Manuals database logo
manualsdatabase
Your AI-powered manual search engine

H3C S3100-52P manuals

S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Network Router
Table of contents
  1. about this manual
  2. Table Of Contents
  3. chapter 1 obtaining the documentation
  4. software release notes
  5. software version
  6. manual list
  7. chapter 3 product overview
  8. chapter 4 networking applications
  9. application for connecting branches or small- to medium-sized enterprises
  10. Table Of Contents
  11. chapter 1 cli configuration
  12. command hierarchy
  13. modifying the command level
  14. switching user level
  15. cli views
  16. cli features
  17. terminal display
  18. command history
  19. error prompts
  20. Table of Contents
  21. Table Of Contents
  22. Table Of Contents
  23. chapter 1 logging in to an ethernet switch
  24. user interface index
  25. chapter 2 logging in through the console port
  26. console port login configuration
  27. console port login configurations for different authentication modes
  28. console port login configuration with authentication mode being none
  29. configuration example
  30. console port login configuration with authentication mode being password
  31. console port login configuration with authentication mode being scheme
  32. chapter 3 logging in through telnet
  33. telnet configurations for different authentication modes
  34. telnet configuration with authentication mode being none
  35. telnet configuration with authentication mode being password
  36. telnet configuration with authentication mode being scheme
  37. telnetting to a switch
  38. telnetting to another switch from the current switch
  39. chapter 4 logging in using a modem
  40. switch configuration
  41. modem connection establishment
  42. establishing an http connection
  43. configuring the login banner
  44. enabling/disabling the web server
  45. chapter 6 logging in through nms
  46. configuring source ip address for telnet service packets
  47. displaying source ip address configuration
  48. chapter 8 user control
  49. controlling telnet users
  50. controlling telnet users by source mac addresses
  51. controlling network management users by source ip addresses
  52. controlling web users by source ip address
  53. disconnecting a web user by force
  54. Table Of Contents
  55. chapter 1 configuration file management
  56. configuration task list
  57. saving the current configuration
  58. erasing the startup configuration file
  59. specifying a configuration file for next startup
  60. displaying switch configuration
  61. Table of Contents
  62. Table Of Contents
  63. chapter 1 vlan overview
  64. advantages of vlans
  65. vlan interface
  66. vlan classification
  67. assigning an ethernet port to specified vlans
  68. protocol-based vlan
  69. encapsulation format of ethernet data
  70. procedure for the switch to judge packet protocol
  71. implementation of protocol-based vlan
  72. chapter 2 vlan configuration
  73. basic vlan interface configuration
  74. displaying vlan configuration
  75. configuring the link type of an ethernet port
  76. configuring the default vlan for a port
  77. displaying and maintaining port-based vlan
  78. configuring a protocol-based vlan
  79. associating a port with a protocol-based vlan
  80. displaying protocol-based vlan configuration
  81. Table of Contents
  82. Table Of Contents
  83. chapter 1 ip addressing configuration
  84. special case ip addresses
  85. configuring ip addresses
  86. displaying ip addressing configuration
  87. ip address configuration examples
  88. chapter 2 ip performance configuration
  89. configuring tcp attributes
  90. displaying and maintaining ip performance configuration
  91. Table of Contents
  92. Table Of Contents
  93. chapter 1 voice vlan configuration
  94. how s3100-52p switch identifies voice traffic
  95. setting the voice traffic transmission priority
  96. support for voice vlan on various ports
  97. security mode of voice vlan
  98. configuring the voice vlan to operate in automatic voice vlan assignment mode
  99. configuring the voice vlan to operate in manual voice vlan assignment mode
  100. displaying and maintaining voice vlan
  101. voice vlan configuration example
  102. voice vlan configuration example (manual voice vlan assignment mode)
  103. Table Of Contents
  104. chapter 1 gvrp configuration
  105. protocol specifications
  106. configuring gvrp timers
  107. configuring gvrp port registration mode
  108. displaying and maintaining gvrp
  109. Table of Contents
  110. Table Of Contents
  111. chapter 1 port basic configuration
  112. configuring port auto-negotiation speed
  113. limiting traffic on individual ports
  114. enabling flow control on a port
  115. configuring loopback detection for an ethernet port
  116. enabling loopback test
  117. enabling the system to test connected cable
  118. configuring the interval to perform statistical analysis on port traffic
  119. configuring storm control on a port
  120. setting the port state change delay
  121. displaying and maintaining basic port configuration
  122. troubleshooting ethernet port configuration
  123. Table of Contents
  124. Table Of Contents
  125. chapter 1 link aggregation configuration
  126. requirements on ports for link aggregation
  127. static lacp aggregation group
  128. dynamic lacp aggregation group
  129. aggregation group categories
  130. link aggregation configuration
  131. configuring a static lacp aggregation group
  132. configuring a dynamic lacp aggregation group
  133. configuring a description for an aggregation group
  134. displaying and maintaining link aggregation configuration
  135. Table Of Contents
  136. chapter 1 port isolation configuration
  137. displaying and maintaining port isolation configuration
  138. Table Of Contents
  139. chapter 1 port security configuration
  140. port security modes
  141. port security configuration task list
  142. setting the maximum number of mac addresses allowed on a port
  143. setting the port security mode
  144. configuring port security features
  145. ignoring the authorization information from the radius server
  146. displaying and maintaining port security configuration
  147. port security configuration example
  148. chapter 2 port binding configuration
  149. displaying and maintaining port binding configuration
  150. Table Of Contents
  151. chapter 1 dldp configuration
  152. dldp fundamentals
  153. dldp status
  154. dldp timers
  155. dldp operating mode
  156. dldp neighbor state
  157. dldp configuration
  158. resetting dldp state
  159. displaying and maintaining dldp
  160. Table Of Contents
  161. chapter 1 mac address table management
  162. introduction to mac address learning
  163. managing mac address table
  164. configuring mac address table management
  165. configuring a mac address entry
  166. setting the mac address aging timer
  167. setting the maximum number of mac addresses a port can learn
  168. assigning mac addresses for ethernet ports
  169. displaying mac address table information
  170. Table of Contents
  171. Table Of Contents
  172. Table Of Contents
  173. chapter 1 mstp configuration
  174. mstp overview
  175. basic mstp terminologies
  176. principle of mstp
  177. mstp implementation on switches
  178. configuring root bridge
  179. configuring an mst region
  180. specifying the current switch as a root bridge/secondary root bridge
  181. configuring the bridge priority of the current switch
  182. configuring the mstp operation mode
  183. configuring the network diameter of the switched network
  184. configuring the mstp time-related parameters
  185. configuring the current port as an edge port
  186. specifying whether the link connected to a port is point-to-point link
  187. configuring leaf nodes
  188. configuring the mst region
  189. configuring a port as an edge port
  190. configuring port priority
  191. specifying whether the link connected to a port is a point-to-point link
  192. configuring guard functions
  193. configuring bpdu guard
  194. configuring root guard
  195. configuring loop guard
  196. configuring bpdu dropping
  197. configuring digest snooping
  198. configuring vlan-vpn tunnel
  199. stp maintenance configuration
  200. enabling trap messages conforming to 802.1d standard
  201. displaying and maintaining mstp
  202. vlan-vpn tunnel configuration example
  203. Table of Contents
  204. Table Of Contents
  205. chapter 1 ip routing protocol overview
  206. routing protocols and routing priority
  207. route backup
  208. chapter 2 static route configuration
  209. default route
  210. displaying and maintaining static routes
  211. troubleshooting a static route
  212. Table of Contents
  213. Table Of Contents
  214. Table Of Contents
  215. chapter 1 multicast overview
  216. information transmission in the broadcast mode
  217. information transmission in the multicast mode
  218. roles in multicast
  219. advantages and applications of multicast
  220. multicast models
  221. multicast architecture
  222. multicast protocols
  223. multicast packet forwarding mechanism
  224. implementation of the rpf mechanism
  225. chapter 2 common multicast configuration
  226. configuring a multicast mac address entry
  227. configuring dropping unknown multicast packets
  228. displaying common multicast configuration
  229. chapter 3 igmp snooping configuration
  230. basic concepts in igmp snooping
  231. work mechanism of igmp snooping
  232. igmp snooping configuration task list
  233. enabling igmp snooping
  234. configuring timers
  235. configuring fast leave processing
  236. configuring a multicast group filter
  237. configuring the maximum number of multicast groups on a port
  238. configuring igmp snooping querier
  239. suppressing flooding of unknown multicast traffic in a vlan
  240. configuring static member port for a multicast group
  241. configuring a static router port
  242. configuring a vlan tag for query messages
  243. displaying and maintaining igmp snooping
  244. igmp snooping configuration examples
  245. configuring multicast vlan
  246. troubleshooting igmp snooping
  247. Table of Contents
  248. Table Of Contents
  249. Table Of Contents
  250. chapter 1 802.1x configuration
  251. architecture of 802.1x authentication
  252. the mechanism of an 802.1x authentication system
  253. encapsulation of eapol messages
  254. x authentication procedure
  255. timers used in 802.1x
  256. x implementation on an s3100-52p switch
  257. introduction to 802.1x configuration
  258. basic 802.1x configuration
  259. timer and maximum user number configuration
  260. advanced 802.1x configuration
  261. configuring client version checking
  262. enabling dhcp-triggered authentication
  263. configuring 802.1x re-authentication
  264. displaying and maintaining 802.1x configuration
  265. chapter 2 quick ead deployment configuration
  266. configuring quick ead deployment
  267. displaying and maintaining quick ead deployment
  268. troubleshooting
  269. chapter 3 habp configuration
  270. habp client configuration
  271. chapter 4 system guard configuration
  272. configuring system guard against tcn attacks
  273. enabling layer 3 error control
  274. Table of Contents
  275. Table Of Contents
  276. Table Of Contents
  277. chapter 1 aaa overview
  278. introduction to isp domain
  279. introduction to aaa services
  280. introduction to hwtacacs
  281. chapter 2 aaa configuration
  282. creating an isp domain and configuring its attributes
  283. configuring an aaa scheme for an isp domain
  284. configuring dynamic vlan assignment
  285. configuring the attributes of a local user
  286. cutting down user connections forcibly
  287. radius configuration task list
  288. creating a radius scheme
  289. configuring radius accounting servers
  290. configuring shared keys for radius messages
  291. configuring the maximum number of radius request transmission attempts
  292. configuring the status of radius servers
  293. configuring the attributes of data to be sent to radius servers
  294. configuring the local radius server
  295. configuring timers for radius servers
  296. enabling sending trap message when a radius server goes down
  297. enabling the user re-authentication at restart function
  298. hwtacacs configuration task list
  299. configuring tacacs authentication servers
  300. configuring tacacs accounting servers
  301. configuring shared keys for hwtacacs messages
  302. configuring the attributes of data to be sent to tacacs servers
  303. displaying and maintaining aaa configuration
  304. displaying and maintaining hwtacacs protocol configuration
  305. local authentication of ftp/telnet users
  306. hwtacacs authentication and authorization of telnet users
  307. troubleshooting aaa
  308. troubleshooting hwtacacs configuration
  309. chapter 3 ead configuration
  310. ead configuration
  311. Table Of Contents
  312. chapter 1 web authentication configuration
  313. displaying and maintaining web authentication
  314. Table Of Contents
  315. mac address authentication overview
  316. performing mac address authentication on a radius server
  317. quiet mac address
  318. mac address authentication enhanced function configuration
  319. displaying and maintaining mac address authentication configuration
  320. Table of Contents
  321. Table Of Contents
  322. chapter 1 arp configuration
  323. arp table
  324. arp process
  325. introduction to arp packet rate limit
  326. configuring arp
  327. configuring the arp packet rate limit function
  328. configuring gratuitous arp
  329. displaying and debugging arp
  330. arp attack detection and packet rate limit configuration example
  331. Table of Contents
  332. Table Of Contents
  333. chapter 1 dhcp overview
  334. dhcp ip address assignment
  335. updating ip address lease
  336. dhcp packet format
  337. protocol specification
  338. chapter 2 dhcp snooping configuration
  339. introduction to dhcp-snooping option
  340. introduction to ip filtering
  341. configuring dhcp snooping
  342. configuring dhcp snooping to support option
  343. configuring ip filtering
  344. dhcp snooping configuration examples
  345. ip filtering configuration example
  346. displaying dhcp snooping configuration
  347. chapter 3 dhcp packet rate limit configuration
  348. configuring dhcp packet rate limit
  349. rate limit configuration example
  350. chapter 4 dhcp/bootp client configuration
  351. how automatic configuration works
  352. introduction to bootp client
  353. dhcp client configuration example
  354. bootp client configuration example
  355. Table of Contents
  356. Table Of Contents
  357. chapter 1 acl configuration
  358. acl matching order
  359. ways to apply an acl on a switch
  360. types of acls supported by s3100-52p ethernet switch
  361. configuring basic acl
  362. configuring advanced acl
  363. configuring layer 2 acl
  364. configuring user-defined acl
  365. applying acls on ports
  366. displaying and maintaining acl configuration
  367. example for controlling web login users by source ip
  368. examples for applying acls to hardware
  369. advanced acl configuration example
  370. user-defined acl configuration example
  371. example for applying an acl to a vlan
  372. Table of Contents
  373. Table Of Contents
  374. Table Of Contents
  375. chapter 1 qos configuration
  376. traditional packet forwarding service
  377. major traffic control techniques
  378. qos supported by s3100-52p ethernet switch
  379. introduction to qos functions
  380. priority trust mode
  381. protocol priority
  382. line rate
  383. congestion avoidance
  384. flow-based traffic accounting
  385. traffic mirroring
  386. configuring the mapping between 802.1p priority and local precedence
  387. setting the priority of protocol packets
  388. marking packet priority
  389. configuring traffic policing
  390. configuring line rate
  391. configuring traffic redirecting
  392. configuring vlan mapping
  393. configuring queue scheduling
  394. configuring wred
  395. configuring traffic accounting
  396. enabling the burst function
  397. displaying and maintaining qos
  398. qos configuration examples
  399. configuration example of priority marking and queue scheduling
  400. vlan mapping configuration example
  401. configuring traffic mirroring and redirecting traffic to a port
  402. chapter 2 qos profile configuration
  403. qos profile configuration task list
  404. applying a qos profile
  405. displaying and maintaining qos profile configuration
  406. qos profile configuration example
  407. Table Of Contents
  408. chapter 1 mirroring configuration
  409. remote port mirroring
  410. mirroring configuration
  411. configuring remote port mirroring
  412. displaying and maintaining port mirroring
  413. remote port mirroring configuration example
  414. Table of Contents
  415. Table Of Contents
  416. chapter 1 stack
  417. main switch configuration
  418. switching to slave switch view
  419. slave switch configuration
  420. stack configuration example
  421. chapter 2 cluster
  422. roles in a cluster
  423. how a cluster works
  424. cluster configuration task list
  425. configuring the management device
  426. configuring member devices
  427. managing a cluster through the management device
  428. configuring the enhanced cluster features
  429. displaying and maintaining cluster configuration
  430. enhanced cluster feature configuration example
  431. Table of Contents
  432. Table Of Contents
  433. chapter 1 snmp configuration
  434. snmp versions
  435. configuring basic snmp functions
  436. configuring trap-related functions
  437. configuring extended trap function
  438. enabling logging for network management
  439. displaying snmp
  440. chapter 2 rmon configuration
  441. commonly used rmon groups
  442. rmon configuration
  443. displaying rmon
  444. Table of Contents
  445. Table Of Contents
  446. chapter 1 ntp configuration
  447. implementation principle of ntp
  448. ntp implementation modes
  449. ntp configuration task list
  450. configuring ntp implementation modes
  451. configuring the ntp symmetric peer mode
  452. configuring ntp broadcast mode
  453. configuring ntp multicast mode
  454. configuring access control right
  455. configuring ntp authentication
  456. configuration prerequisites
  457. configuration procedure
  458. configuring optional ntp parameters
  459. configuring an interface on the local switch to send ntp messages
  460. disabling an interface from receiving ntp messages
  461. configuration examples
  462. configuring ntp symmetric peer mode
  463. configuring ntp server/client mode with authentication
  464. Table of Contents
  465. Table Of Contents
  466. chapter 1 ssh configuration
  467. algorithm and key
  468. ssh operating process
  469. ssh server and client configuration task list
  470. configuring the ssh server
  471. configuring the user interfaces for ssh clients
  472. configuring the ssh management functions
  473. configuring the ssh server to be compatible with ssh1 clients
  474. creating an ssh user and specifying an authentication type
  475. specifying a service type for an ssh user
  476. configuring the public key of a client on the server
  477. assigning a public key to an ssh user
  478. configuring the ssh client
  479. configuring an ssh client that runs ssh client software
  480. configuring an ssh client assumed by an ssh2-capable switch
  481. displaying and maintaining ssh configuration
  482. ssh configuration examples
  483. when switch acts as server for password and radius authentication
  484. when switch acts as server for password and hwtacacs authentication
  485. when switch acts as server for publickey authentication
  486. when switch acts as client for password authentication
  487. when switch acts as client for publickey authentication
  488. when switch acts as client and first-time authentication is not supported
  489. Table Of Contents
  490. chapter 1 file system management configuration
  491. directory operations
  492. flash memory operations
  493. file system configuration example
  494. file attribute configuration
  495. booting with the startup file
  496. configuring file attributes
  497. Table of Contents
  498. Table Of Contents
  499. chapter 1 ftp and sftp configuration
  500. introduction to sftp
  501. ftp configuration: a switch operating as an ftp server
  502. configuration example: a switch operating as an ftp server
  503. ftp banner display configuration example
  504. sftp configuration
  505. sftp configuration: a switch operating as an sftp server
  506. sftp configuration: a switch operating as an sftp client
  507. sftp configuration example
  508. chapter 2 tftp configuration
  509. tftp configuration
  510. tftp configuration example
  511. Table of Contents
  512. Table Of Contents
  513. chapter 1 information center
  514. system information format
  515. information center configuration
  516. configuring to display the time stamp with the utc time zone
  517. setting to output system information to the console
  518. setting to output system information to a monitor terminal
  519. setting to output system information to a log host
  520. setting to output system information to the trap buffer
  521. setting to output system information to the log buffer
  522. setting to output system information to the snmp nms
  523. information center configuration examples
  524. log output to a linux log host
  525. log output to the console
  526. Table of Contents
  527. Table Of Contents
  528. chapter 1 boot rom and host software loading
  529. boot menu
  530. loading by xmodem through console port
  531. loading by tftp through ethernet port
  532. loading by ftp through ethernet port
  533. remote boot rom and software loading
  534. remote loading using tftp
  535. basic system configuration
  536. displaying the system status
  537. debugging the system
  538. displaying debugging status
  539. chapter 3 network connectivity test
  540. chapter 4 device management
  541. rebooting the ethernet switch
  542. configuring real-time monitoring of the running status of the system
  543. loading hot patch
  544. displaying pluggable transceiver information
  545. displaying the device management configuration
  546. Table of Contents
  547. Table Of Contents
  548. chapter 1 vlan-vpn configuration
  549. implementation of vlan-vpn
  550. inner-to-outer tag priority replicating and mapping
  551. enabling the vlan-vpn feature for a port
  552. configuring the inner-to-outer tag priority replicating and mapping feature
  553. displaying and maintaining vlan-vpn configuration
  554. chapter 2 selective qinq configuration
  555. mac address replicating
  556. selective qinq configuration
  557. selective qinq configuration example
  558. chapter 3 bpdu tunnel configuration
  559. bpdu tunnel configuration
  560. configuring a bpdu tunnel
  561. displaying and maintaining bpdu tunnel configuration
  562. Table of Contents
  563. Table Of Contents
  564. chapter 1 hwping configuration
  565. test types supported by hwping
  566. hwping configuration
  567. displaying hwping configuration
  568. dhcp test
  569. ftp test
  570. http test
  571. jitter test
  572. snmp test
  573. tcp test (tcpprivate test) on the specified ports
  574. udp test (udpprivate test) on the specified ports
  575. dns test
  576. Table of Contents
  577. Table Of Contents
  578. chapter 1 ipv6 configuration
  579. introduction to ipv6 address
  580. introduction to ipv6 neighbor discovery protocol
  581. introduction to ipv6 dns
  582. configuring an ipv6 unicast address
  583. configuring ipv6 ndp
  584. configuring a static ipv6 route
  585. configuring the hop limit of icmpv6 reply packets
  586. configuring ipv6 dns
  587. displaying and maintaining ipv
  588. ipv6 configuration example
  589. chapter 2 ipv6 application configuration
  590. ipv6 traceroute
  591. ipv6 tftp
  592. ipv6 application configuration example
  593. troubleshooting ipv6 application
  594. unable to run traceroute
  595. Table Of Contents
  596. chapter 1 dns configuration
  597. configuring domain name resolution
  598. displaying and maintaining dns
  599. dynamic domain name resolution configuration example
  600. troubleshooting dns
  601. Table of Contents
  602. Table Of Contents
  603. chapter 1 smart link configuration
  604. operating mechanism of smart link
  605. configuring smart link
  606. configuring associated devices
  607. displaying and maintaining smart link
  608. chapter 2 monitor link configuration
  609. how monitor link works
  610. configuring monitor link
  611. configuring the uplink port
  612. displaying monitor link configuration
  613. monitor link configuration example
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Network Router
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Network Router
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Network Router
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Switch
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Ethernet switch
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Switch
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Switch
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Switch
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Switch
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Switch
S3100-52P first page preview

S3100-52P

Brand: H3C | Category: Switch
H3C categories
More H3C categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine