H3C S3100-52P manuals
S3100-52P
Table of contents
- about this manual
- Table Of Contents
- chapter 1 obtaining the documentation
- software release notes
- software version
- manual list
- chapter 3 product overview
- chapter 4 networking applications
- application for connecting branches or small- to medium-sized enterprises
- Table Of Contents
- chapter 1 cli configuration
- command hierarchy
- modifying the command level
- switching user level
- cli views
- cli features
- terminal display
- command history
- error prompts
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 logging in to an ethernet switch
- user interface index
- chapter 2 logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- console port login configuration with authentication mode being none
- configuration example
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- chapter 3 logging in through telnet
- telnet configurations for different authentication modes
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- telnetting to another switch from the current switch
- chapter 4 logging in using a modem
- switch configuration
- modem connection establishment
- establishing an http connection
- configuring the login banner
- enabling/disabling the web server
- chapter 6 logging in through nms
- configuring source ip address for telnet service packets
- displaying source ip address configuration
- chapter 8 user control
- controlling telnet users
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip address
- disconnecting a web user by force
- Table Of Contents
- chapter 1 configuration file management
- configuration task list
- saving the current configuration
- erasing the startup configuration file
- specifying a configuration file for next startup
- displaying switch configuration
- Table of Contents
- Table Of Contents
- chapter 1 vlan overview
- advantages of vlans
- vlan interface
- vlan classification
- assigning an ethernet port to specified vlans
- protocol-based vlan
- encapsulation format of ethernet data
- procedure for the switch to judge packet protocol
- implementation of protocol-based vlan
- chapter 2 vlan configuration
- basic vlan interface configuration
- displaying vlan configuration
- configuring the link type of an ethernet port
- configuring the default vlan for a port
- displaying and maintaining port-based vlan
- configuring a protocol-based vlan
- associating a port with a protocol-based vlan
- displaying protocol-based vlan configuration
- Table of Contents
- Table Of Contents
- chapter 1 ip addressing configuration
- special case ip addresses
- configuring ip addresses
- displaying ip addressing configuration
- ip address configuration examples
- chapter 2 ip performance configuration
- configuring tcp attributes
- displaying and maintaining ip performance configuration
- Table of Contents
- Table Of Contents
- chapter 1 voice vlan configuration
- how s3100-52p switch identifies voice traffic
- setting the voice traffic transmission priority
- support for voice vlan on various ports
- security mode of voice vlan
- configuring the voice vlan to operate in automatic voice vlan assignment mode
- configuring the voice vlan to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- voice vlan configuration example
- voice vlan configuration example (manual voice vlan assignment mode)
- Table Of Contents
- chapter 1 gvrp configuration
- protocol specifications
- configuring gvrp timers
- configuring gvrp port registration mode
- displaying and maintaining gvrp
- Table of Contents
- Table Of Contents
- chapter 1 port basic configuration
- configuring port auto-negotiation speed
- limiting traffic on individual ports
- enabling flow control on a port
- configuring loopback detection for an ethernet port
- enabling loopback test
- enabling the system to test connected cable
- configuring the interval to perform statistical analysis on port traffic
- configuring storm control on a port
- setting the port state change delay
- displaying and maintaining basic port configuration
- troubleshooting ethernet port configuration
- Table of Contents
- Table Of Contents
- chapter 1 link aggregation configuration
- requirements on ports for link aggregation
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- link aggregation configuration
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- configuring a description for an aggregation group
- displaying and maintaining link aggregation configuration
- Table Of Contents
- chapter 1 port isolation configuration
- displaying and maintaining port isolation configuration
- Table Of Contents
- chapter 1 port security configuration
- port security modes
- port security configuration task list
- setting the maximum number of mac addresses allowed on a port
- setting the port security mode
- configuring port security features
- ignoring the authorization information from the radius server
- displaying and maintaining port security configuration
- port security configuration example
- chapter 2 port binding configuration
- displaying and maintaining port binding configuration
- Table Of Contents
- chapter 1 dldp configuration
- dldp fundamentals
- dldp status
- dldp timers
- dldp operating mode
- dldp neighbor state
- dldp configuration
- resetting dldp state
- displaying and maintaining dldp
- Table Of Contents
- chapter 1 mac address table management
- introduction to mac address learning
- managing mac address table
- configuring mac address table management
- configuring a mac address entry
- setting the mac address aging timer
- setting the maximum number of mac addresses a port can learn
- assigning mac addresses for ethernet ports
- displaying mac address table information
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 mstp configuration
- mstp overview
- basic mstp terminologies
- principle of mstp
- mstp implementation on switches
- configuring root bridge
- configuring an mst region
- specifying the current switch as a root bridge/secondary root bridge
- configuring the bridge priority of the current switch
- configuring the mstp operation mode
- configuring the network diameter of the switched network
- configuring the mstp time-related parameters
- configuring the current port as an edge port
- specifying whether the link connected to a port is point-to-point link
- configuring leaf nodes
- configuring the mst region
- configuring a port as an edge port
- configuring port priority
- specifying whether the link connected to a port is a point-to-point link
- configuring guard functions
- configuring bpdu guard
- configuring root guard
- configuring loop guard
- configuring bpdu dropping
- configuring digest snooping
- configuring vlan-vpn tunnel
- stp maintenance configuration
- enabling trap messages conforming to 802.1d standard
- displaying and maintaining mstp
- vlan-vpn tunnel configuration example
- Table of Contents
- Table Of Contents
- chapter 1 ip routing protocol overview
- routing protocols and routing priority
- route backup
- chapter 2 static route configuration
- default route
- displaying and maintaining static routes
- troubleshooting a static route
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 multicast overview
- information transmission in the broadcast mode
- information transmission in the multicast mode
- roles in multicast
- advantages and applications of multicast
- multicast models
- multicast architecture
- multicast protocols
- multicast packet forwarding mechanism
- implementation of the rpf mechanism
- chapter 2 common multicast configuration
- configuring a multicast mac address entry
- configuring dropping unknown multicast packets
- displaying common multicast configuration
- chapter 3 igmp snooping configuration
- basic concepts in igmp snooping
- work mechanism of igmp snooping
- igmp snooping configuration task list
- enabling igmp snooping
- configuring timers
- configuring fast leave processing
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp snooping querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring static member port for a multicast group
- configuring a static router port
- configuring a vlan tag for query messages
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- configuring multicast vlan
- troubleshooting igmp snooping
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 802.1x configuration
- architecture of 802.1x authentication
- the mechanism of an 802.1x authentication system
- encapsulation of eapol messages
- x authentication procedure
- timers used in 802.1x
- x implementation on an s3100-52p switch
- introduction to 802.1x configuration
- basic 802.1x configuration
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring client version checking
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- displaying and maintaining 802.1x configuration
- chapter 2 quick ead deployment configuration
- configuring quick ead deployment
- displaying and maintaining quick ead deployment
- troubleshooting
- chapter 3 habp configuration
- habp client configuration
- chapter 4 system guard configuration
- configuring system guard against tcn attacks
- enabling layer 3 error control
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 aaa overview
- introduction to isp domain
- introduction to aaa services
- introduction to hwtacacs
- chapter 2 aaa configuration
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- cutting down user connections forcibly
- radius configuration task list
- creating a radius scheme
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the maximum number of radius request transmission attempts
- configuring the status of radius servers
- configuring the attributes of data to be sent to radius servers
- configuring the local radius server
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- enabling the user re-authentication at restart function
- hwtacacs configuration task list
- configuring tacacs authentication servers
- configuring tacacs accounting servers
- configuring shared keys for hwtacacs messages
- configuring the attributes of data to be sent to tacacs servers
- displaying and maintaining aaa configuration
- displaying and maintaining hwtacacs protocol configuration
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- troubleshooting hwtacacs configuration
- chapter 3 ead configuration
- ead configuration
- Table Of Contents
- chapter 1 web authentication configuration
- displaying and maintaining web authentication
- Table Of Contents
- mac address authentication overview
- performing mac address authentication on a radius server
- quiet mac address
- mac address authentication enhanced function configuration
- displaying and maintaining mac address authentication configuration
- Table of Contents
- Table Of Contents
- chapter 1 arp configuration
- arp table
- arp process
- introduction to arp packet rate limit
- configuring arp
- configuring the arp packet rate limit function
- configuring gratuitous arp
- displaying and debugging arp
- arp attack detection and packet rate limit configuration example
- Table of Contents
- Table Of Contents
- chapter 1 dhcp overview
- dhcp ip address assignment
- updating ip address lease
- dhcp packet format
- protocol specification
- chapter 2 dhcp snooping configuration
- introduction to dhcp-snooping option
- introduction to ip filtering
- configuring dhcp snooping
- configuring dhcp snooping to support option
- configuring ip filtering
- dhcp snooping configuration examples
- ip filtering configuration example
- displaying dhcp snooping configuration
- chapter 3 dhcp packet rate limit configuration
- configuring dhcp packet rate limit
- rate limit configuration example
- chapter 4 dhcp/bootp client configuration
- how automatic configuration works
- introduction to bootp client
- dhcp client configuration example
- bootp client configuration example
- Table of Contents
- Table Of Contents
- chapter 1 acl configuration
- acl matching order
- ways to apply an acl on a switch
- types of acls supported by s3100-52p ethernet switch
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- configuring user-defined acl
- applying acls on ports
- displaying and maintaining acl configuration
- example for controlling web login users by source ip
- examples for applying acls to hardware
- advanced acl configuration example
- user-defined acl configuration example
- example for applying an acl to a vlan
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 qos configuration
- traditional packet forwarding service
- major traffic control techniques
- qos supported by s3100-52p ethernet switch
- introduction to qos functions
- priority trust mode
- protocol priority
- line rate
- congestion avoidance
- flow-based traffic accounting
- traffic mirroring
- configuring the mapping between 802.1p priority and local precedence
- setting the priority of protocol packets
- marking packet priority
- configuring traffic policing
- configuring line rate
- configuring traffic redirecting
- configuring vlan mapping
- configuring queue scheduling
- configuring wred
- configuring traffic accounting
- enabling the burst function
- displaying and maintaining qos
- qos configuration examples
- configuration example of priority marking and queue scheduling
- vlan mapping configuration example
- configuring traffic mirroring and redirecting traffic to a port
- chapter 2 qos profile configuration
- qos profile configuration task list
- applying a qos profile
- displaying and maintaining qos profile configuration
- qos profile configuration example
- Table Of Contents
- chapter 1 mirroring configuration
- remote port mirroring
- mirroring configuration
- configuring remote port mirroring
- displaying and maintaining port mirroring
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- chapter 1 stack
- main switch configuration
- switching to slave switch view
- slave switch configuration
- stack configuration example
- chapter 2 cluster
- roles in a cluster
- how a cluster works
- cluster configuration task list
- configuring the management device
- configuring member devices
- managing a cluster through the management device
- configuring the enhanced cluster features
- displaying and maintaining cluster configuration
- enhanced cluster feature configuration example
- Table of Contents
- Table Of Contents
- chapter 1 snmp configuration
- snmp versions
- configuring basic snmp functions
- configuring trap-related functions
- configuring extended trap function
- enabling logging for network management
- displaying snmp
- chapter 2 rmon configuration
- commonly used rmon groups
- rmon configuration
- displaying rmon
- Table of Contents
- Table Of Contents
- chapter 1 ntp configuration
- implementation principle of ntp
- ntp implementation modes
- ntp configuration task list
- configuring ntp implementation modes
- configuring the ntp symmetric peer mode
- configuring ntp broadcast mode
- configuring ntp multicast mode
- configuring access control right
- configuring ntp authentication
- configuration prerequisites
- configuration procedure
- configuring optional ntp parameters
- configuring an interface on the local switch to send ntp messages
- disabling an interface from receiving ntp messages
- configuration examples
- configuring ntp symmetric peer mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- chapter 1 ssh configuration
- algorithm and key
- ssh operating process
- ssh server and client configuration task list
- configuring the ssh server
- configuring the user interfaces for ssh clients
- configuring the ssh management functions
- configuring the ssh server to be compatible with ssh1 clients
- creating an ssh user and specifying an authentication type
- specifying a service type for an ssh user
- configuring the public key of a client on the server
- assigning a public key to an ssh user
- configuring the ssh client
- configuring an ssh client that runs ssh client software
- configuring an ssh client assumed by an ssh2-capable switch
- displaying and maintaining ssh configuration
- ssh configuration examples
- when switch acts as server for password and radius authentication
- when switch acts as server for password and hwtacacs authentication
- when switch acts as server for publickey authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- when switch acts as client and first-time authentication is not supported
- Table Of Contents
- chapter 1 file system management configuration
- directory operations
- flash memory operations
- file system configuration example
- file attribute configuration
- booting with the startup file
- configuring file attributes
- Table of Contents
- Table Of Contents
- chapter 1 ftp and sftp configuration
- introduction to sftp
- ftp configuration: a switch operating as an ftp server
- configuration example: a switch operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: a switch operating as an sftp server
- sftp configuration: a switch operating as an sftp client
- sftp configuration example
- chapter 2 tftp configuration
- tftp configuration
- tftp configuration example
- Table of Contents
- Table Of Contents
- chapter 1 information center
- system information format
- information center configuration
- configuring to display the time stamp with the utc time zone
- setting to output system information to the console
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the trap buffer
- setting to output system information to the log buffer
- setting to output system information to the snmp nms
- information center configuration examples
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- chapter 1 boot rom and host software loading
- boot menu
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using tftp
- basic system configuration
- displaying the system status
- debugging the system
- displaying debugging status
- chapter 3 network connectivity test
- chapter 4 device management
- rebooting the ethernet switch
- configuring real-time monitoring of the running status of the system
- loading hot patch
- displaying pluggable transceiver information
- displaying the device management configuration
- Table of Contents
- Table Of Contents
- chapter 1 vlan-vpn configuration
- implementation of vlan-vpn
- inner-to-outer tag priority replicating and mapping
- enabling the vlan-vpn feature for a port
- configuring the inner-to-outer tag priority replicating and mapping feature
- displaying and maintaining vlan-vpn configuration
- chapter 2 selective qinq configuration
- mac address replicating
- selective qinq configuration
- selective qinq configuration example
- chapter 3 bpdu tunnel configuration
- bpdu tunnel configuration
- configuring a bpdu tunnel
- displaying and maintaining bpdu tunnel configuration
- Table of Contents
- Table Of Contents
- chapter 1 hwping configuration
- test types supported by hwping
- hwping configuration
- displaying hwping configuration
- dhcp test
- ftp test
- http test
- jitter test
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table of Contents
- Table Of Contents
- chapter 1 ipv6 configuration
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- introduction to ipv6 dns
- configuring an ipv6 unicast address
- configuring ipv6 ndp
- configuring a static ipv6 route
- configuring the hop limit of icmpv6 reply packets
- configuring ipv6 dns
- displaying and maintaining ipv
- ipv6 configuration example
- chapter 2 ipv6 application configuration
- ipv6 traceroute
- ipv6 tftp
- ipv6 application configuration example
- troubleshooting ipv6 application
- unable to run traceroute
- Table Of Contents
- chapter 1 dns configuration
- configuring domain name resolution
- displaying and maintaining dns
- dynamic domain name resolution configuration example
- troubleshooting dns
- Table of Contents
- Table Of Contents
- chapter 1 smart link configuration
- operating mechanism of smart link
- configuring smart link
- configuring associated devices
- displaying and maintaining smart link
- chapter 2 monitor link configuration
- how monitor link works
- configuring monitor link
- configuring the uplink port
- displaying monitor link configuration
- monitor link configuration example
S3100-52P
Table of contents
- Table Of Contents
- Chapter 1 Multicast Overview
- Information Transmission in the Broadcast Mode
- Information Transmission in the Multicast Mode
- Roles in Multicast
- Advantages and Applications of Multicast
- Multicast Models
- Multicast Architecture
- Multicast Protocols
- Multicast Packet Forwarding Mechanism
- Implementation of the RPF Mechanism
- Chapter 2 Common Multicast Configuration
- Configuring a Multicast MAC Address Entry
- Configuring Dropping Unknown Multicast Packets
- Displaying Common Multicast Configuration
- Chapter 3 IGMP Snooping Configuration
- Basic Concepts in IGMP Snooping
- Work Mechanism of IGMP Snooping
- IGMP Snooping Configuration Task List
- Enabling IGMP Snooping
- Configuring Timers
- Configuring Fast Leave Processing
- Configuring a Multicast Group Filter
- Configuring the Maximum Number of Multicast Groups on a Port
- Configuring IGMP Snooping Querier
- Suppressing Flooding of Unknown Multicast Traffic in a VLAN
- Configuring Static Member Port for a Multicast Group
- Configuring a Static Router Port
- Configuring a VLAN Tag for Query Messages
- Displaying and Maintaining IGMP Snooping
- IGMP Snooping Configuration Examples
- Configuring Multicast VLAN
- Troubleshooting IGMP Snooping
S3100-52P
Table of contents
- chapter 1 link aggregation configuration
- operation key
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- link aggregation configuration
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- displaying and maintaining link aggregation configuration
- link aggregation configuration example
S3100-52P
Table of contents
- Chapter 1 Port Basic Configuration
- Configuring Port Auto-Negotiation Speed
- Limiting Traffic on individual Ports
- Enabling Flow Control on a Port
- Configuring Loopback Detection for an Ethernet Port
- Enabling Loopback Test
- Enabling the System to Test Connected Cable
- Configuring the Interval to Perform Statistical Analysis on Port Traffic
- Configuring Storm Control on a Port
- Setting the Port State Change Delay
- Displaying and Maintaining Basic Port Configuration
- Troubleshooting Ethernet Port Configuration
S3100-52P
Table of contents
- Chapter 1 VLAN Overview
- Advantages of VLANs
- VLAN Interface
- VLAN Classification
- Assigning an Ethernet Port to Specified VLANs
- Protocol-Based VLAN
- Encapsulation Format of Ethernet Data
- Procedure for the Switch to Judge Packet Protocol
- Implementation of Protocol-Based VLAN
- Chapter 2 VLAN Configuration
- Basic VLAN Interface Configuration
- Displaying VLAN Configuration
- Configuring the Link Type of an Ethernet Port
- Configuring the Default VLAN for a Port
- Displaying and Maintaining Port-Based VLAN
- Configuring a Protocol-Based VLAN
- Associating a Port with a Protocol-Based VLAN
- Displaying Protocol-Based VLAN Configuration
S3100-52P
Table of contents
S3100-52P
Table of contents
- Chapter 1 QoS Configuration
- Priority of Protocol Packets
- Queue Scheduling
- QoS Supported by S3100-52P
- Configuring the Mapping between 802.1p Priority and Queues
- Setting to Use the Port Priority or Packet Priority
- Setting the Precedence of Protocol Packet
- Configuration Example
- Configuration Procedure
- Displaying QOS Configuration
S3100-52P
Table of contents
- Chapter 1 DHCP Overview
- Obtaining IP Addresses Dynamically
- DHCP Packet Format
- Protocol Specification
- Chapter 2 DHCP Snooping Configuration
- DHCP Snooping Configuration
- Displaying DHCP Snooping
- Chapter 3 DHCP/BOOTP Client Configuration
- Introduction to BOOTP Client
- DHCP/BOOTP Client Configuration
- Configuration Example
S3100-52P
Table of contents
S3100-52P
Table of contents
- Table Of Contents
- Chapter 1 AAA & RADIUS & HWTACACS Configuration
- Introduction to ISP Domain
- Introduction to HWTACACS
- Configuration Task
- AAA Configuration
- Configuration Prerequisites
- Configuring an AAA Scheme for an ISP Domain
- Configuring Dynamic VLAN Assignment
- Configuring the Attributes of a Local User
- Cutting Down User Connections Forcibly
- Creating a RADIUS Scheme
- Configuring RADIUS Authentication/Authorization Servers
- Configuring RADIUS Accounting Servers
- Configuring Shared Keys for RADIUS Messages
- Configuring Maximum Number of Transmission Attempts of RADIUS Request
- Configuring to Support a Type of RADIUS Server
- Configuring the Attributes for Data to be Sent to RADIUS Servers
- Configuring Local RADIUS Authentication Server
- Configuring the Timers of RADIUS Servers
- Enabling the Sending of Trap Message When a RADIUS Server is Down
- Enabling the User Re-Authentication at Restart Function
- HWTACACS Configuration
- Configuring HWTACACS Authentication Servers
- Configuring HWTACACS Authorization Servers
- Configuring HWTACACS Accounting Servers
- Configuring the Attributes for Data to be Sent to TACACS Servers
- Configuring the Timers of TACACS Servers
- Displaying and Maintaining AAA & RADIUS & HWTACACS Information
- AAA & RADIUS & HWTACACS Configuration Example
- Local Authentication of FTP/Telnet Users
- HWTACACS Authentication and Authorization of Telnet Users
- Troubleshooting AAA & RADIUS & HWTACACS Configuration
- Troubleshooting HWTACACS Configuration
S3100-52P
Table of contents
- Chapter 1 IP Routing Table Commands
- display ip routing-table acl
- display ip routing-table ip-address
- display ip routing-table ip-address1 ip-address2
- display ip routing-table protocol
- display ip routing-table radix
- display ip routing-table statistics
- display ip routing-table verbose
- reset ip routing-table statistics protocol
- Chapter 2 Static Route Configuration Commands
- ip route-static
S3100-52P
Table of contents
- Chapter 1 IP Routing Table Display Commands
- display ip routing-table ip-address
- display ip routing-table ip-address1 ip-address2
- display ip routing-table protocol
- display ip routing-table radix
- display ip routing-table statistics
- display ip routing-table verbose
- Chapter 2 Static Route Configuration Commands
- ip route-static
S3100-52P
Table of contents
- Table Of Contents
- chapter 1 mstp configuration commands
- bpdu-drop any
- display stp
- display stp region-configuration
- instance
- region-name
- reset stp
- stp bpdu-protection
- stp bridge-diameter
- stp compliance
- stp config-digest-snooping
- stp cost
- stp edged-port
- stp interface
- stp interface config-digest-snooping
- stp interface cost
- stp interface edged-port
- stp interface loop-protection
- stp interface mcheck
- stp interface no-agreement-check
- stp interface point-to-point
- stp interface port priority
- stp interface root-protection
- stp interface transmit-limit
- stp loop-protection
- stp max-hops
- stp mcheck
- stp mode
- stp no-agreement-check
- stp pathcost-standard
- stp point-to-point
- stp port priority
- stp priority
- stp region-configuration
- stp root primary
- stp root secondary
- stp root-protection
- stp tc-protection
- stp timer forward-delay
- stp timer hello
- stp timer max-age
- stp timer-factor
- stp transmit-limit
- vlan-mapping modulo
- bpdu tunnel configuration commands
S3100-52P
Table of contents
- chapter 1 stack
- main switch configuration
- switching to slave switch view
- slave switch configuration
- stack configuration example
- chapter 2 cluster
- roles in a cluster
- how a cluster works
- cluster configuration task list
- configuring the management device
- configuring member devices
- managing a cluster through the management device
- configuring the enhanced cluster features
- displaying and maintaining cluster configuration
- enhanced cluster feature configuration example
manualsdatabase
Your AI-powered manual search engine