp domain attributes
- configuring aaa authentication methods for an isp domain
- configuring aaa authorization methods for an isp domain
- configuring aaa accounting methods for an isp domain
- configuring local user attributes
- displaying and maintaining aaa
- configuring radius
- specifying the radius authentication/authorization servers
- setting the shared key for radius packets
- setting the upper limit of radius request retransmission attempts
- setting the status of radius servers
- configuring attributes related to data to be sent to the radius server
- setting timers regarding radius servers
- configuring radius accounting-on
- specifying a security policy server
- configuring hwtacacs
- specifying the hwtacacs authentication servers
- specifying the hwtacacs accounting servers
- setting the shared key for hwtacacs packets
- setting timers regarding hwtacacs servers
- aaa configuration examples
- aaa for telnet users by separate servers
- aaa for ssh users by a radius server
- troubleshooting aaa
- troubleshooting hwtacacs
- Table of Contents
- Table Of Contents
- x configuration
- architecture of 802.1x
- eap over lans
- eap over radius
- authentication process of 802.1x
- x timers
- extensions to 802.1x
- configuring 802.1x
- configuring 802.1x for a port
- configuring an 802.1x guest vlan
- x configuration example
- guest vlan and vlan assignment configuration example
- acl assignment configuration example
- x-based ead fast deployment configuration
- configuring ead fast deployment
- displaying and maintaining ead fast deployment
- troubleshooting ead fast deployment
- Table of Contents
- Table Of Contents
- introduction to habp
- configuring habp
- displaying and maintaining habp
- Table Of Contents
- mac authentication configuration
- related concepts
- configuring mac authentication
- configuring a guest vlan
- displaying and maintaining mac authentication
- radius-based mac authentication configuration example
- Table of Contents
- Table Of Contents
- port security configuration
- port security modes
- port security configuration task list
- setting the maximum number of secure mac addresses
- setting the port security mode
- configuring port security features
- configuring intrusion protection
- configuring secure mac addresses
- displaying and maintaining port security
- configuring the userloginwithoui mode
- configuring the macaddresselseuserloginsecure mode
- configuration information
- troubleshooting port security
- cannot change port security mode when a user is online
- Table of Contents
- Table Of Contents
- ip source guard configuration
- configuring a static binding entry
- ip source guard configuration examples
- dynamic binding function configuration example
- troubleshooting ip source guard
- Table of Contents
- Table Of Contents
- ssh2.0 configuration
- configuring the device as an ssh server
- enabling ssh server
- configuring a client public key
- configuring an ssh user
- setting the ssh management parameters
- configuring the device as an ssh client
- configuring whether first-time authentication is supported
- displaying and maintaining ssh
- when switch acts as server for publickey authentication
- ssh client configuration examples
- when switch acts as client for publickey authentication
- sftp service
- configuring an sftp client
- working with the sftp directories
- working with sftp files
- terminating the connection to the remote sftp server
- sftp server configuration example
- Table of Contents
- Table Of Contents
- pki configuration
- architecture of pki
- pki configuration task list
- configuring an entity dn
- configuring a pki domain
- submitting a pki certificate request
- retrieving a certificate manually
- configuring pki certificate verification
- destroying a local rsa key pair
- deleting a certificate
- pki configuration examples
- requesting a certificate from a ca running windows 2003 server
- configuring a certificate attribute-based access control policy
- troubleshooting pki
- failed to retrieve crls
- Table of Contents
- Table Of Contents
- ssl configuration
- ssl configuration task list
- configuring an ssl server policy
- ssl server policy configuration example
- configuring an ssl client policy
- troubleshooting ssl
- Table of Contents
- Table Of Contents
- public key configuration
- configuring the local asymmetric key pair
- displaying or exporting the local rsa or dsa host public key
- displaying and maintaining public keys
- public key configuration examples
- importing the public key of a peer from a public key file
- Table of Contents
- Table Of Contents
- Table Of Contents
- acl overview
- introduction to ipv4 acl
- ipv4 acl naming
- ipv4 acl step
- introduction to ipv6 acl
- ipv6 acl step
- ipv4 acl configuration
- configuring a basic ipv4 acl
- configuring an advanced ipv4 acl
- configuring an ethernet frame header acl
- copying an ipv4 acl
- displaying and maintaining ipv4 acls
- ipv6 acl configuration
- configuring an advanced ipv6 acl
- copying an ipv6 acl
- displaying and maintaining ipv6 acls
- acl application for packet filtering
- filtering ipv6 packets
- acl application example
- applying an acl to a vlan interface
- Table of Contents
- Table Of Contents
- arp attack protection configuration
- configuring arp defense against ip packet attacks
