Manuals database logo
manualsdatabase
Your AI-powered manual search engine

H3C H3C S5100-SI manuals

H3C S5100-SI first page preview

H3C S5100-SI

Brand: H3C | Category: Switch
Table of contents
  1. About This Manual
  2. Table Of Contents
  3. related documentation
  4. Product Overview
  5. software release notes
  6. manual list
  7. networking applications
  8. data center access
  9. Table of Contents
  10. Login
  11. Table Of Contents
  12. logging in to an ethernet switch
  13. relationship between a user and a user interface
  14. logging in through the console port
  15. console port login configuration
  16. console port login configurations for different authentication modes
  17. console port login configuration with authentication mode being none
  18. console port login configuration with authentication mode being password
  19. configuration example
  20. console port login configuration with authentication mode being scheme
  21. logging in through telnet
  22. telnet configurations for different authentication modes
  23. telnet configuration with authentication mode being none
  24. telnet configuration with authentication mode being password
  25. telnet configuration with authentication mode being scheme
  26. telnetting to a switch
  27. telnetting to another switch from the current switch
  28. logging in using a modem
  29. modem connection establishment
  30. cli configuration
  31. modifying the command level
  32. switching user level
  33. cli views
  34. cli features
  35. terminal display
  36. command edit
  37. management interface
  38. configuring the login banner
  39. enabling/disabling the web server
  40. connection establishment using nms
  41. configuring source ip address for telnet service packets
  42. displaying source ip address configuration
  43. user control
  44. controlling telnet users by acl
  45. controlling network management users by source ip addresses
  46. controlling web users by source ip address
  47. logging out a web user
  48. Table of Contents
  49. Configuration File Management
  50. configuration file management
  51. configuration task list
  52. erasing the startup configuration file
  53. specifying a configuration file for next startup
  54. VLAN
  55. Table of Contents
  56. Table Of Contents
  57. vlan overview
  58. advantages of vlans
  59. Management VLAN
  60. link types of ethernet ports
  61. protocol-based vlan
  62. encapsulation format of ethernet data
  63. procedure for the switch to judge packet protocol
  64. implementation of protocol-based vlan
  65. vlan configuration
  66. basic vlan interface configuration
  67. displaying vlan configuration
  68. assigning an ethernet port to a vlan
  69. configuring the default vlan for a port
  70. configuring a protocol-based vlan
  71. associating a port with a protocol-based vlan
  72. displaying protocol-based vlan configuration
  73. Table of Contents
  74. Table Of Contents
  75. management vlan configuration
  76. configuring the management vlan
  77. displaying and maintaining management vlan configuration
  78. Voice VLAN
  79. voice vlan configuration
  80. how s5100-ei series switches identify voice traffic
  81. setting the voice traffic transmission priority
  82. security mode of voice vlan
  83. configuring the voice vlan to operate in manual voice vlan assignment mode
  84. displaying and maintaining voice vlan
  85. voice vlan configuration example
  86. voice vlan configuration example (manual mode)
  87. Table of Contents
  88. GVRP
  89. gvrp configuration
  90. protocol specifications
  91. configuring gvrp timers
  92. displaying and maintaining gvrp
  93. gvrp configuration example
  94. Table of Contents
  95. Port Basic Configuration
  96. port basic configuration
  97. initially configuring a port
  98. limiting traffic on individual ports
  99. enabling flow control on a port
  100. Link Aggregation
  101. enabling loopback test
  102. configuring the interval to perform statistical analysis on port traffic
  103. configuring a port group
  104. displaying and maintaining basic port configuration
  105. Table of Contents
  106. Table Of Contents
  107. link aggregation configuration
  108. link aggregation classification
  109. static lacp aggregation group
  110. dynamic lacp aggregation group
  111. aggregation group categories
  112. configuring a manual aggregation group
  113. configuring a static lacp aggregation group
  114. configuring a dynamic lacp aggregation group
  115. displaying and maintaining link aggregation configuration
  116. Port Isolation
  117. port isolation configuration
  118. port isolation configuration example
  119. configuration procedure
  120. Table Of Contents
  121. port security configuration
  122. port security configuration task list
  123. setting the maximum number of mac addresses allowed on a port
  124. setting the port security mode
  125. configuring port security features
  126. ignoring the authorization information from the radius server
  127. displaying and maintaining port security configuration
  128. port security configuration example
  129. port binding overview
  130. port binding configuration example
  131. Table of Contents
  132. DLDP
  133. dldp configuration
  134. dldp fundamentals
  135. dldp status
  136. dldp operating mode
  137. dldp implementation
  138. dldp neighbor state
  139. performing basic dldp configuration
  140. resetting dldp state
  141. dldp configuration example
  142. Table of Contents
  143. MAC Address Table
  144. mac address table management
  145. managing mac address table
  146. configuring mac address table management
  147. configuring a mac address entry
  148. setting the aging time of mac address entries
  149. displaying mac address table information
  150. adding a static mac address entry manually
  151. Table of Contents
  152. MSTP
  153. Table Of Contents
  154. mstp configuration
  155. rapid spanning tree protocol overview
  156. mstp implementation on switches
  157. mstp configuration task list
  158. configuring root bridge
  159. specifying the current switch as a root bridge/secondary root bridge
  160. configuring the bridge priority of the current switch
  161. configuring the mstp operation mode
  162. configuring the maximum hop count of an mst region
  163. configuring the network diameter of the switched network
  164. configuring the current port as an edge port
  165. enabling mstp
  166. configuring leaf nodes
  167. configuring a port as an edge port
  168. configuring port priority
  169. performing mcheck operation
  170. configuring guard functions
  171. configuring root guard
  172. configuring loop guard
  173. configuring tc-bpdu attack guard
  174. configuring bpdu dropping
  175. configuring digest snooping
  176. configuring rapid transition
  177. configuring vlan-vpn tunnel
  178. mstp maintenance configuration
  179. displaying and maintaining mstp
  180. mstp configuration example
  181. vlan-vpn tunnel configuration example
  182. Table of Contents
  183. Table Of Contents
  184. x configuration
  185. the mechanism of an 802.1x authentication system
  186. encapsulation of eapol messages
  187. x authentication procedure
  188. timers used in 802.1x
  189. x implementation on an s5100-si/ei series switch
  190. introduction to 802.1x configuration
  191. basic 802.1x configuration
  192. timer and maximum user number configuration
  193. advanced 802.1x configuration
  194. configuring client version checking
  195. enabling dhcp-triggered authentication
  196. configuring 802.1x re-authentication
  197. displaying and maintaining 802.1x configuration
  198. quick ead deployment configuration
  199. configuration prerequisites
  200. displaying and maintaining quick ead deployment
  201. troubleshooting
  202. introduction to habp
  203. habp client configuration
  204. system-guard configuration
  205. Table of Contents
  206. Table Of Contents
  207. Table Of Contents
  208. aaa overview
  209. introduction to aaa services
  210. introduction to hwtacacs
  211. aaa configuration
  212. creating an isp domain and configuring its attributes
  213. configuring an aaa scheme for an isp domain
  214. configuring dynamic vlan assignment
  215. configuring the attributes of a local user
  216. MAC Address Authentication
  217. creating a radius scheme
  218. configuring radius authentication/authorization servers
  219. configuring radius accounting servers
  220. configuring shared keys for radius messages
  221. configuring the type of radius servers to be supported
  222. configuring the attributes of data to be sent to radius servers
  223. configuring the local radius server
  224. configuring timers for radius servers
  225. enabling sending trap message when a radius server goes down
  226. hwtacacs configuration task list
  227. configuring tacacs authorization servers
  228. configuring tacacs accounting servers
  229. configuring the attributes of data to be sent to tacacs servers
  230. configuring the timers regarding tacacs servers
  231. aaa configuration examples
  232. local authentication of ftp/telnet users
  233. hwtacacs authentication and authorization of telnet users
  234. troubleshooting aaa
  235. ead configuration
  236. ead configuration example
  237. Table of Contents
  238. Table Of Contents
  239. mac address authentication configuration
  240. related concepts
  241. mac address authentication enhanced function configuration
  242. configuring the maximum number of mac address authentication users allowed to access a port
  243. displaying and maintaining mac address authentication configuration
  244. Table of Contents
  245. Table Of Contents
  246. ip addressing overview
  247. special ip addresses
  248. DHCP
  249. displaying ip addressing configuration
  250. ip address configuration example ii
  251. ip performance overview
  252. disabling sending of icmp error packets
  253. displaying and maintaining ip performance optimization configuration
  254. Table of Contents
  255. Table Of Contents
  256. dhcp overview
  257. obtaining ip addresses dynamically
  258. dhcp packet format
  259. protocol specification
  260. dhcp relay agent configuration
  261. option 82 support on dhcp relay agent
  262. configuring the dhcp relay agent
  263. correlating a dhcp server group with a relay agent interface
  264. configuring the dhcp relay agent to support option
  265. displaying and maintaining dhcp relay agent configuration
  266. troubleshooting dhcp relay agent configuration
  267. dhcp snooping configuration
  268. introduction to dhcp-snooping option
  269. configuring dhcp snooping
  270. configuring dhcp snooping to support option
  271. displaying dhcp snooping configuration
  272. dhcp snooping configuration examples
  273. ip filtering configuration example
  274. introduction to dhcp client
  275. displaying dhcp/bootp client configuration
  276. dhcp client configuration example
  277. Table of Contents
  278. Table Of Contents
  279. acl configuration
  280. ways to apply an acl on a switch
  281. types of acls supported by s5100 series ethernet switches
  282. configuring basic acl
  283. configuring advanced acl
  284. configuring layer 2 acl
  285. acl assignment
  286. assigning an acl globally
  287. assigning an acl to a port group
  288. assigning an acl to a port
  289. displaying acl configuration
  290. basic acl configuration example
  291. advanced acl configuration example
  292. layer 2 acl configuration example
  293. Table of Contents
  294. Table Of Contents
  295. Table Of Contents
  296. qos configuration
  297. major traffic control technologies
  298. qos features supported by the s5100 series ethernet switches
  299. traffic classification
  300. priority marking
  301. line rate
  302. flow-based traffic accounting
  303. configuring priority trust mode
  304. configuring priority mapping
  305. setting the priority of protocol packets
  306. configuring priority marking
  307. configuring traffic policing
  308. configuring traffic shaping
  309. configuring line rate
  310. configuring traffic redirecting
  311. configuring vlan mapping
  312. configuring queue scheduling
  313. configuring traffic accounting
  314. enabling the burst function
  315. configuring traffic mirroring
  316. displaying and maintaining qos
  317. qos configuration examples
  318. priority marking and queue scheduling configuration example
  319. vlan mapping configuration example
  320. traffic mirroring and traffic redirecting configuration example
  321. qos profile configuration
  322. configuring a qos profile
  323. applying a qos profile
  324. displaying and maintaining qos profile configuration
  325. qos profile configuration example
  326. Table of Contents
  327. Table Of Contents
  328. mirroring configuration
  329. local port mirroring
  330. mac-based mirroring
  331. QoS-QoS Profile
  332. configuring remote port mirroring
  333. configuring mac-based mirroring
  334. configuring vlan-based mirroring
  335. displaying port mirroring
  336. mirroring configuration examples
  337. remote port mirroring configuration example
  338. network diagram
  339. Table of Contents
  340. Table Of Contents
  341. arp configuration
  342. arp table
  343. introduction to arp attack detection
  344. configuring arp
  345. configuring arp attack detection
  346. configuring gratuitous arp
  347. arp configuration examples
  348. Table of Contents
  349. Table Of Contents
  350. stack function overview
  351. main switch configuration
  352. switching to slave switch view
  353. stack configuration example
  354. cluster overview
  355. roles in a cluster
  356. how a cluster works
  357. cluster configuration tasks
  358. configuring the management device
  359. configuring member devices
  360. managing a cluster through the management device
  361. configuring the enhanced cluster features
  362. SNMP-RMON
  363. displaying and maintaining cluster configuration
  364. cluster configuration example
  365. enhanced cluster feature configuration example
  366. Table of Contents
  367. Table Of Contents
  368. snmp configuration
  369. configuring basic snmp functions
  370. configuring trap-related functions
  371. enabling logging for network management
  372. displaying snmp
  373. rmon configuration
  374. displaying rmon
  375. Table of Contents
  376. Table Of Contents
  377. multicast overview
  378. information transmission in the broadcast mode
  379. roles in multicast
  380. common notations in multicast
  381. multicast models
  382. multicast protocols
  383. multicast packet forwarding mechanism
  384. implementation of the rpf mechanism
  385. igmp snooping configuration
  386. work mechanism of igmp snooping
  387. enabling igmp snooping
  388. configuring timers
  389. configuring a multicast group filter
  390. configuring the maximum number of multicast groups on a port
  391. configuring igmp querier
  392. suppressing flooding of unknown multicast traffic in a vlan
  393. configuring a static router port
  394. configuring a vlan tag for query messages
  395. displaying and maintaining igmp snooping
  396. configuring multicast vlan
  397. troubleshooting igmp snooping
  398. common multicast configuration
  399. displaying common multicast configuration
  400. Table of Contents
  401. Table Of Contents
  402. ntp configuration
  403. implementation principle of ntp
  404. ntp implementation modes
  405. ntp configuration task list
  406. configuring access control right
  407. configuring ntp authentication
  408. configuring optional ntp parameters
  409. displaying ntp configuration
  410. configuration examples
  411. configuring ntp symmetric peer mode
  412. configuring ntp broadcast mode
  413. configuring ntp multicast mode
  414. configuring ntp server/client mode with authentication
  415. Table of Contents
  416. Table Of Contents
  417. ssh configuration
  418. ssh operating process
  419. ssh server and client
  420. configuring the ssh server
  421. configuring the user interfaces for ssh clients
  422. configuring the ssh management functions
  423. configuring the ssh server to be compatible with ssh1 clients
  424. creating an ssh user and specifying an authentication type
  425. specifying a service type for an ssh user on the server
  426. configuring the public key of a client on the server
  427. exporting the host public key to a file
  428. configuring the ssh client
  429. configuring an ssh client assumed by an ssh2-capable switch
  430. displaying and maintaining ssh configuration
  431. ssh configuration examples
  432. when switch acts as server for password and radius authentication
  433. when switch acts as server for password and hwtacacs authentication
  434. when switch acts as server for publickey authentication
  435. when switch acts as client for password authentication
  436. when switch acts as client for publickey authentication
  437. when switch acts as client and first-time authentication is not supported
  438. Table of Contents
  439. Table Of Contents
  440. file system configuration
  441. file operations
  442. flash memory operations
  443. file system configuration example
  444. file attribute configuration
  445. configuring file attributes
  446. Table of Contents
  447. Table Of Contents
  448. introduction to ftp and sftp
  449. ftp configuration
  450. configuration example: a switch operating as an ftp server
  451. ftp banner display configuration example
  452. sftp configuration
  453. sftp configuration: a switch operating as an sftp client
  454. sftp configuration example
  455. tftp configuration
  456. tftp configuration: a switch operating as a tftp client
  457. tftp configuration example
  458. Table of Contents
  459. Table Of Contents
  460. information center
  461. system information format
  462. information center configuration
  463. configuring to display the time stamp with the utc time zone
  464. setting to output system information to a monitor terminal
  465. setting to output system information to a log host
  466. setting to output system information to the trap buffer
  467. setting to output system information to the log buffer
  468. displaying and maintaining information center
  469. information center configuration examples
  470. log output to a linux log host
  471. log output to the console
  472. Table of Contents
  473. Table Of Contents
  474. introduction to loading approaches
  475. boot menu
  476. loading by xmodem through console port
  477. loading by tftp through ethernet port
  478. loading by ftp through ethernet port
  479. remote boot rom and software loading
  480. remote loading using tftp
  481. basic system configuration
  482. displaying the system status
  483. displaying debugging status
  484. network connectivity test
  485. device management
  486. scheduling a reboot on the switch
  487. specifying the app to be used at reboot
  488. displaying the device management configuration
  489. Table of Contents
  490. Table Of Contents
  491. implementation of vlan-vpn
  492. enabling the vlan-vpn feature for a port
  493. displaying vlan-vpn configuration
  494. selective qinq configuration
  495. inner-to-outer tag priority mapping
  496. selective qinq configuration example
  497. Table of Contents
  498. Table Of Contents
  499. hwping configuration
  500. test types supported by hwping
  501. hwping server configuration
  502. displaying hwping configuration
  503. dhcp test
  504. ftp test
  505. http test
  506. jitter test
  507. snmp test
  508. tcp test (tcpprivate test) on the specified ports
  509. udp test (udpprivate test) on the specified ports
  510. dns test
  511. Table of Contents
  512. Table Of Contents
  513. dns configuration
  514. configuring domain name resolution
  515. displaying and maintaining dns
  516. dns configuration examples
  517. troubleshooting dns
  518. Table of Contents
  519. Table Of Contents
  520. smart link overview
  521. configuring smart link
  522. configuring a smart link device
  523. configuring associated devices
  524. smart link configuration example
  525. introduction to monitor link
  526. how monitor link works
  527. configuring monitor link
  528. configuring a downlink port
  529. displaying monitor link configuration
  530. Table of Contents
  531. Table Of Contents
  532. ipv6 configuration
  533. introduction to ipv6 address
  534. introduction to ipv6 neighbor discovery protocol
  535. introduction to ipv6 dns
  536. ipv6 configuration task list
  537. configuring ipv6 ndp
  538. configuring a static ipv6 route
  539. configuring ipv6 tcp properties
  540. configuring the hop limit of icmpv6 reply packets
  541. displaying and maintaining ipv
  542. ipv6 configuration example
  543. ipv6 application configuration
  544. ipv6 traceroute
  545. ipv6 telnet
  546. ipv6 application configuration example
  547. troubleshooting ipv6 application
  548. unable to run traceroute
  549. Table of Contents
  550. Table Of Contents
  551. poe configuration
  552. poe configuration tasks
  553. setting the maximum output power on a port
  554. setting the poe mode on a port
  555. configuring poe over-temperature protection on the switch
  556. poe configuration example
  557. poe profile configuration
  558. displaying poe profile configuration
  559. Table of Contents
  560. Table Of Contents
  561. udp helper configuration
  562. configuring udp helper
  563. displaying and maintaining udp helper
  564. Table Of Contents
  565. access management configuration
  566. configuring access management
  567. combining access management with port isolation
H3C S5100-SI first page preview

H3C S5100-SI

Brand: H3C | Category: Switch
Table of contents
  1. About This Manual
  2. Table Of Contents
  3. Table Of Contents
  4. Product Overview
  5. chapter 1 obtaining the documentation
  6. software release notes
  7. software version
  8. chapter 3 product overview
  9. system features of the s5100 series
  10. system features of the s5100-ei series
  11. chapter 4 networking applications
  12. access layer devices
  13. Table of Contents
  14. Login
  15. Table Of Contents
  16. logging in to an ethernet switch
  17. relationship between a user and a user interface
  18. common user interface configuration
  19. chapter 2 logging in through the console port
  20. console port login configuration
  21. console port login configurations for different authentication modes
  22. console port login configuration with authentication mode being none
  23. console port login configuration with authentication mode being password
  24. console port login configuration with authentication mode being scheme
  25. configuration example
  26. chapter 3 logging in through telnet
  27. common configuration to control telnet access
  28. telnet configuration with authentication mode being none
  29. telnet configuration with authentication mode being password
  30. telnet configuration with authentication mode being scheme
  31. telnetting to a switch
  32. telnetting to another switch from the current switch
  33. configuration on the switch side
  34. switch configuration
  35. modem connection establishment
  36. introduction to the cli
  37. Configuration File
  38. switching user level
  39. cli views
  40. VLAN
  41. cli features
  42. terminal display
  43. command history
  44. command edit
  45. establishing an http connection
  46. configuring the login banner
  47. enabling/disabling the web server
  48. connection establishment using nms
  49. configuring source ip address for telnet service packets
  50. displaying source ip address configuration
  51. chapter 9 user control
  52. controlling telnet users
  53. controlling network management users by source ip addresses
  54. controlling web users by source ip address
  55. logging out a web user
  56. Table Of Contents
  57. introduction to configuration file
  58. configuration task list
  59. erasing the startup configuration file
  60. specifying a configuration file for next startup
  61. displaying switch configuration
  62. Table of Contents
  63. Table Of Contents
  64. vlan overview
  65. vlan fundamentals
  66. vlan interface
  67. vlan classification
  68. assigning an ethernet port to specified vlans
  69. protocol-based vlan
  70. encapsulation format of ethernet data
  71. procedure for the switch to judge packet protocol
  72. implementation of protocol-based vlan
  73. vlan configuration
  74. basic vlan interface configuration
  75. displaying vlan configuration
  76. configuring the link type of an ethernet port
  77. configuring the default vlan for a port
  78. displaying and maintaining port-based vlan
  79. configuring a protocol-based vlan
  80. associating a port with a protocol-based vlan
  81. displaying protocol-based vlan configuration
  82. Table Of Contents
  83. management vlan
  84. default route
  85. displaying and maintaining management vlan configuration
  86. Table of Contents
  87. Voice VLAN
  88. voice vlan overview
  89. how s5100-ei series switches identify voice traffic
  90. setting the voice traffic transmission priority
  91. support for voice vlan on various ports
  92. voice vlan configuration
  93. configuring the voice vlan to operate in automatic voice vlan assignment mode
  94. configuring the voice vlan to operate in manual voice vlan assignment mode
  95. displaying and maintaining voice vlan
  96. voice vlan configuration example
  97. voice vlan configuration example (manual mode)
  98. GVRP
  99. chapter 1 gvrp configuration
  100. protocol specifications
  101. configuring gvrp timers
  102. configuring gvrp port registration mode
  103. displaying and maintaining gvrp
  104. Port Basic Configuration
  105. ethernet port configuration
  106. initially configuring a port
  107. configuring port auto-negotiation speed
  108. limiting traffic on individual ports
  109. duplicating the configuration of a port to other ports
  110. configuring loopback detection for an ethernet port
  111. Link Aggregation
  112. configuring the interval to perform statistical analysis on port traffic
  113. disabling up/down log output on a port
  114. configuring a port group
  115. displaying and maintaining basic port configuration
  116. Table of Contents
  117. Table Of Contents
  118. introduction to link aggregation
  119. link aggregation classification
  120. manual aggregation group
  121. dynamic lacp aggregation group
  122. aggregation group categories
  123. link aggregation configuration
  124. configuring a static lacp aggregation group
  125. configuring a dynamic lacp aggregation group
  126. configuring a description for an aggregation group
  127. displaying and maintaining link aggregation configuration
  128. Port Isolation
  129. port isolation overview
  130. port isolation configuration example
  131. Port Security-Port Binding
  132. port security overview
  133. port security modes
  134. port security configuration task list
  135. setting the maximum number of mac addresses allowed on a port
  136. setting the port security mode
  137. configuring port security features
  138. ignoring the authorization information from the radius server
  139. displaying and maintaining port security configuration
  140. port security configuration example
  141. port binding overview
  142. displaying and maintaining port binding configuration
  143. DLDP
  144. chapter 1 dldp configuration
  145. dldp fundamentals
  146. dldp configuration
  147. resetting dldp state
  148. displaying and maintaining dldp
  149. MAC Address Table
  150. introduction to mac address table
  151. managing mac address table
  152. configuring mac address table management
  153. setting the aging time of mac address entries
  154. disabling mac address learning for a vlan
  155. displaying mac address table information
  156. Table of Contents
  157. MSTP
  158. Table Of Contents
  159. stp overview
  160. mstp overview
  161. basic mstp terminologies
  162. principle of mstp
  163. mstp implementation on switches
  164. configuring an mst region
  165. specifying the current switch as a root bridge/secondary root bridge
  166. configuring the bridge priority of the current switch
  167. configuring the maximum hop count of an mst region
  168. configuring the network diameter of the switched network
  169. configuring the mstp time-related parameters
  170. configuring the timeout time factor
  171. configuring the current port as an edge port
  172. specifying whether the link connected to a port is point-to-point link
  173. enabling mstp
  174. configuring leaf nodes
  175. configuring the mst region
  176. configuring a port as an edge port
  177. configuring port priority
  178. performing mcheck operation
  179. configuring guard functions
  180. configuring bpdu guard
  181. configuring root guard
  182. configuring loop guard
  183. configuring digest snooping
  184. configuring rapid transition
  185. configuring vlan-vpn tunnel
  186. stp maintenance configuration
  187. displaying and maintaining mstp
  188. mstp configuration example
  189. vlan-vpn tunnel configuration example
  190. Table of Contents
  191. Table Of Contents
  192. Table Of Contents
  193. chapter 1 802.1x configuration
  194. the mechanism of an 802.1x authentication system
  195. encapsulation of eapol messages
  196. x authentication procedure
  197. timers used in 802.1x
  198. x implementation on an s5100-si/ei series switch
  199. introduction to 802.1x configuration
  200. basic 802.1x configuration
  201. MAC Address
  202. advanced 802.1x configuration
  203. configuring proxy checking
  204. configuring client version checking
  205. configuring guest vlan
  206. configuring 802.1x re-authentication
  207. x configuration example
  208. chapter 2 quick ead deployment configuration
  209. configuring quick ead deployment
  210. displaying and maintaining quick ead deployment
  211. troubleshooting
  212. introduction to habp
  213. habp client configuration
  214. chapter 4 system-guard configuration
  215. displaying and maintaining system-guard
  216. Table of Contents
  217. Table Of Contents
  218. Table Of Contents
  219. introduction to aaa
  220. introduction to aaa services
  221. introduction to hwtacacs
  222. aaa configuration task list
  223. creating an isp domain and configuring its attributes
  224. configuring an aaa scheme for an isp domain
  225. configuring dynamic vlan assignment
  226. configuring the attributes of a local user
  227. cutting down user connections forcibly
  228. radius configuration task list
  229. IP Address and
  230. creating a radius scheme
  231. configuring radius accounting servers
  232. configuring shared keys for radius messages
  233. configuring the type of radius servers to be supported
  234. configuring the status of radius servers
  235. configuring the attributes of data to be sent to radius servers
  236. configuring the local radius server
  237. configuring timers for radius servers
  238. enabling sending trap message when a radius server goes down
  239. hwtacacs configuration task list
  240. configuring tacacs authentication servers
  241. configuring tacacs accounting servers
  242. configuring shared keys for hwtacacs messages
  243. configuring the attributes of data to be sent to tacacs servers
  244. aaa configuration examples
  245. local authentication of ftp/telnet users
  246. hwtacacs authentication and authorization of telnet users
  247. troubleshooting aaa
  248. troubleshooting hwtacacs configuration
  249. introduction to ead
  250. ead configuration
  251. ead configuration example
  252. Table Of Contents
  253. mac address authentication overview
  254. related concepts
  255. configuring basic mac address authentication functions
  256. mac address authentication enhanced function configuration
  257. configuring the maximum number of mac address authentication users allowed to access a port
  258. displaying and maintaining mac address authentication configuration
  259. Table of Contents
  260. Table Of Contents
  261. ip addressing overview
  262. special ip addresses
  263. subnetting and masking
  264. DHCP
  265. displaying ip addressing configuration
  266. ip address configuration example ii
  267. ip performance overview
  268. configuring tcp attributes
  269. displaying and maintaining ip performance optimization configuration
  270. Table of Contents
  271. Table Of Contents
  272. introduction to dhcp
  273. dhcp ip address assignment
  274. dhcp packet format
  275. protocol specification
  276. dhcp snooping overview
  277. introduction to dhcp-snooping option
  278. introduction to ip filtering
  279. configuring dhcp snooping
  280. configuring dhcp snooping to support option
  281. configuring ip filtering
  282. displaying dhcp snooping configuration
  283. ip filtering configuration example
  284. introduction to dhcp client
  285. configuring a dhcp/bootp client
  286. displaying dhcp/bootp client configuration
  287. bootp client configuration example
  288. Table of Contents
  289. Table Of Contents
  290. acl overview
  291. ways to apply an acl on a switch
  292. types of acls supported by s5100 series ethernet switches
  293. acl configuration
  294. configuring basic acl
  295. configuring advanced acl
  296. configuring layer 2 acl
  297. acl assignment
  298. assigning an acl to a vlan
  299. assigning an acl to a port group
  300. displaying acl configuration
  301. example for upper-layer software referencing acls
  302. basic acl configuration example
  303. advanced acl configuration example
  304. layer 2 acl configuration example
  305. example for applying an acl to a vlan
  306. Table of Contents
  307. Table Of Contents
  308. Table Of Contents
  309. introduction to qos
  310. major traffic control technologies
  311. qos features supported by the s5100 series ethernet switches
  312. traffic classification
  313. priority trust mode
  314. priority marking
  315. line rate
  316. flow-based traffic accounting
  317. qos configuration
  318. configuring priority mapping
  319. setting the priority of protocol packets
  320. configuring priority marking
  321. configuring traffic policing
  322. configuring traffic shaping
  323. configuring line rate
  324. configuring traffic redirecting
  325. configuring vlan mapping
  326. configuring queue scheduling
  327. configuring traffic accounting
  328. configuring traffic mirroring
  329. displaying and maintaining qos
  330. qos configuration examples
  331. priority marking and queue scheduling configuration example
  332. vlan mapping configuration example
  333. vlan tag
  334. traffic mirroring and traffic redirecting configuration example
  335. chapter 2 qos profile configuration
  336. qos profile configuration
  337. applying a qos profile
  338. displaying and maintaining qos profile configuration
  339. qos profile configuration example
  340. Table of Contents
  341. Table Of Contents
  342. mirroring overview
  343. local port mirroring
  344. QoS-QoS Profile
  345. configuring local port mirroring
  346. configuring remote port mirroring
  347. configuring mac-based mirroring
  348. configuring vlan-based mirroring
  349. displaying port mirroring
  350. mirroring configuration examples
  351. remote port mirroring configuration example
  352. Table Of Contents
  353. chapter 1 arp configuration
  354. arp table
  355. arp process
  356. introduction to gratuitous arp
  357. configuring arp attack detection
  358. configuring gratuitous arp
  359. displaying and debugging arp
  360. arp configuration examples
  361. Table of Contents
  362. Stack-Cluster
  363. chapter 1 stack
  364. creating a stack
  365. switching to slave switch view
  366. slave switch configuration
  367. stack configuration example
  368. cluster overview
  369. roles in a cluster
  370. how a cluster works
  371. cluster configuration tasks
  372. configuring member devices
  373. managing a cluster through the management device
  374. configuring the enhanced cluster features
  375. displaying and maintaining cluster configuration
  376. cluster configuration example
  377. enhanced cluster feature configuration example
  378. Table of Contents
  379. SNMP-RMON
  380. snmp overview
  381. snmp versions
  382. configuring basic snmp functions
  383. configuring trap-related functions
  384. enabling logging for network management
  385. displaying snmp
  386. introduction to rmon
  387. commonly used rmon groups
  388. Multicast
  389. displaying rmon
  390. Table of Contents
  391. Table Of Contents
  392. Table Of Contents
  393. multicast overview
  394. information transmission in the broadcast mode
  395. roles in multicast
  396. multicast models
  397. multicast architecture
  398. multicast protocols
  399. multicast packet forwarding mechanism
  400. rpf check
  401. igmp snooping overview
  402. basic concepts in igmp snooping
  403. work mechanism of igmp snooping
  404. igmp snooping configuration
  405. enabling igmp snooping
  406. configuring timers
  407. configuring a multicast group filter
  408. configuring the maximum number of multicast groups on a port
  409. configuring igmp querier
  410. suppressing flooding of unknown multicast traffic in a vlan
  411. configuring a static router port
  412. configuring a port as a simulated group member
  413. configuring a vlan tag for query messages
  414. configuring multicast vlan
  415. displaying and maintaining igmp snooping
  416. igmp snooping configuration examples
  417. troubleshooting igmp snooping
  418. common multicast configuration
  419. configuring dropping unknown multicast packets
  420. Table of Contents
  421. Table Of Contents
  422. introduction to ntp
  423. implementation principle of ntp
  424. ntp implementation modes
  425. ntp configuration task list
  426. configuring ntp implementation modes
  427. configuring the ntp symmetric peer mode
  428. configuring access control right
  429. configuring ntp authentication
  430. configuration prerequisites
  431. configuration procedure
  432. configuring optional ntp parameters
  433. displaying ntp configuration
  434. configuration examples
  435. configuring ntp symmetric peer mode
  436. configuring ntp broadcast mode
  437. configuring ntp multicast mode
  438. configuring ntp server/client mode with authentication
  439. Table of Contents
  440. Table Of Contents
  441. ssh overview
  442. ssh operating process
  443. ssh server and client
  444. configuring the ssh server
  445. configuring the user interfaces for ssh clients
  446. configuring the ssh management functions
  447. configuring the ssh server to be compatible with ssh1 clients
  448. creating an ssh user and specifying an authentication type
  449. specifying a service type for an ssh user on the server
  450. configuring the public key of a client on the server
  451. assigning a public key to an ssh user
  452. exporting the host public key to a file
  453. configuring the ssh client
  454. configuring an ssh client assumed by an ssh2-capable switch
  455. displaying and maintaining ssh configuration
  456. ssh configuration examples
  457. when switch acts as server for password and radius authentication
  458. when switch acts as server for password and hwtacacs authentication
  459. when switch acts as server for publickey authentication
  460. when switch acts as client for password authentication
  461. when switch acts as client for publickey authentication
  462. when switch acts as client and first-time authentication is not supported
  463. File System Management
  464. file system configuration
  465. file operations
  466. flash memory operations
  467. prompt mode configuration
  468. file attribute configuration
  469. configuring file attributes
  470. Table of Contents
  471. FTP-SFTP-TFTP
  472. introduction to ftp and sftp
  473. ftp configuration
  474. ftp configuration: a switch operating as an ftp server
  475. configuration example: a switch operating as an ftp server
  476. ftp banner display configuration example
  477. sftp configuration
  478. sftp configuration: a switch operating as an sftp server
  479. sftp configuration: a switch operating as an sftp client
  480. sftp configuration example
  481. introduction to tftp
  482. tftp configuration
  483. tftp configuration example
  484. Table of Contents
  485. Information Center
  486. information center overview
  487. system information format
  488. System Maintenance and
  489. information center configuration
  490. configuring to display the time stamp with the utc time zone
  491. setting to output system information to a monitor terminal
  492. setting to output system information to a log host
  493. setting to output system information to the trap buffer
  494. setting to output system information to the log buffer
  495. setting to output system information to the snmp nms
  496. displaying and maintaining information center
  497. log output to a linux log host
  498. log output to the console
  499. Table of Contents
  500. Table Of Contents
  501. introduction to loading approaches
  502. boot menu
  503. loading by xmodem through console port
  504. loading by tftp through ethernet port
  505. loading by ftp through ethernet port
  506. remote boot rom and software loading
  507. remote loading using tftp
  508. basic system configuration
  509. displaying the system status
  510. displaying debugging status
  511. network connectivity test
  512. introduction to device management
  513. scheduling a reboot on the switch
  514. specifying the app to be used at reboot
  515. identifying and diagnosing pluggable transceivers
  516. displaying the device management configuration
  517. Table of Contents
  518. VLAN-VPN
  519. chapter 1 vlan-vpn configuration
  520. implementation of vlan-vpn
  521. vlan-vpn configuration
  522. tpid adjusting configuration
  523. displaying vlan-vpn configuration
  524. selective qinq overview
  525. selective qinq configuration
  526. configuring the inner-to-outer tag priority mapping feature
  527. selective qinq configuration example
  528. Table of Contents
  529. HWPing
  530. chapter 1 hwping configuration
  531. test types supported by hwping
  532. hwping configuration
  533. displaying hwping configuration
  534. dhcp test
  535. ftp test
  536. http test
  537. jitter test
  538. snmp test
  539. tcp test (tcpprivate test) on the specified ports
  540. udp test (udpprivate test) on the specified ports
  541. dns test
  542. Table Of Contents
  543. dns overview
  544. configuring domain name resolution
  545. displaying and maintaining dns
  546. dynamic domain name resolution configuration example
  547. troubleshooting dns
  548. Table of Contents
  549. Smart Link-Monitor Link
  550. smart link overview
  551. operating mechanism of smart link
  552. configuring smart link
  553. configuring associated devices
  554. smart link configuration example
  555. introduction to monitor link
  556. how monitor link works
  557. configuring monitor link
  558. configuring the uplink port
  559. displaying monitor link configuration
  560. monitor link configuration example
  561. Table of Contents
  562. IPv6 Management
  563. ipv6 overview
  564. introduction to ipv6 address
  565. introduction to ipv6 neighbor discovery protocol
  566. ipv6 configuration task list
  567. configuring an ipv6 unicast address
  568. configuring ipv6 ndp
  569. configuring a static ipv6 route
  570. configuring the hop limit of icmpv6 reply packets
  571. configuring ipv6 dns
  572. displaying and maintaining ipv
  573. ipv6 configuration example
  574. introduction to ipv6 application
  575. ipv6 traceroute
  576. ipv6 telnet
  577. ipv6 application configuration example
  578. troubleshooting ipv6 application
  579. unable to run traceroute
  580. Table of Contents
  581. PoE-PoE Profile
  582. poe overview
  583. poe configuration
  584. enabling the poe feature on a port
  585. setting the poe mode on a port
  586. configuring the pd compatibility detection function
  587. displaying poe configuration
  588. poe configuration example
  589. introduction to poe profile
  590. displaying poe profile configuration
  591. poe profile configuration example
  592. Appendix
H3C S5100-SI first page preview

H3C S5100-SI

Brand: H3C | Category: Switch
Table of contents
  1. about this manual
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Chapter 1 Product Overview
  7. S5100-8P-SI Ethernet Switch
  8. S5100-16P-SI
  9. S5100-16P-SI Ethernet Switch
  10. S5100-24P-SI
  11. S5100-24P-SI Ethernet Switch
  12. S5100-48P-SI Ethernet Switch
  13. S5100-8P-EI Ethernet Switch
  14. S5100-16P-EI Ethernet Switch
  15. S5100-24P-EI Ethernet Switch
  16. S5100-48P-EI
  17. S5100-48P-EI Ethernet Switch
  18. S5100-26C-EI Ethernet Switch
  19. S5100-50C-EI
  20. S5100-50C-EI Ethernet Switch
  21. S5100-8P-PWR-EI Ethernet Switch
  22. S5100-16P-PWR-EI
  23. S5100-16P-PWR-EI Ethernet Switch
  24. S5100-26C-PWR-EI
  25. S5100-26C-PWR-EI Ethernet Switch
  26. S5100-50C-PWR-EI Ethernet Switch
  27. LEDs
  28. Mode LED
  29. gigabit sfp port status led
  30. Gigabit SFP Port Status LED
  31. Module LED
  32. Segment Digitron Display
  33. System Features of the S5100 Series
  34. System Features of the S5100-EI Series
  35. Ordering SFP/XFP/XENPAK Interface Modules
  36. Ordering 10 G Stack Interface Modules
  37. Ordering Stack Cables
  38. Chapter 2 Preparing for Installation
  39. Cleanness
  40. Safety in Use of Laser
  41. Chapter 3 Installing the Switch
  42. Introduction to Mounting Ear
  43. S5100-48P-EI 50
  44. Introduction to Guide Rail
  45. Use Front Mounting Ears and a Tray
  46. Use Front and Rear Mounting Ears
  47. Use Front Mounting Ears and Guide Rails
  48. Desk Mounting
  49. Magnet Mounting
  50. Connecting Power Cord and Grounding Wire
  51. Connecting DC Power Cord
  52. Connecting Grounding Wire
  53. Connecting Console Cable
  54. Installing and Removing Optional Interface Modules
  55. Stack Module
  56. XENPAK Optical Module
  57. Installing and Removing Dedicated Stack Cables
  58. Verifying the Installation
  59. Chapter 4 Powering on the Switch for the First Time
  60. Booting the Switch
  61. Changing the Startup Mode
  62. Chapter 5 Boot ROM and Host Software Loading
  63. Boot Menu
  64. Loading Software Using XModem Through Console Port
  65. Loading Software Using TFTP through Ethernet Port
  66. Loading Software Using FTP Through Ethernet Port
  67. Remote Software Loading
  68. Remote Loading Using TFTP
  69. Chapter 6 Maintenance and Troubleshooting
  70. Missing Boot ROM Password
  71. appendix a lightning protection of the switch
Related products
H3C S5100-EIS5100H3C S5600 SeriesLS-5100-8P-SI-OVS-H3LS-5100-16P-SI-OVS-H3H3C S3600 SeriesH3C S7500E-XS3600-SIS5120-SI SeriesS5500-SI Series
H3C categories
More H3C categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine