H3C S5510 Series manuals
S5510 Series
Table of contents
- dhcp configuration examples
- Chapter 1 DHCP Functions Overview
- Configuration Guide
- Configuring the DHCP Relay Agent
- Configuring DHCP Snooping
- Chapter 2 Configuration Examples
- Network Diagram
- DHCP Relay Agent/Snooping Configuration Examples
- Configuration Procedure
- Precautions
- Chapter 3 Related Documents
- Table of Contents
- Table Of Contents
- chapter 1 qacl overview
- network environment
- time-based acl plus rate limiting plus traffic policing configuration example
- configuration example of traffic measurement plus port redirection
- configuration example of local traffic mirroring
- other functions referencing acl rules
- configuration example of web cache redirection
- Table Of Contents
- x configuration example
- chapter 1 802.1x overview
- chapter 2 802.1x configuration commands
- authentication configuration example
- configuring the switch
- chapter 3 enterprise network access authentication configuration example
- configuring the radius server
- configuring the supplicant system
- verifying configuration
- Table of Contents
- Table Of Contents
- ssh configuration example
- introduction to ssh
- ssh configuration
- ssh configuration commands
- configuration commands
- configuring an h3c switch as an ssh client
- chapter 3 ssh configuration example
- when the switch acts as an ssh server and the authentication type is rsa
- when the switch acts as an ssh client and the authentication type is password
- when the switch acts as an ssh client and the authentication type is rsa
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 routing overview
- configuration task list
- rip configuration
- ospf configuration
- bgp configuration
- route policy configuration
- configuration examples
- rip configuration examples
- dr configuration example
- ospf virtual link configuration examples
- bgp confederation configuration example
- bgp route reflector configuration example
- bgp path selection configuration example
- enable ospf
- chapter 3 comprehensive configuration example
- devices used for networking
- software version
- rip, static route, and routing policy configuration example
- bgp and igp interaction configuration example
- route backup configuration example
- bgp med attribute configuration example
- verifying the configuration
- verifying the route backup configuration
- verifying the med attribute configuration
- Table of Contents
- Table Of Contents
- chapter 1 multicast protocol overview
- support of multicast features
- configuring igmp snooping
- configuring igmp
- configuring pim
- configuring msdp
- pim-sm plus igmp plus igmp snooping configuration examples
- igmp snooping-only configuration examples
- msdp configuration examples
- vlan configuration examples
- configuring basic vlan settings
- configuring basic settings of a vlan interface
- protocol vlan configuration
- vlan configuration example
- voice vlan configuration examples
- configuring voice vlan
- Table Of Contents
- qinq configuration examples
- chapter 1 qinq overview
- configuring qinq
- configuring selective qinq
- qinq configuration example
- reserved protocol type values
- Table of Contents
- Table Of Contents
- chapter 1 arp attack prevention overview
- arp attack prevention
- ip static binding
- arp packet rate limit
- configuring arp attack prevention
- device models that supports arp attack prevention
- configuration example for arp attack prevention in dhcp snooping mode
- configuration considerations
- configuration guidelines
- configuration example for arp attack prevention in authentication mode
S5510 Series
Table of contents
- Chapter 1 Basic Configurations
- Configuring the Device Name
- Configuring a Banner
- Configuring CLI Hotkeys
- Configuring User Levels and Command Levels
- Displaying and Maintaining Basic Configurations
- CLI Features
- Online Help with Command Lines
- Display Features
- Command Line Error Information
- Edit Features
- Chapter 2 System Maintaining and Debugging
- Introduction to System Debugging
- System Maintaining and Debugging
- System Debugging
- System Maintaining Example
- Chapter 3 Device Management
- Specifying a Boot ROM File for the Next Device Boot
- Upgrading Boot ROM
- Clearing the 16-bit Interface Indexes Not Used in the Current System
- Identifying and Diagnosing Pluggable Transceivers
- Displaying and Maintaining Device Management Configuration
S5510 Series
Table of contents
S5510 Series
Table of contents
- Chapter 1 Cluster Management Configuration
- Roles in a Cluster
- How a Cluster Works
- Cluster Configuration Task List
- Configuring the Management Device
- Enabling NTDP Globally and for Specific Ports
- Configuring NTDP Parameters
- Establishing a Cluster
- Devices Within a Cluster
- Configuring the Member Devices
- Enabling the Cluster Function
- Adding a Candidate Device to a Cluster
- Configuring Advanced Cluster Functions
- Configuring Interaction for a Cluster
- Displaying and Maintaining Cluster Management
- Cluster Management Configuration Examples
S5510 Series
Table of contents
- Chapter 1 Basic Configurations
- Display Features
- Command Line Error Information
- CLI Views
- Basic Configurations
- Configuring Device Name
- Configuring Welcome Information
- Configuring CLI Hotkeys
- Configuring User Levels and Command Levels
- Displaying System Configuration Information and Running Information
- Displaying System Statistics
- Chapter 2 System Maintaining and Debugging
- Introduction to System Debugging
- System Maintaining and Debugging
- System Debugging
- Chapter 3 Device Management
- Introduction to Loading Approaches
- Remote Software Loading
- Device Management Configuration
- Upgrading a BootROM File
- Displaying and Maintaining Device Management Configuration
- Remote Upgrade Configuration Example
S5510 Series
Table of contents
- Table Of Contents
- logging into an ethernet switch
- Chapter 1 Logging into an Ethernet Switch
- Chapter 2 Logging in Through the Console Port
- Console Port Login Configuration
- Console Port Login Configurations for Different Authentication Modes
- Console Port Login Configuration with Authentication Mode Being None
- Configuration Example
- Console Port Login Configuration with Authentication Mode Being Password
- Console Port Login Configuration with Authentication Mode Being Scheme
- Chapter 3 Logging in Through Telnet
- Telnet Configurations for Different Authentication Modes
- Telnet Configuration with Authentication Mode Being None
- Telnet Configuration with Authentication Mode Being Password
- Telnet Configuration with Authentication Mode Being Scheme
- Telnet Connection Establishment
- Telneting to Another Switch from the Current Switch
- Chapter 4 Logging in Using Modem
- Switch Configuration
- Modem Connection Establishment
- Chapter 5 Logging in Through Web-based Network Management System
- Web Server Shutdown/Startup
- Chapter 6 Logging in Through NMS
- Connection Establishment Using NMS
- Chapter 7 Controlling Login Users
- Controlling Telnet Users by Source and Destination IP Addresses
- Controlling Telnet Users by Source MAC Addresses
- Prerequisites
- Controlling Web Users by Source IP Address
- Controlling Web Users by Source IP Addresses
S5510 Series
Table of contents
- Table Of Contents
- introduction to aaa
- introduction to isp domain
- introduction to hwtacacs
- configuration tasks
- aaa configuration
- configuration prerequisites
- configuring the attributes of a local user
- cutting down user connections forcibly
- radius configuration
- configuring the supported radius server type
- configuring the attributes for data to be sent to radius servers
- configuring the timers of radius servers
- hwtacacs configuration
- configuring hwtacacs authentication servers
- configuring hwtacacs authorization servers
- configuring the attributes for data to be sent to tacacs servers
- configuring the timers of tacacs servers
- Local Authentication, Authorization and Accounting for FTP/Telnet of Users
- TACACS Authentication/Authorization and Accounting of Telnet Users
- users
- Troubleshooting AAA & RADIUS & HWTACACS Configuration
- Troubleshooting the HWTACACS Protocol
S5510 Series
Table of contents
- Chapter 1 SSH Configuration
- Asymmetric Key Algorithm
- Configuring the Device as an SSH Server
- Configuring RSA and DSA Keys
- Configuring a Client Public Key
- Configuring an SSH User
- Setting the SSH Management Parameters
- Configuring the Device as an SSH Client
- Establishing a Connection Between the SSH Client and the Server
- SSH Server Configuration Examples
- When Using Publickey Authentication
- SSH Client Configuration Examples
- Chapter 2 SFTP Service
- Configuring the SFTP Connection Idle Timeout Period
- Establishing a Connection to the SFTP Server
- Working with SFTP Files
- Displaying Help Information
- Terminating the Connection to the Remote SFTP Server
S5510 Series
Table of contents
S5510 Series
Table of contents
- Table Of Contents
- Chapter 1 Basic Configuration Commands
- clock summer-time one-off
- clock summer-time repeating
- clock timezone
- command-privilege
- display clipboard
- display clock
- display current-configuration
- display diagnostic-information
- display hotkey
- display this
- display version
- header
- hotkey
- quit
- super
- super password
- sysname
- system-view
- Chapter 2 System Maintaining and Debugging Commands
- ping ipv6
- tracert
- tracert ipv6
- System Debugging Commands
- display debugging
- Chapter 3 Device Management Commands
- bootrom
- display boot-loader
- display device manuinfo
- display fan
- display power
- display reboot-type
- display transceiver alarm interface
- display transceiver diagnosis interface
- display transceiver interface
- display transceiver manuinfo interface
- reboot
- reset unused porttag
- schedule reboot delay
- shutdown-interval
S5510 Series
Table of contents
- Chapter 1 RRPP Configuration
- RRPP Packets
- Typical RRPP Networking
- How RRPP Works
- Protocols and Standards
- Configuring Master Node
- Master Node Configuration Example
- Transit Node Configuration Example
- Configuring Edge Node
- Edge Node Configuration Example
- Assistant Edge Node Configuration Example
- Displaying and Maintaining RRPP
- Configuring Single-Domain Intersecting Ring Topology
- Configuring Multi-Domain Intersecting Ring Topology
S5510 Series
Table of contents
- Chapter 1 SSL Configuration
- SSL Configuration Task List
- SSL Server Policy Configuration Example
- Configuring an SSL Client Policy
- Configuration Procedure
- Chapter 2 HTTPS Configuration
- Associating the HTTPS Service with an SSL Server Policy
- Associating the HTTPS Service with a Certificate Attribute Access Control Policy
- Associating the HTTPS Service with an ACL
- HTTPS Configuration Example
S5510 Series
Table of contents
- Chapter 1 Link Aggregation Overview
- Approaches to Link Aggregation
- Static LACP link aggregation
- Load Sharing in a Link Aggregation Group
- Service Loop Group
- Aggregation Port Group
- Chapter 2 Link Aggregation Configuration
- Configuring a Static LACP Link Aggregation Group
- Configuring an Aggregation Group Name
- Entering Aggregation Port Group View
- Link Aggregation Configuration Example
S5510 Series
Table of contents
- Table Of Contents
- configuration commands
- Chapter 1 AAA & RADIUS & HWTACACS Configuration Commands
- accounting default
- accounting lan-access
- accounting login
- access-limit
- attribute
- authentication default
- authentication lan-access
- authentication login
- authorization command
- authorization default
- authorization lan-access
- authorization login
- cut connection
- display connection
- display domain
- display local-user
- domain
- domain default
- idle-cut
- level
- local-user
- local-user password-display-mode
- self-service-url
- service-type
- service-type ftp
- state
- data-flow-format
- display local-server statistics
- display radius
- display radius statistics
- display stop-accounting-buffer
- local-server
- local-server nas-ip
- nas-ip
- primary accounting
- primary authentication
- radius client
- radius nas-ip
- radius scheme
- radius trap
- reset radius statistics
- reset stop-accounting-buffer
- retry
- retry realtime-accounting
- retry stop-accounting
- secondary accounting
- secondary authentication
- server-type
- stop-accounting-buffer enable
- timer quiet
- timer realtime-accounting
- timer response-timeout
- user-name-format
- display hwtacacs
- hwtacacs nas-ip
- hwtacacs scheme
- primary authorization
- secondary authorization
S5510 Series
Table of contents
S5510 Series
Table of contents
- cluster management overview
- roles in a cluster
- how a cluster works
- configuring a cluster
- configuring the management device
- enabling ntdp globally and for specific ports
- enabling the cluster function
- Configuring Member Management
- configuring topology management
- configuring cluster parameters
- configuring interaction for a cluster
- configuring the member devices
- cluster management configuration example
S5510 Series
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Chapter 1 Multicast Overview
- Roles in Multicast
- Advantages and Applications of Multicast
- Framework of Multicast
- Multicast Addresses
- Multicast Protocols
- Multicast Packets Forwarding Mechanism
- Chapter 2 IGMP Snooping Configuration
- Work Mechanism of IGMP Snooping
- Processing of Multicast Protocol Messages
- Configuring Basic Functions of IGMP Snooping
- Enabling IGMP Snooping
- Configuring Port Aging Timers
- Configuring IGMP Snooping Port Functions
- Configuring Simulated Joining
- Enabling the Fast Leave Feature
- Configuring IGMP Report Suppression
- Configuring IGMP-Related Functions
- Configuring IGMP Timers
- Configuring Source IP Address of IGMP Queries
- Configuring a Multicast Group Policy
- Configuring Maximum Multicast Groups that Can Pass Ports
- Configuring Multicast Group Replacement
- Displaying and Maintaining IGMP Snooping
- IGMP Snooping Configuration Examples
- Static Router Port Configuration
- Troubleshooting IGMP Snooping Configuration
- Configured Multicast Group Policy Fails to Take Effect
- Chapter 3 MLD Snooping Configuration
- Work Mechanism of MLD Snooping
- MLD Snooping Configuration Tasks
- Configuring Basic Functions of MLD Snooping
- Configuring MLD Snooping Port Functions
- Configuring the Fast Leave Feature
- Configuring MLD Report Suppression
- Enabling MLD Snooping Querier
- Configuring Source IPv6 Addresses of MLD Queries
- Configuring IPv6 Multicast Group Replacement
- Displaying and Maintaining MLD Snooping
- MLD Snooping Configuration Examples
- Troubleshooting MLD Snooping
- Configured IPv6 Multicast Group Policy Fails to Take Effect
- Chapter 4 Multicast VLAN Configuration
- Displaying Multicast VLAN
- Multicast VLAN Configuration Example
- Chapter 5 IGMP Configuration
- Enhancements Provided by IGMPv2
- Enhancements Provided by IGMPv3
- Related Specifications
- Configuring Basic Functions of IGMP
- Configuring IGMP Versions
- Adjusting IGMP Performance
- Configure IGMP Fast Leave
- IGMP Configuration Example
- Troubleshooting IGMP
- Inconsistent Memberships on Routers on the Same Subnet
- Chapter 6 PIM Configuration
- How PIM-DM Works
- Introduction to PIM-SM
- How PIM-SM Works
- Introduction to BSR Admin-scope Regions in PIM-SM
- SSM Model Implementation in PIM
- Enabling PIM-DM
- Configuring State Refresh Parameters
- Configuring PIM-SM
- Configuration Prerequisites
- Enabling PIM-SM
- Configuring a BSR
- Configuring an RP
- Configuring PIM-SM Register Messages
- Configuring RPT-to-SPT Switchover
- Configuring the Range of PIM-SSM Multicast Groups
- Configuring PIM Common Information
- Configuring a PIM Filter
- Configuring PIM Common Timers
- Configuring Join/Prune Message Limits
- Displaying and Maintaining PIM
- PIM Configuration Examples
- PIM-SM Configuration Example
- PIM-SSM Configuration Example
- Troubleshooting PIM Configuration
- Multicast Data Abnormally Terminated on an Intermediate Router
- No Unicast Route Between BSR and C-RPs in PIM-SM
- Chapter 7 MSDP Configuration
- Operation Mechanism of MSDP
- MSDP-Related Specifications
- Configuring Basic Functions of MSDP
- Enabling MSDP
- Configuring an MSDP Peer Connection
- Configuring an MSDP Mesh Group
- Configuring MSDP Peer Connection Control
- Configuring SA Request Messages
- Configuring SA Message Cache
- Displaying and Maintaining MSDP
- Example of Anycast RP Application Configuration
- Static RPF Peer Configuration Example
- Troubleshooting MSDP
- Inter-RP Communication Faults in Anycast RP Application
- Chapter 8 Multicast Policy Configuration
- How a Multicast Policy Works
- Configuration Tasks
- Enabling IP Multicast Routing
- Configuring a Multicast Route Match Policy
- Configuring Multicast Forwarding Table Size
- Displaying and Debugging a Multicast Policy
- Configuration Example
- Troubleshooting Multicast Policies
- Multicast Data Fails to Reach Receivers
S5510 Series
Table of contents
- Chapter 1 File System Management Configuration
- Directory Operations
- Storage Device Operations
- File System Prompt Mode Setting
- Configuration File Management
- Saving the Current Configuration
- Erasing the Startup Configuration File
- Specifying a Configuration File for Next Startup
- Displaying and Maintaining Device Configuration
- Chapter 2 FTP Configuration
- Configuring the FTP Client
- FTP Client Configuration Example
- Configuring the FTP Server
- Configuring Authentication and Authorization for Accessing FTP Server
- FTP Server Configuration Example
- Displaying and Maintaining FTP
- Chapter 3 TFTP Configuration
- Configuring the TFTP Client
- Displaying and Maintaining the TFTP Client
S5510 Series
Table of contents
- about this manual
- Table Of Contents
- Table Of Contents
- Chapter 1 Product Overview
- S5510-24P-AC/S5510-24P-DC Ethernet Switch
- Rear Panel
- S5510-24F-AC/S5510-24F-DC Ethernet Switch
- Technical Specifications of S5510 Series
- Chapter 2 Installation Preparation
- Cleanness
- Laser Safety
- Chapter 3 Installing the Switch
- Desk Mounting
- Installing Power Module
- Connecting the Power Cord and the Ground Wire
- Connecting the DC-Input Power Cord
- Connecting the Ground Wire
- Multi-power Input
- Connecting the Switch to a Console Terminal
- Verifying Installation
- Chapter 4 Starting up the Switch at the Initial Boot
- Booting the Switch
- Chapter 5 Loading Boot ROM and Host Software
- Loading Software from Console Port Using XModem
- Loading Software from an Ethernet Port Using TFTP
- Loading Software from an Ethernet Port Using FTP
- Loading Software Remotely
- Loading Software Remotely Using FTP
- Loading Software Remotely Using TFTP
- Chapter 6 Maintenance and Troubleshooting
- Recovering the Boot ROM Password
- appendix a lightning protection of the switch
Related products
S5500-SI SeriesS5500-EI seriesS5560-EI seriesS5560-HI SeriesS3610 Seriess5800 seriess5820x seriesS5120-SI SeriesS5820V2 seriesS5830V2 seriesH3C categories
Switch
Network Router
Network Hardware
IP Access Controllers
Firewall
Control Unit
Wireless Access Point
Server
Gateway
Wireless Router
manualsdatabase
Your AI-powered manual search engine