Manuals database logo
manualsdatabase
Your AI-powered manual search engine

H3C S5810 Series manuals

S5810 Series first page preview

S5810 Series

Brand: H3C | Category: Switch
Table of contents
  1. about this manual
  2. Table of Contents
  3. Table Of Contents
  4. software release notes
  5. product features
  6. access volume
  7. ip services volume
  8. ip routing volume
  9. qos volume
  10. system volume
  11. manual version
  12. Table of Contents
  13. Table Of Contents
  14. ethernet interface configuration
  15. basic ethernet interface configuration
  16. configuring flow control on an ethernet interface
  17. configuring loopback testing on an ethernet interface
  18. configuring a port group
  19. setting the interval for collecting ethernet interface statistics
  20. enabling forwarding of jumbo frames
  21. configuring the mdi mode for an ethernet interface
  22. enabling bridging on an ethernet interface
  23. configuring the storm constrain function on an ethernet interface
  24. displaying and maintaining an ethernet interface
  25. Table of Contents
  26. Table Of Contents
  27. link aggregation configuration
  28. link aggregation modes
  29. load sharing mode of an aggregation group
  30. configuring a static aggregation group
  31. configuring an aggregate interface
  32. enabling linkup/linkdown trap generation for an aggregate interface
  33. displaying and maintaining link aggregation
  34. link aggregation configuration examples
  35. layer-2 dynamic aggregation configuration example
  36. configuration procedure
  37. Table of Contents
  38. Table Of Contents
  39. port isolation configuration
  40. configuring the isolation group for a isolation-group device
  41. displaying and maintaining isolation groups
  42. port isolation configuration example
  43. Table of Contents
  44. Table Of Contents
  45. loopback interface
  46. null interface
  47. displaying and maintaining logical interfaces
  48. Table Of Contents
  49. dldp configuration
  50. dldp introduction
  51. dldp configuration task list
  52. enabling dldp
  53. setting the interval for sending advertisement packets
  54. setting the port shutdown mode
  55. resetting dldp state
  56. displaying and maintaining dldp
  57. troubleshooting
  58. Table of Contents
  59. Table Of Contents
  60. lldp configuration
  61. lldp configuration task list
  62. performing basic lldp configuration
  63. setting lldp operating mode
  64. configuring the tlvs to be advertised
  65. setting the ttl multiplier
  66. configuring the encapsulation format for lldpdus
  67. displaying and maintaining lldp
  68. Table of Contents
  69. Table Of Contents
  70. Table Of Contents
  71. mstp configuration
  72. basic concepts in stp
  73. how stp works
  74. introduction to rstp
  75. introduction to mstp
  76. basic concepts in mstp
  77. how mstp works
  78. configuration task list
  79. configuring the root bridge
  80. specifying the root bridge or a secondary root bridge
  81. configuring the work mode of an mstp device
  82. configuring the priority of the current device
  83. configuring the network diameter of a switched network
  84. configuring timers of mstp
  85. configuring the maximum port rate
  86. configuring ports as edge ports
  87. configuring the mode a port uses to recognize/send mstp packets
  88. enabling the output of port state transition information
  89. configuring leaf nodes
  90. configuring the maximum transmission rate of ports
  91. configuring port priority
  92. performing mcheck
  93. configuring the vlan ignore feature
  94. configuring digest snooping
  95. configuring no agreement check
  96. configuring protection functions
  97. enabling bpdu guard
  98. enabling root guard
  99. enabling loop guard
  100. displaying and maintaining mstp
  101. mstp configuration example
  102. Table of Contents
  103. Table Of Contents
  104. smart link overview
  105. operating mechanism of smart link
  106. configuring a smart link device
  107. configuring member ports for a smart link group
  108. enabling the sending of flush messages
  109. configuring an associated device
  110. associated device configuration example
  111. multiple smart link groups load sharing configuration example
  112. monitor link configuration
  113. configuring monitor link
  114. monitor link configuration example
  115. Table of Contents
  116. Table Of Contents
  117. vlan configuration
  118. vlan fundamentals
  119. types of vlan
  120. configuring basic settings of a vlan interface
  121. port-based vlan configuration
  122. assigning an access port to a vlan
  123. assigning a trunk port to a vlan
  124. assigning a hybrid port to a vlan
  125. displaying and maintaining vlan
  126. vlan configuration example
  127. gvrp configuration
  128. protocols and standards
  129. configuring garp timers
  130. displaying and maintaining gvrp
  131. gvrp configuration example ii
  132. gvrp configuration example iii
  133. Table of Contents
  134. Table Of Contents
  135. port mirroring configuration
