H3C S5810 Series manuals
S5810 Series
Table of contents
- about this manual
- Table of Contents
- Table Of Contents
- software release notes
- product features
- access volume
- ip services volume
- ip routing volume
- qos volume
- system volume
- manual version
- Table of Contents
- Table Of Contents
- ethernet interface configuration
- basic ethernet interface configuration
- configuring flow control on an ethernet interface
- configuring loopback testing on an ethernet interface
- configuring a port group
- setting the interval for collecting ethernet interface statistics
- enabling forwarding of jumbo frames
- configuring the mdi mode for an ethernet interface
- enabling bridging on an ethernet interface
- configuring the storm constrain function on an ethernet interface
- displaying and maintaining an ethernet interface
- Table of Contents
- Table Of Contents
- link aggregation configuration
- link aggregation modes
- load sharing mode of an aggregation group
- configuring a static aggregation group
- configuring an aggregate interface
- enabling linkup/linkdown trap generation for an aggregate interface
- displaying and maintaining link aggregation
- link aggregation configuration examples
- layer-2 dynamic aggregation configuration example
- configuration procedure
- Table of Contents
- Table Of Contents
- port isolation configuration
- configuring the isolation group for a isolation-group device
- displaying and maintaining isolation groups
- port isolation configuration example
- Table of Contents
- Table Of Contents
- loopback interface
- null interface
- displaying and maintaining logical interfaces
- Table Of Contents
- dldp configuration
- dldp introduction
- dldp configuration task list
- enabling dldp
- setting the interval for sending advertisement packets
- setting the port shutdown mode
- resetting dldp state
- displaying and maintaining dldp
- troubleshooting
- Table of Contents
- Table Of Contents
- lldp configuration
- lldp configuration task list
- performing basic lldp configuration
- setting lldp operating mode
- configuring the tlvs to be advertised
- setting the ttl multiplier
- configuring the encapsulation format for lldpdus
- displaying and maintaining lldp
- Table of Contents
- Table Of Contents
- Table Of Contents
- mstp configuration
- basic concepts in stp
- how stp works
- introduction to rstp
- introduction to mstp
- basic concepts in mstp
- how mstp works
- configuration task list
- configuring the root bridge
- specifying the root bridge or a secondary root bridge
- configuring the work mode of an mstp device
- configuring the priority of the current device
- configuring the network diameter of a switched network
- configuring timers of mstp
- configuring the maximum port rate
- configuring ports as edge ports
- configuring the mode a port uses to recognize/send mstp packets
- enabling the output of port state transition information
- configuring leaf nodes
- configuring the maximum transmission rate of ports
- configuring port priority
- performing mcheck
- configuring the vlan ignore feature
- configuring digest snooping
- configuring no agreement check
- configuring protection functions
- enabling bpdu guard
- enabling root guard
- enabling loop guard
- displaying and maintaining mstp
- mstp configuration example
- Table of Contents
- Table Of Contents
- smart link overview
- operating mechanism of smart link
- configuring a smart link device
- configuring member ports for a smart link group
- enabling the sending of flush messages
- configuring an associated device
- associated device configuration example
- multiple smart link groups load sharing configuration example
- monitor link configuration
- configuring monitor link
- monitor link configuration example
- Table of Contents
- Table Of Contents
- vlan configuration
- vlan fundamentals
- types of vlan
- configuring basic settings of a vlan interface
- port-based vlan configuration
- assigning an access port to a vlan
- assigning a trunk port to a vlan
- assigning a hybrid port to a vlan
- displaying and maintaining vlan
- vlan configuration example
- gvrp configuration
- protocols and standards
- configuring garp timers
- displaying and maintaining gvrp
- gvrp configuration example ii
- gvrp configuration example iii
- Table of Contents
- Table Of Contents
- port mirroring configuration
- configuring local port mirroring
- configuring remote port mirroring
- configuring a remote destination mirroring group (on the destination device)
- displaying and maintaining port mirroring
- remote port mirroring configuration example
- Table of Contents
- Table Of Contents
- ip addressing overview
- special ip addresses
- configuring ip addresses
- ip addressing configuration example
- displaying and maintaining ip addressing
- Table of Contents
- Table Of Contents
- enabling reception and forwarding of directed broadcasts to a directly connected network
- enabling forwarding of directed broadcasts to a directly connected network
- configuring tcp attributes
- enabling protection against naptha attacks
- configuring tcp optional parameters
- configuring icmp to send error packets
- displaying and maintaining ip performance optimization
- Table of Contents
- Table Of Contents
- arp configuration
- arp address resolution process
- configuring arp
- configuring the maximum number of arp entries for an interface
- enabling the arp entry check
- configuring gratuitous arp
- displaying and maintaining arp
- arp attack defense configuration
- configuring arp source suppression
- configuring source mac address based arp attack detection
- configuring arp packet source mac address consistency check
- configuring arp detection
- enabling arp detection based on dhcp snooping entries/static ip-to-mac bindings
- configuring arp detection based on specified objects
- displaying and maintaining arp detection
- Table of Contents
- Table Of Contents
- dhcp client configuration
- displaying and maintaining the dhcp client
- dhcp snooping configuration
- application environment of trusted ports
- dhcp snooping support for option
- configuring dhcp snooping basic functions
- configuring dhcp snooping to support option 82
- displaying and maintaining dhcp snooping
- dhcp snooping configuration examples
- enable dhcp snooping
- bootp client configuration
- configuring an interface to dynamically obtain an ip address through bootp
- bootp client configuration example
- Table of Contents
- Table Of Contents
- dns overview
- configuring the ipv4 dns client
- displaying and maintaining ipv4 dns
- dynamic domain name resolution configuration example
- troubleshooting ipv4 dns configuration
- Table of Contents
- Table Of Contents
- ftp configuration
- configuring the ftp client
- operating the directories on an ftp server
- using another username to log in to an ftp server
- maintaining and debugging an ftp connection
- ftp client configuration example
- configuring the ftp server
- configuring authentication and authorization on the ftp server
- ftp server configuration example
- displaying and maintaining ftp
- tftp configuration
- configuring the tftp client
- displaying and maintaining the tftp client
- tftp client configuration example
- Table Of Contents
- ip routing overview
- displaying and maintaining a routing table
- Table Of Contents
- static routing configuration
- configuring a static route
- displaying and maintaining static routes
- Table of Contents
- Table Of Contents
- multicast overview
- features of multicast
- common notations in multicast
- multicast models
- multicast addresses
- multicast protocols
- multicast packet forwarding mechanism
- Table of Contents
- Table Of Contents
- igmp snooping configuration
- basic concepts in igmp snooping
- how igmp snooping works
- igmp snooping proxying
- igmp snooping configuration task list
- configuring basic functions of igmp snooping
- configuring igmp snooping port functions
- configuring aging timers for dynamic ports
- configuring simulated joining
- configuring fast leave processing
- configuring igmp snooping querier
- configuring igmp queries and responses
- configuring source ip address of igmp queries
- configuring an igmp snooping policy
- configuring the function of dropping unknown multicast data
- configuring igmp report suppression
- configuring multicast group replacement
- configuring 802.1p precedence for igmp messages
- displaying and maintaining igmp snooping
- static port configuration example
- igmp snooping querier configuration example
- igmp snooping proxying configuration example
- troubleshooting igmp snooping configuration
- Table of Contents
- Table Of Contents
- multicast vlan configuration
- multicast vlan configuration task list
- configuring port-based multicast vlan
- configuring user port attributes
- displaying and maintaining multicast vlan
- multicast vlan configuration examples
- port-based multicast vlan configuration
- Table of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- qos overview
- congestion: causes, impacts, and countermeasures
- qos technology implementations
- traffic classification
- qos policy overview
- defining a traffic behavior
- defining a policy
- applying the qos policy
- applying the qos policy to a vlan
- applying the qos policy globally
- displaying and maintaining qos policies
- priority mapping overview
- introduction to priority mapping tables
- configuring a priority mapping table
- configuration example
- configuration prerequisites
- displaying and maintaining priority mapping
- traffic evaluation and token bucket
- traffic policing
- traffic shaping
- traffic policing, gts and line rate configuration
- configuring traffic policing
- displaying and maintaining traffic policing, gts and line rate
- aggregation car configuration
- referencing aggregation car in a traffic behavior
- displaying and maintaining aggregation car
- congestion management configuration
- congestion management configuration methods
- configure wrr queuing
- configuring sp+wrr queues
- configuring traffic mirroring
- displaying and maintaining traffic mirroring
- port buffer configuration
- configuring the shared buffer manually
- network requirements
- Table of Contents
- Table Of Contents
- Table Of Contents
- aaa configuration
- introduction to radius
- security and authentication mechanisms
- radius packet format
- extended radius attributes
- differences between hwtacacs and radius
- aaa configuration task list
- radius configuration task list
- configuring aaa
- configuring isp domain attributes
- configuring aaa authentication methods for an isp domain
- configuring aaa authorization methods for an isp domain
- configuring aaa accounting methods for an isp domain
- configuring local user attributes
- configuring user group attributes
- configuring radius
- specifying the radius authentication/authorization servers
- setting the shared key for radius packets
- setting the upper limit of radius request retransmission attempts
- setting the status of radius servers
- configuring attributes related to data to be sent to the radius server
- setting timers regarding radius servers
- configuring radius accounting-on
- enabling the listening port of the radius client
- configuring hwtacacs
- specifying the hwtacacs authorization servers
- setting the shared key for hwtacacs packets
- configuring attributes related to the data sent to hwtacacs server
- aaa configuration examples
- aaa for telnet users by separate servers
- aaa for ssh users by a radius server
- troubleshooting aaa
- troubleshooting hwtacacs
- Table of Contents
- Table Of Contents
- ip source guard configuration
- configuring dynamic binding function
- ip source guard configuration examples
- dynamic binding function configuration example
- troubleshooting ip source guard
- Table of Contents
- Table Of Contents
- ssh2.0 configuration
- configuring the device as an ssh server
- enabling ssh server
- configuring a client public key
- configuring an ssh user
- configuring the device as an ssh client
- specifying a source ip address/interface for the ssh client
- displaying and maintaining ssh
- ssh server configuration examples
- when switch acts as server for publickey authentication
- ssh client configuration examples
- when switch acts as client for publickey authentication
- sftp service
- configuring an sftp client
- working with the sftp directories
- working with sftp files
- terminating the connection to the remote sftp server
- sftp server configuration example
- Table of Contents
- Table Of Contents
- pki configuration
- architecture of pki
- applications of pki
- pki configuration task list
- configuring a pki domain
- submitting a pki certificate request
- submitting a certificate request in manual mode
- retrieving a certificate manually
- configuring pki certificate verification
- destroying a local rsa key pair
- configuring an access control policy
- pki configuration examples
- requesting a certificate from a ca running windows 2003 server
- configuring a certificate attribute-based access control policy
- troubleshooting pki
- failed to request a local certificate
- Table of Contents
- Table Of Contents
- ssl configuration
- ssl configuration task list
- configuring an ssl server policy
- ssl server policy configuration example
- configuring an ssl client policy
- troubleshooting ssl
- Table of Contents
- Table Of Contents
- public key configuration
- configuring the local asymmetric key pair
- displaying or exporting the local rsa or dsa host public key
- displaying and maintaining public keys
- public key configuration examples
- importing the public key of a peer from a public key file
- Table of Contents
- Table Of Contents
- Table Of Contents
- acl overview
- ipv4 acl naming
- ipv4 acl step
- introduction to ipv6 acl
- ipv6 acl naming
- ipv6 acl step
- creating a time range
- configuring a basic ipv4 acl
- configuring an advanced ipv4 acl
- configuring an ethernet frame header acl
- copying an ipv4 acl
- displaying and maintaining ipv4 acls
- ipv6 acl configuration
- configuring an advanced ipv6 acl
- copying an ipv6 acl
- displaying and maintaining ipv6 acls
- acl application for packet filtering
- acl application example
- Table of Contents
- Table Of Contents
- Table Of Contents
- logging in to an ethernet switch
- users and user interfaces
- logging in through the console port
- console port login configuration
- console port login configurations for different authentication modes
- console port login configuration with authentication mode being none
- console port login configuration with authentication mode being password
- console port login configuration with authentication mode being scheme
- logging in through telnet
- telnet connection establishment
- common configuration
- telnet login configuration task list
- telnet configuration with authentication mode being password
- telnet configuration with authentication mode being scheme
- logging in through ssh
- modem connection establishment
- configuration on the administrator side
- configuration on the switch side
- web server configuration
- displaying web users
- connection establishment using nms
- specifying source for telnet packets
- displaying the source ip address/interface specified for telnet packets
- controlling telnet users
- controlling telnet users by source and destination ip addresses
- controlling telnet users by source mac addresses
- controlling network management users by source ip addresses
- controlling web users by source ip addresses
- forcing online web users offline
- Table of Contents
- Table Of Contents
- basic configurations
- entering system view
- configuring the device name
- enabling/disabling the display of copyright information
- configuring a banner
- configuring cli hotkeys
- configuring user privilege levels and command levels
- displaying and maintaining basic configurations
- cli features
- synchronous information output
- cli display
- saving commands in the history buffer
- command line error information
- Table of Contents
- Table Of Contents
- device management
- rebooting a device
- configuring the scheduled automatic execution function
- upgrading device software
- upgrading the boot rom program through command lines
- configuring temperature alarm thresholds for a device
- identifying and diagnosing pluggable transceivers
- displaying and maintaining device management configuration
- device management configuration examples
- Table of Contents
- Table Of Contents
- Table Of Contents
- file system management
- directory operations
- file operations
- copying a file
- emptying the recycle bin
- displaying and maintaining the nand flash memory
- setting file system prompt modes
- configuration file management
- saving the current configuration
- setting configuration rollback
- configuring parameters for saving the current running configuration
- saving the current running configuration automatically
- saving the current running configuration manually
- specifying a startup configuration file for the next system startup
- deleting the startup configuration file for the next startup
- displaying and maintaining device configuration
- Table of Contents
- Table Of Contents
- http configuration
- configuring the port number of the http service
- displaying and maintaining http
- https configuration
- associating the https service with an ssl server policy
- associating the https service with a certificate attribute access control policy
- associating the https service with an acl
- Table of Contents
- Table Of Contents
- snmp configuration
- snmp protocol version
- configuring snmp logging
- configuring snmp trap
- configuring trap parameters
- displaying and maintaining snmp
- snmpv3 configuration example
- snmp logging configuration example
- mib style configuration
- Table of Contents
- Table Of Contents
- rmon configuration
- rmon groups
- configuring the rmon statistics function
- configuring the rmon ethernet statistics function
- configuring the rmon alarm function
- displaying and maintaining rmon
- Table of Contents
- Table Of Contents
- mac address table management configuration
- types of mac address table entries
- configuring mac address table management
- configuring the aging timer for dynamic mac address entries
- displaying and maintaining mac address table management
- Table of Contents
- Table Of Contents
- system maintaining and debugging
- ping configuration example
- configuring tracert
- system debugging
- ping and tracert configuration example
- Table of Contents
- Table Of Contents
- information center configuration
- system information format
- configuring information center
- outputting system information to a monitor terminal
- outputting system information to a log host
- outputting system information to the trap buffer
- outputting system information to the log buffer
- outputting system information to the snmp module
- configuring synchronous information output
- displaying and maintaining information center
- outputting log information to a linux log host
- outputting log information to the console
- Table of Contents
- Table Of Contents
- track overview
- track configuration task list
- configuring collaboration between the track module and the application modules
- configuring track-static routing collaboration
- displaying and maintaining track objects
- static routing, track and the interface management module collaboration configuration example
- Table of Contents
- Table Of Contents
- ntp configuration
- how ntp works
- ntp message format
- operation modes of ntp
- ntp configuration task list
- configuring the ntp symmetric peers mode
- configuring optional parameters of ntp
- disabling an interface from receiving ntp messages
- configuring access-control rights
- configuring ntp authentication
- displaying and maintaining ntp
- configuring the ntp symmetric mode
- configuring ntp broadcast mode
- configuring ntp multicast mode
- configuring ntp client/server mode with authentication
- configuring ntp broadcast mode with authentication
- Table of Contents
- Table Of Contents
- vrrp configuration
- vrrp standard protocol mode
- vrrp timers
- packet format
- vrrp tracking
- vrrp application
- configuring vrrp for ipv4
- configuring the association between virtual ip address and mac address
- configuring router priority, preemptive mode and tracking function
- configuring vrrp packet attributes
- enabling the trap function of vrrp
- displaying and maintaining vrrp for ipv
- vrrp interface tracking configuration example
- multiple vrrp group configuration example
- troubleshooting vrrp
- Table of Contents
- Table Of Contents
- cluster management configuration
- how a cluster works
- cluster configuration task list
- configuring the management device
- enabling ntdp globally and for specific ports
- manually collecting topology information
- enabling management vlan auto-negotiation
- configuring cluster management protocol packets
- cluster member management
- configuring the member devices
- adding a candidate device to a cluster
- configuring topology management
- snmp configuration synchronization function
- configuring web user accounts in batches
- displaying and maintaining cluster management
- cluster management configuration example
- Table of Contents
- Table Of Contents
- stack configuration
- establishing a stack
- configuring the master device of a stack
- configuring stack ports of a slave device
- stack configuration example
- Table Of Contents
- automatic configuration
- how automatic configuration works
- obtaining the ip address of an interface and related information through dhcp
- obtaining the configuration file from the tftp server
- executing the configuration file
S5810 Series
Table of contents
- quick start
- about this manual
- product overview
- ventilation system
- installation preparations
- installation tools
- installing a switch
- mounting the switch on a workbench
- connecting the ground wire
- installing a power module
- setting up the configuration environment
- setting terminal parameters
- booting the switch
- changing the boot mode
- maintenance and troubleshooting
- power supply failure
- appendix a lightning protection of the switch
- installation of lightning arrester for network port
- regulatory compliance standards
- electricity safety elektrische sicherheit
- laser laser
Related products
S5830 SeriesS5820 seriesS5510 SeriesS5850 Seriess5800 seriess5820x seriesWS5810-WiNet SeriesS5820V2 seriesS5830V2 seriesS5800-EI SeriesH3C categories
Switch
Network Router
Network Hardware
IP Access Controllers
Firewall
Control Unit
Wireless Access Point
Server
Gateway
Wireless Router
manualsdatabase
Your AI-powered manual search engine