H3C S5600-26C manuals
S5600-26C
Table of contents
- About This Manual
- Table Of Contents
- Table Of Contents
- Product Overview
- chapter 1 obtaining the documentation
- software release notes
- Login
- manual list
- switch models
- Configuration File Management
- GVRP
- chapter 4 networking applications
- application in large-scaled/campus networks
- Table Of Contents
- introduction to the cli
- command hierarchy
- modifying the command level
- switching user level
- cli views
- cli features
- command history
- error prompts
- command edit
- Table of Contents
- Table Of Contents
- Table Of Contents
- logging in to an ethernet switch
- user interface index
- logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- console port login configuration with authentication mode being none
- configuration example
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- chapter 3 logging in through telnet
- telnet configurations for different authentication modes
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- telnetting to another switch from the current switch
- configuration on the switch side
- switch configuration
- modem connection establishment
- establishing an http connection
- configuring the login banner
- enabling/disabling the web server
- connection establishment using nms
- configuring source ip address for telnet service packets
- displaying source ip address configuration
- chapter 8 user control
- controlling telnet users
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip address
- disconnecting a web user by force
- Table Of Contents
- introduction to configuration file
- configuration task list
- saving the current configuration
- erasing the startup configuration file
- specifying a configuration file for next startup
- displaying switch configuration
- Table of Contents
- Table Of Contents
- vlan overview
- vlan fundamentals
- vlan interface
- port-based vlan
- configuring the default vlan id for a port
- protocol-based vlan
- procedure for the switch to judge packet protocol
- implementation of protocol-based vlan
- vlan configuration
- basic vlan interface configuration
- displaying vlan configuration
- assigning an ethernet port to a vlan
- configuring the default vlan for a port
- configuring a protocol-based vlan
- associating a port with a protocol-based vlan
- displaying protocol-based vlan configuration
- Table of Contents
- Table Of Contents
- ip addressing overview
- special case ip addresses
- configuring ip addresses
- displaying ip addressing configuration
- ip address configuration examples
- ip performance overview
- configuring tcp attributes
- disabling icmp to send error packets
- displaying and maintaining ip performance configuration
- ip performance configuration example
- Table of Contents
- Table Of Contents
- voice vlan overview
- how s5600 series switches identify voice traffic
- setting the voice traffic transmission priority
- support for voice vlan on various ports
- voice vlan configuration
- configuring the voice vlan to operate in automatic voice vlan assignment mode
- configuring the voice vlan to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- voice vlan configuration example
- voice vlan configuration example (manual voice vlan assignment mode)
- Table Of Contents
- chapter 1 gvrp configuration
- protocol specifications
- configuring gvrp timers
- configuring gvrp port registration mode
- displaying and maintaining gvrp
- Table of Contents
- Table Of Contents
- ethernet port configuration
- configuring port auto-negotiation speed
- limiting traffic on individual ports
- enabling flow control on a port
- configuring loopback detection for an ethernet port
- enabling loopback test
- enabling the system to test connected cable
- configuring the interval to perform statistical analysis on port traffic
- configuring storm control on a port
- setting the port state change delay
- ethernet port configuration example
- troubleshooting ethernet port configuration
- Table of Contents
- Table Of Contents
- introduction to link aggregation
- link aggregation classification
- static lacp aggregation group
- dynamic lacp aggregation group
- aggregation group categories
- link aggregation configuration
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- configuring a description for an aggregation group
- displaying and maintaining link aggregation configuration
- Table Of Contents
- port isolation overview
- port isolation configuration example
- Table Of Contents
- port security overview
- port security modes
- port security configuration task list
- setting the maximum number of mac addresses allowed on a port
- setting the port security mode
- configuring port security features
- ignoring the authorization information from the radius server
- displaying and maintaining port security configuration
- port security configuration example
- port binding overview
- displaying and maintaining port binding configuration
- Table Of Contents
- chapter 1 dldp configuration
- dldp fundamentals
- dldp status
- dldp timers
- dldp operating mode
- dldp configuration
- resetting dldp state
- displaying and maintaining dldp
- MAC Address Table Management
- introduction to mac address table
- introduction to mac address learning
- managing mac address table
- configuring mac address table management
- configuring a mac address entry
- setting the mac address aging timer
- enabling destination mac address triggered update
- assigning mac addresses for ethernet ports
- displaying mac address table information
- Auto Detect
- introduction to the auto detect function
- auto detect basic configuration
- auto detect implementation in static routing
- auto detect implementation in vlan interface backup
- auto detect configuration examples
- configuration example for auto detect implementation in vrrp
- configuration example for auto detect implementation in vlan interface backup
- Table of Contents
- MSTP
- Table Of Contents
- stp overview
- mstp overview
- basic mstp terminologies
- principle of mstp
- mstp implementation on switches
- configuring root bridge
- configuring an mst region
- specifying the current switch as a root bridge/secondary root bridge
- configuring the bridge priority of the current switch
- configuring the maximum hop count of an mst region
- configuring the network diameter of the switched network
- configuring the mstp time-related parameters
- configuring the timeout time factor
- configuring the current port as an edge port
- specifying whether the link connected to a port is point-to-point link
- enabling mstp
- configuring leaf nodes
- configuring the mst region
- configuring port priority
- performing mcheck operation
- configuration prerequisites
- configuring guard functions
- configuring bpdu guard
- configuring loop guard
- configuring tc-bpdu attack guard
- configuring digest snooping
- configuring rapid transition
- configuring vlan-vpn tunnel
- stp maintenance configuration
- displaying and maintaining mstp
- vlan-vpn tunnel configuration example
- Table of Contents
- Routing Protocol
- Table Of Contents
- Multicast
- Table Of Contents
- introduction to ip route and routing table
- routing protocol overview
- routing protocols and routing priority
- load sharing and route backup
- displaying and maintaining a routing table
- introduction to static route
- default route
- displaying and maintaining static routes
- troubleshooting a static route
- rip overview
- rip startup and operation
- rip configuration task list
- configuring basic rip functions
- rip route control
- rip network adjustment and optimization
- displaying and maintaining rip configuration
- rip configuration example
- troubleshooting rip configuration
- ospf overview
- ospf route calculation
- ospf area partition and route summarization
- ospf network type
- ospf configuration task list
- basic ospf configuration
- ospf area attribute configuration
- ospf network type configuration
- configuring the network type of an ospf interface
- configuring an nbma/p2mp neighbor
- ospf route control
- configuring ospf to filter received routes
- configuring the ospf cost on an interface
- configuring ospf to redistribute external routes
- ospf network adjustment and optimization
- configuring the lsa transmission delay
- configuring ospf authentication
- configuring the mtu field in dd packets
- enabling ospf logging of neighbor state changes
- displaying and maintaining ospf configuration
- ospf configuration examples
- configuring ospf virtual link
- troubleshooting ospf configuration
- bgp overview
- bgp message type
- bgp route attributes
- bgp routing policy
- problems in large-scale bgp networks
- protocol standard
- bgp configuration task list
- configuring bgp multicast address family
- configuring the way to advertise/receive routing information
- configuring bgp route summarization
- enabling default route advertising
- configuring bgp route reception filtering policies
- disable bgp-igp route synchronization
- configuring bgp route dampening
- configuring bgp route attributes
- tuning and optimizing a bgp network
- configuring a large-scale bgp network
- configuring bgp community
- configuring bgp confederation
- displaying and maintaining bgp configuration
- resetting bgp connections
- bgp configuration examples
- configuring bgp path selection
- configure ospf
- troubleshooting bgp configuration
- ip routing policy overview
- ip routing policy configuration task list
- defining a routing policy
- defining if-match clauses and apply clauses
- ip-prefix configuration
- as path list configuration
- displaying ip routing policy
- controlling rip packet cost to implement dynamic route backup
- troubleshooting ip routing policy
- route capacity configuration overview
- route capacity limitation
- enabling/disabling automatic protocol recovery
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- multicast overview
- information transmission in the broadcast mode
- information transmission in the multicast mode
- roles in multicast
- advantages and applications of multicast
- multicast models
- multicast architecture
- multicast protocols
- multicast packet forwarding mechanism
- implementation of the rpf mechanism
- common multicast configuration
- enabling multicast routing
- configuring limit on the number of route entries
- configuring a multicast mac address entry
- configuring dropping unknown multicast packets
- tracing a multicast path
- igmp overview
- enhancements provided by igmpv
- igmp proxy
- configuring igmp
- configuring igmp version
- configuring options related to igmp query messages
- configuring the maximum allowed number of multicast groups
- configuring a multicast group filter
- configuring simulated joining
- configuring igmp proxy
- displaying and maintaining igmp
- pim overview
- introduction to pim-dm
- introduction to pim-sm
- how pim-sm works
- configuring pim-dm
- configuring pim-sm
- configuring an rp
- configuring a bsr
- filtering the registration packets from dr to rp
- disabling rpt-to-spt switchover
- configuring a multicast data filter
- configuring pim neighbors
- configuring multicast source lifetime
- displaying and maintaining pim
- pim-sm configuration example
- troubleshooting pim
- msdp overview
- how msdp works
- protocols and standards
- configuring msdp basic functions
- configuring connection between msdp peers
- configuring description information for msdp peers
- configuring sa message transmission
- configuring rp address in sa messages
- configuring sa message cache
- configuring a rule for filtering the multicast sources of sa messages
- configuring a rule for filtering received and forwarded sa messages
- displaying and maintaining msdp
- msdp configuration example
- troubleshooting msdp configuration
- no sa entry in the sa cache of the router
- igmp snooping overview
- basic concepts in igmp snooping
- work mechanism of igmp snooping
- configuring igmp snooping
- enabling igmp snooping
- configuring timers
- configuring fast leave processing
- configuring the maximum number of multicast groups on a port
- configuring igmp snooping querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring static member port for a multicast group
- configuring a static router port
- configuring a vlan tag for query messages
- configuring multicast vlan
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- troubleshooting igmp snooping
- Table of Contents
- Table Of Contents
- Table Of Contents
- chapter 1 802.1x configuration
- architecture of 802.1x authentication
- the mechanism of an 802.1x authentication system
- encapsulation of eapol messages
- x authentication procedure
- timers used in 802.1x
- x implementation on an s5600 series switch
- introduction to 802.1x configuration
- basic 802.1x configuration
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring client version checking
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- x configuration example
- chapter 2 quick ead deployment configuration
- configuring quick ead deployment
- displaying and maintaining quick ead deployment
- troubleshooting
- introduction to habp
- habp client configuration
- chapter 4 system guard configuration
- configuring system guard against tcn attacks
- enabling layer 3 error control
- Table of Contents
- Table Of Contents
- Table Of Contents
- introduction to aaa
- introduction to isp domain
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration task list
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- cutting down user connections forcibly
- radius configuration task list
- creating a radius scheme
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the maximum number of radius request transmission attempts
- configuring the status of radius servers
- configuring the attributes of data to be sent to radius servers
- configuring the local radius server
- configuring timers for radius servers
- enabling sending trap message when a radius server goes down
- enabling the user re-authentication at restart function
- hwtacacs configuration task list
- configuring tacacs authentication servers
- configuring tacacs accounting servers
- configuring shared keys for hwtacacs messages
- configuring the attributes of data to be sent to tacacs servers
- aaa configuration examples
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- troubleshooting aaa
- troubleshooting hwtacacs configuration
- introduction to ead
- ead configuration
- Web Authentication
- web authentication configuration
- displaying and maintaining web authentication
- MAC Address Authentication
- mac address authentication overview
- related concepts
- quiet mac address
- mac address authentication enhanced function configuration
- configuring the maximum number of mac address authentication users allowed to access a port
- displaying and maintaining mac address authentication configuration
- Table of Contents
- VRRP
- vrrp overview
- introduction to vrrp group
- virtual router overview
- vrrp timer
- vrrp tracking
- vrrp configuration
- configuring advanced vrrp functions
- displaying and maintaining vrrp
- vrrp configuration examples
- vrrp tracking interface configuration
- configure vlan
- multiple-vrrp group configuration
- port tracking configuration examples
- troubleshooting vrrp
- Table of Contents
- Table Of Contents
- chapter 1 arp configuration
- arp message format
- arp table
- arp process
- DHCP
- introduction to gratuitous arp
- configuring arp
- configuring arp attack detection
- configuring the arp packet rate limit function
- configuring gratuitous arp
- displaying and debugging arp
- arp attack detection and packet rate limit configuration example
- chapter 2 proxy arp configuration
- configuring proxy arp
- proxy arp configuration in port isolation application
- chapter 3 resilient arp configuration
- resilient arp configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- introduction to dhcp
- dhcp ip address assignment
- updating ip address lease
- dhcp packet format
- protocol specification
- introduction to dhcp server
- dhcp address pool
- dhcp ip address preferences
- irf support
- dhcp server configuration task list
- configuring the global address pool based dhcp server
- enabling the global address pool mode on interface(s)
- configuring an address allocation mode for the global address pool
- configuring gateways for the dhcp client
- configuring option 184 parameters for the client with voice service
- configuring the interface address pool based dhcp server
- enabling the interface address pool mode on interface(s)
- configuring an address allocation mode for an interface address pool
- configuring dhcp server security functions
- configuring ip address detecting
- introduction to dhcp accounting
- enabling the dhcp server to process option
- displaying and maintaining the dhcp server
- dhcp server configuration example
- dhcp server with option 184 support configuration example
- dhcp accounting configuration example
- troubleshooting a dhcp server
- introduction to dhcp relay agent
- option 82 support on dhcp relay agent
- configuring the dhcp relay agent
- correlating a dhcp server group with a relay agent interface
- configuring dhcp relay agent security functions
- configuring the dhcp relay agent to support option
- displaying and maintaining dhcp relay agent configuration
- dhcp relay agent configuration example
- troubleshooting dhcp relay agent configuration
- dhcp snooping overview
- introduction to dhcp-snooping option
- introduction to ip filtering
- configuring dhcp snooping
- configuring dhcp snooping to support option
- configuring ip filtering
- dhcp snooping configuration examples
- ip filtering configuration example
- displaying dhcp snooping configuration
- chapter 5 dhcp packet rate limit configuration
- configuring port state auto recovery
- rate limit configuration example
- introduction to dhcp client
- configuring a dhcp/bootp client
- dhcp client configuration example
- Table of Contents
- Table Of Contents
- acl overview
- acl matching order
- ways to apply an acl on a switch
- configuring time range
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- configuring user-defined acl
- applying acls on ports
- displaying and maintaining acl configuration
- example for controlling web login users by source ip
- basic acl configuration example
- advanced acl configuration example
- user-defined acl configuration example
- example for applying an acl to a vlan
- Table of Contents
- QoS-QoS Profile
- Table Of Contents
- introduction to qos
- traditional packet forwarding service
- major traffic control techniques
- qos supported by the s5600 series ethernet switches
- traffic classification
- protocol priority
- priority marking
- line rate
- flow-based traffic accounting
- traffic mirroring
- configuring the mapping between 802.1p priority and local precedence
- setting the priority of protocol packets
- marking packet priority
- configuring traffic policing
- configuring line rate
- configuring traffic redirecting
- configuring vlan mapping
- configuring queue scheduling
- configuring traffic accounting
- enabling the burst function
- IRF Fabric
- qos configuration examples
- configuration example of priority marking and queue scheduling
- vlan mapping configuration example
- configuring traffic mirroring and redirecting traffic to a port
- chapter 2 qos profile configuration
- configuring a qos profile
- applying a qos profile
- displaying and maintaining qos profile configuration
- qos profile configuration example
- Table Of Contents
- mirroring overview
- remote port mirroring
- mirroring configuration
- configuring remote port mirroring
- displaying and maintaining port mirroring
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- chapter 1 irf fabric configuration
- how irf works
- irf fabric configuration
- setting a unit id for a switch
- assigning a unit name to a switch
- displaying and maintaining irf fabric
- network requirements
- Cluster
- cluster overview
- roles in a cluster
- how a cluster works
- cluster configuration task list
- configuring member devices
- managing a cluster through the management device
- configuring the enhanced cluster features
- displaying and maintaining cluster configuration
- network management interface configuration example
- enhanced cluster feature configuration example
- Table of Contents
- PoE-PoE Profile
- poe overview
- poe features supported by s
- poe configuration
- setting the maximum output power on a port
- setting the poe mode on a port
- configuring poe over-temperature protection on the switch
- upgrading the pse processing software of fabric switches online
- displaying poe configuration
- introduction to poe profile
- displaying poe profile configuration
- UDP Helper
- introduction to udp helper
- configuring udp helper
- displaying and maintaining udp helper
- SNMP-RMON
- snmp overview
- snmp versions
- configuring basic snmp functions
- configuring trap-related functions
- configuring extended trap function
- enabling logging for network management
- displaying snmp
- introduction to rmon
- commonly used rmon groups
- rmon configuration
- displaying rmon
- Table of Contents
- Table Of Contents
- introduction to ntp
- implementation principle of ntp
- ntp implementation modes
- ntp configuration task list
- configuring ntp implementation modes
- configuring the ntp symmetric peer mode
- configuring access control right
- configuring ntp authentication
- configuring optional ntp parameters
- configuring an interface on the local switch to send ntp messages
- displaying ntp configuration
- configuration examples
- configuring ntp symmetric peer mode
- configuring ntp broadcast mode
- configuring ntp multicast mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- ssh overview
- algorithm and key
- ssh operating process
- ssh server and client configuration task list
- configuring the ssh server
- configuring the user interfaces for ssh clients
- configuring the ssh management functions
- configuring the ssh server to be compatible with ssh1 clients
- creating an ssh user and specifying an authentication type
- specifying a service type for an ssh user
- configuring the public key of a client on the server
- assigning a public key to an ssh user
- configuring the ssh client
- configuring an ssh client that runs ssh client software
- configuring an ssh client assumed by an ssh2-capable switch
- displaying and maintaining ssh configuration
- ssh configuration examples
- when switch acts as server for password and radius authentication
- when switch acts as server for password and hwtacacs authentication
- when switch acts as server for publickey authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- when switch acts as client and first-time authentication is not supported
- Table of Contents
- File System Management
- file system configuration
- directory operations
- file operations
- flash memory operations
- file system configuration examples
- file attribute configuration
- booting with the startup file
- configuring file attributes
- configuration file backup and restoration
- Table of Contents
- Table Of Contents
- introduction to ftp and sftp
- ftp configuration
- ftp configuration: a switch operating as an ftp server
- configuration example: a switch operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: a switch operating as an sftp client
- sftp configuration example
- introduction to tftp
- tftp configuration
- tftp configuration example
- Table of Contents
- Table Of Contents
- information center overview
- system information format
- information center configuration
- configuring synchronous information output
- setting to output system information to the console
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the trap buffer
- setting to output system information to the snmp nms
- displaying and maintaining information center
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- introduction to loading approaches
- local boot rom and software loading
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using ftp
- remote loading using tftp
- basic system configuration
- displaying the system status
- displaying debugging status
- network connectivity test
- introduction to device management
- rebooting the ethernet switch
- configuring real-time monitoring of the running status of the system
- upgrading the host software in the fabric
- identifying and diagnosing pluggable transceivers
- displaying the device management configuration
- Table of Contents
- Table Of Contents
- chapter 1 vlan-vpn configuration
- implementation of vlan-vpn
- vlan-vpn configuration
- displaying and maintaining vlan-vpn configuration
- selective qinq overview
- mac address replicating
- selective qinq configuration
- selective qinq configuration example
- bpdu tunnel overview
- bpdu tunnel configuration
- configuring a bpdu tunnel
- bpdu tunnel configuration example
- Table of Contents
- Table Of Contents
- chapter 1 hwping configuration
- test types supported by hwping
- hwping configuration
- displaying hwping configuration
- dhcp test
- ftp test
- http test
- jitter test
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table of Contents
- Table Of Contents
- ipv6 overview
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- ipv6 configuration task list
- configuring an ipv6 unicast address
- configuring ipv6 ndp
- configuring a static ipv6 route
- configuring the hop limit of icmpv6 reply packets
- configuring ipv6 dns
- displaying and maintaining ipv
- ipv6 configuration example
- introduction to ipv6 application
- ipv6 traceroute
- ipv6 telnet
- ipv6 application configuration example
- troubleshooting ipv6 application
- unable to run traceroute
- Table Of Contents
- dns overview
- dynamic domain name resolution
- configuring domain name resolution
- displaying and maintaining dns
- dynamic domain name resolution configuration example
- troubleshooting dns
- Table of Contents
- Table Of Contents
- smart link overview
- configuring smart link
- configuring a smart link device
- configuring associated devices
- smart link configuration example
- introduction to monitor link
- how monitor link works
- configuring monitor link
- configuring the uplink port
- displaying monitor link configuration
- monitor link configuration example
- Table Of Contents
- access management overview
- configuring access management
- access management configuration example
- combining access management with port isolation
S5600-26C
Table of contents
- Table of Contents
- Table Of Contents
- about this document
- new features
- command conventions
- related documentation
- documentation feedback
- product overview
- application in large-scaled/campus networks
- Table of Contents
- Table Of Contents
- cli configuration
- entering cli through the console port
- entering cli through telnet
- h3c products cli descriptions
- cli view description
- tips on using the cli
- command line error information
- typing and editing commands
- undo form of a command
- cli configurations
- configuring command levels
- saving configurations
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- logging in to an ethernet switch
- user interface index
- logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- configuration example
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- logging in through telnet/ssh
- telnet configurations for different authentication modes
- telnet configuration with authentication mode being none
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- telnetting to a switch
- telnetting to another switch from the current switch
- modem configuration
- switch configuration
- management system
- configuring the login banner
- enabling/disabling the web server
- logging in through nms
- configuring source ip address for telnet service packets
- displaying source ip address configuration
- user control
- controlling telnet users by source ip addresses
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip address
- disconnecting a web user by force
- switching user level
- adopting super password authentication for user level switching
- adopting hwtacacs authentication for user level switching
- configuration examples
- Table of Contents
- Table Of Contents
- configuration file management
- configuration task list
- erasing the startup configuration file
- displaying switch configuration
- Table of Contents
- Table Of Contents
- vlan overview
- advantages of vlans
- vlan interface
- assigning an ethernet port to specified vlans
- protocol-based vlan
- procedure for the switch to judge packet protocol
- implementation of protocol-based vlan
- vlan configuration
- basic vlan interface configuration
- displaying vlan configuration
- assigning an ethernet port to a vlan
- displaying and maintaining port-based vlan
- network diagram
- configuring a protocol-based vlan
- associating a port with a protocol-based vlan
- displaying protocol-based vlan configuration
- Table of Contents
- Table Of Contents
- ip addressing overview
- special case ip addresses
- configuring ip addresses
- displaying ip addressing configuration
- ip address configuration example ii
- ip performance configuration
- configuring tcp attributes
- disabling icmp to send error packets
- canceling the system-defined acls for icmp attack guard
- ip performance configuration example
- Table of Contents
- Table Of Contents
- voice vlan configuration
- how s5600 series switches identify voice traffic
- setting the voice traffic transmission priority
- security mode of voice vlan
- configuring the voice vlan to operate in automatic voice vlan assignment mode
- configuring the voice vlan to operate in manual voice vlan assignment mode
- displaying and maintaining voice vlan
- voice vlan configuration example
- voice vlan configuration example (manual voice vlan assignment mode)
- Table of Contents
- Table Of Contents
- gvrp configuration
- protocol specifications
- configuring gvrp timers
- displaying and maintaining gvrp
- gvrp configuration example
- Table of Contents
- Table Of Contents
- ethernet port configuration
- configuring port auto-negotiation speed
- limiting traffic on individual ports
- duplicating the configuration of a port to other ports
- enabling loopback test
- enabling the system to test connected cable
- enabling giant-frame statistics function
- configuring storm control on a port
- setting the port state change delay
- ethernet port configuration example
- troubleshooting ethernet port configuration
- Table of Contents
- Table Of Contents
- link aggregation configuration
- operational key
- link aggregation classification
- static lacp aggregation group
- dynamic lacp aggregation group
- configuring a manual aggregation group
- configuring a static lacp aggregation group
- configuring a dynamic lacp aggregation group
- link aggregation configuration example
- Table Of Contents
- port isolation configuration
- port isolation configuration example
- Table Of Contents
- port security overview
- port security modes
- port security features
- port security configuration task list
- setting the maximum number of secure mac addresses allowed on a port
- setting the port security mode
- configuring port security features
- configuring guest vlan for a port in macaddressoruserloginsecure mode
- ignoring the authorization information from the radius server
- displaying and maintaining port security configuration
- port security mode macaddresswithradius configuration example
- port security mode userloginwithoui configuration example
- port security mode macaddresselseuserloginsecureext configuration example
- port security mode macaddressanduserloginsecureext configuration example
- guest vlan configuration example
- port binding configuration
- displaying and maintaining port binding configuration
- Table of Contents
- Table Of Contents
- dldp configuration
- dldp fundamentals
- performing basic dldp configuration
- resetting dldp state
- dldp configuration example
- Table of Contents
- Table Of Contents
- mac address table management
- managing mac address table
- configuring mac address table management
- configuring a mac address entry
- setting the mac address aging timer
- enabling destination mac address triggered update
- displaying mac address table information
- Table of Contents
- Table Of Contents
- auto detect configuration
- auto detect basic configuration
- auto detect implementation in vrrp
- auto detect implementation in vlan interface backup
- auto detect configuration examples
- configuration example for auto detect implementation with vlan interface backup
- Table of Contents
- Table Of Contents
- Table Of Contents
- mstp configuration
- rapid spanning tree protocol overview
- multiple spanning tree protocol overview
- mstp implementation on switches
- protocols and standards
- configuring an mst region
- specifying the current switch as a root bridge/secondary root bridge
- configuring the bridge priority of the current switch
- configuring the mstp operation mode
- configuring the network diameter of the switched network
- configuring the mstp time-related parameters
- configuring the current port as an edge port
- configuring leaf nodes
- configuring a port as an edge port
- configuring port priority
- performing mcheck operation
- configuring bpdu guard
- configuring root guard
- configuring loop guard
- configuring tc-bpdu attack guard
- configuring bpdu dropping
- configuring digest snooping
- mstp maintenance configuration
- displaying and maintaining mstp
- vlan-vpn tunnel configuration example
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- ip routing protocol overview
- routing protocol overview
- routing protocols and routing priority
- displaying and maintaining a routing table
- static route configuration
- default route
- static route configuration example
- troubleshooting a static route
- rip configuration
- rip configuration task list
- basic rip configuration
- rip route control
- configuring rip route control
- rip network adjustment and optimization
- displaying and maintaining rip configuration
- troubleshooting rip configuration
- ospf configuration
- basic ospf concepts
- ospf area partition and route summarization
- ospf network type
- ospf configuration task list
- basic ospf configuration
- ospf area attribute configuration
- configuring ospf area attributes
- configuring the network type of an ospf interface
- configuring the dr priority on an ospf interface
- configuring ospf route summarization
- configuring the ospf cost on an interface
- configuring ospf to redistribute external routes
- configuring ospf timers
- configuring the lsa transmission delay
- configuring ospf authentication
- configuring ospf network management
- displaying and maintaining ospf configuration
- ospf configuration examples
- configuring ospf virtual link
- troubleshooting ospf configuration
- unable to learn a complete network topology
- bgp configuration
- bgp message type
- bgp route attributes
- bgp routing policy
- protocol standard
- bgp configuration task list
- configuring bgp multicast address family
- configuring the way to advertise/receive routing information
- configuring bgp route summarization
- enabling default route advertising
- configuring bgp route reception filtering policies
- configuring bgp route dampening
- configuring bgp route attributes
- configuring a large-scale bgp network
- configuring bgp peer group
- configuring bgp community
- configuring bgp confederation
- displaying and maintaining bgp configuration
- clearing bgp information
- network requirements
- configuring bgp path selection
- configure ospf
- troubleshooting bgp configuration
- ip routing policy configuration
- ip routing policy configuration task list
- routing policy configuration
- defining if-match clauses and apply clauses
- ip-prefix configuration
- community list configuration
- controlling rip packet cost to implement dynamic route backup
- troubleshooting ip routing policy
- route capacity configuration
- route capacity limitation configuration
- displaying and maintaining route capacity limitation configuration
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- multicast overview
- information transmission in the broadcast mode
- information transmission in the multicast mode
- common notations in multicast
- multicast models
- multicast architecture
- multicast protocols
- multicast packet forwarding mechanism
- implementation of the rpf mechanism
- common multicast configuration
- enabling multicast routing
- configuring suppression on the multicast source port
- configuring a multicast mac address entry
- tracing a multicast path
- igmp configuration
- enhancements provided by igmpv
- igmp proxy
- configuring igmp
- configuring igmp version
- configuring the maximum allowed number of multicast groups
- configuring simulated joining
- configuring igmp proxy
- displaying and maintaining igmp
- pim configuration
- introduction to pim-dm
- introduction to pim-sm
- configuring pim-dm
- configuring an rp
- configuring a bsr
- filtering the registration packets from dr to rp
- configuring common pim parameters
- configuring the hello interval
- configuring multicast source lifetime
- displaying and maintaining pim
- pim configuration examples
- verifying the configuration
- pim-sm configuration example
- troubleshooting pim
- msdp overview
- how msdp works
- configuring connection between msdp peers
- configuring an msdp mesh group
- configuring msdp peer connection control
- configuring rp address in sa messages
- configuring sa message cache
- configuring a rule for filtering the multicast sources of sa messages
- displaying and maintaining msdp
- msdp configuration example
- troubleshooting msdp configuration
- no sa entry in the sa cache of the router
- igmp snooping configuration
- basic concepts in igmp snooping
- work mechanism of igmp snooping
- configuring igmp snooping
- configuring the version of igmp snooping
- configuring fast leave processing
- configuring a multicast group filter
- configuring the maximum number of multicast groups on a port
- configuring igmp snooping querier
- suppressing flooding of unknown multicast traffic in a vlan
- configuring a static router port
- disabling a port from becoming a router port
- configuring a vlan tag for query messages
- configuring multicast vlan
- displaying and maintaining igmp snooping
- igmp snooping configuration examples
- troubleshooting igmp snooping
- Table of Contents
- Table Of Contents
- Table Of Contents
- x configuration
- architecture of 802.1x authentication
- the mechanism of an 802.1x authentication system
- encapsulation of eapol messages
- x authentication procedure
- timers used in 802.1x
- x implementation on an s5600 series switch
- introduction to 802.1x configuration
- basic 802.1x configuration
- timer and maximum user number configuration
- advanced 802.1x configuration
- configuring proxy checking
- configuring the unicast trigger function
- enabling dhcp-triggered authentication
- configuring 802.1x re-authentication
- displaying and maintaining 802.1x configuration
- quick ead deployment configuration
- configuring quick ead deployment
- displaying and maintaining quick ead deployment
- troubleshooting
- habp configuration
- habp client configuration
- system guard configuration
- configuring system guard
- displaying and maintaining system guard configuration
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa overview
- introduction to isp domain
- introduction to aaa services
- introduction to hwtacacs
- aaa configuration
- creating an isp domain and configuring its attributes
- configuring an aaa scheme for an isp domain
- configuring dynamic vlan assignment
- configuring the attributes of a local user
- cutting down user connections forcibly
- radius configuration task list
- creating a radius scheme
- configuring radius authentication/authorization servers
- configuring ignorance of assigned radius authorization attributes
- configuring radius accounting servers
- configuring shared keys for radius messages
- configuring the maximum number of radius request transmission attempts
- configuring the status of radius servers
- configuring the local radius server
- enabling sending trap message when a radius server goes down
- enabling the user re-authentication at restart function
- creating a hwtacacs scheme
- configuring tacacs authentication servers
- configuring tacacs accounting servers
- configuring shared keys for hwtacacs messages
- configuring the timers regarding tacacs servers
- displaying and maintaining aaa configuration
- aaa configuration examples
- remote radius authentication of telnet/ssh users
- local authentication of ftp/telnet users
- hwtacacs authentication and authorization of telnet users
- auto vlan configuration example
- troubleshooting aaa
- troubleshooting hwtacacs configuration
- ead configuration
- ead configuration example
- Table of Contents
- Table Of Contents
- web authentication configuration
- configuring web authentication
- configuring https access for web authentication
- customizing web authentication pages
- customizing authentication pages
- displaying and maintaining web authentication
- Table of Contents
- Table Of Contents
- mac address authentication configuration
- related concepts
- configuring basic mac address authentication functions
- configuring a guest vlan
- displaying and maintaining mac address authentication configuration
- Table of Contents
- Table Of Contents
- vrrp configuration
- introduction to vrrp group
- virtual router overview
- vrrp timer
- operation procedure of vrrp
- periodical sending of arp packets in a vrrp group
- configuring advanced vrrp functions
- displaying and maintaining vrrp
- vrrp configuration examples
- vrrp tracking interface configuration
- multiple-vrrp group configuration
- port tracking configuration examples
- troubleshooting vrrp
- Table of Contents
- Table Of Contents
- Table Of Contents
- arp configuration
- arp table
- introduction to gratuitous arp
- configuring arp
- displaying and debugging arp
- arp attack defense configuration
- introduction to arp packet rate limit
- configuring arp attack defense
- configuring the maximum number of dynamic arp entries that a vlan interface can learn
- configuring arp attack detection
- configuring the arp packet rate limit function
- arp attack defense configuration example
- arp attack defense configuration example ii
- arp attack defense configuration example iv
- configuration procedures
- proxy arp overview
- local proxy arp
- configuring proxy arp
- local proxy arp configuration in port isolation application
- resilient arp configuration
- resilient arp configuration example
- basic concepts of mff
- how mff works
- enabling mff
- specifying the ip addresses of servers
- configuring network port
- displaying mff configuration
- troubleshooting mff configuration
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- dhcp overview
- dhcp ip address assignment
- updating ip address lease
- protocol specification
- dhcp server configuration
- dhcp ip address preferences
- dhcp server configuration task list
- configuring the global address pool based dhcp server
- creating a dhcp global address pool
- configuring gateways for the dhcp client
- configuring the interface address pool based dhcp server
- enabling the interface address pool mode on interface(s)
- configuring an address allocation mode for an interface address pool
- configuring option 184 parameters for the client with voice service
- enabling unauthorized dhcp server detection
- configuring dhcp accounting functions
- displaying and maintaining the dhcp server
- dhcp server configuration examples
- dhcp server with option 184 support configuration example
- dhcp accounting configuration example
- troubleshooting a dhcp server
- dhcp relay agent configuration
- option 82 support on dhcp relay agent
- dhcp inform message handling feature used in irf system
- configuring the dhcp relay agent
- correlating a dhcp server group with a relay agent interface
- configuring dhcp relay agent security functions
- configuring the dhcp relay agent to support option 82
- configuring dhcp inform message handling feature used in irf system
- dhcp relay agent configuration example
- dhcp snooping configuration
- introduction to dhcp-snooping option
- introduction to ip filtering
- configuring dhcp snooping
- configuring ip filtering
- displaying and maintaining dhcp snooping configuration
- ip filtering configuration example
- dhcp packet rate limit configuration
- rate limit configuration example
- introduction to dhcp client
- dhcp client configuration example
- bootp client configuration example
- Table of Contents
- Table Of Contents
- acl configuration
- acl matching order
- ways to apply an acl on a switch
- acl configuration task list
- configuring basic acl
- configuring advanced acl
- configuring layer 2 acl
- configuring user-defined acl
- configuring ipv6 acl
- applying acl rules on ports
- displaying and maintaining acl configuration
- example for controlling web login users by source ip
- basic acl configuration example
- advanced acl configuration example
- user-defined acl configuration example
- ipv6 acl configuration example
- example for applying an acl to a vlan
- Table of Contents
- Table Of Contents
- Table Of Contents
- qos configuration
- major traffic control techniques
- qos supported by the s5600 series ethernet switches
- introduction to qos functions
- protocol priority
- line rate
- flow-based traffic accounting
- configuring the mapping between 802.1p priority and local precedence
- setting the priority of protocol packets
- configuring traffic policing
- configuring line rate
- configuring vlan mapping
- configuring queue scheduling
- configuring traffic accounting
- configuring traffic mirroring
- displaying and maintaining qos
- qos configuration examples
- configuration example of priority marking and queue scheduling
- vlan mapping configuration example
- configuring traffic mirroring and redirecting traffic to a port
- qos profile configuration
- qos profile configuration task list
- applying a qos profile
- displaying and maintaining qos profile configuration
- Table of Contents
- Table Of Contents
- mirroring configuration
- remote port mirroring
- port mirroring – stp collaboration overview
- configuring local port mirroring
- configuring remote port mirroring
- displaying and maintaining port mirroring
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- irf fabric configuration
- establishment of an irf fabric
- how irf works
- irf fabric configuration task list
- setting a unit id for a switch
- assigning a unit name to a switch
- displaying and maintaining irf fabric
- irf fabric configuration example
- Table of Contents
- Table Of Contents
- cluster overview
- roles in a cluster
- how a cluster works
- cluster configuration task list
- cluster configuration
- configuring member devices
- managing a cluster through the management device
- configuring the cluster synchronization function
- displaying and maintaining cluster configuration
- network management interface configuration example
- enhanced cluster feature configuration example
- Table of Contents
- Table Of Contents
- poe configuration
- poe configuration task list
- enabling the poe feature on a port
- setting the maximum output power on a port
- setting the poe mode on a port
- upgrading the pse processing software online
- upgrading the pse processing software of fabric switches online
- poe profile configuration
- displaying poe profile configuration
- poe profile configuration example
- Table of Contents
- Table Of Contents
- udp helper configuration
- configuring udp helper
- displaying and maintaining udp helper
- Table Of Contents
- snmp configuration
- supported mibs
- configuring basic snmp functions
- configuring trap-related functions
- enabling logging for network management
- snmp configuration example
- rmon configuration
- commonly used rmon groups
- rmon configuration example
- Table of Contents
- Table Of Contents
- ntp configuration
- implementation principle of ntp
- ntp implementation modes
- configuring ntp implementation modes
- configuring the ntp symmetric peer mode
- configuring ntp multicast mode
- configuring access control right
- configuring ntp authentication
- configuring optional ntp parameters
- disabling an interface from receiving ntp messages
- configuring ntp symmetric peer mode
- configuring ntp broadcast mode
- configuring ntp server/client mode with authentication
- Table of Contents
- Table Of Contents
- ssh configuration
- ssh operating process
- ssh server and client
- configuring the ssh server
- configuring the user interfaces for ssh clients
- configuring the ssh management functions
- configuring the ssh server to be compatible with ssh1 clients
- creating an ssh user and specifying an authentication type
- specifying a service type for an ssh user on the server
- configuring the public key of a client on the server
- exporting the host public key to a file
- configuring the ssh client
- configuring an ssh client assumed by an ssh2-capable switch
- displaying and maintaining ssh configuration
- comparison of ssh commands with the same functions
- ssh configuration examples
- when switch acts as server for password and radius authentication
- when switch acts as server for password and hwtacacs authentication
- when switch acts as server for publickey authentication
- when switch acts as client for password authentication
- when switch acts as client for publickey authentication
- when switch acts as client and first-time authentication is not supported
- Table of Contents
- Table Of Contents
- file system management configuration
- directory operations
- flash memory operations
- prompt mode configuration
- file attribute configuration
- booting with the startup file
- configuration file backup and restoration
- file backup and restoration
- Table of Contents
- Table Of Contents
- introduction to ftp
- introduction to sftp
- configuration example: a switch operating as an ftp server
- ftp banner display configuration example
- sftp configuration
- sftp configuration: a switch operating as an sftp client
- sftp configuration example
- tftp configuration
- tftp configuration: a switch operating as a tftp client
- tftp configuration example
- Table of Contents
- Table Of Contents
- information center overview
- system information format
- information center configuration task list
- setting to output system information to the console
- setting to output system information to a monitor terminal
- setting to output system information to a log host
- setting to output system information to the trap buffer
- setting to output system information to the log buffer
- displaying and maintaining information center
- log output to a linux log host
- log output to the console
- Table of Contents
- Table Of Contents
- Table Of Contents
- boot rom and host software loading
- boot menu
- loading by xmodem through console port
- loading by tftp through ethernet port
- loading by ftp through ethernet port
- remote boot rom and software loading
- remote loading using tftp
- basic system configuration
- displaying the system status
- displaying debugging status
- network connectivity test
- device management
- scheduling a reboot on the switch
- upgrading the boot rom
- loading hot patch
- identifying and diagnosing pluggable transceivers
- displaying the device management configuration
- remote switch app upgrade configuration example
- scheduled task configuration
- scheduled task configuration example
- Table of Contents
- Table Of Contents
- implementation of vlan-vpn
- vlan-vpn configuration task list
- enabling transparent igmp message transmission on a vlan-vpn port
- vlan-vpn configuration example
- selective qinq configuration
- mac address replicating
- selective qinq configuration task list
- enabling the inter-vlan mac address replicating feature
- bpdu tunnel configuration
- configuring a bpdu tunnel
- displaying and maintaining bpdu tunnel configuration
- bpdu tunnel configuration example
- Table of Contents
- Table Of Contents
- hwping configuration
- test types supported by hwping
- hwping server configuration
- hwping client configuration
- displaying hwping configuration
- dhcp test
- ftp test
- http test
- jitter test
- snmp test
- tcp test (tcpprivate test) on the specified ports
- udp test (udpprivate test) on the specified ports
- dns test
- Table of Contents
- Table Of Contents
- ipv6 configuration
- introduction to ipv6 address
- introduction to ipv6 neighbor discovery protocol
- introduction to ipv6 dns
- configuring an ipv6 unicast address
- configuring ipv6 ndp
- configuring a static ipv6 route
- configuring ipv6 tcp properties
- configuring ipv6 dns
- displaying and maintaining ipv
- ipv6 configuration example
- ipv6 application configuration
- ipv6 traceroute
- ipv6 telnet
- ipv6 applications
- troubleshooting ipv6 application
- Table of Contents
- Table Of Contents
- dns configuration
- configuring static domain name resolution
- displaying and maintaining dns
- dynamic domain name resolution configuration example
- troubleshooting dns
- Table of Contents
- Table Of Contents
- smart link configuration
- operating mechanism of smart link
- configuring a smart link device
- configuring associated devices
- displaying and maintaining smart link
- monitor link configuration
- how monitor link works
- configuring monitor link
- configuring a downlink port
- displaying monitor link configuration
- Table of Contents
- Table Of Contents
- access management configuration
- configuring access management
- access management configuration example
- combining access management with port isolation
- Table of Contents
- Table Of Contents
- lldp configuration
- basic concepts
- operating modes of lldp
- how lldp works
- enabling lldp
- enabling lldp polling
- setting other lldp parameters
- setting an encapsulation format for lldpdus
- configuring lldp trapping
- displaying and maintaining lldp
- cdp-compatible lldp configuration example
- Table of Contents
- Table Of Contents
- introduction to pki
- architecture of pki
- applications of pki
- pki configuration task list
- configuring a pki domain
- submitting a pki certificate request
- submitting a certificate request in manual mode
- retrieving a certificate manually
- configuring pki certificate verification
- destroying a local rsa key pair
- configuring an access control policy
- pki configuration examples
- requesting a certificate from a ca running windows 2003 server
- troubleshooting pki
- failed to retrieve crls
- Table of Contents
- Table Of Contents
- ssl configuration
- ssl configuration task list
- configuration prerequisites
- ssl server policy configuration example
- configuring an ssl client policy
- troubleshooting ssl
- Table Of Contents
- https configuration
- associating the https service with an ssl server policy
- associating the https service with a certificate attribute access control policy
- https configuration example
S5600-26C
Table of contents
- about this manual
- Table Of Contents
- Table Of Contents
- Chapter 1 Product Overview
- S5600-26C/S5600-26C-PWR/S5600-26F Ethernet Switch
- Rear Panel
- S5600-50C/S5600-50C-PWR Ethernet Switch
- Power system
- Attributes of 1000 Mbps SFP port
- Expansion Module
- S5600 Series Technical Specifications
- Chapter 2 Preparing for Installation
- Cleanness
- Laser Safety
- Chapter 3 Installing the Switch
- Introduction to guide rail
- Use front mounting ears and a tray
- Use front and rear mounting ears
- Use front mounting ears and guide rails
- Mounting the Switch on a Tabletop/Workbench
- Installing/Removing the Power Module
- Connecting the Power Cord and the Ground Wire
- Connecting the DC-Input Power Cord
- Connecting the Ground Wire
- Connecting the Switch to a Console Terminal
- Installing/Removing the Stack Cable
- Removing the Stack Cable
- Verifying Installation
- Chapter 4 Starting up the Switch at the Initial Boot
- Booting the Switch
- Chapter 5 Loading Boot ROM and Host Software
- Loading Software from Console Port Using XModem
- Loading Software from an Ethernet Port Using TFTP
- Loading Software from an Ethernet Port Using FTP
- Loading Software Remotely
- Loading Software Remotely Using TFTP
- Chapter 6 Maintenance and Troubleshooting
- appendix a lightning protection of the switch
manualsdatabase
Your AI-powered manual search engine