  136. configuring local port mirroring
  137. configuring remote port mirroring
  138. configuring a remote destination mirroring group (on the destination device)
  139. displaying and maintaining port mirroring
  140. remote port mirroring configuration example
  141. Table of Contents
  142. Table Of Contents
  143. ip addressing overview
  144. special ip addresses
  145. configuring ip addresses
  146. ip addressing configuration example
  147. displaying and maintaining ip addressing
  148. Table of Contents
  149. Table Of Contents
  150. enabling reception and forwarding of directed broadcasts to a directly connected network
  151. enabling forwarding of directed broadcasts to a directly connected network
  152. configuring tcp attributes
  153. enabling protection against naptha attacks
  154. configuring tcp optional parameters
  155. configuring icmp to send error packets
  156. displaying and maintaining ip performance optimization
  157. Table of Contents
  158. Table Of Contents
  159. arp configuration
  160. arp address resolution process
  161. configuring arp
  162. configuring the maximum number of arp entries for an interface
  163. enabling the arp entry check
  164. configuring gratuitous arp
  165. displaying and maintaining arp
  166. arp attack defense configuration
  167. configuring arp source suppression
  168. configuring source mac address based arp attack detection
  169. configuring arp packet source mac address consistency check
  170. configuring arp detection
  171. enabling arp detection based on dhcp snooping entries/static ip-to-mac bindings
  172. configuring arp detection based on specified objects
  173. displaying and maintaining arp detection
  174. Table of Contents
  175. Table Of Contents
  176. dhcp client configuration
  177. displaying and maintaining the dhcp client
  178. dhcp snooping configuration
  179. application environment of trusted ports
  180. dhcp snooping support for option
  181. configuring dhcp snooping basic functions
  182. configuring dhcp snooping to support option 82
  183. displaying and maintaining dhcp snooping
  184. dhcp snooping configuration examples
  185. enable dhcp snooping
  186. bootp client configuration
  187. configuring an interface to dynamically obtain an ip address through bootp
  188. bootp client configuration example
  189. Table of Contents
  190. Table Of Contents
  191. dns overview
  192. configuring the ipv4 dns client
  193. displaying and maintaining ipv4 dns
  194. dynamic domain name resolution configuration example
  195. troubleshooting ipv4 dns configuration
  196. Table of Contents
  197. Table Of Contents
  198. ftp configuration
  199. configuring the ftp client
  200. operating the directories on an ftp server
  201. using another username to log in to an ftp server
  202. maintaining and debugging an ftp connection
  203. ftp client configuration example
  204. configuring the ftp server
  205. configuring authentication and authorization on the ftp server
  206. ftp server configuration example
  207. displaying and maintaining ftp
  208. tftp configuration
  209. configuring the tftp client
  210. displaying and maintaining the tftp client
  211. tftp client configuration example
  212. Table Of Contents
  213. ip routing overview
  214. displaying and maintaining a routing table
  215. Table Of Contents
  216. static routing configuration
  217. configuring a static route
  218. displaying and maintaining static routes
  219. Table of Contents
  220. Table Of Contents
  221. multicast overview
  222. features of multicast
  223. common notations in multicast
  224. multicast models
  225. multicast addresses
  226. multicast protocols
  227. multicast packet forwarding mechanism
  228. Table of Contents
  229. Table Of Contents
  230. igmp snooping configuration
  231. basic concepts in igmp snooping
  232. how igmp snooping works
  233. igmp snooping proxying
  234. igmp snooping configuration task list
  235. configuring basic functions of igmp snooping
  236. configuring igmp snooping port functions
  237. configuring aging timers for dynamic ports
  238. configuring simulated joining
  239. configuring fast leave processing
  240. configuring igmp snooping querier
  241. configuring igmp queries and responses
  242. configuring source ip address of igmp queries
  243. configuring an igmp snooping policy
  244. configuring the function of dropping unknown multicast data
  245. configuring igmp report suppression
  246. configuring multicast group replacement
  247. configuring 802.1p precedence for igmp messages
  248. displaying and maintaining igmp snooping
  249. static port configuration example
  250. igmp snooping querier configuration example
  251. igmp snooping proxying configuration example
  252. troubleshooting igmp snooping configuration
  253. Table of Contents
  254. Table Of Contents
  255. multicast vlan configuration
  256. multicast vlan configuration task list
  257. configuring port-based multicast vlan
  258. configuring user port attributes
  259. displaying and maintaining multicast vlan
  260. multicast vlan configuration examples
  261. port-based multicast vlan configuration
  262. Table of Contents
  263. Table Of Contents
  264. Table Of Contents
  265. Table Of Contents
  266. qos overview
  267. congestion: causes, impacts, and countermeasures
  268. qos technology implementations
  269. traffic classification
  270. qos policy overview
  271. defining a traffic behavior
  272. defining a policy
  273. applying the qos policy
  274. applying the qos policy to a vlan
  275. applying the qos policy globally
  276. displaying and maintaining qos policies
  277. priority mapping overview
  278. introduction to priority mapping tables
  279. configuring a priority mapping table
  280. configuration example
  281. configuration prerequisites
  282. displaying and maintaining priority mapping
  283. traffic evaluation and token bucket
  284. traffic policing
  285. traffic shaping
  286. traffic policing, gts and line rate configuration
  287. configuring traffic policing
  288. displaying and maintaining traffic policing, gts and line rate
  289. aggregation car configuration
  290. referencing aggregation car in a traffic behavior
  291. displaying and maintaining aggregation car
  292. congestion management configuration
  293. congestion management configuration methods
  294. configure wrr queuing
  295. configuring sp+wrr queues
  296. configuring traffic mirroring
  297. displaying and maintaining traffic mirroring
  298. port buffer configuration
  299. configuring the shared buffer manually
  300. network requirements
  301. Table of Contents
  302. Table Of Contents
  303. Table Of Contents
  304. aaa configuration
  305. introduction to radius
  306. security and authentication mechanisms
  307. radius packet format
  308. extended radius attributes
  309. differences between hwtacacs and radius
  310. aaa configuration task list
  311. radius configuration task list
  312. configuring aaa
  313. configuring isp domain attributes
  314. configuring aaa authentication methods for an isp domain
  315. configuring aaa authorization methods for an isp domain
  316. configuring aaa accounting methods for an isp domain
  317. configuring local user attributes
  318. configuring user group attributes
  319. configuring radius
  320. specifying the radius authentication/authorization servers
  321. setting the shared key for radius packets
  322. setting the upper limit of radius request retransmission attempts
  323. setting the status of radius servers
  324. configuring attributes related to data to be sent to the radius server
  325. setting timers regarding radius servers
  326. configuring radius accounting-on
  327. enabling the listening port of the radius client
  328. configuring hwtacacs
  329. specifying the hwtacacs authorization servers
  330. setting the shared key for hwtacacs packets
  331. configuring attributes related to the data sent to hwtacacs server
  332. aaa configuration examples
  333. aaa for telnet users by separate servers
  334. aaa for ssh users by a radius server
  335. troubleshooting aaa
  336. troubleshooting hwtacacs
  337. Table of Contents
  338. Table Of Contents
  339. ip source guard configuration
  340. configuring dynamic binding function
  341. ip source guard configuration examples
  342. dynamic binding function configuration example
  343. troubleshooting ip source guard
  344. Table of Contents
  345. Table Of Contents
  346. ssh2.0 configuration
  347. configuring the device as an ssh server
  348. enabling ssh server
  349. configuring a client public key
  350. configuring an ssh user
  351. configuring the device as an ssh client
  352. specifying a source ip address/interface for the ssh client
  353. displaying and maintaining ssh
  354. ssh server configuration examples
  355. when switch acts as server for publickey authentication
  356. ssh client configuration examples
  357. when switch acts as client for publickey authentication
  358. sftp service
  359. configuring an sftp client
  360. working with the sftp directories
  361. working with sftp files
  362. terminating the connection to the remote sftp server
  363. sftp server configuration example
  364. Table of Contents
  365. Table Of Contents
  366. pki configuration
  367. architecture of pki
  368. applications of pki
  369. pki configuration task list
  370. configuring a pki domain
  371. submitting a pki certificate request
  372. submitting a certificate request in manual mode
  373. retrieving a certificate manually
  374. configuring pki certificate verification
  375. destroying a local rsa key pair
  376. configuring an access control policy
  377. pki configuration examples
  378. requesting a certificate from a ca running windows 2003 server
  379. configuring a certificate attribute-based access control policy
  380. troubleshooting pki
  381. failed to request a local certificate
  382. Table of Contents
  383. Table Of Contents
  384. ssl configuration
  385. ssl configuration task list
  386. configuring an ssl server policy
  387. ssl server policy configuration example
  388. configuring an ssl client policy
  389. troubleshooting ssl
  390. Table of Contents
  391. Table Of Contents
  392. public key configuration
  393. configuring the local asymmetric key pair
  394. displaying or exporting the local rsa or dsa host public key
  395. displaying and maintaining public keys
  396. public key configuration examples
  397. importing the public key of a peer from a public key file
  398. Table of Contents
  399. Table Of Contents
  400. Table Of Contents
  401. acl overview
  402. ipv4 acl naming
  403. ipv4 acl step
  404. introduction to ipv6 acl
  405. ipv6 acl naming
  406. ipv6 acl step
  407. creating a time range
  408. configuring a basic ipv4 acl
  409. configuring an advanced ipv4 acl
  410. configuring an ethernet frame header acl
  411. copying an ipv4 acl
  412. displaying and maintaining ipv4 acls
  413. ipv6 acl configuration
  414. configuring an advanced ipv6 acl
  415. copying an ipv6 acl
  416. displaying and maintaining ipv6 acls
  417. acl application for packet filtering
  418. acl application example
  419. Table of Contents
  420. Table Of Contents
  421. Table Of Contents
  422. logging in to an ethernet switch
  423. users and user interfaces
  424. logging in through the console port
  425. console port login configuration
  426. console port login configurations for different authentication modes
  427. console port login configuration with authentication mode being none
  428. console port login configuration with authentication mode being password
  429. console port login configuration with authentication mode being scheme
  430. logging in through telnet
  431. telnet connection establishment
  432. common configuration
  433. telnet login configuration task list
  434. telnet configuration with authentication mode being password
  435. telnet configuration with authentication mode being scheme
  436. logging in through ssh
  437. modem connection establishment
  438. configuration on the administrator side
  439. configuration on the switch side
  440. web server configuration
  441. displaying web users
  442. connection establishment using nms
  443. specifying source for telnet packets
  444. displaying the source ip address/interface specified for telnet packets
  445. controlling telnet users
  446. controlling telnet users by source and destination ip addresses
  447. controlling telnet users by source mac addresses
  448. controlling network management users by source ip addresses
  449. controlling web users by source ip addresses
  450. forcing online web users offline
  451. Table of Contents
  452. Table Of Contents
  453. basic configurations
  454. entering system view
  455. configuring the device name
  456. enabling/disabling the display of copyright information
  457. configuring a banner
  458. configuring cli hotkeys
  459. configuring user privilege levels and command levels
  460. displaying and maintaining basic configurations
  461. cli features
  462. synchronous information output
  463. cli display
  464. saving commands in the history buffer
  465. command line error information
  466. Table of Contents
  467. Table Of Contents
  468. device management
  469. rebooting a device
  470. configuring the scheduled automatic execution function
  471. upgrading device software
  472. upgrading the boot rom program through command lines
  473. configuring temperature alarm thresholds for a device
  474. identifying and diagnosing pluggable transceivers
  475. displaying and maintaining device management configuration
  476. device management configuration examples
  477. Table of Contents
  478. Table Of Contents
  479. Table Of Contents
  480. file system management
  481. directory operations
  482. file operations
  483. copying a file
  484. emptying the recycle bin
  485. displaying and maintaining the nand flash memory
  486. setting file system prompt modes
  487. configuration file management
  488. saving the current configuration
  489. setting configuration rollback
  490. configuring parameters for saving the current running configuration
  491. saving the current running configuration automatically
  492. saving the current running configuration manually
  493. specifying a startup configuration file for the next system startup
  494. deleting the startup configuration file for the next startup
  495. displaying and maintaining device configuration
  496. Table of Contents
  497. Table Of Contents
  498. http configuration
  499. configuring the port number of the http service
  500. displaying and maintaining http
  501. https configuration
  502. associating the https service with an ssl server policy
  503. associating the https service with a certificate attribute access control policy
  504. associating the https service with an acl
  505. Table of Contents
  506. Table Of Contents
  507. snmp configuration
  508. snmp protocol version
  509. configuring snmp logging
  510. configuring snmp trap
  511. configuring trap parameters
  512. displaying and maintaining snmp
  513. snmpv3 configuration example
  514. snmp logging configuration example
  515. mib style configuration
  516. Table of Contents
  517. Table Of Contents
  518. rmon configuration
  519. rmon groups
  520. configuring the rmon statistics function
  521. configuring the rmon ethernet statistics function
  522. configuring the rmon alarm function
  523. displaying and maintaining rmon
  524. Table of Contents
  525. Table Of Contents
  526. mac address table management configuration
  527. types of mac address table entries
  528. configuring mac address table management
  529. configuring the aging timer for dynamic mac address entries
  530. displaying and maintaining mac address table management
  531. Table of Contents
  532. Table Of Contents
  533. system maintaining and debugging
  534. ping configuration example
  535. configuring tracert
  536. system debugging
  537. ping and tracert configuration example
  538. Table of Contents
  539. Table Of Contents
  540. information center configuration
  541. system information format
  542. configuring information center
  543. outputting system information to a monitor terminal
  544. outputting system information to a log host
  545. outputting system information to the trap buffer
  546. outputting system information to the log buffer
  547. outputting system information to the snmp module
  548. configuring synchronous information output
  549. displaying and maintaining information center
  550. outputting log information to a linux log host
  551. outputting log information to the console
  552. Table of Contents
  553. Table Of Contents
  554. track overview
  555. track configuration task list
  556. configuring collaboration between the track module and the application modules
  557. configuring track-static routing collaboration
  558. displaying and maintaining track objects
  559. static routing, track and the interface management module collaboration configuration example
  560. Table of Contents
  561. Table Of Contents
  562. ntp configuration
  563. how ntp works
  564. ntp message format
  565. operation modes of ntp
  566. ntp configuration task list
  567. configuring the ntp symmetric peers mode
  568. configuring optional parameters of ntp
  569. disabling an interface from receiving ntp messages
  570. configuring access-control rights
  571. configuring ntp authentication
  572. displaying and maintaining ntp
  573. configuring the ntp symmetric mode
  574. configuring ntp broadcast mode
  575. configuring ntp multicast mode
  576. configuring ntp client/server mode with authentication
  577. configuring ntp broadcast mode with authentication
  578. Table of Contents
  579. Table Of Contents
  580. vrrp configuration
  581. vrrp standard protocol mode
  582. vrrp timers
  583. packet format
  584. vrrp tracking
  585. vrrp application
  586. configuring vrrp for ipv4
  587. configuring the association between virtual ip address and mac address
  588. configuring router priority, preemptive mode and tracking function
  589. configuring vrrp packet attributes
  590. enabling the trap function of vrrp
  591. displaying and maintaining vrrp for ipv
  592. vrrp interface tracking configuration example
  593. multiple vrrp group configuration example
  594. troubleshooting vrrp
  595. Table of Contents
  596. Table Of Contents
  597. cluster management configuration
  598. how a cluster works
  599. cluster configuration task list
  600. configuring the management device
  601. enabling ntdp globally and for specific ports
  602. manually collecting topology information
  603. enabling management vlan auto-negotiation
  604. configuring cluster management protocol packets
  605. cluster member management
  606. configuring the member devices
  607. adding a candidate device to a cluster
  608. configuring topology management
  609. snmp configuration synchronization function
  610. configuring web user accounts in batches
  611. displaying and maintaining cluster management
  612. cluster management configuration example
  613. Table of Contents
  614. Table Of Contents
  615. stack configuration
  616. establishing a stack
  617. configuring the master device of a stack
  618. configuring stack ports of a slave device
  619. stack configuration example
  620. Table Of Contents
  621. automatic configuration
  622. how automatic configuration works
  623. obtaining the ip address of an interface and related information through dhcp
  624. obtaining the configuration file from the tftp server
  625. executing the configuration file
S5810 Series first page preview

S5810 Series

Brand: H3C | Category: Switch
Related products
S5830 SeriesS5820 seriesS5510 SeriesS5850 Seriess5800 seriess5820x seriesWS5810-WiNet SeriesS5820V2 seriesS5830V2 seriesS5800-EI Series
H3C categories
More H3C categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine