H3C S5820V2 series manuals
S5820V2 series
Table of contents
- installation guide
- obtaining documentation
- Table Of Contents
- Table Of Contents
- Preparing for installation
- Cleanliness
- Installation tools
- Installing the switch
- Installing the switch in a 19-inch rack
- Rack-mounting procedures at a glance
- Attaching the slide rails to the rack
- Mounting the switch in the rack
- Grounding the switch
- Grounding the switch with a grounding strip
- Grounding the switch by using the AC power cord
- Installing/removing a fan tray
- Removing a fan tray
- Installing a power module
- Removing a power module
- Connecting the power cord
- Connecting the LSVM1AC650 or LSVM1AC300 power module
- Verifying the installation
- Accessing the switch for the first time
- Connection procedure
- Setting up an IRF fabric
- Planning IRF fabric setup
- Planning IRF topology and connections
- Identifying physical IRF ports on the member switches
- Configuring basic IRF settings
- Maintenance and troubleshooting
- No terminal display
- Appendix A Chassis views and technical specifications
- S5820V2-48S
- S5820V2-52QF
- S5820V2-52QF-U
- S5820V2-52Q
- S5820V2-54QS-GE
- Technical specifications
- Appendix B FRUs and compatibility matrixes
- Fan trays
- Appendix C Ports and LEDs
- SFP+ port
- QSFP+ port
- Base-T autosensing Ethernet port
- LEDs
- Base-T autosensing Ethernet port LEDs
- Appendix D Cooling system
- Index
S5820V2 series
Table of contents
- command conventions
- documentation set
- obtaining documentation
- documentation feedback
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- configuring ethernet interfaces
- Splitting a 40-GE interface and combining 10-GE breakout interfaces
- Configuring basic settings of an Ethernet interface
- Configuring the link mode of an Ethernet interface
- Configuring physical state change suppression on an Ethernet interface
- Performing a loopback test on an Ethernet interface
- Configuring PFC on an Ethernet interface
- Enabling energy saving features on an Ethernet interface
- Setting the statistics polling interval
- Forcibly bringing up a fiber port
- configuring storm suppression
- Configuring storm control on an Ethernet interface
- Setting the MDIX mode of an Ethernet interface
- Testing the cable connection of an Ethernet interface
- displaying and maintaining an ethernet interface
- configuring a loopback interface
- Configuring a null interface
- Bulk configuring interfaces
- Displaying and maintaining bulk interface configuration
- configuring the mac address table
- types of mac address entries
- configuring mac address entries
- on an interface
- Adding or modifying a multiport unicast MAC address entry
- disabling mac address learning
- disabling mac address learning on a vlan
- Configuring the MAC learning limit on an interface
- Assigning MAC learning priority to an interface
- Enabling MAC address synchronization
- Enable MAC address move notifications (for Release 2307)
- Enable MAC address move notifications (for Release 2310 and later)
- Enabling ARP fast update for MAC address moves
- Enabling SNMP notifications for the MAC address table
- mac address table configuration example
- Configuration procedure
- configuring mac information
- configuring the mac information queue length
- Configuration guidelines
- Configuring Ethernet link aggregation
- Aggregation states of member ports in an aggregation group
- link aggregation modes
- aggregating links in dynamic mode
- LACP
- How dynamic link aggregation works
- ethernet link aggregation configuration task list
- configuring an aggregation group
- configuring a static aggregation group
- configuring a dynamic aggregation group
- configuring an aggregate interface
- Specifying ignored VLANs on a Layer 2 aggregate interface
- Configuring the expected bandwidth of an aggregate interface
- Configuring an edge aggregate interface
- shutting down an aggregate interface
- Restoring the default settings for an aggregate interface
- Enabling local-first load sharing for link aggregation
- Configuring per-flow load sharing algorithm settings for Ethernet link aggregation
- ethernet link aggregation configuration examples
- layer 2 dynamic aggregation configuration example
- Layer 2 aggregation load sharing configuration example
- Layer 2 edge aggregate interface configuration example
- Layer 3 static aggregation configuration example
- Layer 3 dynamic aggregation configuration example
- Layer 3 edge aggregate interface configuration example
- configuring port isolation
- port isolation configuration example
- stp protocol packets
- basic concepts in stp
- calculation process of the stp algorithm
- RSTP
- mstp features
- how mstp works
- mstp implementation on devices
- STP configuration task list
- RSTP configuration task list
- PVST configuration task list
- mstp configuration task list
- configuring an mst region
- Configuring the root bridge or a secondary root bridge
- spanning tree
- configuring the maximum hops of an mst region
- Setting spanning tree timers
- Configuring the BPDU transmission rate
- configuration example
- Configuring the port link type
- Configuring the mode a port uses to recognize and send MSTP packets
- Enabling the spanning tree feature
- performing mcheck
- configuring digest snooping
- configuring no agreement check
- Configuration prerequisites
- No Agreement Check configuration example
- configuring protection functions
- enabling loop guard
- Configuring port role restriction
- Enabling TC-BPDU guard
- Displaying and maintaining the spanning tree
- Verifying the configuration
- PVST configuration example
- Configuring loop detection
- Loop detection interval
- Port status auto recovery
- Configuring the loop protection action
- Setting the loop detection interval
- configuring vlans
- configuring basic vlan settings
- configuring basic settings of a vlan interface
- Configuring port-based VLANs
- assigning an access port to a vlan
- assigning a trunk port to a vlan
- assigning a hybrid port to a vlan
- Configuring IP subnet-based VLANs
- Configuring an IP subnet-based VLAN
- Configuring protocol-based VLANs
- Displaying and maintaining VLANs
- vlan configuration examples
- IP subnet-based VLAN configuration example
- Protocol-based VLAN configuration example
- configuring a super vlan
- Configuring a super VLAN interface
- super vlan configuration example
- configuration task list
- Displaying and maintaining the private VLAN
- Private VLAN configuration example in trunk promiscuous mode
- Private VLAN configuration example in trunk promiscuous and trunk secondary modes
- Secondary VLAN Layer 3 communication configuration example
- host mode
- Configuring MVRP
- MRP messages
- MRP timers
- Configuring MRP timers
- Enabling GVRP compatibility
- MVRP configuration example
- configuring qinq
- QinQ implementations
- restrictions and guidelines
- Configuring the TPID in VLAN tags
- Configuring the CVLAN TPID
- qinq configuration example
- VLAN transparent transmission configuration example
- configuring vlan mapping
- Application scenario of one-to-two and two-to-two VLAN mapping
- vlan mapping configuration task list
- Configuring one-to-one VLAN mapping
- Configuring many-to-one VLAN mapping
- Configuring many-to-one VLAN mapping in a network with static IP address assignment
- Configuring one-to-two VLAN mapping
- Configuring two-to-two VLAN mapping
- vlan mapping configuration examples
- enable dhcp snooping
- One-to-two and two-to-two VLAN mapping configuration example
- Configuring PBB
- PBB frame format
- PBB frame forwarding
- Enabling L2VPN
- configuring an uplink port
- configuring a downlink port
- configuration procedures
- troubleshooting
- Solution
- configuring lldp
- working mechanism
- lldp configuration task list
- enabling lldp
- Setting the LLDP operating mode
- enabling lldp polling
- configuring the management address and its encoding format
- setting other lldp parameters
- configuring cdp compatibility
- configuring dcbx
- DCBX configuration task list
- Configuring APP parameters
- Configuring ETS parameters
- Configuring PFC parameters
- Configuring the DCBX version
- Configuring LLDP trapping and LLDP-MED trapping
- displaying and maintaining lldp
- DCBX configuration example
- Configuring service loopback groups
- Displaying and maintaining service loopback groups
- Configuring cut-through Layer 2 forwarding
- Index
S5820V2 series
Table of contents
- command conventions
- documentation set
- technical support
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- configuring aaa
- RADIUS
- HWTACACS
- LDAP
- AAA implementation on the device
- AAA for MPLS L3VPNs
- radius attributes
- FIPS compliance
- configuring local users
- Configuring RADIUS schemes
- Configuring HWTACACS schemes
- Configuring LDAP schemes
- Configuring AAA methods for ISP domains
- Configuration prerequisites
- Configuring authentication methods for an ISP domain
- Configuring authorization methods for an ISP domain
- Configuring accounting methods for an ISP domain
- displaying and maintaining aaa
- Local authentication, HWTACACS authorization, and RADIUS accounting for SSH users
- Authentication and authorization for SSH users by a RADIUS server
- Authentication for SSH users by an LDAP server
- troubleshooting radius
- troubleshooting hwtacacs
- X overview
- X-related protocols
- Packet formats
- EAP over RADIUS
- Access device as the initiator
- Comparing EAP relay and EAP termination
- EAP termination
- x configuration task list
- Enabling 802.1X
- Setting the port authorization state
- Setting the maximum number of authentication request attempts
- Configuring the online user handshake function
- Configuration guidelines
- Configuring the quiet timer
- X authentication configuration example
- Verifying the configuration
- configuring mac authentication
- Specifying a MAC authentication domain
- Configuring MAC authentication timers
- displaying and maintaining mac authentication
- RADIUS-based MAC authentication configuration example
- configuring port security
- enabling port security
- Setting port security's limit on the number of secure MAC addresses on a port
- setting the port security mode
- configuring port security features
- configuring secure mac addresses
- displaying and maintaining port security
- port security configuration examples
- userLoginWithOUI configuration example
- macAddressElseUserLoginSecure configuration example
- troubleshooting port security
- cannot configure secure mac addresses
- password setting
- Password updating and expiration
- User login control
- Logging
- Setting global password control parameters
- Setting user group password control parameters
- Setting super password control parameters
- password control configuration example
- Managing public keys
- Creating a local key pair
- Distributing a local host public key
- Displaying a host public key in a specific format and saving it to a file
- Configuring a peer public key
- Displaying and maintaining public keys
- Example for importing a public key from a public key file
- configuring pki
- PKI architecture
- PKI operation
- pki configuration task list
- configuring a pki domain
- Requesting a certificate
- Configuring automatic certificate request
- Manually requesting a certificate
- obtaining certificates
- Verifying certificates without CRL checking
- Exporting certificates
- removing a certificate
- displaying and maintaining pki
- Certificate request from an RSA Keon CA server
- Certificate request from a Windows 2003 CA server
- configuring the device
- Certificate import and export configuration example
- Troubleshooting PKI configuration
- Failed to request local certificates
- Failed to obtain CRLs
- Failed to import a local certificate
- Failed to set the storage path
- configuring ssh
- SSH authentication methods
- configuring the device as an ssh server
- Enabling the SSH server function
- Enabling the SFTP server function
- configuring an ssh user
- setting the ssh management parameters
- Configuring the device as an Stelnet client
- Configuring the device as an SFTP client
- working with sftp files
- Terminating the connection with the SFTP server
- displaying and maintaining ssh
- Publickey authentication enabled Stelnet server configuration example
- Password authentication enabled Stelnet client configuration example
- Publickey authentication enabled Stelnet client configuration example
- SFTP configuration examples
- Publickey authentication enabled SFTP client configuration example
- SCP file transfer with password authentication
- configuring ssl
- ssl configuration task list
- configuring an ssl client policy
- displaying and maintaining ssl
- configuring ip source guard
- Dynamic IPv4 source binding entries
- Configuring a static IPv4 source guard binding entry on an interface
- Configuring the IPv6 source guard function
- ip source guard configuration examples
- Dynamic IPv4 source guard using DHCP snooping configuration example
- Dynamic IPv4 source guard using DHCP relay configuration example
- Static IPv6 source guard configuration example
- Configuring ARP attack protection
- configuring arp source suppression
- Configuring ARP packet rate limit
- Displaying and maintaining source MAC-based ARP attack detection
- Configuring ARP packet source MAC consistency check
- Configuring ARP packet validity check
- Configuring ARP restricted forwarding
- User validity check and ARP packet validity check configuration example
- Configuring ARP automatic scanning and fixed ARP
- Configuration example
- configuring urpf
- network application
- Displaying and maintaining uRPF
- Configuring FIPS
- Configuring FIPS mode
- Configuration changes in FIPS mode
- FIPS self-tests
- Triggering self-tests
- Entering FIPS mode through manual reboot
- configuration file
- configuring ipsec
- Security protocols and encapsulation modes
- security association
- Authentication and encryption
- Protocols and standards
- configuring an acl
- Configuring an IPsec transform set
- configuring a manual ipsec policy
- Configuring an IKE-based IPsec policy
- Applying an IPsec policy to an interface
- Enabling ACL checking for de-encapsulated packets
- Binding a source interface to an IPsec policy
- Enabling QoS pre-classify
- displaying and maintaining ipsec
- IPsec configuration examples
- Configuring an IKE-based IPsec tunnel for IPv4 packets
- configuring ike
- IKE security mechanism
- ike configuration task list
- Configuring an IKE profile
- configuring an ike proposal
- Configuring an IKE keychain
- Configuring the global identity information
- Configuring the IKE keepalive function
- Configuring IKE DPD
- displaying and maintaining ike
- Main mode IKE with pre-shared key authentication configuration example
- troubleshooting ike
- IPsec SA negotiation failed because no matching IPsec transform sets were found
S5820V2 series
Table of contents
- command reference
- obtaining documentation
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Basic CLI commands
- display | { begin | exclude | include }
- display | by-linenum
- display
- display command-alias
- display history-command
- display hotkey
- hotkey
- quit
- screen-length disable
- Login management commands
- authentication-mode
- auto-execute command
- command accounting
- command authorization
- databits
- display line
- display telnet client
- display users
- escape-key
- flow-control
- free line
- free user-interface
- history-command max-size
- line
- line class
- lock
- parity
- protocol inbound
- screen-length
- send
- set authentication password
- shell
- stopbits
- telnet
- telnet client source
- telnet ipv6
- telnet server dscp
- telnet server enable
- telnet server ipv6 dscp
- terminal type
- user-interface class
- user-role
- RBAC commands
- display role feature
- display role feature-group
- feature
- permit interface
- permit vlan
- permit vpn-instance
- role
- role feature-group
- rule
- super
- super default role
- super password
- vlan policy deny
- vpn-instance policy deny
- FTP commands
- free ftp user
- free ftp user-ip
- ftp server acl
- ftp server enable
- ftp server ssl-server-policy
- ftp timeout
- ascii
- binary
- cdup
- debug
- delete
- disconnect
- display ftp client source
- ftp client ipv6 source
- ftp client source
- ftp ipv6
- help
- mkdir
- newer
- passive
- rename
- restart
- rmdir
- rstatus
- status
- system
- user
- TFTP commands
- tftp client ipv6 source
- tftp client source
- tftp ipv6
- tftp-server acl
- tftp-server ipv6 acl
- File system management commands
- copy
- fdisk
- file prompt
- format
- gzip
- md5sum
- more
- mount
- reset recycle-bin
- tar create
- tar list
- umount
- undelete
- Configuration file management commands
- archive configuration location
- archive configuration max
- configuration commit
- configuration commit delay
- configuration encrypt
- display archive configuration
- display current-configuration
- display current-configuration diff
- display default-configuration
- display saved-configuration
- display startup
- display this
- reset saved-configuration
- restore startup-configuration
- save
- startup saved-configuration
- Software upgrade commands
- boot-loader pex file
- boot-loader update
- bootrom update
- display boot-loader
- display boot-loader pex
- reset boot-loader pex
- warm-reboot
- ISSU commands
- display install backup
- display install committed
- display install inactive
- display install ipe-info
- display install log
- display install package
- display install rollback
- display install which
- display issu rollback-timer
- display version comp-matrix
- install abort
- install add
- install commit
- install deactivate
- install remove
- install verify
- issu accept
- issu load
- issu pex
- issu rollback
- issu rollback-timer
- issu run switchover
- reset install log-history oldest
- reset install rollback oldest
- Emergency shell commands
- display copyright
- display interface m-eth0
- display ip routing-table
- display ipv6 routing-table
- display version
- install load
- interface m-eth0
- ip address
- ipv6 address
- ping
- ping ipv6
- shutdown
- system-view
- Device management commands
- clock protocol
- clock timezone
- command
- display clock
- display cpu-usage
- display cpu-usage configuration
- display device
- display device manuinfo
- display device manuinfo fan
- display device manuinfo power
- display diagnostic-information
- display fan
- display memory
- display memory-threshold
- display power
- display scheduler logfile
- display scheduler reboot
- display system stable state
- display system-working-mode
- display transceiver diagnosis
- display transceiver interface
- display transceiver manuinfo
- fan prefer-direction
- memory-threshold
- memory-threshold usage
- monitor cpu-usage enable
- monitor cpu-usage threshold
- password-recovery enable
- reset scheduler logfile
- restore factory-default
- scheduler logfile size
- scheduler reboot at
- scheduler reboot delay
- shutdown-interval
- sysname
- system-working-mode
- time once
- time repeating
- usb disable
- Tcl commands
- tclsh
- Python commands
- License management commands
- display license feature
- display license device-id
- license activation-file uninstall
- license compress
- Index
S5820V2 series
Table of contents
- network management and monitoring
- command conventions
- documentation set
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Ping, tracert, and system debugging commands
- display memory
- display process
- display process cpu
- display process log
- display process memory
- display process memory heap
- display process memory heap address
- display process memory heap size
- monitor process
- monitor thread
- command description
- ping
- ping ipv6
- process
- tracert
- tracert ipv6
- NTP commands
- display ntp-service sessions
- display ntp-service status
- display ntp-service trace
- ntp-service acl
- ntp-service authentication enable
- ntp-service authentication-keyid
- ntp-service broadcast-client
- ntp-service broadcast-server
- ntp-service inbound disable
- ntp-service ipv6 multicast-client
- ntp-service ipv6 multicast-server
- ntp-service ipv6 source
- ntp-service ipv6 unicast-server
- ntp-service max-dynamic-sessions
- ntp-service multicast-client
- ntp-service refclock-master
- ntp-service reliable authentication-keyid
- ntp-service source
- ntp-service unicast-peer
- ntp-service unicast-server
- SNTP commands
- sntp authentication enable
- sntp authentication-keyid
- sntp ipv6 unicast-server
- sntp reliable authentication-keyid
- sntp unicast-server
- Information center commands
- display logbuffer
- display logbuffer summary
- display logfile summary
- info-center enable
- info-center logbuffer size
- info-center logfile frequency
- info-center logfile switch-directory
- info-center logging suppress duplicates
- info-center loghost
- info-center source
- info-center synchronous
- info-center timestamp
- info-center timestamp loghost
- reset logbuffer
- terminal monitor
- terminal debugging
- SNMP commands
- display snmp-agent group
- display snmp-agent local-engineid
- display snmp-agent mib-view
- display snmp-agent remote
- display snmp-agent statistics
- display snmp-agent sys-info
- display snmp-agent usm-user
- snmp-agent
- snmp-agent calculate-password
- snmp-agent community
- snmp-agent group
- snmp-agent local-engineid
- snmp-agent log
- snmp-agent packet max-size
- snmp-agent remote
- snmp-agent sys-info contact
- snmp-agent sys-info version
- snmp-agent target-host
- snmp-agent trap enable
- snmp-agent trap life
- snmp-agent trap source
- snmp-agent usm-user { v1 | v2c }
- snmp-agent usm-user v3
- Port mirroring commands
- mirroring-group
- mirroring-group mirroring-port (interface view)
- mirroring-group mirroring-port (system view)
- mirroring-group monitor-egress
- mirroring-group monitor-port (interface view)
- mirroring-group monitor-port (system view)
- mirroring-group reflector-port
- mirroring-group remote-probe vlan
- Index
Related products
s5820x seriesS5830V2 seriess5800 seriesS3600V2 SERIESS5510 SeriesS5120-SI SeriesS5500-SI SeriesVSR SeriesMSR SeriesS5120-EI SeriesH3C categories
Switch
Network Router
Network Hardware
IP Access Controllers
Firewall
Control Unit
Wireless Access Point
Server
Gateway
Wireless Router
manualsdatabase
Your AI-powered manual search engine