- enabling arp black hole routing
- configuring source mac address based arp attack detection
- configuring arp packet source mac address consistency check
- configuring arp detection
- configuring arp detection based on specified objects
- arp detection configuration example i
- arp detection configuration example ii
- Table of Contents
- Table Of Contents
- smart link overview
- how smart link works
- smart link configuration task list
- configuring protected vlans for a smart link group
- configuring role preemption for a smart link group
- smart link device configuration example
- configuring an associated device
- displaying and maintaining smart link
- multiple smart link groups load sharing configuration example
- Table of Contents
- Table Of Contents
- monitor link configuration
- configuring monitor link
- configuring monitor link group member ports
- monitor link configuration example
- Table of Contents
- Table Of Contents
- rrpp overview
- basic concepts in rrpp
- rrpp timers
- typical rrpp networking
- rrpp configuration task list
- creating an rrpp domain
- configuring control vlans
- configuring rrpp rings
- configuring rrpp nodes
- activating an rrpp domain
- configuring an rrpp ring group
- displaying and maintaining rrpp
- intersecting ring configuration example
- intersecting-ring load balancing configuration example
- troubleshooting
- Table of Contents
- Table Of Contents
- dldp configuration
- how dldp works
- dldp configuration task list
- enabling dldp
- setting the interval for sending advertisement packets
- setting the port shutdown mode
- configuring dldp authentication
- displaying and maintaining dldp
- Table of Contents
- Table Of Contents
- ethernet oam configuration
- how ethernet oam works
- standards and protocols
- configuring link monitoring
- configuring errored frame seconds event detection
- displaying and maintaining ethernet oam configuration
- ethernet oam configuration example
- Table of Contents
- Table Of Contents
- cfd configuration
- cfd functions
- basic configuration tasks
- configuring mep
- configuring cc on meps
- configuring lb on meps
- finding the path between a source mep and a target mep
- cfd configuration examples
- configuring mep and enabling cc on it
- configuring the rules for generating mips
- Table of Contents
- Table Of Contents
- track overview
- track configuration task list
- configuring collaboration between the track module and the application modules
- displaying and maintaining track object(s)
- Table of Contents
- Table Of Contents
- Table Of Contents
- logging in to an ethernet switch
- users and user interfaces
- logging in through the console port
- console port login configuration
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- logging in through telnet
- telnet login configuration task list
- telnet login configuration with authentication mode being password
- telnet login configuration with authentication mode being scheme
- logging in through ssh
- user interface configuration examples
- command authorization configuration example
- command accounting configuration example
- web server configuration
- displaying web users
- connection establishment using nms
- specifying source for telnet packets
- displaying the source ip address/interface specified for telnet packets
- controlling telnet users
- controlling telnet users by source and destination ip addresses
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip addresses
- Table of Contents
- Table Of Contents
- basic configurations
- entering system view
- configuring the system clock
- displaying the system clock
- enabling/disabling the display of copyright information
- configuring a banner
- configuring cli hotkeys
- configuring command alias
- configuring user privilege levels and command levels
- configuring user privilege level
- switching user privilege level
- modifying command level
- cli features
- synchronous information output
- editing features
- cli display
- display functions
- saving history commands
- Table of Contents
- Table Of Contents
- device management
- rebooting a device
- configuring the scheduled automatic execution function
- upgrading device software
- upgrading the boot file through command lines
- configuring a detection interval
- identifying and diagnosing pluggable transceivers
- displaying and maintaining device management configuration
- device management configuration examples
- Table of Contents
- Table Of Contents
- file system management
- directory operations
- file operations
- batch operations
- setting file system prompt modes
- configuration file management
- saving the current configuration
- specifying a startup configuration file for the next system startup
- backing up the startup configuration file
- displaying and maintaining device configuration
- ftp configuration
- configuring the ftp client
- ftp client configuration example
- configuring the ftp server
- configuring authentication and authorization on the ftp server
- ftp server configuration example
- displaying and maintaining ftp
- tftp configuration
- configuring the tftp client
- displaying and maintaining the tftp client
- Table of Contents
- Table Of Contents
- http configuration
- configuring the port number of the http service
- displaying and maintaining http
- https configuration
- associating the https service with an ssl server policy
- associating the https service with a certificate attribute access control policy
- associating the https service with an acl
- Table of Contents
- Table Of Contents
- snmp configuration
- snmp protocol version
- configuring snmp logging
- snmp trap configuration
- configuring trap parameters
- displaying and maintaining snmp
- snmp configuration example
- snmp logging configuration example
- mib style configuration
- Table of Contents
- Table Of Contents
- rmon configuration
- rmon groups
- configuring rmon
- displaying and maintaining rmon
- Table of Contents
- Table Of Contents
- mac address table configuration
- types of mac address table entries
- configuring mac address table
- configuring the aging timer for dynamic mac address entries
- mac address table configuration example
- mac information configuration
- enabling mac information on an interface
- Table of Contents
- Table Of Contents
- system maintaining and debugging
- introduction to system debugging
- system maintaining
- system maintaining example
- Table Of Contents
- information center configuration
- system information format
- configuring information center
- outputting system information to a monitor terminal
- outputting system information to a log host
- outputting system information to the trap buffer
- outputting system information to the log buffer
- outputting system information to the snmp module
- disabling a port from generating link up/down logging information
- displaying and maintaining information center
- outputting log information to a linux log host
- outputting log information to the console
- Table of Contents
- Table Of Contents
- poe configuration
- poe configuration task list
- configuring a poe interface through the command line
- configuring poe power management
- upgrading pse processing software online
- configuring a pd disconnection detection mode
- displaying and maintaining poe
- troubleshooting poe
- Table of Contents
- Table Of Contents
- hotfix configuration
- hotfix configuration task list
- one-step patch installation
- step-by-step patch installation
- activating patches
- step-by-step patch uninstallation
- displaying and maintaining hotfix
- Table of Contents
- Table Of Contents
- nqa configuration
- basic concepts of nqa
- nqa configuration task list
- configuring the nqa server
- configuring an nqa test group
- configuring a dhcp test
- configuring an ftp test
- configuring an http test
- configuring a udp jitter test
- configuring an snmp test
- configuring a tcp test
- configuring a udp echo test
- configuring a voice test
- configuring a dlsw test
- configuring the collaboration function
- configuring trap delivery
- configuring optional parameters common to an nqa test group
- scheduling an nqa test group
- displaying and maintaining nqa
- dhcp test configuration example
- ftp test configuration example
- http test configuration example
- udp jitter test configuration example
- snmp test configuration example
- tcp test configuration example
- udp echo test configuration example
- voice test configuration example
- dlsw test configuration example
- nqa collaboration configuration example
- Table of Contents
- Table Of Contents
- ntp configuration
- advantages of ntp
- ntp message format
- operation modes of ntp
- ntp configuration task list
- configuring the operation modes of ntp
- configuring the ntp symmetric peers mode
- configuring optional parameters of ntp
- disabling an interface from receiving ntp messages
- configuring access-control rights
- configuring ntp authentication
- displaying and maintaining ntp
- configuring the ntp symmetric mode
- configuring ntp broadcast mode
- configuring ntp client/server mode with authentication
- configuring ntp broadcast mode with authentication
- Table of Contents
- Table Of Contents
- cluster management configuration
- how a cluster works
- cluster configuration task list
- configuring the management device
- configuring ndp parameters
- manually collecting topology information
- enabling the cluster function
- enabling management vlan auto-negotiation
- cluster member management
- configuring the member devices
- adding a candidate device to a cluster
- configuring advanced cluster functions
- configuring interaction for a cluster
- snmp configuration synchronization function
- configuring web user accounts in batches
- displaying and maintaining cluster management
- Table of Contents
- Table Of Contents
- stack configuration
- establishing a stack
- configuring the master device of a stack
- configuring stack ports of a slave device
- displaying and maintaining stack configuration
- Table Of Contents
- automatic configuration
- how automatic configuration works
- obtaining an ip address
- obtaining the configuration file from the tftp server
- executing the configuration file
Related products
4500G 48-Port4200G 24-Port4210G 24-Port4210G NT 24-PortSwitch 4800G 24-Port4200G 48-PortSwitch 4500 26-Port4500G PWRSwitch 4800G PWR 24-Port4200G 12-Port3Com categories
Switch
Network Router
Network Hardware
Wireless Access Point
Network Card
Modem
Computer Hardware
Software
Telephone
Gateway
manualsdatabase
Your AI-powered manual search engine