Manuals database logo
manualsdatabase
Your AI-powered manual search engine

H3C S5100-26C-PWR-EI manuals

S5100-26C-PWR-EI first page preview

S5100-26C-PWR-EI

Brand: H3C | Category: Switch
Table of contents
  1. About This Manual
  2. Table Of Contents
  3. Table Of Contents
  4. Product Overview
  5. chapter 1 obtaining the documentation
  6. software release notes
  7. software version
  8. chapter 3 product overview
  9. system features of the s5100 series
  10. system features of the s5100-ei series
  11. chapter 4 networking applications
  12. access layer devices
  13. Table of Contents
  14. Login
  15. Table Of Contents
  16. logging in to an ethernet switch
  17. relationship between a user and a user interface
  18. common user interface configuration
  19. chapter 2 logging in through the console port
  20. console port login configuration
  21. console port login configurations for different authentication modes
  22. console port login configuration with authentication mode being none
  23. console port login configuration with authentication mode being password
  24. console port login configuration with authentication mode being scheme
  25. configuration example
  26. chapter 3 logging in through telnet
  27. common configuration to control telnet access
  28. telnet configuration with authentication mode being none
  29. telnet configuration with authentication mode being password
  30. telnet configuration with authentication mode being scheme
  31. telnetting to a switch
  32. telnetting to another switch from the current switch
  33. configuration on the switch side
  34. switch configuration
  35. modem connection establishment
  36. introduction to the cli
  37. Configuration File
  38. switching user level
  39. cli views
  40. VLAN
  41. cli features
  42. terminal display
  43. command history
  44. command edit
  45. establishing an http connection
  46. configuring the login banner
  47. enabling/disabling the web server
  48. connection establishment using nms
  49. configuring source ip address for telnet service packets
  50. displaying source ip address configuration
  51. chapter 9 user control
  52. controlling telnet users
  53. controlling network management users by source ip addresses
  54. controlling web users by source ip address
  55. logging out a web user
  56. Table Of Contents
  57. introduction to configuration file
  58. configuration task list
  59. erasing the startup configuration file
  60. specifying a configuration file for next startup
  61. displaying switch configuration
  62. Table of Contents
  63. Table Of Contents
  64. vlan overview
  65. vlan fundamentals
  66. vlan interface
  67. vlan classification
  68. assigning an ethernet port to specified vlans
  69. protocol-based vlan
  70. encapsulation format of ethernet data
  71. procedure for the switch to judge packet protocol
  72. implementation of protocol-based vlan
  73. vlan configuration
  74. basic vlan interface configuration
  75. displaying vlan configuration
  76. configuring the link type of an ethernet port
  77. configuring the default vlan for a port
  78. displaying and maintaining port-based vlan
  79. configuring a protocol-based vlan
  80. associating a port with a protocol-based vlan
  81. displaying protocol-based vlan configuration
  82. Table Of Contents
  83. management vlan
  84. default route
  85. displaying and maintaining management vlan configuration
  86. Table of Contents
  87. Voice VLAN
  88. voice vlan overview
  89. how s5100-ei series switches identify voice traffic
  90. setting the voice traffic transmission priority
  91. support for voice vlan on various ports
  92. voice vlan configuration
  93. configuring the voice vlan to operate in automatic voice vlan assignment mode
  94. configuring the voice vlan to operate in manual voice vlan assignment mode
  95. displaying and maintaining voice vlan
  96. voice vlan configuration example
  97. voice vlan configuration example (manual mode)
  98. GVRP
  99. chapter 1 gvrp configuration
  100. protocol specifications
  101. configuring gvrp timers
  102. configuring gvrp port registration mode
  103. displaying and maintaining gvrp
  104. Port Basic Configuration
  105. ethernet port configuration
  106. initially configuring a port
  107. configuring port auto-negotiation speed
  108. limiting traffic on individual ports
  109. duplicating the configuration of a port to other ports
  110. configuring loopback detection for an ethernet port
  111. Link Aggregation
  112. configuring the interval to perform statistical analysis on port traffic
  113. disabling up/down log output on a port
  114. configuring a port group
  115. displaying and maintaining basic port configuration
  116. Table of Contents
  117. Table Of Contents
  118. introduction to link aggregation
  119. link aggregation classification
  120. manual aggregation group
  121. dynamic lacp aggregation group
  122. aggregation group categories
  123. link aggregation configuration
  124. configuring a static lacp aggregation group
  125. configuring a dynamic lacp aggregation group
  126. configuring a description for an aggregation group
  127. displaying and maintaining link aggregation configuration
  128. Port Isolation
  129. port isolation overview
  130. port isolation configuration example
  131. Port Security-Port Binding
  132. port security overview
  133. port security modes
  134. port security configuration task list
  135. setting the maximum number of mac addresses allowed on a port
  136. setting the port security mode
  137. configuring port security features
  138. ignoring the authorization information from the radius server
  139. displaying and maintaining port security configuration
  140. port security configuration example
  141. port binding overview
  142. displaying and maintaining port binding configuration
  143. DLDP
  144. chapter 1 dldp configuration
  145. dldp fundamentals
  146. dldp configuration
  147. resetting dldp state
  148. displaying and maintaining dldp
  149. MAC Address Table
  150. introduction to mac address table
  151. managing mac address table
  152. configuring mac address table management
  153. setting the aging time of mac address entries
  154. disabling mac address learning for a vlan
  155. displaying mac address table information
  156. Table of Contents
  157. MSTP
  158. Table Of Contents
  159. stp overview
  160. mstp overview
  161. basic mstp terminologies
  162. principle of mstp
  163. mstp implementation on switches
  164. configuring an mst region
  165. specifying the current switch as a root bridge/secondary root bridge
  166. configuring the bridge priority of the current switch
  167. configuring the maximum hop count of an mst region
  168. configuring the network diameter of the switched network
  169. configuring the mstp time-related parameters
  170. configuring the timeout time factor
  171. configuring the current port as an edge port
  172. specifying whether the link connected to a port is point-to-point link
  173. enabling mstp
  174. configuring leaf nodes
  175. configuring the mst region
  176. configuring a port as an edge port
  177. configuring port priority
  178. performing mcheck operation
  179. configuring guard functions
  180. configuring bpdu guard
  181. configuring root guard
  182. configuring loop guard
  183. configuring digest snooping
  184. configuring rapid transition
  185. configuring vlan-vpn tunnel
  186. stp maintenance configuration
  187. displaying and maintaining mstp
  188. mstp configuration example
  189. vlan-vpn tunnel configuration example
  190. Table of Contents
  191. Table Of Contents
  192. Table Of Contents
  193. chapter 1 802.1x configuration
  194. the mechanism of an 802.1x authentication system
  195. encapsulation of eapol messages
  196. x authentication procedure
  197. timers used in 802.1x
  198. x implementation on an s5100-si/ei series switch
  199. introduction to 802.1x configuration
  200. basic 802.1x configuration
  201. MAC Address
  202. advanced 802.1x configuration
  203. configuring proxy checking
  204. configuring client version checking
  205. configuring guest vlan
  206. configuring 802.1x re-authentication
  207. x configuration example
  208. chapter 2 quick ead deployment configuration
  209. configuring quick ead deployment
  210. displaying and maintaining quick ead deployment
  211. troubleshooting
  212. introduction to habp
  213. habp client configuration
  214. chapter 4 system-guard configuration
  215. displaying and maintaining system-guard
  216. Table of Contents
  217. Table Of Contents
  218. Table Of Contents
  219. introduction to aaa
  220. introduction to aaa services
  221. introduction to hwtacacs
  222. aaa configuration task list
  223. creating an isp domain and configuring its attributes
  224. configuring an aaa scheme for an isp domain
  225. configuring dynamic vlan assignment
  226. configuring the attributes of a local user
  227. cutting down user connections forcibly
  228. radius configuration task list
  229. IP Address and
  230. creating a radius scheme
  231. configuring radius accounting servers
  232. configuring shared keys for radius messages
  233. configuring the type of radius servers to be supported
  234. configuring the status of radius servers
  235. configuring the attributes of data to be sent to radius servers
  236. configuring the local radius server
  237. configuring timers for radius servers
  238. enabling sending trap message when a radius server goes down
  239. hwtacacs configuration task list
  240. configuring tacacs authentication servers
  241. configuring tacacs accounting servers
  242. configuring shared keys for hwtacacs messages
  243. configuring the attributes of data to be sent to tacacs servers
  244. aaa configuration examples
  245. local authentication of ftp/telnet users
  246. hwtacacs authentication and authorization of telnet users
  247. troubleshooting aaa
  248. troubleshooting hwtacacs configuration
  249. introduction to ead
  250. ead configuration
  251. ead configuration example
  252. Table Of Contents
  253. mac address authentication overview
  254. related concepts
  255. configuring basic mac address authentication functions
  256. mac address authentication enhanced function configuration
  257. configuring the maximum number of mac address authentication users allowed to access a port
  258. displaying and maintaining mac address authentication configuration
  259. Table of Contents
  260. Table Of Contents
  261. ip addressing overview
  262. special ip addresses
  263. subnetting and masking
  264. DHCP
  265. displaying ip addressing configuration
  266. ip address configuration example ii
  267. ip performance overview
  268. configuring tcp attributes
  269. displaying and maintaining ip performance optimization configuration
  270. Table of Contents
  271. Table Of Contents
  272. introduction to dhcp
  273. dhcp ip address assignment
  274. dhcp packet format
  275. protocol specification
  276. dhcp snooping overview
  277. introduction to dhcp-snooping option
  278. introduction to ip filtering
  279. configuring dhcp snooping
  280. configuring dhcp snooping to support option
  281. configuring ip filtering
  282. displaying dhcp snooping configuration
  283. ip filtering configuration example
  284. introduction to dhcp client
  285. configuring a dhcp/bootp client
  286. displaying dhcp/bootp client configuration
  287. bootp client configuration example
  288. Table of Contents
  289. Table Of Contents
  290. acl overview
  291. ways to apply an acl on a switch
  292. types of acls supported by s5100 series ethernet switches
  293. acl configuration
  294. configuring basic acl
  295. configuring advanced acl
  296. configuring layer 2 acl
  297. acl assignment
  298. assigning an acl to a vlan
  299. assigning an acl to a port group
  300. displaying acl configuration
  301. example for upper-layer software referencing acls
  302. basic acl configuration example
  303. advanced acl configuration example
  304. layer 2 acl configuration example
  305. example for applying an acl to a vlan
  306. Table of Contents
  307. Table Of Contents
  308. Table Of Contents
  309. introduction to qos
  310. major traffic control technologies
  311. qos features supported by the s5100 series ethernet switches
  312. traffic classification
  313. priority trust mode
  314. priority marking
  315. line rate
  316. flow-based traffic accounting
  317. qos configuration
  318. configuring priority mapping
  319. setting the priority of protocol packets
  320. configuring priority marking
  321. configuring traffic policing
  322. configuring traffic shaping
  323. configuring line rate
  324. configuring traffic redirecting
  325. configuring vlan mapping
  326. configuring queue scheduling
  327. configuring traffic accounting
  328. configuring traffic mirroring
  329. displaying and maintaining qos
  330. qos configuration examples
  331. priority marking and queue scheduling configuration example
  332. vlan mapping configuration example
  333. vlan tag
  334. traffic mirroring and traffic redirecting configuration example
  335. chapter 2 qos profile configuration
  336. qos profile configuration
  337. applying a qos profile
  338. displaying and maintaining qos profile configuration
  339. qos profile configuration example
  340. Table of Contents
  341. Table Of Contents
  342. mirroring overview
  343. local port mirroring
  344. QoS-QoS Profile
  345. configuring local port mirroring
  346. configuring remote port mirroring
  347. configuring mac-based mirroring
  348. configuring vlan-based mirroring
  349. displaying port mirroring
  350. mirroring configuration examples
  351. remote port mirroring configuration example
  352. Table Of Contents
  353. chapter 1 arp configuration
  354. arp table
  355. arp process
  356. introduction to gratuitous arp
  357. configuring arp attack detection
  358. configuring gratuitous arp
  359. displaying and debugging arp
  360. arp configuration examples
  361. Table of Contents
  362. Stack-Cluster
  363. chapter 1 stack
  364. creating a stack
  365. switching to slave switch view
  366. slave switch configuration
  367. stack configuration example
  368. cluster overview
  369. roles in a cluster
  370. how a cluster works
  371. cluster configuration tasks
  372. configuring member devices
  373. managing a cluster through the management device
  374. configuring the enhanced cluster features
  375. displaying and maintaining cluster configuration
  376. cluster configuration example
  377. enhanced cluster feature configuration example
  378. Table of Contents
  379. SNMP-RMON
  380. snmp overview
  381. snmp versions
  382. configuring basic snmp functions
  383. configuring trap-related functions
  384. enabling logging for network management
  385. displaying snmp
  386. introduction to rmon
  387. commonly used rmon groups
  388. Multicast
  389. displaying rmon
  390. Table of Contents
  391. Table Of Contents
  392. Table Of Contents
  393. multicast overview
  394. information transmission in the broadcast mode
  395. roles in multicast
  396. multicast models
  397. multicast architecture
  398. multicast protocols
  399. multicast packet forwarding mechanism
  400. rpf check
  401. igmp snooping overview
  402. basic concepts in igmp snooping
  403. work mechanism of igmp snooping
  404. igmp snooping configuration
  405. enabling igmp snooping
  406. configuring timers
  407. configuring a multicast group filter
  408. configuring the maximum number of multicast groups on a port
  409. configuring igmp querier
  410. suppressing flooding of unknown multicast traffic in a vlan
  411. configuring a static router port
  412. configuring a port as a simulated group member
  413. configuring a vlan tag for query messages
  414. configuring multicast vlan
  415. displaying and maintaining igmp snooping
  416. igmp snooping configuration examples
  417. troubleshooting igmp snooping
  418. common multicast configuration
  419. configuring dropping unknown multicast packets
  420. Table of Contents
  421. Table Of Contents
  422. introduction to ntp
  423. implementation principle of ntp
  424. ntp implementation modes
  425. ntp configuration task list
  426. configuring ntp implementation modes
  427. configuring the ntp symmetric peer mode
  428. configuring access control right
  429. configuring ntp authentication
  430. configuration prerequisites
  431. configuration procedure
  432. configuring optional ntp parameters
  433. displaying ntp configuration
  434. configuration examples
  435. configuring ntp symmetric peer mode
  436. configuring ntp broadcast mode
  437. configuring ntp multicast mode
  438. configuring ntp server/client mode with authentication
  439. Table of Contents
  440. Table Of Contents
  441. ssh overview
  442. ssh operating process
  443. ssh server and client
  444. configuring the ssh server
  445. configuring the user interfaces for ssh clients
  446. configuring the ssh management functions
  447. configuring the ssh server to be compatible with ssh1 clients
  448. creating an ssh user and specifying an authentication type
  449. specifying a service type for an ssh user on the server
  450. configuring the public key of a client on the server
  451. assigning a public key to an ssh user
  452. exporting the host public key to a file
  453. configuring the ssh client
  454. configuring an ssh client assumed by an ssh2-capable switch
  455. displaying and maintaining ssh configuration
  456. ssh configuration examples
  457. when switch acts as server for password and radius authentication
  458. when switch acts as server for password and hwtacacs authentication
  459. when switch acts as server for publickey authentication
  460. when switch acts as client for password authentication
  461. when switch acts as client for publickey authentication
  462. when switch acts as client and first-time authentication is not supported
  463. File System Management
  464. file system configuration
  465. file operations
  466. flash memory operations
  467. prompt mode configuration
  468. file attribute configuration
  469. configuring file attributes
  470. Table of Contents
  471. FTP-SFTP-TFTP
  472. introduction to ftp and sftp
  473. ftp configuration
  474. ftp configuration: a switch operating as an ftp server
  475. configuration example: a switch operating as an ftp server
  476. ftp banner display configuration example
  477. sftp configuration
  478. sftp configuration: a switch operating as an sftp server
  479. sftp configuration: a switch operating as an sftp client
  480. sftp configuration example
  481. introduction to tftp
  482. tftp configuration
  483. tftp configuration example
  484. Table of Contents
  485. Information Center
  486. information center overview
  487. system information format
  488. System Maintenance and
  489. information center configuration
  490. configuring to display the time stamp with the utc time zone
  491. setting to output system information to a monitor terminal
  492. setting to output system information to a log host
  493. setting to output system information to the trap buffer
  494. setting to output system information to the log buffer
  495. setting to output system information to the snmp nms
  496. displaying and maintaining information center
  497. log output to a linux log host
  498. log output to the console
  499. Table of Contents
  500. Table Of Contents
  501. introduction to loading approaches
  502. boot menu
  503. loading by xmodem through console port
  504. loading by tftp through ethernet port
  505. loading by ftp through ethernet port
  506. remote boot rom and software loading
  507. remote loading using tftp
  508. basic system configuration
  509. displaying the system status
  510. displaying debugging status
  511. network connectivity test
  512. introduction to device management
  513. scheduling a reboot on the switch
  514. specifying the app to be used at reboot
  515. identifying and diagnosing pluggable transceivers
  516. displaying the device management configuration
  517. Table of Contents
  518. VLAN-VPN
  519. chapter 1 vlan-vpn configuration
  520. implementation of vlan-vpn
  521. vlan-vpn configuration
  522. tpid adjusting configuration
  523. displaying vlan-vpn configuration
  524. selective qinq overview
  525. selective qinq configuration
  526. configuring the inner-to-outer tag priority mapping feature
  527. selective qinq configuration example
  528. Table of Contents
  529. HWPing
  530. chapter 1 hwping configuration
  531. test types supported by hwping
  532. hwping configuration
  533. displaying hwping configuration
  534. dhcp test
  535. ftp test
  536. http test
  537. jitter test
  538. snmp test
  539. tcp test (tcpprivate test) on the specified ports
  540. udp test (udpprivate test) on the specified ports
  541. dns test
  542. Table Of Contents
  543. dns overview
  544. configuring domain name resolution
  545. displaying and maintaining dns
  546. dynamic domain name resolution configuration example
  547. troubleshooting dns
  548. Table of Contents
  549. Smart Link-Monitor Link
  550. smart link overview
  551. operating mechanism of smart link
  552. configuring smart link
  553. configuring associated devices
  554. smart link configuration example
  555. introduction to monitor link
  556. how monitor link works
  557. configuring monitor link
  558. configuring the uplink port
  559. displaying monitor link configuration
  560. monitor link configuration example
  561. Table of Contents
  562. IPv6 Management
  563. ipv6 overview
  564. introduction to ipv6 address
  565. introduction to ipv6 neighbor discovery protocol
  566. ipv6 configuration task list
  567. configuring an ipv6 unicast address
  568. configuring ipv6 ndp
  569. configuring a static ipv6 route
  570. configuring the hop limit of icmpv6 reply packets
  571. configuring ipv6 dns
  572. displaying and maintaining ipv
  573. ipv6 configuration example
  574. introduction to ipv6 application
  575. ipv6 traceroute
  576. ipv6 telnet
  577. ipv6 application configuration example
  578. troubleshooting ipv6 application
  579. unable to run traceroute
  580. Table of Contents
  581. PoE-PoE Profile
  582. poe overview
  583. poe configuration
  584. enabling the poe feature on a port
  585. setting the poe mode on a port
  586. configuring the pd compatibility detection function
  587. displaying poe configuration
  588. poe configuration example
  589. introduction to poe profile
  590. displaying poe profile configuration
  591. poe profile configuration example
  592. Appendix
S5100-26C-PWR-EI first page preview

S5100-26C-PWR-EI

Brand: H3C | Category: Switch
Table of contents
  1. about this manual
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Chapter 1 Product Overview
  7. S5100-8P-SI Ethernet Switch
  8. S5100-16P-SI
  9. S5100-16P-SI Ethernet Switch
  10. S5100-24P-SI
  11. S5100-24P-SI Ethernet Switch
  12. S5100-48P-SI Ethernet Switch
  13. S5100-8P-EI Ethernet Switch
  14. S5100-16P-EI Ethernet Switch
  15. S5100-24P-EI Ethernet Switch
  16. S5100-48P-EI
  17. S5100-48P-EI Ethernet Switch
  18. S5100-26C-EI Ethernet Switch
  19. S5100-50C-EI
  20. S5100-50C-EI Ethernet Switch
  21. S5100-8P-PWR-EI Ethernet Switch
  22. S5100-16P-PWR-EI
  23. S5100-16P-PWR-EI Ethernet Switch
  24. S5100-26C-PWR-EI
  25. S5100-26C-PWR-EI Ethernet Switch
  26. S5100-50C-PWR-EI Ethernet Switch
  27. LEDs
  28. Mode LED
  29. gigabit sfp port status led
  30. Gigabit SFP Port Status LED
  31. Module LED
  32. Segment Digitron Display
  33. System Features of the S5100 Series
  34. System Features of the S5100-EI Series
  35. Ordering SFP/XFP/XENPAK Interface Modules
  36. Ordering 10 G Stack Interface Modules
  37. Ordering Stack Cables
  38. Chapter 2 Preparing for Installation
  39. Cleanness
  40. Safety in Use of Laser
  41. Chapter 3 Installing the Switch
  42. Introduction to Mounting Ear
  43. S5100-48P-EI 50
  44. Introduction to Guide Rail
  45. Use Front Mounting Ears and a Tray
  46. Use Front and Rear Mounting Ears
  47. Use Front Mounting Ears and Guide Rails
  48. Desk Mounting
  49. Magnet Mounting
  50. Connecting Power Cord and Grounding Wire
  51. Connecting DC Power Cord
  52. Connecting Grounding Wire
  53. Connecting Console Cable
  54. Installing and Removing Optional Interface Modules
  55. Stack Module
  56. XENPAK Optical Module
  57. Installing and Removing Dedicated Stack Cables
  58. Verifying the Installation
  59. Chapter 4 Powering on the Switch for the First Time
  60. Booting the Switch
  61. Changing the Startup Mode
  62. Chapter 5 Boot ROM and Host Software Loading
  63. Boot Menu
  64. Loading Software Using XModem Through Console Port
  65. Loading Software Using TFTP through Ethernet Port
  66. Loading Software Using FTP Through Ethernet Port
  67. Remote Software Loading
  68. Remote Loading Using TFTP
  69. Chapter 6 Maintenance and Troubleshooting
  70. Missing Boot ROM Password
  71. appendix a lightning protection of the switch
Related products
S5100-26C-EIS5100-8P-PWR-EIS5100-50C-PWR-EIS5100-16P-PWR-EIS5600-26C-PWRS3100-26TP-PWR-EIFS5100-20MS-PWR-EIS5100-24P-EIFS5100-8S-PWR-EIS5130-28S-PWR-EI
H3C categories
More H3C categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine