Manuals database logo
manualsdatabase
Your AI-powered manual search engine

3Com E4500-24 manuals

E4500-24 first page preview

E4500-24

Brand: 3Com | Category: Switch
Table of contents
  1. cli configuration
  2. modifying the command level
  3. switching user level
  4. cli views
  5. cli features
  6. terminal display
  7. command edit
  8. Table of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. logging in to an ethernet switch
  12. user interface index
  13. logging in through the console port
  14. console port login configuration
  15. console port login configurations for different authentication modes
  16. console port login configuration with authentication mode being none
  17. configuration example
  18. console port login configuration with authentication mode being password
  19. console port login configuration with authentication mode being scheme
  20. logging in through telnet
  21. telnet configurations for different authentication modes
  22. telnet configuration with authentication mode being none
  23. telnet configuration with authentication mode being password
  24. telnet configuration with authentication mode being scheme
  25. telnetting to a switch
  26. telnetting to another switch from the current switch
  27. logging in using a modem
  28. modem connection establishment
  29. establishing an http connection
  30. configuring the login banner
  31. enabling/disabling the web server
  32. connection establishment using nms
  33. configuring source ip address for telnet service packets
  34. displaying source ip address configuration
  35. user control
  36. controlling telnet users
  37. controlling telnet users by source mac addresses
  38. controlling network management users by source ip addresses
  39. controlling web users by source ip address
  40. Table of Contents
  41. Table Of Contents
  42. configuration file management
  43. configuration task list
  44. erasing the startup configuration file
  45. displaying switch configuration
  46. Table of Contents
  47. Table Of Contents
  48. vlan overview
  49. advantages of vlans
  50. vlan interface
  51. assigning an ethernet port to specified vlans
  52. vlan configuration
  53. basic vlan interface configuration
  54. displaying vlan configuration
  55. assigning an ethernet port to a vlan
  56. configuring the default vlan for a port
  57. Table of Contents
  58. Table Of Contents
  59. ip addressing overview
  60. special case ip addresses
  61. configuring ip addresses
  62. displaying ip addressing configuration
  63. ip address configuration examples
  64. network requirements
  65. ip performance overview
  66. disabling icmp to send error packets
  67. displaying and maintaining ip performance configuration
  68. Table of Contents
  69. Table Of Contents
  70. voice vlan configuration
  71. how switch 4500 series switches identify voice traffic
  72. configuring voice vlan assignment mode of a port
  73. security mode of voice vlan
  74. configuring the voice vlan to operate in manual voice vlan assignment mode
  75. displaying and maintaining voice vlan
  76. voice vlan configuration example (manual voice vlan assignment mode)
  77. Table of Contents
  78. Table Of Contents
  79. gvrp configuration
  80. protocol specifications
  81. configuring gvrp timers
  82. configuring gvrp port registration mode
  83. displaying and maintaining gvrp
  84. Table of Contents
  85. Table Of Contents
  86. port basic configuration
  87. configuring port auto-negotiation speed
  88. limiting traffic on individual ports
  89. configuring flow control on a port
  90. duplicating the configuration of a port to other ports
  91. enabling loopback test
  92. configuring the interval to perform statistical analysis on port traffic
  93. enabling giant-frame statistics function
  94. setting the port state change delay
  95. ethernet port configuration example
  96. troubleshooting ethernet port configuration
  97. Table of Contents
  98. Table Of Contents
  99. link aggregation configuration
  100. link aggregation classification
  101. static lacp aggregation group
  102. dynamic lacp aggregation group
  103. aggregation group categories
  104. configuring a manual aggregation group
  105. configuring a static lacp aggregation group
  106. configuring a dynamic lacp aggregation group
  107. displaying and maintaining link aggregation configuration
  108. link aggregation configuration example
  109. Table Of Contents
  110. port isolation configuration
  111. port isolation configuration example
  112. Table Of Contents
  113. port security configuration
  114. port security configuration task list
  115. enabling port security
  116. setting the port security mode
  117. configuring port security features
  118. configuring guest vlan for a port in macaddressoruserloginsecure mode
  119. ignoring the authorization information from the radius server
  120. port security configuration examples
  121. guest vlan configuration example
  122. Table of Contents
  123. Table Of Contents
  124. dldp configuration
  125. dldp fundamentals
  126. dldp status
  127. dldp operating mode
  128. dldp implementation
  129. dldp neighbor state
  130. performing basic dldp configuration
  131. resetting dldp state
  132. dldp configuration example
  133. Table of Contents
  134. Table Of Contents
  135. mac address table management
  136. managing mac address table
  137. mac address table management configuration task list
  138. configuring a mac address entry
  139. setting the mac address aging timer
  140. displaying mac address table information
  141. configuration examples
  142. Table of Contents
  143. Table Of Contents
  144. introduction to the auto detect function
  145. auto detect basic configuration
  146. auto detect implementation in vlan interface backup
  147. auto detect configuration examples
  148. configuration example for auto detect implementation with vlan interface backup
  149. Table of Contents
  150. Table Of Contents
  151. Table Of Contents
  152. mstp configuration
  153. rapid spanning tree protocol overview
  154. mstp implementation on switches
  155. mstp configuration task list
  156. configuring root bridge
  157. specifying the current switch as a root bridge/secondary root bridge
  158. configuring the bridge priority of the current switch
  159. configuring the mstp operation mode
  160. configuring the maximum hop count of an mst region
  161. configuring the network diameter of the switched network
  162. configuring the current port as an edge port
  163. enabling mstp
  164. configuring leaf nodes
  165. configuring a port as an edge port
  166. configuring port priority
  167. performing mcheck operation
  168. configuring guard functions
  169. configuring root guard
  170. configuring loop guard
  171. configuring bpdu dropping
  172. configuring digest snooping
  173. configuring rapid transition
  174. configuring vlan-vpn tunnel
  175. mstp maintenance configuration
  176. displaying and maintaining mstp
  177. mstp configuration example
  178. vlan-vpn tunnel configuration example
  179. Table of Contents
  180. Table Of Contents
  181. Table Of Contents
  182. ip routing protocol overview
  183. routing protocol overview
  184. load sharing and route backup
  185. displaying and maintaining a routing table
  186. static route configuration
  187. displaying and maintaining static routes
  188. static route configuration example
  189. troubleshooting a static route
  190. rip configuration
  191. rip configuration task list
  192. basic rip configuration
  193. rip route control
  194. configuring rip route control
  195. rip network adjustment and optimization
  196. displaying and maintaining rip configuration
  197. troubleshooting rip configuration
  198. ip route policy configuration
  199. ip route policy configuration task list
  200. defining a route policy
  201. ip-prefix configuration
  202. ip route policy configuration example
  203. troubleshooting ip route policy
  204. Table of Contents
  205. Table Of Contents
  206. multicast overview
  207. information transmission in the broadcast mode
  208. information transmission in the multicast mode
  209. common notations in multicast
  210. multicast models
  211. multicast address
  212. multicast protocols
  213. multicast packet forwarding mechanism
  214. implementation of the rpf mechanism
  215. common multicast configuration
  216. configuring a multicast mac address entry
  217. configuring dropping unknown multicast packets
  218. igmp snooping configuration
  219. basic concepts in igmp snooping
  220. work mechanism of igmp snooping
  221. configuring igmp snooping
  222. configuring the version of igmp snooping
  223. configuring fast leave processing
  224. configuring a multicast group filter
  225. configuring the maximum number of multicast groups on a port
  226. configuring igmp snooping querier
  227. suppressing flooding of unknown multicast traffic in a vlan
  228. configuring a static router port
  229. configuring a port as a simulated group member
  230. configuring a vlan tag for query messages
  231. displaying and maintaining igmp snooping
  232. configuring multicast vlan
  233. troubleshooting igmp snooping
  234. Table of Contents
  235. Table Of Contents
  236. Table Of Contents
  237. x configuration
  238. the mechanism of an 802.1x authentication system
  239. x authentication procedure
  240. timers used in 802.1x
  241. additional 802.1x features on switch
  242. introduction to 802.1x configuration
  243. configuring basic 802.1x functions
  244. timer and maximum user number configuration
  245. advanced 802.1x configuration
  246. configuring client version checking
  247. enabling dhcp-triggered authentication
  248. configuring the 802.1x re-authentication timer
  249. displaying and maintaining 802.1x configuration
  250. quick ead deployment configuration
  251. configuring quick ead deployment
  252. displaying and maintaining quick ead deployment
  253. troubleshooting
  254. introduction to habp
  255. habp client configuration
  256. system guard configuration
  257. configuring system guard against tcn attacks
  258. displaying and maintaining system guard configuration
  259. Table of Contents
  260. Table Of Contents
  261. Table Of Contents
  262. aaa overview
  263. introduction to aaa services
  264. introduction to hwtacacs
  265. aaa configuration
  266. creating an isp domain and configuring its attributes
  267. configuring an aaa scheme for an isp domain
  268. configuring dynamic vlan assignment
  269. configuring the attributes of a local user
  270. radius configuration task list
  271. creating a radius scheme
  272. configuring radius accounting servers
  273. configuring shared keys for radius messages
  274. configuring the maximum number of radius request transmission attempts
  275. configuring the status of radius servers
  276. configuring the local radius server
  277. configuring timers for radius servers
  278. enabling sending trap message when a radius server goes down
  279. hwtacacs configuration task list
  280. configuring tacacs authorization servers
  281. configuring tacacs accounting servers
  282. configuring the attributes of data to be sent to tacacs servers
  283. aaa configuration examples
  284. local authentication of ftp/telnet users
  285. hwtacacs authentication and authorization of telnet users
  286. troubleshooting aaa
  287. ead configuration
  288. ead configuration example
  289. Table of Contents
  290. Table Of Contents
  291. mac address authentication configuration
  292. related concepts
  293. mac address authentication enhanced function configuration
  294. configuring a guest vlan
  295. configuring the maximum number of mac address authentication users allowed to access a port
  296. displaying and maintaining mac address authentication configuration
  297. Table of Contents
  298. Table Of Contents
  299. arp configuration
  300. arp table
  301. configuring arp
  302. configuring gratuitous arp
  303. displaying and debugging arp
  304. arp attack defense configuration
  305. introduction to arp packet rate limit
  306. configuring arp attack defense
  307. configuring the maximum number of dynamic arp entries that a vlan interface can learn
  308. configuring arp attack detection
  309. configuring the arp packet rate limit function
  310. arp attack defense configuration example
  311. arp attack defense configuration example ii
  312. arp attack defense configuration example iii
  313. Table of Contents
  314. Table Of Contents
  315. Table Of Contents
  316. Table Of Contents
  317. dhcp overview
  318. obtaining ip addresses dynamically
  319. dhcp packet format
  320. protocol specification
  321. dhcp server configuration
  322. dhcp ip address preferences
  323. dhcp server configuration task list
  324. configuring the global address pool based dhcp server
  325. creating a dhcp global address pool
  326. configuring gateways for the dhcp client
  327. configuring the interface address pool based dhcp server
  328. enabling the interface address pool mode on interface(s)
  329. configuring an address allocation mode for an interface address pool
  330. configuring dhcp server security functions
  331. configuring dhcp accounting functions
  332. dhcp accounting configuration
  333. displaying and maintaining the dhcp server
  334. dhcp server with option 184 support configuration example
  335. dhcp accounting configuration example
  336. troubleshooting a dhcp server
  337. dhcp relay agent configuration
  338. option 82 support on dhcp relay agent
  339. configuring the dhcp relay agent
  340. dhcp relay agent configuration task list
  341. configuring dhcp relay agent security functions
  342. configuring the dhcp relay agent to support option
  343. displaying and maintaining dhcp relay agent configuration
  344. troubleshooting dhcp relay agent configuration
  345. dhcp snooping configuration
  346. introduction to dhcp-snooping option
  347. introduction to ip filtering
  348. configuring dhcp snooping
  349. configuring dhcp snooping to support option
  350. configuring ip filtering
  351. displaying and maintaining dhcp snooping configuration
  352. dhcp snooping configuration examples
  353. ip filtering configuration example
  354. dhcp packet rate limit configuration
  355. configuring dhcp packet rate limit
  356. rate limit configuration example
  357. introduction to dhcp client
  358. configuring a dhcp/bootp client
  359. dhcp client configuration example
  360. Table of Contents
  361. Table Of Contents
  362. acl configuration
  363. ways to apply an acl on a switch
  364. types of acls supported by switch 4500 series
  365. configuring basic acl
  366. configuring advanced acl
  367. configuring layer 2 acl
  368. configuring user-defined acl
  369. applying acl rules on ports
  370. displaying and maintaining acl configuration
  371. basic acl configuration example
  372. advanced acl configuration example
  373. layer 2 acl configuration example
  374. user-defined acl configuration example
  375. Table of Contents
  376. Table Of Contents
  377. qos configuration
  378. major traffic control techniques
  379. qos supported by switch 4500 series
  380. priority trust mode
  381. protocol priority
  382. priority marking
  383. line rate
  384. congestion avoidance
  385. configuring the mapping between 802.1p priority and local precedence
  386. setting the priority of protocol packets
  387. marking packet priority
  388. configuring traffic policing
  389. configuring line rate
  390. configuring vlan mapping
  391. configuring wred
  392. configuring traffic mirroring
  393. displaying and maintaining qos
  394. qos configuration examples
  395. configuration example of priority marking and queue scheduling
  396. vlan mapping configuration example
  397. configuration procedure
  398. Table of Contents
  399. Table Of Contents
  400. mirroring configuration
  401. remote port mirroring
  402. configuring local port mirroring
  403. displaying and maintaining port mirroring
  404. mirroring configuration examples
  405. remote port mirroring configuration example
  406. Table of Contents
  407. Table Of Contents
  408. introduction to xrn
  409. how xrn works
  410. specifying the fabric port of a switch
  411. specifying the vlan used to form an xrn fabric
  412. setting a unit id for a switch
  413. assigning a unit name to a switch
  414. displaying and maintaining xrn fabric
  415. network diagram
  416. Table of Contents
  417. Table Of Contents
  418. cluster overview
  419. roles in a cluster
  420. how a cluster works
  421. cluster configuration task list
  422. configuring member devices
  423. managing a cluster through the management device
  424. configuring the enhanced cluster features
  425. displaying and maintaining cluster configuration
  426. cluster configuration examples
  427. network management interface configuration example
  428. enhanced cluster feature configuration example
  429. Table of Contents
  430. Table Of Contents
  431. poe configuration
  432. poe configuration task list
  433. enabling the poe feature on a port
  434. setting the poe mode on a port
  435. configuring the pd compatibility detection function
  436. upgrading the pse processing software online
  437. poe configuration example
  438. poe profile configuration
  439. displaying poe profile configuration
  440. Table of Contents
  441. Table Of Contents
  442. udp helper configuration
  443. configuring udp helper
  444. udp helper configuration example
  445. Table Of Contents
  446. snmp configuration
  447. configuring basic snmp functions
  448. configuring trap-related functions
  449. enabling logging for network management
  450. displaying snmp
  451. rmon configuration
  452. commonly used rmon groups
  453. displaying rmon
  454. Table of Contents
  455. Table Of Contents
  456. ntp configuration
  457. implementation principle of ntp
  458. ntp implementation modes
  459. ntp configuration task list
  460. configuring access control right
  461. configuring ntp authentication
  462. configuring optional ntp parameters
  463. displaying ntp configuration
  464. configuring ntp symmetric peer mode
  465. configuring ntp multicast mode
  466. configuring ntp server/client mode with authentication
  467. Table of Contents
  468. Table Of Contents
  469. ssh configuration
  470. ssh operating process
  471. ssh server and client
  472. configuring the ssh server
  473. configuring the user interfaces for ssh clients
  474. configuring the ssh management functions
  475. configuring key pairs
  476. creating an ssh user and specifying an authentication type
  477. specifying a service type for an ssh user on the server
  478. configuring the public key of a client on the server
  479. assigning a public key to an ssh user
  480. configuring the ssh client
  481. configuring an ssh client assumed by an ssh2-capable switch
  482. displaying and maintaining ssh configuration
  483. comparison of ssh commands with the same functions
  484. ssh configuration examples
  485. when switch acts as server for password and radius authentication
  486. when switch acts as server for password and hwtacacs authentication
  487. when switch acts as server for publickey authentication
  488. when switch acts as client for password authentication
  489. when switch acts as client for publickey authentication
  490. when switch acts as client and first-time authentication is not supported
  491. Table of Contents
  492. Table Of Contents
  493. file system configuration
  494. directory operations
  495. flash memory operations
  496. prompt mode configuration
  497. file attribute configuration
  498. booting with the startup file
  499. configuring file attributes
  500. configuration file backup and restoration
  501. Table of Contents
  502. Table Of Contents
  503. introduction to ftp and sftp
  504. ftp configuration
  505. configuration example: a switch operating as an ftp server
  506. ftp banner display configuration example
  507. sftp configuration
  508. sftp configuration: a switch operating as an sftp client
  509. sftp configuration example
  510. tftp configuration
  511. tftp configuration: a switch operating as a tftp client
  512. tftp configuration example
  513. Table of Contents
  514. Table Of Contents
  515. information center
  516. system information format
  517. information center configuration
  518. configuring to display the time stamp with the utc time zone
  519. setting to output system information to a monitor terminal
  520. setting to output system information to a log host
  521. setting to output system information to the trap buffer
  522. setting to output system information to the log buffer
  523. displaying and maintaining information center
  524. information center configuration examples
  525. log output to a linux log host
  526. log output to the console
  527. Table of Contents
  528. Table Of Contents
  529. introduction to loading approaches
  530. boot menu
  531. loading by xmodem through console port
  532. loading by tftp through ethernet port
  533. loading by ftp through ethernet port
  534. remote boot rom and software loading
  535. remote loading using tftp
  536. basic system configuration
  537. displaying the system status
  538. displaying debugging status
  539. network connectivity test
  540. device management
  541. scheduling a reboot on the switch
  542. specifying the app to be used at reboot
  543. upgrading the host software in the fabric
  544. displaying the device management configuration
  545. remote switch app upgrade configuration example
  546. Table of Contents
  547. Table Of Contents
  548. implementation of vlan-vpn
  549. inner-to-outer tag priority replicating and mapping
  550. enabling the vlan-vpn feature for a port
  551. configuring the inner-to-outer tag priority replicating and mapping feature
  552. vlan-vpn configuration example
  553. selective qinq configuration
  554. mac address replicating
  555. selective qinq configuration task list
  556. selective qinq configuration example
  557. Table of Contents
  558. Table Of Contents
  559. configuring remote-ping
  560. Table Of Contents
  561. ipv6 configuration
  562. introduction to ipv6 address
  563. introduction to ipv6 neighbor discovery protocol
  564. ipv6 configuration task list
  565. configuring an ipv6 unicast address
  566. configuring ipv6 ndp
  567. configuring a static ipv6 route
  568. configuring the maximum number of ipv6 icmp error packets sent within a specified time
  569. displaying and maintaining ipv
  570. ipv6 configuration example
  571. ipv6 application configuration
  572. ipv6 traceroute
  573. ipv6 telnet
  574. ipv6 application configuration example
  575. troubleshooting ipv6 application
  576. unable to run traceroute
  577. Table of Contents
  578. Table Of Contents
  579. introduction to password control configuration
  580. password control configuration
  581. configuring the limitation of minimum password length
  582. configuring history password recording
  583. configuring a user login password in interactive mode
  584. configuring the password authentication timeout time
  585. configuring password composition policies
  586. displaying password control
  587. Table of Contents
  588. Table Of Contents
  589. access management configuration
  590. configuring access management
  591. access management configuration example
  592. combining access management with port isolation
  593. Table of Contents
  594. Table Of Contents
  595. lldp configuration
  596. tlv types
  597. lldp configuration task list
  598. setting lldp operating mode
  599. enable lldp polling
  600. configuring the parameters concerning lldpdu sending
  601. configuring cdp compatibility
  602. configuring lldp trapping
  603. displaying and maintaining lldp
  604. cdp-compatible lldp configuration example
Related products
ProCurve E4500-484500G 24-PortSW4500-264500 PWRSW4500-505500-EI PWRSwitch 5500G-EI PWR 24-PortSwitch 5500G-EI 24-Port SFPSwitch 4500 26-PortLANPLEX 2500
3Com categories
More 3Com categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine