H3C H3C S5100-EI manuals
H3C S5100-EI
Table of contents
- About This Manual
- Table Of Contents
- related documentation
- Product Overview
- software release notes
- manual list
- networking applications
- data center access
- Table of Contents
- Login
- Table Of Contents
- logging in to an ethernet switch
- relationship between a user and a user interface
- logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- configuration example
- console port login configuration with authentication mode being scheme
- logging in through telnet
- telnet configurations for different authentication modes
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- telnetting to another switch from the current switch
- logging in using a modem
- modem connection establishment
- cli configuration
- modifying the command level
- switching user level
- cli views
- cli features
- terminal display
- command edit
- management interface
- configuring the login banner
- enabling/disabling the web server
- connection establishment using nms
- configuring source ip address for telnet service packets
- displaying source ip address configuration
- user control
- controlling telnet users by acl
- controlling network management users by source ip addresses
- controlling web users by source ip address
- logging out a web user
- Table of Contents
- Configuration File Management
- configuration file management
- configuration task list
- erasing the startup configuration file
- specifying a configuration file for next startup
- VLAN
- Table of Contents
- Table Of Contents
- vlan overview
- advantages of vlans
- Management VLAN
- link types of ethernet ports
- protocol-based vlan
- encapsulation format of ethernet data
- procedure for the switch to judge packet protocol
- implementation of protocol-based vlan
- vlan configuration
- basic vlan interface configuration
- displaying vlan configuration
- assigning an ethernet port to a vlan
- configuring the default vlan for a port
- configuring a protocol-based vlan
- associating a port with a protocol-based vlan
- displaying protocol-based vlan configuration
- Table of Contents
- Table Of Contents
- management vlan configuration
- configuring the management vlan
- displaying and maintaining management vlan configuration
- Voice VLAN
- voice vlan configuration
- how s5100-ei series switches identify voice traffic
- setting the voice traffic transmission priority
- security mode of voice vlan
- configuring the voice vlan to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- voice vlan configuration example
- voice vlan configuration example (manual mode)
- Table of Contents
- GVRP
- gvrp configuration
- protocol specifications
- configuring gvrp timers
- displaying and maintaining gvrp
- gvrp configuration example
- Table of Contents
- Port Basic Configuration
- port basic configuration
- initially configuring a port
- limiting traffic on individual ports
- enabling flow control on a port
- Link Aggregation
- enabling loopback test
- configuring the interval to perform statistical analysis on port traffic
- configuring a port group
- displaying and maintaining basic port configuration
- Table of Contents
- Table Of Contents
- link aggregation configuration
- link aggregation classification
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- configuring a manual aggregation group
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- displaying and maintaining link aggregation configuration
- Port Isolation
- port isolation configuration
- port isolation configuration example
- configuration procedure
- Table Of Contents
- port security configuration
- port security configuration task list
- setting the maximum number of mac addresses allowed on a port
- setting the port security mode
- configuring port security features
- ignoring the authorization information from the radius server
- displaying and maintaining port security configuration
- port security configuration example
- port binding overview
- port binding configuration example
- Table of Contents
- DLDP
- dldp configuration
- dldp fundamentals
- dldp status
- dldp operating mode
- dldp implementation
- dldp neighbor state
- performing basic dldp configuration
- resetting dldp state
- dldp configuration example
- Table of Contents
- MAC Address Table
- mac address table management
- managing mac address table
- configuring mac address table management
- configuring a mac address entry
- setting the aging time of mac address entries
- displaying mac address table information
- adding a static mac address entry manually
- Table of Contents
- MSTP
- Table Of Contents
- mstp configuration
- rapid spanning tree protocol overview
- mstp implementation on switches
- mstp configuration task list
- configuring root bridge
- specifying the current switch as a root bridge/secondary root bridge
- configuring the bridge priority of the current switch
- configuring the mstp operation mode
- configuring the maximum hop count of an mst region
- configuring the network diameter of the switched network
- configuring the current port as an edge port
- enabling mstp
- configuring leaf nodes
- configuring a port as an edge port
- configuring port priority
- performing mcheck operation
- configuring guard functions
- configuring root guard
- configuring loop guard
- configuring tc-bpdu attack guard
- configuring bpdu dropping
- configuring digest snooping
- configuring rapid transition
- configuring vlan-vpn tunnel
- mstp maintenance configuration
- displaying and maintaining mstp
- mstp configuration example
- vlan-vpn tunnel configuration example
- Table of Contents
- Table Of Contents
- x configuration
- the mechanism of an 802.1x authentication system
- encapsulation of eapol messages
- x authentication procedure
- timers used in 802.1x
- x implementation on an s5100-si/ei series switch
- introduction to 802.1x configuration
- basic 802.1x configuration
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring client version checking
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- displaying and maintaining 802.1x configuration
- quick ead deployment configuration
- configuration prerequisites
- displaying and maintaining quick ead deployment
- troubleshooting
- introduction to habp
- habp client configuration
- system-guard configuration
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa overview
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- MAC Address Authentication
- creating a radius scheme
- configuring radius authentication/authorization servers
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the type of radius servers to be supported
- configuring the attributes of data to be sent to radius servers
- configuring the local radius server
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- hwtacacs configuration task list
- configuring tacacs authorization servers
- configuring tacacs accounting servers
- configuring the attributes of data to be sent to tacacs servers
- configuring the timers regarding tacacs servers
- aaa configuration examples
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- ead configuration
- ead configuration example
- Table of Contents
- Table Of Contents
- mac address authentication configuration
- related concepts
- mac address authentication enhanced function configuration
- configuring the maximum number of mac address authentication users allowed to access a port
- displaying and maintaining mac address authentication configuration
- Table of Contents
- Table Of Contents
- ip addressing overview
- special ip addresses
- DHCP
- displaying ip addressing configuration
- ip address configuration example ii
- ip performance overview
- disabling sending of icmp error packets
- displaying and maintaining ip performance optimization configuration
- Table of Contents
- Table Of Contents
- dhcp overview
- obtaining ip addresses dynamically
- dhcp packet format
- protocol specification
- dhcp relay agent configuration
- option 82 support on dhcp relay agent
- configuring the dhcp relay agent
- correlating a dhcp server group with a relay agent interface
- configuring the dhcp relay agent to support option
- displaying and maintaining dhcp relay agent configuration
- troubleshooting dhcp relay agent configuration
- dhcp snooping configuration
- introduction to dhcp-snooping option
- configuring dhcp snooping
- configuring dhcp snooping to support option
- displaying dhcp snooping configuration
- dhcp snooping configuration examples
- ip filtering configuration example
- introduction to dhcp client
- displaying dhcp/bootp client configuration
- dhcp client configuration example
- Table of Contents
- Table Of Contents
- acl configuration
- ways to apply an acl on a switch
- types of acls supported by s5100 series ethernet switches
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- acl assignment
- assigning an acl globally
- assigning an acl to a port group
- assigning an acl to a port
- displaying acl configuration
- basic acl configuration example
- advanced acl configuration example
- layer 2 acl configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- qos configuration
- major traffic control technologies
- qos features supported by the s5100 series ethernet switches
- traffic classification
- priority marking
- line rate
- flow-based traffic accounting
- configuring priority trust mode
- configuring priority mapping
- setting the priority of protocol packets
- configuring priority marking
- configuring traffic policing
- configuring traffic shaping
- configuring line rate
- configuring traffic redirecting
- configuring vlan mapping
- configuring queue scheduling
- configuring traffic accounting
- enabling the burst function
- configuring traffic mirroring
- displaying and maintaining qos
- qos configuration examples
- priority marking and queue scheduling configuration example
- vlan mapping configuration example
- traffic mirroring and traffic redirecting configuration example
- qos profile configuration
- configuring a qos profile
- applying a qos profile
- displaying and maintaining qos profile configuration
- qos profile configuration example
- Table of Contents
- Table Of Contents
- mirroring configuration
- local port mirroring
- mac-based mirroring
- QoS-QoS Profile
- configuring remote port mirroring
- configuring mac-based mirroring
- configuring vlan-based mirroring
- displaying port mirroring
- mirroring configuration examples
- remote port mirroring configuration example
- network diagram
- Table of Contents
- Table Of Contents
- arp configuration
- arp table
- introduction to arp attack detection
- configuring arp
- configuring arp attack detection
- configuring gratuitous arp
- arp configuration examples
- Table of Contents
- Table Of Contents
- stack function overview
- main switch configuration
- switching to slave switch view
- stack configuration example
- cluster overview
- roles in a cluster
- how a cluster works
- cluster configuration tasks
- configuring the management device
- configuring member devices
- managing a cluster through the management device
- configuring the enhanced cluster features
- SNMP-RMON
- displaying and maintaining cluster configuration
- cluster configuration example
- enhanced cluster feature configuration example
- Table of Contents
- Table Of Contents
- snmp configuration
- configuring basic snmp functions
- configuring trap-related functions
- enabling logging for network management
- displaying snmp
- rmon configuration
- displaying rmon
- Table of Contents
- Table Of Contents
- multicast overview
- information transmission in the broadcast mode
- roles in multicast
- common notations in multicast
- multicast models
- multicast protocols
- multicast packet forwarding mechanism
- implementation of the rpf mechanism
- igmp snooping configuration
- work mechanism of igmp snooping
- enabling igmp snooping
- configuring timers
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring a static router port
- configuring a vlan tag for query messages
- displaying and maintaining igmp snooping
- configuring multicast vlan
- troubleshooting igmp snooping
- common multicast configuration
- displaying common multicast configuration
- Table of Contents
- Table Of Contents
- ntp configuration
- implementation principle of ntp
- ntp implementation modes
- ntp configuration task list
- configuring access control right
- configuring ntp authentication
- configuring optional ntp parameters
- displaying ntp configuration
- configuration examples
- configuring ntp symmetric peer mode
- configuring ntp broadcast mode
- configuring ntp multicast mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- ssh configuration
- ssh operating process
- ssh server and client
- configuring the ssh server
- configuring the user interfaces for ssh clients
- configuring the ssh management functions
- configuring the ssh server to be compatible with ssh1 clients
- creating an ssh user and specifying an authentication type
- specifying a service type for an ssh user on the server
- configuring the public key of a client on the server
- exporting the host public key to a file
- configuring the ssh client
- configuring an ssh client assumed by an ssh2-capable switch
- displaying and maintaining ssh configuration
- ssh configuration examples
- when switch acts as server for password and radius authentication
- when switch acts as server for password and hwtacacs authentication
- when switch acts as server for publickey authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- when switch acts as client and first-time authentication is not supported
- Table of Contents
- Table Of Contents
- file system configuration
- file operations
- flash memory operations
- file system configuration example
- file attribute configuration
- configuring file attributes
- Table of Contents
- Table Of Contents
- introduction to ftp and sftp
- ftp configuration
- configuration example: a switch operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: a switch operating as an sftp client
- sftp configuration example
- tftp configuration
- tftp configuration: a switch operating as a tftp client
- tftp configuration example
- Table of Contents
- Table Of Contents
- information center
- system information format
- information center configuration
- configuring to display the time stamp with the utc time zone
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the trap buffer
- setting to output system information to the log buffer
- displaying and maintaining information center
- information center configuration examples
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- introduction to loading approaches
- boot menu
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using tftp
- basic system configuration
- displaying the system status
- displaying debugging status
- network connectivity test
- device management
- scheduling a reboot on the switch
- specifying the app to be used at reboot
- displaying the device management configuration
- Table of Contents
- Table Of Contents
- implementation of vlan-vpn
- enabling the vlan-vpn feature for a port
- displaying vlan-vpn configuration
- selective qinq configuration
- inner-to-outer tag priority mapping
- selective qinq configuration example
- Table of Contents
- Table Of Contents
- hwping configuration
- test types supported by hwping
- hwping server configuration
- displaying hwping configuration
- dhcp test
- ftp test
- http test
- jitter test
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table of Contents
- Table Of Contents
- dns configuration
- configuring domain name resolution
- displaying and maintaining dns
- dns configuration examples
- troubleshooting dns
- Table of Contents
- Table Of Contents
- smart link overview
- configuring smart link
- configuring a smart link device
- configuring associated devices
- smart link configuration example
- introduction to monitor link
- how monitor link works
- configuring monitor link
- configuring a downlink port
- displaying monitor link configuration
- Table of Contents
- Table Of Contents
- ipv6 configuration
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- introduction to ipv6 dns
- ipv6 configuration task list
- configuring ipv6 ndp
- configuring a static ipv6 route
- configuring ipv6 tcp properties
- configuring the hop limit of icmpv6 reply packets
- displaying and maintaining ipv
- ipv6 configuration example
- ipv6 application configuration
- ipv6 traceroute
- ipv6 telnet
- ipv6 application configuration example
- troubleshooting ipv6 application
- unable to run traceroute
- Table of Contents
- Table Of Contents
- poe configuration
- poe configuration tasks
- setting the maximum output power on a port
- setting the poe mode on a port
- configuring poe over-temperature protection on the switch
- poe configuration example
- poe profile configuration
- displaying poe profile configuration
- Table of Contents
- Table Of Contents
- udp helper configuration
- configuring udp helper
- displaying and maintaining udp helper
- Table Of Contents
- access management configuration
- configuring access management
- combining access management with port isolation
H3C S5100-EI
Table of contents
- About This Manual
- Table Of Contents
- Table Of Contents
- Product Overview
- chapter 1 obtaining the documentation
- software release notes
- software version
- chapter 3 product overview
- system features of the s5100 series
- system features of the s5100-ei series
- chapter 4 networking applications
- access layer devices
- Table of Contents
- Login
- Table Of Contents
- logging in to an ethernet switch
- relationship between a user and a user interface
- common user interface configuration
- chapter 2 logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- configuration example
- chapter 3 logging in through telnet
- common configuration to control telnet access
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- telnetting to another switch from the current switch
- configuration on the switch side
- switch configuration
- modem connection establishment
- introduction to the cli
- Configuration File
- switching user level
- cli views
- VLAN
- cli features
- terminal display
- command history
- command edit
- establishing an http connection
- configuring the login banner
- enabling/disabling the web server
- connection establishment using nms
- configuring source ip address for telnet service packets
- displaying source ip address configuration
- chapter 9 user control
- controlling telnet users
- controlling network management users by source ip addresses
- controlling web users by source ip address
- logging out a web user
- Table Of Contents
- introduction to configuration file
- configuration task list
- erasing the startup configuration file
- specifying a configuration file for next startup
- displaying switch configuration
- Table of Contents
- Table Of Contents
- vlan overview
- vlan fundamentals
- vlan interface
- vlan classification
- assigning an ethernet port to specified vlans
- protocol-based vlan
- encapsulation format of ethernet data
- procedure for the switch to judge packet protocol
- implementation of protocol-based vlan
- vlan configuration
- basic vlan interface configuration
- displaying vlan configuration
- configuring the link type of an ethernet port
- configuring the default vlan for a port
- displaying and maintaining port-based vlan
- configuring a protocol-based vlan
- associating a port with a protocol-based vlan
- displaying protocol-based vlan configuration
- Table Of Contents
- management vlan
- default route
- displaying and maintaining management vlan configuration
- Table of Contents
- Voice VLAN
- voice vlan overview
- how s5100-ei series switches identify voice traffic
- setting the voice traffic transmission priority
- support for voice vlan on various ports
- voice vlan configuration
- configuring the voice vlan to operate in automatic voice vlan assignment mode
- configuring the voice vlan to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- voice vlan configuration example
- voice vlan configuration example (manual mode)
- GVRP
- chapter 1 gvrp configuration
- protocol specifications
- configuring gvrp timers
- configuring gvrp port registration mode
- displaying and maintaining gvrp
- Port Basic Configuration
- ethernet port configuration
- initially configuring a port
- configuring port auto-negotiation speed
- limiting traffic on individual ports
- duplicating the configuration of a port to other ports
- configuring loopback detection for an ethernet port
- Link Aggregation
- configuring the interval to perform statistical analysis on port traffic
- disabling up/down log output on a port
- configuring a port group
- displaying and maintaining basic port configuration
- Table of Contents
- Table Of Contents
- introduction to link aggregation
- link aggregation classification
- manual aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- link aggregation configuration
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- configuring a description for an aggregation group
- displaying and maintaining link aggregation configuration
- Port Isolation
- port isolation overview
- port isolation configuration example
- Port Security-Port Binding
- port security overview
- port security modes
- port security configuration task list
- setting the maximum number of mac addresses allowed on a port
- setting the port security mode
- configuring port security features
- ignoring the authorization information from the radius server
- displaying and maintaining port security configuration
- port security configuration example
- port binding overview
- displaying and maintaining port binding configuration
- DLDP
- chapter 1 dldp configuration
- dldp fundamentals
- dldp configuration
- resetting dldp state
- displaying and maintaining dldp
- MAC Address Table
- introduction to mac address table
- managing mac address table
- configuring mac address table management
- setting the aging time of mac address entries
- disabling mac address learning for a vlan
- displaying mac address table information
- Table of Contents
- MSTP
- Table Of Contents
- stp overview
- mstp overview
- basic mstp terminologies
- principle of mstp
- mstp implementation on switches
- configuring an mst region
- specifying the current switch as a root bridge/secondary root bridge
- configuring the bridge priority of the current switch
- configuring the maximum hop count of an mst region
- configuring the network diameter of the switched network
- configuring the mstp time-related parameters
- configuring the timeout time factor
- configuring the current port as an edge port
- specifying whether the link connected to a port is point-to-point link
- enabling mstp
- configuring leaf nodes
- configuring the mst region
- configuring a port as an edge port
- configuring port priority
- performing mcheck operation
- configuring guard functions
- configuring bpdu guard
- configuring root guard
- configuring loop guard
- configuring digest snooping
- configuring rapid transition
- configuring vlan-vpn tunnel
- stp maintenance configuration
- displaying and maintaining mstp
- mstp configuration example
- vlan-vpn tunnel configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 802.1x configuration
- the mechanism of an 802.1x authentication system
- encapsulation of eapol messages
- x authentication procedure
- timers used in 802.1x
- x implementation on an s5100-si/ei series switch
- introduction to 802.1x configuration
- basic 802.1x configuration
- MAC Address
- advanced 802.1x configuration
- configuring proxy checking
- configuring client version checking
- configuring guest vlan
- configuring 802.1x re-authentication
- x configuration example
- chapter 2 quick ead deployment configuration
- configuring quick ead deployment
- displaying and maintaining quick ead deployment
- troubleshooting
- introduction to habp
- habp client configuration
- chapter 4 system-guard configuration
- displaying and maintaining system-guard
- Table of Contents
- Table Of Contents
- Table Of Contents
- introduction to aaa
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration task list
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- cutting down user connections forcibly
- radius configuration task list
- IP Address and
- creating a radius scheme
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the type of radius servers to be supported
- configuring the status of radius servers
- configuring the attributes of data to be sent to radius servers
- configuring the local radius server
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- hwtacacs configuration task list
- configuring tacacs authentication servers
- configuring tacacs accounting servers
- configuring shared keys for hwtacacs messages
- configuring the attributes of data to be sent to tacacs servers
- aaa configuration examples
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- troubleshooting hwtacacs configuration
- introduction to ead
- ead configuration
- ead configuration example
- Table Of Contents
- mac address authentication overview
- related concepts
- configuring basic mac address authentication functions
- mac address authentication enhanced function configuration
- configuring the maximum number of mac address authentication users allowed to access a port
- displaying and maintaining mac address authentication configuration
- Table of Contents
- Table Of Contents
- ip addressing overview
- special ip addresses
- subnetting and masking
- DHCP
- displaying ip addressing configuration
- ip address configuration example ii
- ip performance overview
- configuring tcp attributes
- displaying and maintaining ip performance optimization configuration
- Table of Contents
- Table Of Contents
- introduction to dhcp
- dhcp ip address assignment
- dhcp packet format
- protocol specification
- dhcp snooping overview
- introduction to dhcp-snooping option
- introduction to ip filtering
- configuring dhcp snooping
- configuring dhcp snooping to support option
- configuring ip filtering
- displaying dhcp snooping configuration
- ip filtering configuration example
- introduction to dhcp client
- configuring a dhcp/bootp client
- displaying dhcp/bootp client configuration
- bootp client configuration example
- Table of Contents
- Table Of Contents
- acl overview
- ways to apply an acl on a switch
- types of acls supported by s5100 series ethernet switches
- acl configuration
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- acl assignment
- assigning an acl to a vlan
- assigning an acl to a port group
- displaying acl configuration
- example for upper-layer software referencing acls
- basic acl configuration example
- advanced acl configuration example
- layer 2 acl configuration example
- example for applying an acl to a vlan
- Table of Contents
- Table Of Contents
- Table Of Contents
- introduction to qos
- major traffic control technologies
- qos features supported by the s5100 series ethernet switches
- traffic classification
- priority trust mode
- priority marking
- line rate
- flow-based traffic accounting
- qos configuration
- configuring priority mapping
- setting the priority of protocol packets
- configuring priority marking
- configuring traffic policing
- configuring traffic shaping
- configuring line rate
- configuring traffic redirecting
- configuring vlan mapping
- configuring queue scheduling
- configuring traffic accounting
- configuring traffic mirroring
- displaying and maintaining qos
- qos configuration examples
- priority marking and queue scheduling configuration example
- vlan mapping configuration example
- vlan tag
- traffic mirroring and traffic redirecting configuration example
- chapter 2 qos profile configuration
- qos profile configuration
- applying a qos profile
- displaying and maintaining qos profile configuration
- qos profile configuration example
- Table of Contents
- Table Of Contents
- mirroring overview
- local port mirroring
- QoS-QoS Profile
- configuring local port mirroring
- configuring remote port mirroring
- configuring mac-based mirroring
- configuring vlan-based mirroring
- displaying port mirroring
- mirroring configuration examples
- remote port mirroring configuration example
- Table Of Contents
- chapter 1 arp configuration
- arp table
- arp process
- introduction to gratuitous arp
- configuring arp attack detection
- configuring gratuitous arp
- displaying and debugging arp
- arp configuration examples
- Table of Contents
- Stack-Cluster
- chapter 1 stack
- creating a stack
- switching to slave switch view
- slave switch configuration
- stack configuration example
- cluster overview
- roles in a cluster
- how a cluster works
- cluster configuration tasks
- configuring member devices
- managing a cluster through the management device
- configuring the enhanced cluster features
- displaying and maintaining cluster configuration
- cluster configuration example
- enhanced cluster feature configuration example
- Table of Contents
- SNMP-RMON
- snmp overview
- snmp versions
- configuring basic snmp functions
- configuring trap-related functions
- enabling logging for network management
- displaying snmp
- introduction to rmon
- commonly used rmon groups
- Multicast
- displaying rmon
- Table of Contents
- Table Of Contents
- Table Of Contents
- multicast overview
- information transmission in the broadcast mode
- roles in multicast
- multicast models
- multicast architecture
- multicast protocols
- multicast packet forwarding mechanism
- rpf check
- igmp snooping overview
- basic concepts in igmp snooping
- work mechanism of igmp snooping
- igmp snooping configuration
- enabling igmp snooping
- configuring timers
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring a static router port
- configuring a port as a simulated group member
- configuring a vlan tag for query messages
- configuring multicast vlan
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- troubleshooting igmp snooping
- common multicast configuration
- configuring dropping unknown multicast packets
- Table of Contents
- Table Of Contents
- introduction to ntp
- implementation principle of ntp
- ntp implementation modes
- ntp configuration task list
- configuring ntp implementation modes
- configuring the ntp symmetric peer mode
- configuring access control right
- configuring ntp authentication
- configuration prerequisites
- configuration procedure
- configuring optional ntp parameters
- displaying ntp configuration
- configuration examples
- configuring ntp symmetric peer mode
- configuring ntp broadcast mode
- configuring ntp multicast mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- ssh overview
- ssh operating process
- ssh server and client
- configuring the ssh server
- configuring the user interfaces for ssh clients
- configuring the ssh management functions
- configuring the ssh server to be compatible with ssh1 clients
- creating an ssh user and specifying an authentication type
- specifying a service type for an ssh user on the server
- configuring the public key of a client on the server
- assigning a public key to an ssh user
- exporting the host public key to a file
- configuring the ssh client
- configuring an ssh client assumed by an ssh2-capable switch
- displaying and maintaining ssh configuration
- ssh configuration examples
- when switch acts as server for password and radius authentication
- when switch acts as server for password and hwtacacs authentication
- when switch acts as server for publickey authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- when switch acts as client and first-time authentication is not supported
- File System Management
- file system configuration
- file operations
- flash memory operations
- prompt mode configuration
- file attribute configuration
- configuring file attributes
- Table of Contents
- FTP-SFTP-TFTP
- introduction to ftp and sftp
- ftp configuration
- ftp configuration: a switch operating as an ftp server
- configuration example: a switch operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: a switch operating as an sftp server
- sftp configuration: a switch operating as an sftp client
- sftp configuration example
- introduction to tftp
- tftp configuration
- tftp configuration example
- Table of Contents
- Information Center
- information center overview
- system information format
- System Maintenance and
- information center configuration
- configuring to display the time stamp with the utc time zone
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the trap buffer
- setting to output system information to the log buffer
- setting to output system information to the snmp nms
- displaying and maintaining information center
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- introduction to loading approaches
- boot menu
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using tftp
- basic system configuration
- displaying the system status
- displaying debugging status
- network connectivity test
- introduction to device management
- scheduling a reboot on the switch
- specifying the app to be used at reboot
- identifying and diagnosing pluggable transceivers
- displaying the device management configuration
- Table of Contents
- VLAN-VPN
- chapter 1 vlan-vpn configuration
- implementation of vlan-vpn
- vlan-vpn configuration
- tpid adjusting configuration
- displaying vlan-vpn configuration
- selective qinq overview
- selective qinq configuration
- configuring the inner-to-outer tag priority mapping feature
- selective qinq configuration example
- Table of Contents
- HWPing
- chapter 1 hwping configuration
- test types supported by hwping
- hwping configuration
- displaying hwping configuration
- dhcp test
- ftp test
- http test
- jitter test
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table Of Contents
- dns overview
- configuring domain name resolution
- displaying and maintaining dns
- dynamic domain name resolution configuration example
- troubleshooting dns
- Table of Contents
- Smart Link-Monitor Link
- smart link overview
- operating mechanism of smart link
- configuring smart link
- configuring associated devices
- smart link configuration example
- introduction to monitor link
- how monitor link works
- configuring monitor link
- configuring the uplink port
- displaying monitor link configuration
- monitor link configuration example
- Table of Contents
- IPv6 Management
- ipv6 overview
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- ipv6 configuration task list
- configuring an ipv6 unicast address
- configuring ipv6 ndp
- configuring a static ipv6 route
- configuring the hop limit of icmpv6 reply packets
- configuring ipv6 dns
- displaying and maintaining ipv
- ipv6 configuration example
- introduction to ipv6 application
- ipv6 traceroute
- ipv6 telnet
- ipv6 application configuration example
- troubleshooting ipv6 application
- unable to run traceroute
- Table of Contents
- PoE-PoE Profile
- poe overview
- poe configuration
- enabling the poe feature on a port
- setting the poe mode on a port
- configuring the pd compatibility detection function
- displaying poe configuration
- poe configuration example
- introduction to poe profile
- displaying poe profile configuration
- poe profile configuration example
- Appendix
H3C S5100-EI
Table of contents
- about this manual
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Chapter 1 Product Overview
- S5100-8P-SI Ethernet Switch
- S5100-16P-SI
- S5100-16P-SI Ethernet Switch
- S5100-24P-SI
- S5100-24P-SI Ethernet Switch
- S5100-48P-SI Ethernet Switch
- S5100-8P-EI Ethernet Switch
- S5100-16P-EI Ethernet Switch
- S5100-24P-EI Ethernet Switch
- S5100-48P-EI
- S5100-48P-EI Ethernet Switch
- S5100-26C-EI Ethernet Switch
- S5100-50C-EI
- S5100-50C-EI Ethernet Switch
- S5100-8P-PWR-EI Ethernet Switch
- S5100-16P-PWR-EI
- S5100-16P-PWR-EI Ethernet Switch
- S5100-26C-PWR-EI
- S5100-26C-PWR-EI Ethernet Switch
- S5100-50C-PWR-EI Ethernet Switch
- LEDs
- Mode LED
- gigabit sfp port status led
- Gigabit SFP Port Status LED
- Module LED
- Segment Digitron Display
- System Features of the S5100 Series
- System Features of the S5100-EI Series
- Ordering SFP/XFP/XENPAK Interface Modules
- Ordering 10 G Stack Interface Modules
- Ordering Stack Cables
- Chapter 2 Preparing for Installation
- Cleanness
- Safety in Use of Laser
- Chapter 3 Installing the Switch
- Introduction to Mounting Ear
- S5100-48P-EI 50
- Introduction to Guide Rail
- Use Front Mounting Ears and a Tray
- Use Front and Rear Mounting Ears
- Use Front Mounting Ears and Guide Rails
- Desk Mounting
- Magnet Mounting
- Connecting Power Cord and Grounding Wire
- Connecting DC Power Cord
- Connecting Grounding Wire
- Connecting Console Cable
- Installing and Removing Optional Interface Modules
- Stack Module
- XENPAK Optical Module
- Installing and Removing Dedicated Stack Cables
- Verifying the Installation
- Chapter 4 Powering on the Switch for the First Time
- Booting the Switch
- Changing the Startup Mode
- Chapter 5 Boot ROM and Host Software Loading
- Boot Menu
- Loading Software Using XModem Through Console Port
- Loading Software Using TFTP through Ethernet Port
- Loading Software Using FTP Through Ethernet Port
- Remote Software Loading
- Remote Loading Using TFTP
- Chapter 6 Maintenance and Troubleshooting
- Missing Boot ROM Password
- appendix a lightning protection of the switch
H3C S5100-EI
Table of contents
- quick start
- about this manual
- Table Of Contents
- Table Of Contents
- Chapter 1 Product Overview
- LEDs
- System Features of the S5100 Series
- System Features of the S5100-EI Series
- Ordering SFP Interface Modules
- Ordering 10 G Stack Interface Modules
- Ordering DC Power cords
- Chapter 2 Preparing for Installation
- Temperature/Humidity
- Cleanness
- Electromagnetic Susceptibility
- Installation Tools
- Chapter 3 Installing the Switch
- Introduction to Mounting Ear
- Introduction to Guide Rail
- Use Front Mounting Ears and a Tray
- Use Front and Rear Mounting Ears
- Use Front Mounting Ears and Guide Rails
- Desk Mounting
- Wall Mounting
- Magnet Mounting
- Connecting Power Cord and Grounding Wire
- Connecting DC Power Cord
- Connecting Grounding Wire
- Connecting Console Cable
- Installing and Removing Optional Interface Modules
- Stack Module
- XENPAK Optical Module
- Installing and Removing Dedicated Stack Cables
- Installation
- Verifying the Installation
- Chapter 4 Lightning Protection of the Switch
Related products
H3C S5100-SIS5100H3C S5600 SeriesLS-5100-8P-EI-OVS-H3S3600-EIS5500-EI seriesS5120-EI SeriesS5150-EI SeriesH3C S3600 SeriesLS-5100-50C-EI-OVSH3C categories
Switch
Network Router
Network Hardware
IP Access Controllers
Firewall
Control Unit
Wireless Access Point
Server
Gateway
Wireless Router
manualsdatabase
Your AI-powered manual search engine